Technical Specialist - Cyber Security; L3
JOB PURPOSE:
To protect the organization’s IT infrastructure by actively monitoring, analyzing, and responding to security incidents and threats. The Technical Specialist - Cyber Security plays a key role in implementing cybersecurity controls, managing security tools, and ensuring compliance with industry standards and regulatory frameworks.
CERTIFICATIONS:CISSP, CISM, CISA, CompTIA Security+ or equivalent
Cisco CCNA Security or similar, CEH, GIAC, Microsoft SC-200
AI-related training or certification will be considered an added advantage.
EXPERIENCE:Minimum 8-10 years of hands‑on experience in cybersecurity operations, SOC & NOC environments, and security infrastructure management
RESPONSIBILITIES (INCLUDES ALL TASKS):The Technical Specialist - Cyber Security is responsible for monitoring, analyzing, and responding to security incidents using SIEM and other security tools. They play a critical role in maintaining endpoint and network security, managing access controls, supporting vulnerability and patch management, and ensuring compliance with ISO 27001 and other standards. The role includes regular system hardening, firmware updates, configuration backups, and documentation.
The engineer also assists with audit readiness, contributes to threat hunting, and collaborates with internal teams to maintain a secure IT environment.
- Perform triage and investigation of security events and escalation to infosec lead when needed.
- Conduct daily health checks on firewalls, endpoints, security appliances, and SIEM systems.
- Support and manage endpoint protection platforms, email security, and web filtering systems.
- Participate in threat hunting activities and analyze suspicious activities or anomalies.
- Coordinate and support vulnerability assessments and ensure timely patch compliance.
- Maintain system hardening, secure configurations, and adhere to CIS benchmark standards.
- Ensure security controls and processes align with ISO 27001, NIST, and other relevant frameworks.
- Assist in preparing and participating in internal and external ISO audits.
- Prepare and maintain accurate and up‑to‑date security process and documentation, audit logs, SOPs, and reports.
- Perform regular configuration backups and firmware updates for security infrastructure.
- Administer and maintain IAM, MFA, and PAM systems to ensure secure access controls.
- Collaborate with infrastructure and application teams to support secure system operations.
- Respond to audit findings, implement remediation steps, and ensure closure of compliance gaps.
- Contribute to security awareness by documenting incidents, lessons learned, and procedures.
- Participate in 24/7 on‑call rotation or scheduled maintenance windows when required.
Skills and Experience:
- Strong understanding of network security technologies:
- Firewalls:
Palo Alto, Fortigate, Cisco ASA/FTD - VPN technologies and Network Access Control (NAC)
- Hands‑on experience with security operations:
- SIEM tools for monitoring, log analysis, and threat detection
- Incident response and escalation handling
- WAF – F5 ASM, Baracuda
- Endpoint security management:
- Tools such as Crowd Strike, Microsoft Defender, Sentinel One
- DLP:
Forcepoint - Identity and Access Management (IAM):
- Multi‑Factor Authentication (MFA)
- Privileged Access Management (PAM) – Cyber Ark
- Vulnerability management:
- Tools such as Nessus, Qualys
- Patch management processes
- Familiarity with:
- ISO 27001, NIST, GDPR, PCI‑DSS and other security compliance standards
- Experience with:
- Email security gateways:
Proofpoint, Mimecast, Cisco‑ESA - Web proxies:
Forcepoint, Zscaler, Cisco‑WSA - Security hardening and secure configuration practices:
- CIS benchmarks, system hardening techniques
- Proficiency in security monitoring and analysis tools:
- SIEM platforms (e.g., Splunk, QRadar, Solar Winds SEM)
- SOAR platforms (optional but beneficial)
- Compliance and security governance:
- Familiarity with ISO 27001, PCI‑DSS, NIST, GDPR standards
- Involvement in ISO audits, audit readiness, and compliance documentation
- Responsible for conducting periodic reviews of all infrastructure components
- Responsible for conducting vulnerability assessments and penetration testing scans, as well as coordinating…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).