Specialist - Security & Compliance
I. BASIC PURPOSE / JOB BRIEF:
The IST Specialist Security & Compliance works in support of security and compliance requirements for the company, working knowledge on implementing security controls, monitoring and processes that follow best practices to ensure adherence to regulatory agencies, ISO/IEC 27033, SOX, PAGCOR and other applicable corporate compliance programs. The individual will assist to execute, implement network/data security control, audit and all elements of security process flow. Ability to enforce strict IST Policy and SOP procedures and controls to ensure that the company practices remain observant to all pertinent regional and corporate governance requirements and industry standards.
II. MAJOR RESPONSIBILITIES AND DUTIES:
- Ability to execute any information security related matters as being assigned by the management of Information Technology as per business operation required.
- Daily network and data security operation routine checks, file permission audit, user account creation, AD security groups creation and modification with strict adherence to IST Policy and SOPs.
- Front line defense of protecting information from unauthorized access and violations.
- Monitoring and Auditing systems for abnormal activity, and executing corrective actions.
- Ability to assist and perform daily IST security operation and other business critical operation requirements.
- Performs daily IST Security threat prevention operations, vulnerability assessment, monitoring, executing data security controls and policy enforcement.
- Administration of various solutions required for Technology Risk Management, Information Security Governance, Security Monitoring, Patch Management, Access Control, Data Loss Prevention, and other IST Security application programs.
- Ability to perform, deliver the enforcement of access control and maintain security policies, procedures and standards that describe practical, risk-based mechanisms to maintain the confidentiality, integrity and availability of information systems and data.
- Strong character of Good Ethics, which can be trusted with sensitive confidential electronic data information with strict adherence to IST confidentiality policy agreement.
- Ability to maintain security and governance solutions to monitor the efficiency and effectiveness of security operations, controls and infrastructure.
- Ability to work with all levels of professionalism, fostering relationships with business personnel.
- Administration of Spam Firewall Email Security Systems, control, blocking, monitoring and investigation of reported malicious emails.
- Investigate, verify and mitigate malicious URL\Websites.
- Monitoring of vulnerability points, analyze, validate and assess potential data security risks.
III. JOB SPECIFICATIONS:
Educational Requirement:
- Bachelor's Degree or equivalent relevant qualifications
- An information security or other similar technical certification such as, CEH, CompTIA Security+ or CCNA Security is desirable.
Experience Requirements:
- With 5+ years relevant experiences in a large enterprise environment. (Preferably in a Casino or integrated resort).
- Requires in depth experience and knowledge of enterprise IT security technologies.
- Possess knowledge and experience in managing compliance and/or security organization, including planning and executing security policies and standards development
- Experienced in Vulnerability Management, Identification and Containment.
- Experienced in Security Information and Event Management and monitoring (SIEM).
- Experienced in Intrusion Detection and Prevention Systems among others.
Skills and Attributes:
- Must have excellent analytical skills, have the ability to multitask and have solid project management skills.
- Self-lead with minimal supervisorial needs.
- Ability to understand the relationship between business processes, priorities, risk and their underlying technologies and security risks.
- Knowledgeable in Data Security, Privileges Access Management and Account Life-Cycle Process.
- Knowledgeable in 2FA administration management, access provisioning, removal and technical support.
- Knowledgeable in anti-Malware administration and security analytics operation, monitoring, malware blocking applying control and countermeasures, file\device trajectory investigation, control and mitigation containment.
- Proficiency in both spoken and written English is a must and Tagalog & Japanese speaking is an advantage but not required.
Specialist - Security & Compliance
I. BASIC PURPOSE / JOB BRIEF:
The IST Specialist Security & Compliance works in support of security and compliance requirements for the company, working knowledge on implementing security controls, monitoring and processes that follow best practices to ensure adherence to regulatory agencies, ISO/IEC 27033, SOX, PAGCOR and other applicable corporate compliance programs. The individual will assist to execute, implement network/data security control, audit and all elements of security process flow. Ability to enforce strict IST Policy and SOP procedures and controls to ensure that the company practices remain observant to all pertinent regional and corporate governance requirements and industry standards.
II. MAJOR RESPONSIBILITIES AND DUTIES:
- Ability to execute any information security related matters as being assigned by the management of Information Technology as per business operation required.
- Daily network and data security operation routine checks, file permission audit, user account creation, AD security groups creation and modification with strict adherence to IST Policy and SOPs.
- Front line defense of protecting information from unauthorized access and violations.
- Monitoring and Auditing systems for abnormal activity, and executing corrective actions.
- Ability to assist and perform daily IST security operation and other business critical operation requirements.
- Performs daily IST Security threat prevention operations, vulnerability assessment, monitoring, executing data security controls and policy enforcement.
- Administration of various solutions required for Technology Risk Management, Information Security Governance, Security Monitoring, Patch Management, Access Control, Data Loss Prevention, and other IST Security application programs.
- Ability to perform, deliver the enforcement of access control and maintain security policies, procedures and standards that describe practical, risk-based mechanisms to maintain the confidentiality, integrity and availability of information systems and data.
- Strong character of Good Ethics, which can be trusted with sensitive confidential electronic data information with strict adherence to IST confidentiality policy agreement.
- Ability to maintain security and governance solutions to monitor the efficiency and effectiveness of security operations, controls and infrastructure.
- Ability to work with all levels of professionalism, fostering relationships with business personnel.
- Administration of Spam Firewall Email Security Systems, control, blocking, monitoring and investigation of reported malicious emails.
- Investigate, verify and mitigate malicious URL\Websites.
- Monitoring of vulnerability points, analyze, validate and assess potential data security risks.
III. JOB SPECIFICATIONS:
Educational Requirement:
- Bachelor's Degree or equivalent relevant qualifications
- An information security or other similar technical certification such as, CEH, CompTIA Security+ or CCNA Security is desirable.
Experience Requirements:
- With 5+ years relevant experiences in a large enterprise environment. (Preferably in a Casino or integrated resort).
- Requires in depth experience and knowledge of enterprise IT security technologies.
- Possess knowledge and experience in managing compliance and/or security organization, including planning and executing security policies and standards development
- Experienced in Vulnerability Management, Identification and Containment.
- Experienced in Security Information and Event Management and monitoring (SIEM).
- Experienced in Intrusion Detection and Prevention Systems among others.
Skills and Attributes:
- Must have excellent analytical skills, have the ability to multitask and have solid project management skills.
- Self-lead with minimal supervisorial needs.
- Ability to understand the relationship between business processes, priorities, risk and their underlying technologies and security risks.
- Knowledgeable in Data Security, Privileges Access Management and Account Life-Cycle Process.
- Knowledgeable in 2FA administration management, access provisioning, removal and technical support.
- Knowledgeable in anti-Malware administration and security analytics operation, monitoring, malware blocking applying control and countermeasures, file\device trajectory investigation, control and mitigation containment.
- Proficiency in both spoken and written English is a must and Tagalog & Japanese speaking is an advantage but not required.