08-02-2022, 02:18 PM
|
|
|
|
لوني المفضل
Cadetblue
|
رقم العضوية : 25890 |
تاريخ التسجيل : Thu Dec 2021 |
فترة الأقامة : 883 يوم |
أخر زيارة : 20-05-2024 (09:05 PM) |
المشاركات :
26,625 [
+
]
|
التقييم :
10 |
معدل التقييم :
|
بيانات اضافيه [
+
] |
شكراً: 0
تم شكره مرة واحدة في مشاركة واحدة
|
|
|
اخصائي الامن السيبراني
- Review cybersecurity policies and processes to ensure that all security controls are implemented and managed to keep company assets safe .- Ensure the compliance with SAMA's cybersecurity framework to reach the required security maturity level.- Performing cybersecurity reviews periodically to ensure prevention of unauthorized access to the company's assets.- Anticipate any new threats and work to prevent them from happening.- Conducting vulnerability assessment periodically against organization’s assets in order to implement the needed security controls. - Identify and manage cybersecurity risks to address them and reduce the likelihood of their occurrence- Work with other executives across different departments to ensure that security procedures are implemented within the organization’s systems.- Apply cybersecurity policies to the company's technical systems to protect them- Conducting cybersecurity awareness campaigns to increase the employee’s knowledge and alertness in various cybersecurity risks- Performing any other tasks requested by the CISO- Ensure that implementation of secure and restricted logical access to information and technology assets- Use the SIEM tool / dashboard and reports along with other monitoring / admin tools to continuously monitor the security status of the system and compliance with certification requirements.- Perform system and network forensics analysis of suspected or potential security incidents- Manage Vendor’s Services- Support preventing critical applications, data and systems from unauthorized access, by supervising the implementation by the related departments.- Support in processing all approval requests related to PAMPrepare the design and ********ation of IAM integration solutions for an optimized IAM environment- Design IAM controls in support of the Governance and Compliance team to mitigate future threats unauthorized access- Create and maintain new relevant ********ation to include, but not limited to, Standard Operating Procedures, project change control methodologies, and architectural diagrams for IAM solutions- Manage security solutions such as DLP, EDR, AV, ICT, NAC, Patch management.- Ensure that implementation of secure and restricted logical access to information and technology assets
أكثر...
|