-
Notifications
You must be signed in to change notification settings - Fork 29
/
Copy pathInformation_security.php
136 lines (109 loc) · 6.61 KB
/
Information_security.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
<?php
// Initialize the session
session_start();
?>
<!DOCTYPE html>
<html lang="en">
<?php include 'header.php'?>
<!-- Hero-area -->
<div class="hero-area section">
<!-- Backgound Image -->
<div class="bg-image bg-parallax overlay" style="background-image:url(./img/bgc2.jpg); " ></div>
<!-- /Backgound Image -->
<div class="container">
<div class="row">
<div class="col-md-10 col-md-offset-1 text-center">
<ul class="hero-area-tree">
<li><a href="main.php">Home</a></li>
<li><a href="blog.php">Knowledge Network</a></li>
<li>Information Security Specialist</li>
</ul>
<h1 class="white-text">Information Security Specialist</h1>
</div>
</div>
</div>
</div>
<!-- /Hero-area -->
<!-- Blog -->
<div id="blog" class="section">
<!-- container -->
<div class="container">
<!-- row -->
<div class="row">
<!-- main blog -->
<div id="main" class="col-md-9">
<!-- blog post -->
<div class="blog-post" style= "text-align:justify; ">
<h2>Job Description</h2>
<!-- row -->
<div class="row">
<p style="font-size:16px;" >Information Security Specialist role involves in understanding and taking steps to mitigate the risks associated with collecting, storing and transmitting data in a business setting. Information Security Specialist will be expected to set up security measures that help prevent security breaches, as well as analyzing any breeches that do occur.</p>
<p style="font-size:16px;" >Information Security Specialist responsible for designing, testing and Implementation of IT Security solutions as well as on-going maintenance and monitoring of live production environments. The work may involve maintaining security software and integrating new security into an organisation using various tools and techniques including firewalls, spyware, malware detection and intrusion detection systems.</p>
</div>
<!-- /row -->
<!-- row -->
<div class="row">
<h2>Skills required</h2>
<p style="font-size:16px;">As an Information Security Specialist one will work to identify and mitigate against any security threats, weaknesses, bugs or exploits impacting on your organisations cyber security. This work could include software and hardware modifications and other changes such at educating your systems users in best practice methodologies with regard to data and IT Security.</p>
<ol style="font-size:16px;">
<li><b>1. </b>Knowledge of current security risks and protocols.</li>
<li><b>2. </b>Willingness to work on-call in the event of a security breech or other emergency.</li>
<li><b>3. </b>Good analytic and problem solving skills.</li>
<li><b>4. </b>Ability to work under close supervision, as well as the ability to take independent initiative when needed.</li>
<li><b>5. </b>You will need to be organised, efficient and able to work unsupervised under your own initiative</li>
<li><b>6. </b>Understanding of relevant scripting and source code programming languages, such as C#, C++, .NET, Java, Perl, PHP, Python or Ruby On Rails etc. that you will be using</li>
</ol>
</div>
<!-- /row -->
<!-- row -->
<div class="row">
<h2>Educational Requirements</h2>
<p style="font-size:16px;">The Information Security Specialist must have a Bachelors degree in a related field such as Computer Science, IT or a Cyber-Security related field. Also Post-secondary degree in system administration, network security, network administration or a related field will be accepted.</p>
</div>
<!-- /row -->
<!-- row -->
<div class="row">
<h2>Duties and Responsibilities</h2>
<ol style="font-size:16px;">
<li><b>1. </b>Analyze existing security systems and make recommendations for changes or improvements.</li>
<li><b>2. </b>Prepare reports and action plans in the event that a security breech does occur.</li>
<li><b>3. </b>Organize and conduct tests and “ethical hacks” of the existing security architecture.</li>
<li><b>4. </b>Monitor the network and provide early warning of abnormalities or problems.</li>
<li><b>5. </b>Upgrade systems regularly to remain competitive in the field of security.</li>
<li><b>6. </b>Communicate the system status and keep users informed of downtime or changes to the system.</li>
<li><b>7. </b>Keep technical knowledge current through continuing education.</li>
<li><b>8. </b>Provide system updates and write code fixes.</li>
</ol>
</div>
<!-- /row -->
<!-- row -->
<div class="row">
<h2>Salary</h2>
<p style="font-size:16px;">According to online sources , the average salary for a Information Security Specialist is Rs. 10,03,608 per year in India.</p>
</div>
<!-- /row -->
<!-- row -->
<div class="row">
<h2>Companies offering Information Security Specialist role</h2>
<ol style="font-size:16px;">
<li><b>1. Amdocs </b> </li>
<li><b>2. American Express </b></li>
<li><b>3. Adobe</b></li>
<li><b>4. IBM</b></li>
<li><b>5. Larsen and Tourbo Infotech Limited</b></li>
<li><b>6. Deutsche Bank</b></li>
</ol>
</div>
<!-- /row -->
</div>
<!-- /blog post -->
</div>
<!-- /main blog -->
</div>
<!-- row -->
</div>
<!-- container -->
</div>
<!-- /Blog -->
<?php include 'footer.php'?>
</html>