Responsibilities
- Oversee and manage endpoint security, ensuring all devices are protected against threats.
- Implement and monitor IoT security measures to safeguard connected devices.
- Ensure the security of assets, including laptops and servers, through robust security policies and
procedures.
- Manage access controls to action resources such as SharePoint, File Server, Teams, etc., ensuring
only authorized personnel have access.
- Conduct regular security audits and coordinate with external auditors to ensure compliance with
security standards and regulations.
- Identify, document, and manage security risks, actions, issues, and dependencies.
- Develop and implement security policies, protocols, and procedures.
- Monitor network traffic for unusual activity and respond to potential security breaches.
- Perform vulnerability assessments and penetration testing to identify and address security
weaknesses.
- Ensure all security measures are up-to-date and in line with the latest industry standards.
- Provide training and guidance to staff on security best practices and protocols.
- Maintain accurate and up-to-date records of all security incidents and actions taken.
- Report regularly to senior management on the status of security measures and any incidents that
occur.
Requirements And Skills
- 5-8 years of experience in IT security or a related field.
- Bachelor's degree in Computer Science, Information Technology, or a related field.
- Proven working experience as an IT security lead or similar role.
- Strong understanding of endpoint security, IoT security, and asset security.
- Experience managing access controls for resources such as SharePoint, File Server, and Teams.
- Familiarity with security audit processes and working with external auditors.
- Excellent client-facing and internal communication skills.
- Excellent written and verbal communication skills.
- Strong organizational skills, including attention to detail and multitasking abilities.
- Proficiency in Microsoft Office.
- Relevant security certifications (e.g., CISSP, CISM, CEH) are a plus.