Job Description
·Conductthoroughauditsofinformationtechnologysystems,includinghardware,software,networks,and databases.·Evaluatetheeffectivenessofcybersecuritymeasures,identifyingpotentialvulnerabilitiesandrisks.·Ensurecompliancewithindustry-specificregulations,dataprotectionlaws,andcybersecuritystandards.·AssesstheintegrityandaccuracyofdatastoredandprocessedwithinITsystems.·IdentifyandmitigateIT-relatedrisks,includingsecuritybreaches,dataloss,andsystemfailures.·Examinethesecuritymeasuresimplementedincomputernetworkstoprotectagainstunauthorizedaccess and data breaches.·ReviewandassesstheeffectivenessofsecuritypoliciesandproceduresgoverningITsystems.·Developandevaluateincidentresponseplanstoensurepreparednessforcybersecurityincidents.·Audituseraccesscontrolstopreventunauthorizedaccesstosensitiveinformationandsystems.·Assessthesecuritymeasuresofexternalvendorsandthird-partyserviceproviderstomitigatesupplychain risks. A bachelor’s degree in Information Technology, ComputerScience,Cybersecurityorarelatedfieldis often a minimum requirement