Information that should not be disclosed:
- Sensitive information related to company operations, Firewall, WAF, SIEM, AV, EDR, Proxy
- Plans for deployment and internal programs
- Transfer of sensitive information to affected parties
- Activities relating to security incidents:a. Identification of affected systems.b. Attack vectors and affected applications.c. Containment of the incident and affected critical applications.d. Analysis of the incident for lessons learned
- Details of the incident externally or publicly
- Disabling networks or critical infrastructure
- 7. Policies related to information handling and coordination with internal teams
- Information security and communications for business continuity and legal obligations
- Contact and coordination with regulators and relevant authorities in case of serious incidents
- Access the server using the specified IP address
- The existing contracts must be evaluated with clear and explicit confirmation from the legal departments, after reviewing the requirements and the relevant technical documentation
- Identified issues must be addressed according to the inspection reports
- The plan must be reviewed and updated if necessary to ensure it aligns with current operational requirements
- All necessary steps, approvals, and security measures must be implemented for the protection and smooth operation of the targeted systems
- The installations were equipped with monitoring devices for cameras and sensors, IDS/IPS monitoring, file protection, inspection of ports and connections, and other security measures
Requirements
Education:
- Bachelor's degree in Computer Science, Information Security, or a related field (Master's preferred).
Certifications:
- Required: CISSP or CASP (or equivalent advanced security certification).
- Preferred: CCNA (Networking), GSEC, or SCS.
Experience:
- 5+ years of hands-on experience in cybersecurity engineering, security operations, or network defense.
- Proven experience with enterprise-grade security tools and infrastructure protection.
- Strong understanding of threat modeling, risk assessment, and incident management.
Technical Skills:
- Deep knowledge of TCP/IP, routing, and network protocols.
- Experience with SIEM, EDR, IDS/IPS, WAF, and cloud security solutions.
- Familiarity with scripting or automation (Python, PowerShell, Bash