Min. 2+ years of hands-on experience in IT security.
· Experience in evaluating cybersecurity controls and advising on process improvements or potential control breaches within organizational cybersecurity standards, procedures, and controls.
· Information security awareness and training initiatives.
· Hands-on technical experience in computer networking concepts, protocols, and network security methodologies.
· Deep technical understanding and hands-on experience with Network Firewalls and Intrusion Prevention Systems (IPS).
· Technical experience in Windows and Linux infrastructure.
· Hands-on technical experience with security solutions such as antivirus, proxies, Web Application Firewalls (WAF), MDM, Endpoint Detection and Response (EDR), etc.
· Technical experience in vulnerability assessment/management, risk assessment, ethical hacking techniques, network security, product evaluation and security implementation.
· Hands-on technical experience with Security Information & Event Management (SIEM), Privileged Access Management (PAM) and Multi-Factor Authentication (MFA) solutions.
· Experience in cybersecurity, including analysis, auditing, documentation, research, and development of security audit, policies, standards, and procedures.
· Experience in Incident Response handling, including detection, analysis, containment and recovery from cybersecurity incidents, ensuring minimal impact on organizational