o Conduct Vulnerability Assessment & Penetration Testing for ICT Infrastructure.
o Conduct Code Review for ICT Developed Applications.
o Conduct ICT Security Audits and recommend improvements.
o Manage the implementation of Information Security Tools.
o Assist in ICT Security Incident Response and Post-Incident Review.
o Conduct ICT Security Awareness Workshops.
o Conduct Configuration Audit for various ICT devices such routers, firewall, servers, etc.
· Preferred Certifications (at least 2):
o Certified Information Systems Security Professional (CISSP)
o Certified Security Testing Professional (CSTP)
o Certified Ethical Hacker (CEH)
o GIAC Penetration Tester (GPEN)
o OWASP Web Application Security Professional
o GIAC Web Application Penetration Tester (GWAPT)
o GIAC Certified Intrusion Analyst (GCIA)
o CompTIA Advanced Security Practitioner (CASP)
No comments:
Post a Comment