Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Role
Qualification & Skills required
Duties
Systems Security Operations Engineer
Essential:
• Bachelor’s degree in computer science or relevant field
• MCSE, MCSA 2019
• CCNA
• MS Azure Administrator
• Office 365 expert
• VMware VCP
• Linux Redhat
• Minimum 7 years of experience in System and Security operations field
Desirable:
• ITIL certified.
• Lead, deliver, implement, and maintain end-to-end system, and security infrastructure solutions utilizing new technologies, including on prem and cloud solutions.
• Desing and maintain security posture and resilient System, throughout the entire systems and security landscape.
• Recommend and Drive recommended changes as needed in response to technology trends, business needs or audits.
• Undertake projects workload and while ensuring necessary deliverables are achieved within agreed project time and cost constraints, ensuring closure and design documentations availability and accuracy.
• Carry out routine maintenance, failover tests, and drills to continuously monitor the systems against established thresholds and BCP benchmarks.
• Perform proactive incident response and closure within SLAs and maintaining RCAs and KBs
• Assist with development and management of the System and security budgets.
• Align with IT risk management initiatives and Internal/External corporate audit.
Must have - Modules
Essential:
Server Hardening and Benchmarking:
• Define the benchmarking standards for the endpoint and server environments.
• Implement and enforce security configurations aligning to benchmarks for server’s endpoint and minimize security exposure.
• Disable unnecessary services and features to reduce the attack surface.
• Regularly apply security patches and updates to all endpoints to address known vulnerabilities.
• Develop and maintain a patch management strategy to ensure timely updates.
• Ensure legacy services, protocols and vulnerable services are not in use.
• Support regular vulnerability assessments on servers.
• Enforce and implement strong identity and privilege access controls.
• Manage RBAC and permissions on servers and application environment.
• Implement strong authentication mechanisms, such as multi-factor authentication (MFA).
• Ensure periodic reconciliation of security controls services for infrastructure services.
• Enforce conditional access to all critical SaaS, PaaS & IaaS services.
• Execute and remediate all the gaps as per the VAPT report.
• Review the existing GPO’s and apply the latest and up to date security baseline.
• Ability to remediate the weak ciphers for the instances running on all environments (On-prem & Cloud)
• Review all the existing delegated permissions across all systems and advise for the recommended actions.
• Ability to manage the Linux Redhat OS and do a proper patching and hardening.
• Ability to fix and remediate the gaps appeared on VMware environment.
Security Monitoring and Analysis:
• Ensure security logging and auditing is enabled on all the infrastructure components at server and application level.
• Analyse security alerts and take appropriate action to mitigate threats.
Cryptographic controls:
• Enforce strict encryption controls for all services and data at rest and in transit.
• Manage key vaults and certificates with robust security practices.
• Ensure all key management is audited and logged and managed with adequate approval workflows.
Interpersonal Skills:
• - Can-Do/Will-Do Attitude
• - Committed to achieve
• - Continuous development
• - Quick learning
• - Team player
• - Ability to work with the least supervision
Key Skills
Ranked by relevanceReady to apply?
Join Dautom and take your career to the next level!
Application takes less than 5 minutes

