Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailTrigyn has a contractual opportunity for an ICT End User HW/SW Support. This resource will be working at our client site in Lebanon.
Job Responsibilities:
The Cybersecurity Analyst will study the OIOS Audit report prepare a comprehensive plan to implement the audit recommendations and assist in implementing the audit recommendations within the given time.
* Monitoring ICT Infrastructure websites and web applications for security threats and vulnerabilities.
* Responding to cybersecurity incidents such as malware infections or phishing attacks.
* Analyzing cybersecurity alerts and determining the appropriate response.
* Conducting vulnerability assessments and penetration testing to identify potential weaknesses in the organizations security posture.
* Assisting with the implementation and maintenance of cybersecurity controls such as firewalls intrusion detection systems and antivirus software.
* Collaborating with other IT professionals such as network administrators system administrators and software developers to ensure a coordinated approach to cybersecurity.
* Assisting with incident response planning and testing to ensure the organization is prepared for cybersecurity incidents.
* Assisting with the development and implementation of cybersecurity policies technical procedures and guidelines
* Assisting with the identification and assessment of risks and implementing risk management processes and procedures.
* Supporting compliance with enterprise cybersecurity policies relevant laws regulations and industry standards.
* Assisting with the preparation of reports on governance risk and compliance issues for senior management.
* Collaborating with other units and stakeholders to ensure a coordinated approach to governance risk and compliance.
* Participating in continuous improvement efforts to enhance the organizations governance risk and compliance practices.
* Participating in risk assessments and internal audits to identify areas of noncompliance or potential risks.
* Assisting with the development and implementation of BCP and DR plans to ensure the organization is prepared for potential disasters or disruptions.
* Developing and documenting procedures for responding to disasters or disruptions.
* Testing and evaluating BCP and DR plans to ensure they are effective and uptodate.
* Monitoring and reporting on compliance with policies and procedures including tracking incidents of noncompliance and following up with appropriate parties.
* Staying uptodate on changes in enterprise cybersecurity policies laws regulations and industry standards related to governance risk and compliance.
* Assisting with the development and implementation of cybersecurity training programs to promote compliance and risk management awareness.
* Participating in security awareness training and promoting a culture of cybersecurity within the organization.
Outputs
The ultimate result of service for a cybersecurity analyst is to help ensure the confidentiality integrity and availability of an organizations information and systems. The primary goal of a cybersecurity analyst is to protect the organization from cyber threats and to minimize the impact of cybersecurity incidents. This includes:
* Identifying and mitigating vulnerabilities in the organizations ICT Infrastructure websites web applications and endpoints.
* Detecting and responding to security incidents in a timely manner.
* Maintaining the organizations compliance with relevant policies and standards.
* Promoting a culture of security awareness within the organization.
* Ensuring that security controls are implemented effectively and are operating as intended.
* Contributing to the development of cybersecurity policies and procedures.
* Monitoring emerging security threats and adjusting security strategies as needed.
* Continuously improving the organizations security posture through risk assessments vulnerability scanning penetration testing and other cybersecurity testing activities.
Qualifications
A First Level University degree in Information Technology Computer Science or related area is required.
* A minimum of 2 years work experience in two or more of the following areas: Governance Risk Web Application BCP/DR Application security Information security Network and Endpoint security.
* A minimum of 2 years of experience in Threat Vulnerability and Incident Management
* A minimum of 2 years of experience in Governance Risk and Compliance (GRC)
* English and French are the working languages. Fluency in English is required.
For Immediate Response Please send your Resume to
TRIGYN TECHNOLOGIES is a multinational IT services company with resources deployed in 28 countries. TRIGYN is an ISO 9001:2015 ISO 27001:2022 (ISMS) and CMMI Level 5 certified company. TRIGYN has offices in the United States Canada Switzerland and India.
Qualifications :
A First Level University degree in Information Technology Computer Science or related area is required.
* A minimum of 2 years work experience in two or more of the following areas: Governance Risk Web Application BCP/DR Application security Information security Network and Endpoint security.
* A minimum of 2 years of experience in Threat Vulnerability and Incident Management
* A minimum of 2 years of experience in Governance Risk and Compliance (GRC)
* English and French are the working languages. Fluency in English is required.
For Immediate Response Please send your Resume to
TRIGYN TECHNOLOGIES is a multinational IT services company with resources deployed in 28 countries. TRIGYN is an ISO 9001:2015 ISO 27001:2022 (ISMS) and CMMI Level 5 certified company. TRIGYN has offices in the United States Canada Switzerland and India.
Remote Work :
No
Employment Type :
Contract
Contract