QUALIFICATIONS AND JOB DESCRIPTION
- Bachelor’s degree in technical discipline (preferred) or equivalent experience
- 5 years of proven experience working within a large enterprise environment
- Hands on experience with Checkpoint/Fortigate firewalls preferably CCSE certification
- Hands on experience with Intrusion Detection and Prevention Systems
- Hands on experience with Vulnerability Scanning and Assessment
- Hands on experience in responding to denial of service attacks, identifying traffic anomalies and devising filtering strategies in real time
- In depth knowledge of Security policy development (policy, standards, guidelines, procedures)
- Hands-on experience with DLP implementation
- Preferably CISM (Certified Information Security Manager), CISA (Certified Information Systems Auditor), CISSP (Certified Information Systems Security Professional)
- Excellent command of English both written and spoken
- Military service should be completed for male candidates
- No restrictions for travelling both inside of Turkey and abroad temporarily
*Applications will be evaluated also for all OTI Holding companies according to necessities. ?
İŞ TANIMI
The RoleProvide security oversight in the delivery of new technologies, services and solutions to meet critical business requirements.
Job Responsibilities· Define, track, monitor the standard baselines and configuration sets of all managed security devices and implement industry best practices with regards to firewall, IDS, IPS, NAC, Vpn and network connections
· Proactively asses potential items of risk and provide clear, timely and constructive recommendations regarding IT security in all areas related to information systems and networks
· Installation, implementation, configuration and high level support of enterprise Checkpoint firewalls (R71-R75)
· Manage Enterprise AntiVirus and Endpoint protection
· Manage IDS, IPS devices
· Implement DLP solution
· Identity and Access Management
· IT Risk/Vulnerability Assessments
· Network / System Security Architecture and Operations
· Software/Application Security
· Log analysis, Security Monitoring and Incident Response
· IT Compliance Management