
- The main job of a network security expert is to design, operate and ensure the stable maintenance of network infrastructure and systems, and develop strategic solutions to overcome attacks, network and security issues. Design network models, data, analyze vulnerabilities, etc. to ensure the optimal safety and security, avoid intrusions and hackers attacks.
- Manage and operate the systems within the specified scope to ensure stable and safe operation against risks and attacks from the network environment.
- Monitor information security events and receive and handle incidents, events related to the network and information security (malicious code analysis andprocessing, tracking, digital investigation, security events processing, etc.).
- Evaluate security vulnerabilities and build a solution.
- Build and update information security vulnerability management program of theentire IT system and related standards (secure code, hardening ...), including but not limited to: vulnerability scanning tools, security vulnerability internal database updates, vulnerability detection fuzzy framework environment,etc.
- Establish and improve information security monitoring system (SOC), including but not limited to: ensure log source, threat intelligent system, reverse laboratories,playlists/users...
- Build the categories of network and information security services provided to internal units (including but not limited to: tracking, digital surveys,malware analysis, network packet analysis, DC-DR network access control, NAT services, IP allocation services, vulnerability assessment, security assessment, security hardening, pentest, secure code audit/training.
- Manage, identify, evaluate operational and information security risks and planto overcome identified risks.
- Develop, update and optimize policies, processes, standards and guidelines related to information security.
- Develop procedures and policy training materials to enhance information security awareness and conduct training.
- Plan and implement periodic or unexpected compliance assessments at the requestof the Leader for technological activities to ensure compliance with technology policies, regulations and processes (in the field of operating technology systems, developing solutions and application of technology, ensuring information security, etc.).
- Evaluate and supervise information security maintenance that has already been/is being implemented (such as ISO 27001, PCI DSS, SWIFT CSP, Western Union ...).
- Comply with the new regulations of national technology department.