IT Security Risk Associate

Overview

The IT Security Associate is responsible for supporting the organization’s cybersecurity efforts by assisting in the implementation of security measures, monitoring security incidents, and ensuring compliance with established security policies. This role involves working closely with the IT Security team to protect the organization’s digital assets from threats and vulnerabilities. The ideal candidate will have a solid understanding of IT security principles, excellent attention to detail, and strong problem-solving skills. 

Job Description

Key Responsibilities:

Security Monitoring: Assist in monitoring security systems (e.g., firewalls, intrusion detection systems) and responding to security incidents, ensuring timely identification and mitigation of potential threats.

Incident Response: Support the IT Security team in responding to security incidents, conducting root cause analysis, and implementing corrective actions to prevent future occurrences.

Access Control: Monitor user access controls and permissions to ensure that only authorized personnel have access to sensitive systems and data.

Vulnerability Management: Assist in identifying and mitigating vulnerabilities in the organization's IT infrastructure through regular vulnerability assessments and patch management activities.

Security Awareness: Participate in the development and delivery of security awareness programs, educating employees on cybersecurity best practices and potential risks.

Compliance: Support: Ensure compliance with relevant security policies, standards, and regulations, such as ISO 27001, GDPR, or PCI-DSS, by supporting security audits and assessments.

Security Documentation: Maintain and update security documentation, including security policies, incident reports, and risk assessments, to ensure accurate and up-to-date records.

Network Security: Assist in implementing network security measures, including firewall configurations, VPNs, and intrusion prevention systems, to protect against unauthorized access.

Collaboration: Work with IT teams, vendors, and other departments to support the integration of security controls into new and existing systems.

Education:

Bachelor’s degree in Information Security, Computer Science, or a related field.

Bachelor’s degree in Information Security, Computer Science, Information Technology, or a related field.

Relevant certifications such as Certified Ethical Hacker (CEH), or Certified Information Systems Security Professional (CISSP) are an advantage.

Prior experience in IT security or a related field is preferred.

Skills & Requirements

Security Systems (e.g., Firewalls, Intrusion detection systems), Incident Response, Access Control, Vulnerability Assessments, Patch Management, Security Awareness, ISO 27001, GDPR, PCI-DSS, Security Audits, Risk Assessments, VPNs, Intrusion Prevention Systems, CEH, CISSP Certifications

Apply Now

Join Our Community

Let us know the skills you need and we'll find the best talent for you