· Creating and implementing a onetime strategy for the deployment of information security technologies emphasizing on the following:
· Performing IT security risk assessments and reporting on ways to minimize threats.
· Monitoring security vulnerabilities and hacking threats in network and host systems.
· Tracking latest IT security innovations and keeping abreast of latest cyber security technologies.
· Ensuring that each syst log file is generated on daily basis and the admin can see who is doing what in working hours.
· To block specific sites like YouTube, Facebook in such a manner that the admin can unblock and block them according to his requirements.
· Implementing an effective process for the reporting of security incidents.
· Overseeing the investigation of reported security breaches.
· Capacity building of our existing IT security team, security experts and advisors. Complying with the latest regulations and compliance requirements
· Championing and educating the organization about the latest security strategies and technologies