Senior Officer Incident Handling Forensics

@UCC
  • Post Date : July 9, 2024
  • Apply Before : July 16, 2024
  • 1 Click(s)
  • View(s) 7
Email Job
  • Share:

Job Detail

  • Experience 5 Years
  • Gender Both
  • Industry MassCommunication
  • Qualifications Master’s Degree
  • Job Type Freelance

Job Description

 

Job Purpose
To ensure prompt and effective incident response and forensic analysis, to safeguard and improve the resilience of the communication sector infrastructure and services against cyber threats.
Primary Tasks and Responsibilities
1.       Develop and maintain comprehensive incident response plans tailored to the communications sector, outlining procedures for detecting, assessing, containing, and mitigating cyber incidents.

2.       Implement advanced monitoring tools and techniques to continuously monitor communication networks and systems for signs of security breaches, intrusions, malware infections, or other cyber threats.

3.       Assess and prioritise reported security incidents based on their severity, impact, and relevance to critical communication infrastructure and services, ensuring a swift and effective response.

4.       Serve as the central point of contact for coordinating incident response efforts internally within UCC and externally with communication service providers, government agencies, law enforcement, and other relevant stakeholders.

5.       Lead efforts to contain and remediate security incidents, including isolating affected systems, removing malware, restoring services, and implementing corrective actions to prevent future occurrences.

6.       Conduct post-incident analysis to identify lessons learned, gaps in security controls, and areas for improvement in incident response procedures, and prepare comprehensive incident reports for management, stakeholders, or law enforcement as required.

7.       Provide training, guidance, and support to UCC staff, communication service providers, and other stakeholders on incident handling best practices, timely reporting, and response to security incidents.

8.       Manage and review the performance of direct reports, assigning tasks effectively, setting development goals, and ensuring alignment with organisational objectives.

9.       Maintain flexibility to accommodate any other duties assigned by the line supervisor from time to time.

Key Performance Indicators
1.       Implemented cybersecurity processes, procedures, guidelines, frameworks, and strategies.

2.       Timeliness and accuracy in submitting periodic reports on investigated cybersecurity incidents, information security unit operations, and cyber and threat intelligence.

3.       Implemented cybersecurity capacity-building programs.

4.       Conducted on-site and off-site security examinations and advisory services.

5.       Delivered information security consultancy sessions to internal and external stakeholders.

6.       Accuracy and timeliness of incident report submissions.

Education and Professional Qualifications
•      Master’s degree in IT, IS, cyber security, computing or related field.

•      Bachelor’s degree in computer science, information technology, cybersecurity, or a related field.

•      Membership in a relevant professional body or possession of a professional certification in ICT security, CISSP/ GCIA/ GCFA/ CHFI/CEH/ CISA/ CISM.

Working Experience 
Minimum of four (4) years of progressively experience in incident response, including handson experience in detecting, analysing, and responding to cybersecurity incidents. This may involve working in a security operations center (SOC), incident response team, or similar role where rapid incident triage and resolution are essential.
Skills, Knowledge and Abilities
Technical 

• Knowledge of industry-standard incident response frameworks, such as NIST Incident Response Guide, SANS Incident Handling Steps, or similar methodologies, to guide and streamline incident response processes.

  • Proficiency in using incident response tools and utilities, such as packet capture tools, forensic analysis software, memory analysis tools, malware analysis and threat intelligence platforms.
  • Experience with IDS/IPS solutions to monitor network traffic, detect suspicious activities, and prevent unauthorised access or exploitation of vulnerabilities.
  • Knowledge of vulnerability assessment and management processes to identify and prioritise security vulnerabilities in systems and applications, and coordinate remediation efforts.
  • Knowledge of digital forensics principles and techniques to conduct thorough investigations, analyse digital evidence and determine the root cause of security incidents.

Behavioural 

  • Collaboration with internal and external stakeholders.
  • Excellent communication and presentation skills.
  • Strong organisational and time management skills.
  • Critical thinking, adaptability and resilience.
  • High level of integrity.

Important Notice:

  • No payments are required for this application process.
  • If you need assistance, ask for help in the whatsApp group.
  • If you do not have a whatsApp group for the latest job updates, CLICK HERE TO JOIN
Application ends in 1d 19h 14min

Other jobs you may like

Apply for the job