1. Serves as the subject matter expert for supported security technologies and during escalations; provides direction to infrastructure, operations, data, and application developments groups throughout the transitioning phase, implementation in production, and beyond.
2. Plans and directs the implementation and testing of security systems concept and architecture, and prepares security standards, policies, and procedures.
3. Implements security solution for ISA products like (DDOS,WAF…) and for Network (IPS & IDS…); ensures security levels for all new appliances; recommends improvements where applicable.
4. Evaluates ISA/Clients standards, security controls, and industry best practices to determine network information security requirements and specifications and achieve successful solution delivery.
5. Maps all existing processes required for network and applications with focus on security architecture.
6. Ensures all applications within ISA are in line with agreed measures, compliant with PCIDSS standards and with audit and legal requirements.
7. Applies security DevOps best practices and methodologies integrated with DevOps processes by specifying intrusion detection methodologies and equipment; prepares preventive and reactive measures; creates, transmitting, and maintaining keys.
8. Conducts system security and vulnerability analyses and risk assessments, analyzes cyber technologies, metrics models and performance indicators, to recommend the appropriate architecture/platform.
9. Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducts incident response analyses; maintains knowledge of engineering next-gen designs, security trends, threats, and attack techniques.
10. Regularly undertakes penetration testing across the network and application to assess performance capabilities (reliability, maintainability, and availability) versus security and risk, provides feedback to Governance team.
11. Builds and maintains effective relationships with security partners and vendors, management, peers, project managers, and internal customers.
12. Defines system security reports that provide insight into potential threat issues and threat analysis.
13. Updates job knowledge by tracking and understanding emerging security practices and standards. Conducts necessary trainings for ISA/clients when required.
14. Performs any other additional duties as directed by the line manager