Defining access privileges, security control, and security procedures
- Analyzing security problems, identifying abnormalities in systems and network
- Implement security monitoring and security improvements by assessing current situation, evaluating trends/symptoms and anticipation to avoid problems
- Ensure alignment ISMS Policy within the organization Own and run Cloud Security tools and processes. That includes: Scanners, Container Security, Vulnerability Management, Cloud Security Posture Management Threat-modeling
- Innovate and build tools that automates the detection of security issues and processes
- Build standards and guides and deliver trainings for developers to write secure Infrastructure as Code (laC)
- Be a trusted security advisor to engineering teams
- Conduct Security Awareness Policy
- Have knowledge of NGFW Firewall, Anti-Virus, WAF, DLP, Proxy, Anti DDOS) and other security networking hardware/software tools
- Have knowledge of LAN and WAN networking concepts
- Have experience in threat modeling and risk identification.
- Preferably have IT Security competency certification
- Have experience providing security threat assessments and technical guidance for network architecture design and security considerations
- Have experience communicating effectively across internal and external organizations, for complex mission-critical solutions
- Good communication and interpersonal skill
- Have strong analytical skills and tech-savvy
- Fast learning
"Waspada terhadap Modus Penipuan pada saat proses interview. Perusahaan tidak akan memungut biaya apapun dalam melakukan proses interview. Mohon segera melaporkan ke kami, jika pada saat Anda diundang untuk interview dan diminta untuk melakukan pembayaran dengan sejumlah uang."
"Please be aware of the Fraud Company. The company will never be collecting any payment in the process of interview. Please immediately report to us if there's any companies that collecting payment to the Jobseekers."