- Implement secure operating systems, networks, and databases
- Manage, operate and maintain IT Security endpoint systems:
PC Control System (Prevent unauthorized use of USB port, Wi-Fi, Bluetooth, etc.)
Network Access Control system (NAC)
Data Loss Prevention (DLP)
Document encryption system
Server / Database Access Control System
Database Encryption and Key Management System
Web Application Firewall
Network Firewall, IPS, IDS
Virtual Desktop Interface (VDI) System
- Track and manage requests using ITS system to create an audit record of all activity.
- Implement Operational Technology (OT) security best practices including physical and system controls.
- Manage technical IT aspects of physical security systems (VMS, access control)
- Conduct password auditing, network and web application-based vulnerability scanning, virus management and intrusion detection.
- Monitor and analyze system access logs; create related reports.
- Support planning for backup of security system data and system disaster recovery.
IT Security Maintenance
Coordinate with IT security system vendors for maintenance of systems
Manage IT security system maintenance contracts and renewals
IT Security Audits
Respond to IT Security audits conducted by SK Group, SKI, SK On, MOTIE and ISO 27001
Implement corrective actions resulting from the various audits as required.
Audit operating departments for compliance with the IT Security policy.
Conduct security reviews for an proposed company system
Administrative
Develop and maintain IT Security policies, guidelines, and standard operating procedures
Create IT security manuals
Create IT security publications or content for publications to promote IT security awareness
Stay up-to-date with the latest security technologies, trends, and threats to proactively identify vulnerabilities and recommend appropriate solutions.
Skill an Qualifications:
Bachelor's degree in information systems, computer science or equivalent
2+ years of experience with IT Security Systems, including installation and operating systems.
Strong knowledge of internet technologies, TCP / IP protocols, and network security principles.
Familiarity with cloud platforms (PaaS) and scripting languages (e.g., Python, PowerShell)
Proficiency in Windows operating systems
Experience with vulnerability scanning tools, intrusion detection systems, and firewalls.
Knowledge of computer forensics techniques and tools.
Excellent analytical and problem-solving skills
CompTIA Security+ or Network+ Certification preferred
Advanced proficiency in Microsoft Office Suite (Excel, Word, PowerPoint, etc.)