The Cybersecurity Specialist is responsible for protecting the organization’s information systems, networks, applications, and data from cybersecurity threats. The role focuses on security monitoring, incident detection and response, vulnerability management, network security, identity and access control support, and the implementation of cybersecurity controls in line with internal policies and recognized standards.
Key Responsibilities
Security Monitoring & Incident Response
Monitor systems, networks, applications, and security tools for threats, alerts, and unauthorized activities
Investigate security alerts and incidents and perform initial analysis
Support containment, eradication, and recovery activities during cybersecurity incidents
Escalate incidents based on severity and follow the incident response procedure
Document incidents, findings, actions taken, and lessons learned
Network Security
Support the implementation and administration of network security controls
Configure and maintain firewalls, IDS/IPS, VPN, secure remote access, and related technologies
Support secure network architecture including LAN, WAN, DMZ, VLANs, and segmentation
Analyse network traffic to identify suspicious activities and anomalies
Assist in firewall rule reviews and network access control improvements
Identity & Access Management
Support user access management processes
Assist with access provisioning, modification, and revocation
Enforce least privilege and role-based access control principles
Monitor unauthorized access attempts and misuse of privileges
Support periodic user access reviews
Vulnerability & Risk Management
Perform vulnerability assessments using approved tools and methods
Coordinate with system owners for remediation of identified vulnerabilities
Track remediation progress and report unresolved risks
Support cybersecurity risk assessments and mitigation activities
Maintain records of vulnerabilities, risks, exceptions, and remediation actions
Security Controls & Technologies
Implement, operate, and maintain cybersecurity solutions such as:
Firewalls
IDS/IPS
SIEM
Endpoint protection / EDR / XDR
Vulnerability scanners
Encryption technologies
VPN and remote access security tools
Ensure systems are updated with required security patches and configurations
Support secure configuration and hardening activities
Compliance & Governance Support
Support compliance with applicable standards and frameworks, including:
ISO/IEC 27001
NIST SP 800-53
CIS Critical Security Controls
Internal security policies and procedures
Assist in internal and external audits
Prepare evidence, reports, and documentation for audit and compliance purposes
Contribute to ISMS implementation and continuous improvement
Security Awareness
Assist in preparing cybersecurity awareness materials
Support phishing simulations and user awareness activities
Promote cybersecurity best practices across the organization
Documentation & Continuous Improvement
Maintain documentation for security procedures, configurations, incidents, and reports
Recommend improvements to cybersecurity controls, tools, and processes
Stay updated on emerging threats, vulnerabilities, and security technologies
Qualifications
Education
Bachelor’s degree in Information Security, Computer Science, Information Technology, or a related field
Experience
3–5+ years of experience in cybersecurity, IT security, network security, or related roles
Technical Skills
Strong understanding of networking, including TCP/IP, routing, switching, VLANs, LAN/WAN, and DMZ
Experience with firewalls such as FortiGate or similar technologies
Knowledge of VPN technologies, including IPsec and SSL VPN
Familiarity with SIEM, vulnerability scanners, EDR/XDR, IDS/IPS, and log analysis
Understanding of Windows and Linux operating systems
Knowledge of security hardening, patching, and secure configuration practices
Certifications Preferred
CEH – Certified Ethical Hacker
CompTIA Security+
Fortinet NSE certifications
Cisco security-related certifications
ISO/IEC 27001 Foundation / Lead Implementer / Lead Auditor
Core Competencies
Analytical thinking and problem-solving
Attention to detail
Incident handling capability
Technical troubleshooting
Communication and reporting skills
Ability to work independently and as part of a team
Confidentiality and professional integrity
Ability to work under pressure during security incidents
Working Conditions
May require on-call availability for cybersecurity incidents
May require work outside regular business hours during critical incidents or maintenance activities
Requires collaboration with IT, Network, Infrastructure, Compliance, Audit, and business teams
Benefits
Competitive salary aligned with the local labor market
Training and professional development programs
Employee Wellbeing Program
Health insurance coverage
Team-building activities and recognition programs
Flexible working hours + early Friday finish
Extensive mobile benefits (minutes, SMS, data, roaming, loan amounts)