- Chi tiết công việc
- Giới thiệu công ty
Thu nhập: Cạnh tranh
Loại hình: Toàn thời gian
Chức vụ: Nhân viên
Mô tả công việc
Mô tả Công việc
1. Systems Management:
Threat Monitoring and Analysis: Continuously monitor networks and systems for security breaches or vulnerabilities and investigate and respond to potential threats.
Security Policy Development: Develop, implement, and enforce security policies, procedures, and protocols to protect sensitive data and ensure regulatory compliance.
Risk Assessment and Vulnerability Management: Proficient in conducting regular risk assessments, vulnerability scans, and penetration tests, and collaborating with IT teams to implement remediation strategies for enhanced cybersecurity posture
Audit: Review all changes of systems, make sure all changes are recorded (including quality and process verification are meeting standards)
Incident Response: Lead incident response efforts, including containment, eradication, and recovery from security breaches, and document lessons learned.
Identity and Access Management: Manage and monitor access controls, permissions, and multi-factor authentication systems to ensure appropriate user access.
Using data loss prevention technologies/strategies to protect sensitive data and develop and implement extensive security plans, policies and procedures to protect personnel, assets and information.
2. Troubleshooting and Support
Provide technical support for end-users and troubleshoot issues related to security issues.
Employee Training and Awareness: Conduct training and awareness programs to educate staff on security best practices, phishing threats, and safe online behavior.
Collaboration: Work closely with IT and development teams to design secure infrastructure and recommend security improvements.
Incident Response & Documentation: Leading incident response efforts, including root cause analysis and post-incident reporting, to ensure lessons learned are integrated into future security planning.
Threat Monitoring and Analysis: Continuously monitor networks and systems for security breaches or vulnerabilities and investigate and respond to potential threats.
Security Policy Development: Develop, implement, and enforce security policies, procedures, and protocols to protect sensitive data and ensure regulatory compliance.
Risk Assessment and Vulnerability Management: Proficient in conducting regular risk assessments, vulnerability scans, and penetration tests, and collaborating with IT teams to implement remediation strategies for enhanced cybersecurity posture
Audit: Review all changes of systems, make sure all changes are recorded (including quality and process verification are meeting standards)
Incident Response: Lead incident response efforts, including containment, eradication, and recovery from security breaches, and document lessons learned.
Identity and Access Management: Manage and monitor access controls, permissions, and multi-factor authentication systems to ensure appropriate user access.
Using data loss prevention technologies/strategies to protect sensitive data and develop and implement extensive security plans, policies and procedures to protect personnel, assets and information.
Provide technical support for end-users and troubleshoot issues related to security issues.
Employee Training and Awareness: Conduct training and awareness programs to educate staff on security best practices, phishing threats, and safe online behavior.
Collaboration: Work closely with IT and development teams to design secure infrastructure and recommend security improvements.
Incident Response & Documentation: Leading incident response efforts, including root cause analysis and post-incident reporting, to ensure lessons learned are integrated into future security planning.
1. Systems Management:
Threat Monitoring and Analysis: Continuously monitor networks and systems for security breaches or vulnerabilities and investigate and respond to potential threats.
Security Policy Development: Develop, implement, and enforce security policies, procedures, and protocols to protect sensitive data and ensure regulatory compliance.
Risk Assessment and Vulnerability Management: Proficient in conducting regular risk assessments, vulnerability scans, and penetration tests, and collaborating with IT teams to implement remediation strategies for enhanced cybersecurity posture
Audit: Review all changes of systems, make sure all changes are recorded (including quality and process verification are meeting standards)
Incident Response: Lead incident response efforts, including containment, eradication, and recovery from security breaches, and document lessons learned.
Identity and Access Management: Manage and monitor access controls, permissions, and multi-factor authentication systems to ensure appropriate user access.
Using data loss prevention technologies/strategies to protect sensitive data and develop and implement extensive security plans, policies and procedures to protect personnel, assets and information.
2. Troubleshooting and Support
Provide technical support for end-users and troubleshoot issues related to security issues.
Employee Training and Awareness: Conduct training and awareness programs to educate staff on security best practices, phishing threats, and safe online behavior.
Collaboration: Work closely with IT and development teams to design secure infrastructure and recommend security improvements.
Incident Response & Documentation: Leading incident response efforts, including root cause analysis and post-incident reporting, to ensure lessons learned are integrated into future security planning.
Threat Monitoring and Analysis: Continuously monitor networks and systems for security breaches or vulnerabilities and investigate and respond to potential threats.
Security Policy Development: Develop, implement, and enforce security policies, procedures, and protocols to protect sensitive data and ensure regulatory compliance.
Risk Assessment and Vulnerability Management: Proficient in conducting regular risk assessments, vulnerability scans, and penetration tests, and collaborating with IT teams to implement remediation strategies for enhanced cybersecurity posture
Audit: Review all changes of systems, make sure all changes are recorded (including quality and process verification are meeting standards)
Incident Response: Lead incident response efforts, including containment, eradication, and recovery from security breaches, and document lessons learned.
