Restaurant & Hospitality Point of Sale • Restaurant Analytics • Restaurant Software • Fast Casual • Quick Service Restaurants
51 - 200
23 hours ago
Restaurant & Hospitality Point of Sale • Restaurant Analytics • Restaurant Software • Fast Casual • Quick Service Restaurants
51 - 200
• Access Control Management: Define, manage, and enforce access control policies and procedures across the organization. Conduct regular reviews of user access levels, permissions, and roles to ensure compliance with policies and regulations. Handle access provisioning and de-provisioning processes, ensuring timely updates to user access rights based on role changes, terminations, or other factors. • Cybersecurity Threat Monitoring and Response: Continuously monitor for emerging security threats, vulnerabilities, and attack vectors. Analyze threat intelligence from internal and external sources to keep the organization ahead of potential attacks. Perform vulnerability assessments and coordinate with other teams to remediate identified risks. Support security incident response activities, including containment, eradication, and recovery phases. Conduct forensic analysis of compromised systems and create detailed reports on findings and recommendations. Assist in designing and implementing security monitoring, detection, and prevention mechanisms (IDS/IPS, Firewalls, etc.). • Collaboration & Communication: Work closely with other IT and business teams to integrate security best practices into day-to-day operations. Provide security awareness training and advice to employees to improve their understanding of security policies. Participate in internal and external audits and assist with remediation of audit findings related to cybersecurity. Engage in knowledge sharing, mentorship, and training within the team to enhance security expertise across the team.
• Bachelor’s degree in Computer Science, Information Security, or a related field. • Relevant certifications or experience may substitute for formal education. • 3-5 years of experience in a related Information Security role (IAM, Ethical Hacker, Monitoring, Blue team/Red team, Infosec 3rd level support) • Experience with cloud security, including AWS, Azure, or Google Cloud. • Strong understanding of identity management principles, access control models, and regulatory compliance requirements. • High level of precision when monitoring security logs, analyzing threats, and auditing systems. • Familiarity with automation and scripting tools (e.g., Python, PowerShell) for incident response or IAM processes. • Experience with disaster recovery and business continuity planning. • Excellent analytical, problem-solving, and communication skills. • Experience with DevSecOps and integrating tools and resources into CI/CD pipelines. • Ability to work independently and collaboratively in a fast-paced environment.
Apply Now