Maintain all aspects of IT security, including servers, email systems, operating systems, security tools, applications, laptops, desktop computers, software, and hardware.
Take charge of important tasks, projects, and solutions as part of a bigger company initiative including network and system security.
Foster dependable networking and network security infrastructure that is constantly operational.
Manage security policies, support standards, and respond to client security demands.
Maintain & manageÿemployee, contractor, and supplier identities and secure access.
Configure, as well as, troubleshoot the entire security structure and related devices.
Identify the security issues in the systems and take appropriate measures to resolve them
Identify and define the right system security requirements.
Spot security breaches in sensitive data and resolve them immediately
Develop appropriate technical solutions along with the latest security tools that help mitigate security vulnerabilities and also help automate repeatable activities
Manage and maintain network firewalls (Parameter, Core and Datacenter).
Design and maintain ACLs for IP traffic by different vendors (Cisco, FortiGate, Palo Alto, F5).
Manage and maintain PAM solution for remote access users, contractors or suppliers.
Manage and maintain Proxy servers and internet filtration.
Manage and maintain Application level protection by (web application firewalls/load balancers).
Manage and maintain Email security
Manage and maintain other network devices like IPS, IDS, and sandboxes.
Manage and maintain certificates deployed on network services related to security devices.
Apply the preventive/routine maintenance to network security devices.
Maintain and security for Wireless networks for the MBCC.
Design end point security policies to protect end point devices.
Manage and maintain MDM for mobile devices.
Security hardening for network devices, servers and endpoint devices.
Manage and maintain internal Certificate Authorities.
Prepare and document standard operating protocols and procedures
Randomly audit end point devices, servers and network devices.