Identity and Access Management: Manage and monitor access controls, permissions, and multi-factor authentication systems to ensure appropriate user access.
Using data loss prevention technologies/strategies to protect sensitive data and develop and implement extensive security plans, policies and procedures to protect personnel, assets and information.
Provide technical support for end-users and troubleshoot issues related to security issues.
Employee Training and Awareness: Conduct training and awareness programs to educate staff on security best practices, phishing threats, and safe online behavior.
Collaboration: Work closely with IT and development teams to design secure infrastructure and recommend security improvements.
Incident Response & Documentation: Leading incident response efforts, including root cause analysis and post-incident reporting, to ensure lessons learned are integrated into future security planning.
Yêu cầu
Yêu Cầu Công Việc
Education & Major: Information Technology, Computer Science, or a related field. Industry certifications preferred
License & Certificate: Relevant certifications (e.g., CISSP, CEH, CompTIA Security+) is a plus.
English level: Good
Strong knowledge of SIEM, firewalls, VPNs, IDS/IPS, data loss prevention (DLP) technologies multi-factor authentication (MFA), and vulnerability scanning tools (e.g., Nessus, Qualys).
Proficiency with security protocols, encryption, and cryptography.
Familiarity with compliance standards (e.g., GDPR, HIPAA, PCI-DSS).
Experience with vulnerability scanning and penetration testing tools.
Ability to conduct root cause analysis for security incidents.
Education & Major: Information Technology, Computer Science, or a related field. Industry certifications preferred
License & Certificate: Relevant certifications (e.g., CISSP, CEH, CompTIA Security+) is a plus.
English level: Good
Strong knowledge of SIEM, firewalls, VPNs, IDS/IPS, data loss prevention (DLP) technologies multi-factor authentication (MFA), and vulnerability scanning tools (e.g., Nessus, Qualys).
Proficiency with security protocols, encryption, and cryptography.
Familiarity with compliance standards (e.g., GDPR, HIPAA, PCI-DSS).
Experience with vulnerability scanning and penetration testing tools.
Ability to conduct root cause analysis for security incidents.
Quyền lợi
Laptop
Chế độ bảo hiểm
Xe đưa đón
Chăm sóc sức khỏe
Đào tạo
Tăng lương
Nghỉ phép năm
Chế độ bảo hiểm
Xe đưa đón
Chăm sóc sức khỏe
Đào tạo
Tăng lương
Nghỉ phép năm
Thông tin chung
- Thu nhập: Cạnh tranh
Cách thức ứng tuyển
Ứng viên nộp hồ sơ trực tuyến bằng cách bấm nút Ứng tuyển bên dưới:
Hạn nộp: 31/12/2024
Giới thiệu công ty
Xem trang công ty
Rochdale Spears Company is an internationally focused, business-to-business enterprise, serving some of the biggest names in the luxury furniture market. We are proud leader in exceptional design, innovative product development and world-class manufacturing.
We are proud to uphold a positive culture and safe working environment for our team, allowing them to perform at their highest ability, and provide outstanding service to our customers.
As custodians of the planet, we remain committed to...
We are proud to uphold a positive culture and safe working environment for our team, allowing them to perform at their highest ability, and provide outstanding service to our customers.
As custodians of the planet, we remain committed to...
Quy mô công ty
Từ 1000 - 5000 nhân viên
Việc làm tương tự
Công ty TNHH Phát triển Công nghệ Hệ Thống - SYSTECH
15 - 20 triệu
04/12/2024
Hồ Chí Minh, Bình Dương, Hưng Yên, Thái Bình, Thanh Hóa
CÔNG TY TNHH GIA THÙY
14 - 17 triệu
30/11/2024
Hồ Chí Minh, Bình Dương, Đồng Nai
CÔNG TY CỔ PHẦN ĐẦU TƯ XÂY LẮP THÀNH PHÚ
Thoả thuận
28/11/2024
Hồ Chí Minh, Bình Dương
Công Ty TNHH Kỹ Thuật Và Xây Dựng Song Nam
9 - 12 triệu VNĐ
06/12/2024
Hồ Chí Minh, Bình Dương
Công ty TNHH Sinh Nam Metal (Việt Nam)
10 - 15 triệu
18/11/2024
Bình Dương
CÔNG TY TNHH CIRQL MANUFACTURING VIETNAM
Từ 800 - 1200 USD
29/11/2024
Hồ Chí Minh, Bình Dương
hỗ trợ doanh nghiệp
Giải thưởng
của chúng tôi
Top 3
Nền tảng số tiêu biểu của Bộ
TT&TT 2022.
Top 15
Startup Việt xuất sắc 2019 do VNExpress tổ chức.
Top 10
Doanh nghiệp khởi nghiệp sáng tạo Việt Nam - Hội đồng tư vấn kinh doanh ASEAN bình chọn.
Giải Đồng
Sản phẩm công nghệ số Make In Viet Nam 2023.