A bachelor's or master’s degree in computer science, Information Security, or a related field.
Relevant certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), CEH (Certified Ethical Hacker), or similar are preferred.
Skills and Experience:
Incident Response: Proven experience in investigating security incidents, conducting root cause analysis, and implementing corrective actions.
Network Security: Knowledge of network protocols, firewalls, VPNs, IDS/IPS, and network monitoring tools.
Operating System Security: Knowledge of securing various operating systems (Windows, Linux, Unix) and managing OS-level vulnerabilities and EDR / XDR solutions.
Database Security: Knowledge of database security practices, including encryption, access controls, and monitoring.
Threat Intelligence: Ability to analyze threat intelligence and apply it to enhance the organization's security posture.
Compliance and Governance: Familiarity with regulatory requirements and industry standards CIS Controls, PCI-DSS, ISO 27001.
Experience:
Years of Experience: Typically, 5-10 years of experience in information security roles.