Plato Consult Limited IT Jobs in Accra
1. Patiently scroll down and read the job description below.
2. Scroll down and find how to apply or mode of application for this job after the job description.
3. Carefully follow the instructions on how to apply.
4. Always apply for a job by attaching CV with a Cover Letter / Application Letter.
-->
JOB PURPOSE
The successful applicant shall be responsible for playing a critical part in protecting our organization's endpoints (laptops, desktops, mobile devices) from cyber threats. The individual shall be responsible for monitoring, analyzing, and responding to security incidents, implementing, and maintaining endpoint security controls, and continuously improving the overall security posture of the Organization.
The role reports to the Head of Cyber Security.
ROLE-SPECIFIC
- Proactively monitors endpoint security systems for suspicious activity, malware infections, and other threats.
- Analyzes security logs and alerts to identify and investigate potential security incidents.
- Conducts in-depth threat-hunting and incident response activities.
- Collects, analyzes, and correlates security data from various sources to identify trends and patterns.
- Implements and maintains endpoint security controls.
- Develops and maintains security policies and procedures related to endpoint security.
- Conducts regular vulnerability assessments and penetration testing of endpoints.
- Responds to security incidents related to endpoints, including malware outbreaks, data breaches, and ransomware attacks.
- Contains and mitigates the impact of security incidents.
- Conducts root cause analysis of security incidents to prevent future occurrences.
- Assists in the recovery and restoration of systems and data after security incidents.
- Contributes to security awareness and training programs for employees on best practices for endpoint security.
- Educates employees on identifying and reporting suspicious activity.
- Stays abreast of the latest cyber threats, vulnerabilities, and security best practices.
- Researches and evaluates new security technologies and tools.
- Contributes to the continuous improvement of our security processes and procedures.
ADVERTISEMENT - CONTINUE READING BELOW
ADVERTISEMENT - CONTINUE BELOW TO APPLY
-->
1. Patiently scroll down and read the job description below.
2. Scroll down and find how to apply or mode of application for this job after the job description.
3. Carefully follow the instructions on how to apply.
4. Always apply for a job by attaching CV with a Cover Letter / Application Letter.
JOB PURPOSE
The successful applicant shall be responsible for playing a critical part in protecting our organization's endpoints (laptops, desktops, mobile devices) from cyber threats. The individual shall be responsible for monitoring, analyzing, and responding to security incidents, implementing, and maintaining endpoint security controls, and continuously improving the overall security posture of the Organization.
The role reports to the Head of Cyber Security.
ROLE-SPECIFIC
- Proactively monitors endpoint security systems for suspicious activity, malware infections, and other threats.
- Analyzes security logs and alerts to identify and investigate potential security incidents.
- Conducts in-depth threat-hunting and incident response activities.
- Collects, analyzes, and correlates security data from various sources to identify trends and patterns.
- Implements and maintains endpoint security controls.
- Develops and maintains security policies and procedures related to endpoint security.
- Conducts regular vulnerability assessments and penetration testing of endpoints.
- Responds to security incidents related to endpoints, including malware outbreaks, data breaches, and ransomware attacks.
- Contains and mitigates the impact of security incidents.
- Conducts root cause analysis of security incidents to prevent future occurrences.
- Assists in the recovery and restoration of systems and data after security incidents.
- Contributes to security awareness and training programs for employees on best practices for endpoint security.
- Educates employees on identifying and reporting suspicious activity.
- Stays abreast of the latest cyber threats, vulnerabilities, and security best practices.
- Researches and evaluates new security technologies and tools.
- Contributes to the continuous improvement of our security processes and procedures.
ADVERTISEMENT - CONTINUE READING BELOW
ADVERTISEMENT - CONTINUE BELOW TO APPLY