Job Title: Security Posture Assessment
Job Description
We are seeking a highly skilled security posture assessment analyst to join our cybersecurity team. The Ideal candidate will be responsible for conducting comprehensive assessment of our organization’s security posture identifying vulnerabilities and recommending measure to enhance our security resilience. Candidate responsible for building a baseline view of organization's security capabilities end-to-end. The ultimate aim of such an assessment is to build maturity in the organization’s cyber resilience strategy to minimize the risk of cyberattacks and data breaches. Able to understand organisation’s security posture, a holistic view of the personnel, processes, policies and technologies.
Qualifications
Graduation/Post graduation in, Computers, Information Systems, Computer Science, or Information technology systems
7+ years of work experience in cyber security /Information security project, with security posture assessment
At least one technical certification required (CISM, CISSP, CEH, Cloud security)
Should have at least one cyber security certification (CRISC, OSCP, ISACA, GIAC, ISO2701)
Experience with Network Security design and Active Directory management and architecture.
Experience with NIST Cybersecurity Framework and Risk Management Framework is strongly preferred.
Knowledge of banking business and information technology practices and trends in banking sector
Understanding of technology-related issues and how they might impact business;
Awareness of appropriate local laws and regulations dealing with technology;
Ability to communicate effectively, both orally and in writing.
Strong analytic skills and business judgment with ability to independently assess and resolve complex program/project issues
Skills Required
Conduct Vulnerability assessments and analyse security control and configuration to identify the potential risks to organizations information system and data
Strong analytical thinking skills to interpret assessment result, prioritize risks, and recommended effective resolutions.
Must have a better understanding of Risk assessment and Vulnerability assessment
Awareness of relevant laws and regulations impacting information security, privacy and data protection.
Personal skills:
Graduation/Post graduation in, Computers, Information Systems, Computer Science