Collaborates with users to discuss computer data access needs, identify security threats and violations, and identify and recommend needed or process changes.
Conduct risk assessments for projects and changes to identify threats, vulnerabilities, calculate risk values and suggest risk treatments.
Monitor and review logs generated by all security systems to identify violations and threats.
Monitor change management procedure to ensure compliance with cybersecurity requirements.
Review cybersecurity policies and procedures and ensure compliance with regulatory requirements and best practices.
Monitor compliance with regulatory requirements e.g. PCI DSS, SWIFT CSP, ISO27001, COBIT2019.
Conduct users and privileges reviews on systems, platforms, applications and IT resources.
Conduct vulnerability scans, validate reports and remediation.
Participate in cyber incident response procedures and investigations.
Determines when to update virus protection systems by monitoring current reports of computer viruses; facilitates or performs needed updates.
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.