Job Seeker Reactivate Your Account
Thank you, this account has been Deactivated.
Do you want to Reactivate your account?
No
Yes

IT Network & Security Specialist

Asia Strategic Holdings
Kamaryut | Yangon
Verified This job has been verified by the company as a real job vacancy.
19 Jan 2023
Recruiter active 1 week ago The recruiter at this company was last active reviewing applications.
Sorry, Unable to Apply
x
55%
Please Upload CV Attachment, or update your JobNet Profile to at least 55% of completion.
Upload CV
Update Profile
IT Network & Security Specialist
Asia Strategic Holdings, Kamaryut | Yangon

IT Network & Security Specialist

Asia Strategic Holdings

IT Network & Security Specialist

Asia Strategic Holdings
Recruiter active 1 week ago The recruiter at this company was last active reviewing applications.
Myanmar - Yangon
Verified This job has been verified by the company as a real job vacancy.

Experience level

Experienced Non-Manager

Job Function

IT Hardware, Software

Job Industry

Consulting/Professional Services

Min Education Level

Bachelor Degree

Job Type

Full Time

Job Description

An Excellent Opportunity for ...

Key Purpose of the Job: 

Network & Security Administrator's main responsibilities include design and implement a network security policy across the network. He/she have basic to advanced familiarity and skills in network operations, manage threats, potential risks and vulnerabilities, as well as measures and strategies to mitigate them. 

 

IT network/ infrastructure and security management 

  • Build the standard network & infrastructure for belonging Business Units. 

  • Implement tools to assist in detection, prevention, and analysis of security threats. 

  • Awareness training of the workforce on information security standards, policies, and best practices. 

  • Implement protections, patching on Applications, Systems, Devices. 

  • Install and use of firewalls, data encryption and other security products and procedures. 

  • Conduct penetration testing, simulating an attack on the system to find exploitable weaknesses. 

  • Monitor networks and systems for security breaches, through the use of software that detects intrusions and anomalous system behavior. 

  • Develop strategies to respond to and recover from a security breach. 

  • Lead incident response, including steps to minimize the impact and then conducting a technical and forensic investigation into how the breach happened and the extent of the damage. 

IT Cloud Architecture 

  • Create a well-informed cloud strategy and manage the adaption process. 

  • Regularly evaluate cloud applications, hardware, and software. 

  • Develop and organize cloud systems. 

  • Respond to technical issues in a professional and timely manner. 

  • Offer guidance in infrastructure movement techniques including bulk application transfers into the cloud. 

  • Identify the top cloud architecture solutions to successfully meet the strategic needs of the company. 

IT Audit 

  • Examine internal IT controls, evaluate the design and operational effectiveness, determine exposure to risk, and develop remediation strategies. 

  • Collaborate with IT compliance manager to audit and support security configuration at group level 

  • Plan, implement, monitor, and upgrade security measures for the protection of the organization’s data, systems, and networks. 

  • Conduct efficient and effective IT audit procedures. 

  • Perform regular audit testing and provide recommendations. 

  • Review, evaluate, and test application controls. 

  • Provide recommendations and guidance on identified security and control risks. 

  • Develop a strong understanding of business and system processes. 

IT Development 

  • Design/Deploy/Lead the IT projects. 

  • Work with other departments, stakeholders, vendors in implementing IT projects. 

  • Build the workflow, action plan, project documents, and work with IT related members in implementing the projects, security solution. 

Open To

Male/Female

Job Requirements

  • Bachelor Degree holder
  • Computer Information Systems, Management Information Systems, Computer Science or Information Technology or related are preferable 
  • 3-5 years experiences in related field
  • Excellent IT skills, including knowledge of computer networks, operating systems, software, hardware, and security 
  • An understanding of the cyber security risks associated with various technologies and ways to manage them
  • A good working knowledge of various security technologies such as network and application firewalls, host intrusion prevention and anti-virus 
  • Knowledge of public cloud (AWS, Azure, GCP) 
  • Aanalytical and problem-solving skills to identify and assess risks, threats, patterns and trends 
  • An ability to work under pressure, particularly when dealing with threats and at times of high demand. 
  • Hard-working and willing to learn 

What We Can Offer

Benefits

Rewards for over performance

Highlights

International standards
Joined an experienced team

Career Opportunities

Learn new skills on the job