Job Description
Key Accountabilities
- DLP Implementation: The resource will be involved in planning, configuring, and deploying DLP solutions across the organization’s network, endpoints, and data storage systems. They will work closely with IT teams to ensure seamless integration of DLP technologies.
- Policy Development: The resource needs to collaborate with stakeholders to define data protection policies, guidelines, and best practices. This includes identifying and classifying sensitive data based on its type, importance, and regulatory requirements.
- Data Classification: The resource will develop and implement data classification schemes that categorize information based on its level of sensitivity, confidentiality, and criticality. He will work with business units to ensure consistent and accurate data labeling.
Other Accountabilities
- Risk Assessment: Conducting risk assessments to identify potential vulnerabilities, threats, and risks related to data handling and protection. He should recommend and implement controls and countermeasures to mitigate these risks effectively.
- Incident Response: Monitoring and investigating potential data breaches, security incidents, or policy violations. He will be responsible for analyzing incidents, identifying the root cause, and implementing corrective actions to prevent future occurrences.
- Compliance and Auditing: Collaborating with compliance teams to ensure adherence to industry standards, privacy regulations, and data protection laws. They will assist in conducting regular audits and assessments to evaluate the effectiveness of DLP controls and data classification practices
Competencies
- Adaptability/Flexibility
- Computer Skills
- Creativity/Innovation
- Decision Making/Judgment
- Dependability
- Initiative
- Integrity/Ethics
- Internet Savvy
- Managing Technology
- Personal Organization
- Planning
- Problem Solving/Analysis
- Process PRIME postings manually
- Process transaction vouchers received from various Departments (internal)
- Productivity
- Quality
- Receipt and verify the posting and payroll documents received
- Results Focus
- Self Development
- Sense of Urgency
- Strategic Thinking/Management
- Summary
- Technical Skills
- Vision and Values
Skills
Skills
- Anomaly Detection
- Authentication
- Cryptography
- Cyber Crime Trend Analysis
- Cyber Security Administration
- Cyber Security Analysis
- Cyber Security Architecture
- Cyber Security Audits
- Cyber Security Best Practices
- Cyber Security Compliance
- Cyber Security Design
- Cyber Security Governance
- Cyber Security Monitoring
- Cyber Security Planning
- Cyber Security Policy Management
- Cyber Security Regulations
- Cyber Security Risk Management
- Cyber Security Standards and Procedures
- Cyber Security Testing
- Cyber Security Threat Monitoring
- Cyber Security Tools/Products
- Cyber Threats and Attacks
- Data Analysis
- Disaster Recovery
- Encryption and Authentication
- Encryption/Decryption
- Event Monitoring/Log Analysis
- Fault Diagnosis/Isolation/Detection
- Firewall Management
- Hacking Countermeasures
- Incident Response
- Incidents Reporting
- Intrusion Detection
- Intrusion Detection Systems
- Malware Analysis
- Network Forensics
- Network Protocols
- Network Topologies
- Penetration Testing
- Threat Containment
- Vulnerability Assessments
Education
- Bachelor’s degree in Computer Science or equivalent