Cybersecurity Specialist

Apliko Tani

Reports To

Cybersecurity Manager / Head of Security

Job Purpose

The Cybersecurity Specialist is responsible for protecting the organization’s information systems, networks, applications, and data from cybersecurity threats. The role focuses on security monitoring, incident detection and response, vulnerability management, network security, identity and access control support, and the implementation of cybersecurity controls in line with internal policies and recognized standards.

Key Responsibilities

  1. Security Monitoring & Incident Response
  • Monitor systems, networks, applications, and security tools for threats, alerts, and unauthorized activities
  • Investigate security alerts and incidents and perform initial analysis
  • Support containment, eradication, and recovery activities during cybersecurity incidents
  • Escalate incidents based on severity and follow the incident response procedure
  • Document incidents, findings, actions taken, and lessons learned
  1. Network Security
  • Support the implementation and administration of network security controls
  • Configure and maintain firewalls, IDS/IPS, VPN, secure remote access, and related technologies
  • Support secure network architecture including LAN, WAN, DMZ, VLANs, and segmentation
  • Analyse network traffic to identify suspicious activities and anomalies
  • Assist in firewall rule reviews and network access control improvements
  1. Identity & Access Management
  • Support user access management processes
  • Assist with access provisioning, modification, and revocation
  • Enforce least privilege and role-based access control principles
  • Monitor unauthorized access attempts and misuse of privileges
  • Support periodic user access reviews
  1. Vulnerability & Risk Management
  • Perform vulnerability assessments using approved tools and methods
  • Coordinate with system owners for remediation of identified vulnerabilities
  • Track remediation progress and report unresolved risks
  • Support cybersecurity risk assessments and mitigation activities
  • Maintain records of vulnerabilities, risks, exceptions, and remediation actions
  1. Security Controls & Technologies
  • Implement, operate, and maintain cybersecurity solutions such as:
    • Firewalls
    • IDS/IPS
    • SIEM
    • Endpoint protection / EDR / XDR
    • Vulnerability scanners
    • Encryption technologies
    • VPN and remote access security tools
  • Ensure systems are updated with required security patches and configurations
  • Support secure configuration and hardening activities
  1. Compliance & Governance Support
  • Support compliance with applicable standards and frameworks, including:
    • ISO/IEC 27001
    • NIST SP 800-53
    • CIS Critical Security Controls
    • Internal security policies and procedures
  • Assist in internal and external audits
  • Prepare evidence, reports, and documentation for audit and compliance purposes
  • Contribute to ISMS implementation and continuous improvement
  1. Security Awareness
  • Assist in preparing cybersecurity awareness materials
  • Support phishing simulations and user awareness activities
  • Promote cybersecurity best practices across the organization
  1. Documentation & Continuous Improvement
  • Maintain documentation for security procedures, configurations, incidents, and reports
  • Recommend improvements to cybersecurity controls, tools, and processes
  • Stay updated on emerging threats, vulnerabilities, and security technologies

 

Qualifications

Education

  • Bachelor’s degree in Information Security, Computer Science, Information Technology, or a related field

Experience

  • 3–5+ years of experience in cybersecurity, IT security, network security, or related roles

Technical Skills

  • Strong understanding of networking, including TCP/IP, routing, switching, VLANs, LAN/WAN, and DMZ
  • Experience with firewalls such as FortiGate or similar technologies
  • Knowledge of VPN technologies, including IPsec and SSL VPN
  • Familiarity with SIEM, vulnerability scanners, EDR/XDR, IDS/IPS, and log analysis
  • Understanding of Windows and Linux operating systems
  • Knowledge of security hardening, patching, and secure configuration practices

Certifications Preferred

  • CEH – Certified Ethical Hacker
  • CompTIA Security+
  • Fortinet NSE certifications
  • Cisco security-related certifications
  • ISO/IEC 27001 Foundation / Lead Implementer / Lead Auditor

Core Competencies

  • Analytical thinking and problem-solving
  • Attention to detail
  • Incident handling capability
  • Technical troubleshooting
  • Communication and reporting skills
  • Ability to work independently and as part of a team
  • Confidentiality and professional integrity
  • Ability to work under pressure during security incidents

Working Conditions

  • May require on-call availability for cybersecurity incidents
  • May require work outside regular business hours during critical incidents or maintenance activities
  • Requires collaboration with IT, Network, Infrastructure, Compliance, Audit, and business teams

Benefits

  • Competitive salary aligned with the local labor market
  • Training and professional development programs
  • Employee Wellbeing Program
  • Health insurance coverage
  • Team-building activities and recognition programs
  • Flexible working hours + early Friday finish
  • Extensive mobile benefits (minutes, SMS, data, roaming, loan amounts)
  • Free IPKO internet, DTV & telephony services

 

Work Location

Prishtinë — IPKO Industrial Zone

 

Application Deadline

 26 May 2026

Apliko online

Working place:
Prishtinë

The deadline for application
26/05/2026