You will:
1. Cyber Vigilance:
- Monitor and analyze security event logs to identify potential security incidents.
- Respond to security incidents in a timely and effective manner, ensuring minimal disruption to business operations.
2. Risk Management:
- Conduct risk assessments and vulnerability management to identify potential security threats.
- Develop and implement mitigation strategies to minimize risk.
3. Compliance and Governance:
- Ensure compliance with IT security policies, regulations, and standard e.g IM8 , PDPA.
- Develop and maintain security policies, procedures, and guidelines.
4. Incident Response:
- Develop and maintain incident response plans and procedures.
- Coordinate incident response efforts with stakeholders, including IT teams and management.
5. Security Awareness and Training:
- Promote security awareness and training programs for employees.
- Develop and deliver security training sessions to enhance employee knowledge and skills.
6. You Will:
- First person and POC for all security incidents and escalations
- The ITSM shall inform the parties listed in the Technical SOP within the Expected Response Timeline of the Incident Management.
- The information to be provided shall include the incident reference number, description, date and time and the impact (including who had been affected) of the incident.
- To administer, maintain and assess the implementation of security processes.
- To develop System Owner support for acquiring and sustaining adequate resources for incident response.
- To be the corporate intermediary for coordinating communications between System Owner and incident response personnel.
- To serve as a trusted custodian of incident information for ensuring the preservation and admissibility of evidence.
- To ensure the compliance with the required IT security policies.
- To perform the logs review in all security system managed by our operational team
- To review system security logs and to work with the client manager and onsite technical team on follow up actions.
- To perform regular policy review and enhancement to ensure all are in line with agency requirements.
- To promote IT security awareness, latest risk and cyber responsibility.
- To participate in incident response table-top exercises, simulation and drills either conducted internally by the contractor or as required by client.