The purpose of this role is to ensure best protection for company's information assets against threats and vulnerabilities.
1. Perform vulnerability assessment and penetration testing on the defined scope, and provide a comprehensive the report.
Conduct application security testing prior to deployment, by collaborate with IT developer/engineer
Conduct application penetration testing in regular basis, and ensure all findings are addressed.
2. Perform security monitoring, data/log and forensic analysis, to proactively detect security incidents and threats.
Ensure all security event & incident are recorded and all log sorurces are connected to Security Event and Incident Management (SEIM) tools, i.e. QRadar monitoring system.
Provide Incident Response actions needed to mitigate threats, steps needed to restore services
3. Plan for and perform periodic security reviews to validate that the security posture satisfies Information Security and facility security requirements.
Conduct User Acces Management (Matrix and Review)
Ensure the implementation of IT Security Awareness program for all employees conducted regularly
4. Recommend countermeasures, security techniques, tools and vendor products to mitigate security vulnerabilities and strengthen the overall security posture
Involve in the assigned IT Projects, provide technical design, implementation planning, testing and troubleshooting expertise for security infrastructure components.
Defining access privileges, security control, and security procedures.
Conduct security assessment for new IT software
5. Implement information security strategy and risk management
Ensure Information Security policies and procedures are maintained and in accordance with applicable regulation.
Ensure risk identification, risk assessment, risk control, risk monitoring comply with internal and external regulations.
Bachelor degree, Graduate from reputable university majoring in Information Technology or Computer Science
5+ years experience in a reputed organization as IT Security Specialist.
Knowledge of implementing baseline secure configurations, conduct vulnerability assessment, penetration testing and implement controls, OWASP, patch management, firewalls and intrusion detection/prevention system.
Experienced in IT security policy, governance and compliance.
Have good knowledge in system, networking and cyber security concept.
Knowledge in cloud security is an advantage.
Certification in IT Security area (e.g. CISA, CISM, CCSP, CompTIA Security+, etc.) would be an added advantage.
The AG I&B Indonesia provides engineering consulting and project management services for industrial facilities in the Food & Beverage, pharmaceutical and FMCGâ¦
Ensuring the service standards and procedures, and guest experience are well implemented.
Employee benefit card offering discounted rates in Accor Hotelsâ¦