




Job Summary: An Information Security professional responsible for managing, monitoring, and implementing security policies; responding to incidents; and training staff to ensure data and system protection. Key Highlights: 1. Manage and monitor information security infrastructure. 2. Implement security policies and procedures; conduct audits. 3. Respond to security incidents and coordinate disaster recovery. **Description and Responsibilities:** **Working Hours:** Business hours **Level:** Professional **Employment Type:** Service Provider \- PJ * Manage and monitor the organization’s information security infrastructure. * Implement security policies and procedures to protect data and systems. * Conduct regular security audits and risk assessments. * Respond to security incidents and coordinate disaster recovery. * Collaborate with IT teams to ensure security across all operations and projects. * Stay updated on information security trends and threats. * Train and raise awareness among staff regarding security practices. * Document and report security incidents and corrective actions. * Configure and manage security tools such as firewalls and intrusion detection systems. **Requirements:** * Bachelor’s degree in Information Technology or a Bachelor’s degree in any field plus a postgraduate program in Computer Networks and/or Information Security (minimum 360 hours). * ITIL 4 Foundation certification or training. * Experience in information security systems administration with one of the following certifications: Fortinet FCP or F5 BIG\-IP. * Information security management; provision of support, maintenance, administration, improvement planning, and updates for perimeter security, network security, and strategic information security solutions; * Third\-level technical support related to information security services and systems, including continuous assessment, incident response, vulnerability testing, and operational access control; * Development, analysis, and implementation of security policies, penetration testing, etc.; * Analysis and remediation of server and service vulnerabilities; advanced knowledge of firewall, proxy, URL filtering, NAT, and information integrity configuration and administration; * Installation, configuration, and administration of firewall, antivirus, and VPN consoles; * Experience creating automation scripts using Linux Shell and PowerShell; * Installation, configuration, and administration of load balancers/capacity balancers such as HAProxy and BigIP; * Router configuration, routing protocols, and ACL creation on routers and switches; * Knowledge of industry best practices (ISO 9001:2000, ISO 17799, ISO 27001, ISO 20000, ITIL, COBIT, and Governance). **Benefits:** No benefits provided


