Creating and managing processes related to handling security reports and findings.
Presenting to the client the progress report on security activities and upcoming plans.
Managing different stakeholders across multiple teams who are engaged in performing patching, upgrades, environment configurations, and vulnerabilities remediations.
Ability to recommend technologies, frameworks, or workaround that comply with international and local cyber security regulations.
Solid understanding for the security protocols, standards, policies, and practices.
Perform recurrent checks and reviews for the developed products and flag potential risks related compliance or potential threats.
Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement.
Serve as a focal point of contact for the information security team and the customer or organization.
CERTIFICATIONS:
Having the one or more from the following certificates is a plus: