Continuously monitor network traffic, system logs and security alerts for suspicious activity and potential security breaches.
Act as a first responder to security incidents, investigating breaches, containing threats and helping to restore systems.
Conduct regular vulnerability assessments and penetration tests to identify weaknesses in systems and implement necessary improvements.
Contribute to the development of incident response capabilities, policies and procedures.
Ensure that the organisation complies with relevant data protection laws and industry regulations by implementing best practices for securing sensitive data.
Provide detailed reports on security incidents, vulnerabilities and the effectiveness of implemented security measures to stakeholders and IT teams.
Stay informed about the latest cyber threats, vulnerabilities and emerging security technologies to proactively defend against them.
Audit contingency and disaster recovery plans to ensure business continuity in the event of a significant security breach.
Work closely with IT and other departments to share information, implement security best practices and enhance the overall security posture of the organisation.
Provide cybersecurity awareness training to colleagues to help them understand and follow security protocols.
Requirements
Analytical Mindset : The ability to analyse large amounts of data to identify anomalies and potential risks.
Technical Proficiency : Knowledge of operating systems, firewalls, encryption, VPNs and security information and event management (SIEM) systems. C ISSP, CISM, CEH or CompTIA Security+ would be a plus.
Attention to Detail : Meticulous in reviewing data and systems to catch even minor security flaws.
Strong Communication : Ability to clearly communicate findings and recommendations to both technical and non-technical audiences.
Methodical and Logical: Applying an organised and rational process to tasks, including investigating complex problems and finding solutions.
Proactive Approach : A willingness to research new threats and technologies to stay ahead of attackers.