Use this Computer Security Specialist job description template to advertise the open roles for free using Longlist.io. You can use this template as a starting point, modify the requirements according the needs of your organization or the client you are hiring for.
We are looking for a Computer Security Specialist to implement and maintain our security systems. You will be responsible for preventing unauthorized access to our data and responding to privacy breaches.
In this role, you should be knowledgeable about security frameworks and systems. If you’re also a problem-solver and quick decision-maker, we’d like to meet you.
Your goal will be to ensure that our technology infrastructure is well-protected.
A Computer Security Specialist is responsible for safeguarding an organization's computer systems and networks against potential threats and breaches. On a day-to-day basis, their tasks may include:
Monitoring: They constantly monitor computer systems and networks to detect any suspicious activities, threats, or vulnerabilities.
Threat and Vulnerability Analysis: They analyze potential threats and vulnerabilities in computer systems and networks, conducting risk assessments and identifying areas that need improvement.
Incident Response: They respond to security incidents, investigating and containing any breaches or attacks that occur. This involves analyzing logs, researching the root cause, and coordinating with other teams to mitigate the impact.
Security Auditing: They conduct regular security audits to assess the effectiveness of existing security measures and recommend improvements.
Security Architecture Design: They participate in the design and implementation of security measures, ensuring that systems and networks are built with security in mind.
Security Testing: They perform security testing, including penetration testing, vulnerability assessment, and ethical hacking to identify potential weaknesses in systems.
Security Awareness and Training: They provide security awareness programs and training sessions to educate employees and users about best practices for data protection and secure computing.
Keeping Up with Industry Trends: They stay updated with the latest security technologies, trends, and regulations to ensure that organizations remain compliant and proactive against emerging threats.
Documentation and Reporting: They maintain accurate documentation of security measures, incidents, and any remediation actions taken, preparing regular reports for management.
Collaboration and Communication: They collaborate with IT teams, management, and other stakeholders to educate and advocate for security best practices, ensuring a secure computing environment for the organization.
Abbott is a global healthcare leader that helps people live more fully at all stages of life. Our portfolio of life-changing technologies spans the spectrum of healthcare, with leading businesses and products in diagnostics, medical devices, nutritionals and branded generic medicines. Our 113,000 colleagues serve people in more than 160 countries.
CYBERSECURITY SPECIALIST...
SUMMARY:
The cyb...
Overview:
Lutron Electronics Co., Inc has an immediate opening for an Cyber Security Specialist supporting Lutron's Enterprise Cyber Security Team. In this position, you would be a key part of supporting the practices and techniques involved in protecting Lutron from cyber attacks. In addition, you will learn how various departments in Lutron utilize technology assets and how IT Security... in...
The Senior Manager receives assistance from the Cyber Security Specialist in directing initiatives to guarantee the security of computer networks and information systems. Defending against hackers and cyberattacks is a part of this, as is keeping an eye on network traffic and records for anything that seems out of the ordinary. Additionally, specialists are in charge of identifying computer... ...
Job Description
Contact Government Services strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting edge technology with world class personnel to deliver customized solutions that fit specific needs and solve the most challenging, dynamic problems. Our team emphasizes technical expertise and an empathy to....
Gather verified email addresses & phone numbers directly from LinkedIn, reach out, and see when candidates open your emails.
Get Started Free