Puesto, ciudad o estado.

Hace 1 mes

IT Security Specialist

Salario no mostrado por compañía.

GoHire en

Esta es una vacante externa, deberás completar el proceso en el sitio de la empresa.

Hace 1 mes

IT Security Specialist

Salario no mostrado por compañía.

GoHire

en

Esta es una vacante externa, deberás completar el proceso en el sitio de la empresa.

Detalles

Espacio de trabajo:Presencial

Descripción

A Security Specialist focused on app development and IT infrastructure plays a crucial role in ensuring the security and integrity of digital assets. They are responsible for identifying vulnerabilities, implementing security measures, and responding to security breaches. Below are the tools commonly used by Security Specialists to perform their duties effectively across different aspects of cybersecurity: Requirements * Vulnerability and Threat Assessment * Nessus or Qualys: For vulnerability scanning and identifying security weaknesses in software, networks, and systems. * Burp Suite or OWASP ZAP (Zed Attack Proxy): Tools for web application security testing, useful in identifying vulnerabilities in web apps. * Penetration Testing * Metasploit: An open-source framework for developing, testing, and executing exploits. * Kali Linux: A Linux distribution designed for digital forensics and penetration testing, containing numerous tools for security testing and research. * Security Compliance and Frameworks * Chef Compliance: For automating compliance checks and managing configuration policies across the enterprise. * Nmap: For network discovery and security auditing, useful in compliance assessments and audits. * Kibana and Elastic search for analysis over logs * CloudWatch and other AWS tools for gathering relevant information * Perform audit testing in endpoints and APIS to ensure compliance with the best security standards (JWE Encryption one of them) Responsibilities * Risk Assessment and Management: Identify, assess, and prioritize risks to the organization's information assets, and implement measures to mitigate these risks. * Vulnerability Assessment and Penetration Testing: Conduct regular scans of systems, networks, and applications to identify vulnerabilities. Perform penetration testing to evaluate the security of systems by simulating attacks. * Security Monitoring and Incident Response: Monitor security systems and logs for unusual activities that might indicate a breach. Develop and execute incident response plans to contain and mitigate the impacts of security incidents. * Security Policies and Procedures Development: Develop, implement, and maintain policies, procedures, and controls to ensure the security and compliance of systems and data. * User Education and Awareness Training: Conduct training sessions and awareness programs for employees to ensure they understand security risks and adhere to best practices and company policies. * Compliance and Auditing: Ensure systems and processes comply with relevant laws, regulations, and standards (such as GDPR, HIPAA, ISO 27001). Prepare for and facilitate security audits. * Data Protection and Privacy: Implement measures to protect sensitive data from unauthorized access and breaches, ensuring data privacy and compliance with data protection regulations. * Threat Intelligence: Keep abreast of the latest security threats, vulnerabilities, and mitigation techniques. Share intelligence with the team and use it to improve security measures. * Access Control and Identity Management: Manage access to systems and data through robust identity and access management (IAM) practices. Ensure that only authorized individuals can access certain data and systems. * Security Architecture and Design Review: Participate in the design and development of new systems and applications to ensure that security is integrated into the architecture from the ground up. * Disaster Recovery and Business Continuity Planning: Develop and maintain plans to ensure the organization can recover from security incidents or disasters and continue operations with minimal downtime. * Endpoint Security Management: Secure all endpoints, including mobile devices, laptops, and desktops, against malware, ransomware, and other threats. * Network Security Management: Implement and manage network security measures such as firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS) to protect data in transit and at rest. * Encryption and Data Security: Implement encryption strategies for data at rest and in transit to protect sensitive information. * Third-Party Security Management: Assess and manage the security risks associated with third-party vendors and service providers to ensure they comply with the organization's security requirements.

ID: 18208583