The cyber security plays a crucial role in protecting the university's digital assets, infrastructure, and data from cyber threats. This position is responsible for monitoring and responding to security incidents, implementing and managing security controls, conducting vulnerability assessments, developing security policies.
Key Responsibilities:Threat Monitoring and Incident Response: o Monitor security alerts and logs from various security tools o Analyze security incidents to determine their scope, impact, and root cause. o Follow established incident response procedures to contain, eradicate, and recover from security incidents. o Document security incidents and actions taken. o Participate in post-incident analysis and recommend improvements to security controls. Security Control Implementation and Management: o Design, implement, and maintain security controls and technologies o Develop and maintain security configurations and documentation. o Evaluate and recommend new security technologies and solutions. o Ensure the proper functioning and effectiveness of security controls. Vulnerability Management: o Conduct regular vulnerability scans and penetration testing of university systems and applications. o Analyze vulnerability reports and prioritize remediation efforts. o Track and report on the status of vulnerability remediation. o Provide guidance to system owners on addressing identified vulnerabilities. |
Security Policy and Awareness:o Assist in the development, implementation, and maintenance of university security policies, standards, and procedures. o Contribute to the development and delivery of security awareness training programs for faculty, staff, and students. o Promote a culture of security awareness across the university. Data Protection and Privacy: o Assist in the implementation of data protection and privacy measures. o Ensure compliance with relevant data privacy regulations. o Participate in data security incident investigations. Security Architecture and Planning: o Contribute to the development and maintenance of the university's security architecture. o Participate in the planning and design of secure IT systems and infrastructure. Threat Intelligence: o Stay up-to-date on the latest cyber security threats, trends, and vulnerabilities. o Analyze threat intelligence feeds and incorporate relevant information into security monitoring and defenses. |