Find Work
Indonesian

Cyber Security Specialist in Ziguinchor

Sort By:
_________
Cyber Security Specialist in Ziguinchor
Ziguinchor

Hiring a cyber security specialist to safe guard our business digital assets from cyber threats, unauthorized access, and data breaches. The ideal candidate should have a strong technical background in penetration testing, cloud and network security, cryptography or digital forensics.

The candidate should ideally certified in security analyst, IT support, Cybersecurity engineering, Penetration testing, and security architect

Responsibilities

  • Network Security – Configuring firewalls, encryption, and access controls.
  • Programming & Scripting – Knowledge of Python, PowerShell, or Bash for automation.
  • Security Training – Educating employees on cybersecurity awareness and safe practices.
  • Threat Detection & Prevention – Monitoring systems for vulnerabilities and implementing security measures.
  • Security Frameworks – Familiarity with NIST, ISO 27001, and CIS benchmarks.
  • Cloud Security – Securing AWS, Azure, or Google Cloud environments.
  • Authentication & Encryption – Implementing Kerberos, SSL/TLS, and multi-factor authentication.
  • Incident Response – Investigating security breaches and mitigating damage.
  • Penetration Testing – Using tools like Metasploit and Wireshark to assess vulnerabilities.
  • Compliance & Risk Management – Ensuring adherence to security regulations and best practices.

Technical Skills & Tools

  • Network Security – Configuring firewalls, encryption, and access controls.
  • Programming & Scripting – Knowledge of Python, PowerShell, or Bash for automation.
  • Security Training – Educating employees on cybersecurity awareness and safe practices.
  • Threat Detection & Prevention – Monitoring systems for vulnerabilities and implementing security measures.
  • Security Frameworks – Familiarity with NIST, ISO 27001, and CIS benchmarks.
  • Cloud Security – Securing AWS, Azure, or Google Cloud environments.
  • Authentication & Encryption – Implementing Kerberos, SSL/TLS, and multi-factor authentication.
  • Incident Response – Investigating security breaches and mitigating damage.
  • Penetration Testing – Using tools like Metasploit and Wireshark to assess vulnerabilities.
  • Compliance & Risk Management – Ensuring adherence to security regulations and best practices.
Apply for this job
_
;

Activity Logs

There are 2 new tasks for you in “AirPlus Mobile App” project:
Added at 4:23 PM by
img
Meeting with customer
Application Design
img
img
A
In Progress
View
Project Delivery Preparation
CRM System Development
img
B
Completed
View
Invitation for crafting engaging designs that speak human workshop
Sent at 4:23 PM by
img
Task #45890merged with #45890in “Ads Pro Admin Dashboard project:
Initiated at 4:23 PM by
img
3 new application design concepts added:
Created at 4:23 PM by
img
New case #67890is assigned to you in Multi-platform Database Design project
Added at 4:23 PM by
Alice Tan
You have received a new order:
Placed at 5:05 AM by
img

Database Backup Process Completed!

Login into Admin Dashboard to make sure the data integrity is OK
Proceed
New order #67890is placed for Workshow Planning & Budget Estimation
Placed at 4:23 PM by
Jimmy Bold

Shopping Cart

Iblender The best kitchen gadget in 2022
$ 350 for 5
SmartCleaner Smart tool for cooking
$ 650 for 4
CameraMaxr Professional camera for edge
$ 150 for 3
$D Printer Manfactoring unique objekts
$ 1450 for 7
MotionWire Perfect animation tool
$ 650 for 7
Samsung Profile info,Timeline etc
$ 720 for 6
$D Printer Manfactoring unique objekts
$ 430 for 8

Candidate Name

Translator