Job Seeker Reactivate Your Account
Thank you, this account has been Deactivated.
Do you want to Reactivate your account?
No
Yes

IT Security Consultant

Myanmar Human Capital Solutions
| Yangon
Verified This job has been verified by the company as a real job vacancy.
25 Aug 2020
Recruiter active 1 day ago The recruiter at this company was last active reviewing applications.
Sorry, Unable to Apply
x
55%
Please Upload CV Attachment, or update your JobNet Profile to at least 55% of completion.
Upload CV
Update Profile

IT Security Consultant

Myanmar Human Capital Solutions
Recruiter active 1 day ago The recruiter at this company was last active reviewing applications.
Myanmar - Yangon
Verified This job has been verified by the company as a real job vacancy.

Experience level

Manager

Job Function

IT Hardware, Software

Job Industry

Banking/ Insurance/ Microfinance

Min Education Level

Bachelor Degree

Job Type

Full Time

Job Description

A Fantastic Opportunity for ...

  • Oversee the company’s Information Security Program
  • Work with IT Director to define information security-related objectives that will enable the company to meet its legal, contractual and business related requirements for data confidentiality, integrity and availability through the effective use of technology controls, procedural controls and information security awareness and educational objectives
  • Ensure that the company security related objectives are being met
  • Continually assess the overall effectiveness of the information security program
  • Coordinate the development and maintenance of the company’s Information Security Policy and ensure that it coordinates with other Information Technology Policies
  • Work with IT Director to define and maintain the company’s Information Security Policy regarding information classification, the proper handling of the company’s information at all sensitivity levels, the rules for the issuance of computer accounts and the assignment of privileges, the definition of acceptable proof of identity for accessing information resources, who authorizes access to information, how authorization decisions are documented and enforced, and the process of responding to information security related incidents
  • Coordinate the development, maintenance and documentation of technology standards and procedures
  • Work with IT Team to confirm that technology related standards and procedures effectively implement the company’s IT security related policies in a cost effective practical manner
  • Review third party products and services to ensure that they do not increase the risk of the company’s information being compromised
  • Manage IT security incidents
  • Promote security awareness and education
  • Convey security related policies and procedures to company’s clients and vendors utilizing a variety communication vehicles (web content, presentations, articles, email)
  • Develop and manage the company’s information security awareness program for company’s employees
  • Manage information security related projects as needed
  • Coordinate the company’s response to information security related audit findings and request made by Authorities
  • Perform operational functions where necessary for segregation of duties
  • Regularly review system activity logs to proactively uncover potential threats to company data and systems, and to ensure that operational and administrative controls are functioning appropriately
  • Review and authorize access requests beyond standard user access (highly privileged system access, access by vendors)
  • Serve as a Process Manager, coordinating the company’s investigation of and response to the possible exposure of sensitive company information
  • Research, recommend, install, configure, operate, maintain and monitor security related products that satisfy the company’s information security
  • Advise IT Director in the development of standards and procedures for: servers and workstations, handheld devices, network equipment, databases, applications
  • Research, recommend, install, configure, maintain and operate software products that can detect: improperly configured servers and workstations, application program code weakness
  • Perform technical investigations of suspected system compromises
  • Educate IT support staff in security best practices for configuring, administering, operating and monitoring technology

Open To

Repatriate
Male/Female

Job Requirements

  • Minimum S1 Information Technology from reputable university
  • Working experience in the field of banking or financial institution (Information Security) of at least 5 years
  • Security Certifications are advantage (CISA, CISM, CRISC, ECSA, CCNA, CCNP, CCIE, CHFI, CISSP, CEH, MCSE) or other certification in networking and security area
  • Able to have IT security infrastructure managerial skills (design, implement, maintain, configure and review)
  • Knowledge in IT Security Management System (ISMS), ISO27001, AS400 and wide range of security products
  • Able to conduct IT vulnerability assessment and security penetration testing (Pentest)
  • Knowledge in firewalls, intrusion detection and prevention (IPS/IDS), anti malware, security information and event management, vulnerability analysis, account provisioning/deprovisioning, directory management, active directory, cryptography, group policy, enhanced authentication privilege management through the assignment of security groups and application of Access Control Lists Forensic tools, Log Events, and any other IT security
  • Good presentation and commnication skills
  • Fluent in English (both speaking and writing)

What We Can Offer

Benefits

-

Highlights

  • An awesome company
  • Join a winning team
  • You can make a difference

Career Opportunities

  • Opportunities for promotion
  • Possibility for job training
  • Learn new skills and techniques