Ability to handle Microsoft Office and other programs, along with the capability to import and export information in all the MS Office applications,
Creating databases in Access or Excel
Handle information security in IT
Knowledge of risk assessment procedures, authentication technologies, policy formation, and security attack pathologies
Good command over verbal and written communication
Knowledge of various application ,system architecture security and practices
Solution oriented with good interpersonal skills
Ability to perform tasks with minimal supervision
Effective organizational and time management skills
Developing and implementing PCI DSS and ISO27001 policies
Managing SIEM and Vulnerability Nessus Tenable Product
Ethical Hacking
Plan, execute and lead security audits across an organization
Inspect and evaluate financial and information systems, management procedures and security controls
Evaluate the efficiency, effectiveness and compliance of operation processes with corporate security policies and related government regulations
Develop and administer risk-focused exams for IT systems
Review or interview personnel to establish security risks and complications
Execute and properly document the audit process on a variety of computing environments and computer applications
Assess the exposures resulting from ineffective or missing control practices
Accurately interpret audit results against defined criteria
Weigh the relevancy, accuracy and perspective of conclusions against audit evidence
Provide a written and verbal report of audit findings
Develop rigorous “best practice” recommendations to improve security on all levels
Foreing Languages: English