Cyber Security Administrator
Pharmathen
Μαρούσι, Αττική-Αθήνα, GR
πριν από 4 μέρες
source : Kariera
  • Pharmathen Pharmaceuticals is a privately owned, vertically integrated pharmaceutical company, focused on the development and marketing of pharmaceutical products in more than 85 countries;
  • with more than 1000 employees in all continents, Pharmathen offers a world of opportunities.

    Due to continuous growth and expansion, Pharmathen Pharmaceuticals offers a great opportunity for career development and is seeking to recruit a Cyber Security Administrator to join our Information Technology team at Maroussi.

  • As a Cyber Security Administrator, the ideal candidate will ensure the secure operation of the in-house computer systems, servers, and network connections;
  • ensure the confidentiality, integrity and availability of the IT infrastructure and intellectual property; monitor, analyzes, and detect Cyber events and incidents within information systems and networks under limited supervision;
  • recommend and oversees the documentation, implementation and execution of the IT policies according to needs and industry best practices;
  • ensure the execution of security inspections of the networks, servers, and end user accounts and devices to verify program compliance;
  • analyze and help resolve newly discovered security vulnerabilities and / or breaches in a timely and accurate fashion, and conduct user activity audits where required. More specifically

    What you will do :

  • Develop, implement, maintain, and oversee enforcement of policies, procedures and associated plans for system security administration and user system access based on industry-standard best practices.
  • Assist in the design and implementation of a disaster recovery plan for operating systems, databases, networks, servers, and software applications.
  • Assess need for any security reconfigurations (minor or significant) and executes them if required.
  • Stay abreast of emerging security alerts and issues; remain current on industry trends and evaluates new technology.
  • Understand industry and regulatory requirements, respond to comments from auditors and regulators, and mitigate identified risks.
  • Conduct research on emerging products, services, protocols and standards in support of security enhancement and development efforts.
  • Perform ongoing risk assessment and audits to ensure that information systems are adequate.
  • Design, perform, and / or oversee penetration testing of all systems in order to identify system vulnerabilities; conducts vulnerability scans on a routine or ad-hoc basis.
  • Recommend, schedule, and perform security improvements and upgrades.
  • Recommend, schedule (where appropriate), and apply fixes, security patches, disaster recovery procedures, and any other measures required in the event of a security breach.
  • Deploy, manage and maintain all security systems and their corresponding or associated software, including firewalls, intrusion detection systems, and antivirus software.
  • Administer and maintain end user accounts, permissions, and access rights; design, implement, and report on security system and end user activity audits.
  • Manage connection security for local and wide area networks and e-mail communications.
  • Manage and ensure the security of databases and data transferred both internally and externally.
  • Monitor server logs, firewall logs, intrusion detection logs, and network traffic for unusual or suspicious activity; interprets activity and make recommendations for resolution.
  • Review systems logs, IDS logs, change management logs and makes recommendations for any corrective actions needed.
  • Promote, facilitate and monitor the IT Security awareness program.
  • Identify gaps in design and operating effectiveness of controls and identifies opportunities for continuous improvement.
  • Ensure creation and maintenance of technical / architectural documentation.
  • Provide technical expertise in the resolution of complex operating system and infrastructure problems.
  • Download and test new security software and / or technologies.
  • Provide on-call security support to technical staff.
  • Provide network and security guidance to members of the technology team.
  • Requirements

    The ideal candidate should have :

  • Bachelor's Degree in Computer Science, Engineering, or other Computer Engineering or Information Technology based technical discipline and 5 years of experience in a Cybersecurity role as a Vulnerability Assessment Engineer, Application Security Specialist, Cybersecurity Systems Engineer, or an equivalent combination of education, training and / or experience that provides the required knowledge, skills and abilities to perform the essential functions of the job.
  • CISSP Certification (Certified Information Systems Security Professional) or OSCP Certification (Offensive Security Certified Professional.)
  • Must be familiar in deploying and operating vulnerability scanning infrastructure and services and network penetration testing.
  • Must maintain tools used for conduction vulnerability scanning and application security testing.
  • Working knowledge of Microsoft Security Tools and Framework is mandatory
  • Job-Specific Skills :

  • Strong knowledge of industry standards regarding vulnerability management including Common Vulnerabilities and Exposures (CVE), Common Vulnerability Scoring System (CVSS) and Open Web Application Security Project (OWASP).
  • Must have proficient hands-on knowledge of firewalls, intrusion detection systems, anti-virus software, data encryption, and other industry-standard techniques and practices.
  • Must have in-depth technical knowledge of network PC, virtual desktop infrastructure and platform operating systems.
  • Must have working technical knowledge of current systems software, security and network protocols, and standards.
  • Must have strong knowledge of TCP / IP and network administration protocols.
  • Knowledge of applicable practices and laws relating to data privacy and protection.
  • Knowledge of security auditing techniques.
  • Knowledge of computer networks, including various hardware and software necessary to build a functional network, including routers, switches, firewalls, wiring, wireless devices, and how TCP / IP packets flow through the system.
  • Must have excellent verbal and written communication.
  • Must have strong analytical skills.
  • Must be a strong team player with ability to take charge of their area of expertise.
  • Must be comfortable working outside comfort zone with a willingness to learn
  • Ability to perform vulnerability assessments and penetration testing using manual testing techniques, scripts, commercial and open source tools.
  • Ability to demonstrate knowledge with prioritizing remediation activities with operational teams through risk ratings of vulnerabilities and assets.
  • Ability to read, write and modify scripts for automation of vulnerability management tasks.
  • Ability to find ways to structure or classify multiple pieces of information.
  • Ability to use logic and analysis to identify the strengths and weaknesses of different approaches.
  • Ability to identify problems and review related information to develop and evaluate options and implement solutions.
  • Ability to effectively communicate information and ideas in writing, as well as through speech, so others will understand.
  • Ability to work independently and with minimal supervision.
  • Ability to effectively present information and respond to questions from groups of managers, clients, customers, and the general public.
  • Ability to determine how a system should work and how changes in conditions, operations, and the environment will affect outcomes
  • What you'll gain :

  • Involvement in a high-caliber, team-oriented and dynamic atmosphere
  • Exposure to challenging business issues and practices
  • Great opportunity to leverage and develop your business knowledge and skills
  • Join our team and experience the unique Pharmathen's culture that gives you the opportunity to innovate, to make decisions, to achieve your own potential and to chart your own career.

    Submit your CV no later than 20 March 2020

    Υποβάλετε αίτηση
    Το e-mail μου
    Πατώντας στο κουμπί «Συνέχεια », δίνω στο neuvoo τη συγκατάθεση μου να καταχωρήσει τα δεδομένα μου και να μου στέλνει ειδοποιήσεις μέσω email, όπως αναφέρεται λεπτομερώς στην πολιτική προστασίας προσωπικών δεδομένων του neuvoo. Μπορείτε ανά πάσα στιγμή να αποσύρετε τη συγκατάθεση σας ή να διαγραφθείτε οποιαδήποτε στιγμή.
    Συνέχεια
    Φόρμα αίτησης