Email / Username

Password

Forgot Password?

Keep me logged In

Not a member? Register Now

Email Print Report

Computer Incidents Response Expert (Re - Advertise)

(854 Views)

About Ministry of communication and IT

The Mandate of Ministry of Communication and IT (MCIT) are to provide high Quality Communication, IT and Postal Services for the Afghan People at Affordable prices. The Ministry has been Actively Advocating for a Positive change in the Society by Connecting the Afghan People to Knowledge and Resources, which will enable them to improve the quality of their lives. The Afghan Government aims to establish a stable and Democratic Political Environment, rule of law, and a Favorable Regulatory Environment for Business.
Vision:
The vision of the Ministry of Communication and IT is to transform Afghanistan into technology Information Society.
Priorities of MCIT:
• To deliver the Telecom and IT services to remote areas throughout the country
• To supply high speed internet to the people in Afghanistan
• To design, develop and deploy the technical platform of the National Identity Card (NID) and provide ide technical assistance to the Ministry of Interior (MoI) on the successful implementation of project"
• To extend the fiber optic network in the country
• To replace the existing analogue television (TV) broadcasting systems by digital TV broadcasting systems in the country and tighten regulations for broadcasting companies

Job Summary

• Perform IT Security Incident Response life cycle (preparation; detection and analysis, containment, eradication and recovery; post-incident activity);

Job Details

Date Posted: 09 Jun 2018 Reference: MCIT - NIXA - 001
Closing Date: 17 Jun 2018 Work Type: Full Time
Number of Vacancies: 1 Gender: Any
Functional Area: IT Open Ended: NO
Nationality: Afghan Salary Range: As per NTA Salary Scale Policy
Contract Type: Contractor Years of Experience: 2 Year(s)
Contract Duration: 0 Year(s) & 0 Month(s) Extension Possibility: Yes
Probation Period: 3 Months

Duties and Responsibilities

• Perform IT Security Incident Response life cycle (preparation; detection and analysis, containment, eradication and recovery; post-incident activity);
• Assesses IT risks and analyze potential mitigation strategies to reduce IT Security exposure (Use Cases, Scenarios)
• Detailed analyses of various security event sources (FW, IDS, PROXY, AD etc.) Acts as the interface with other IT and business departments regarding IT security incidents
• Security incidents are effectively identified, documented, and investigated.
• Collaborates with and provides consulting services to clients if required
• Provides advisory assessments in relation to cybersecurity breach prevention.
• Conducts gap assessments and provides actionable recommendations to remediate shortcomings.
• Demonstrated expert understanding of the life cycle of network threats, attacks, attack vectors, and methods of exploitation with an understanding of intrusion set tactics, techniques, and procedures.
• Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
• Demonstrated hands-on experience analyzing high volumes of logs, network data (e.g. NetFlow, Full Packet Capture), and other attack artifacts in support of incident investigations.
• Experience and proficiency with any of the following: Anti-Virus, HIPS, IDS/IPS, Full Packet Capture, Host-Based Forensics, Network Forensics.
• Experience with malware analysis concepts and methods.
• Familiarity or experience in Cyber Kill Chain methodology.
• Knowledge of Virtualization and Cloud security.
• Knowledge of Linux, UNIX, Windows (including Active Directory) and other operating systems.
• Must be a flexible team player, hard-working, and possess excellent communication and customer-facing skills.
• Must be self-directed, able to manage solo projects or participate as part of a larger team.
• Strong report writing skills and ability to explain complex security issues to customers in a formal presentation format.
• Must be able to interact confidently with all levels of technical and management client teams.
• Working knowledge of NIST SP 800-53A, ICD 503, FISMA, DCID 6/3, relationships between IC and DoD policies for assessment and authorization
• Skill in using network analysis tools to identify vulnerabilities
• Expert with Firewall Configuration and administration
• Expert with Intrusion Detection Systems (IDS) configuration and administration
• Skill in assessing the robustness of security systems and design
• Skill in developing and apply security system access controls
• Skill in assessments of industry IT operating system, software database, or hardware
• Ability to prepare the various types of security related documents
• Ability to conduct vulnerability scans and recognize vulnerabilities in security systems
• Ability to evaluate the trustworthiness of the supplier and/or product
• Ability to evaluate the adequacy of security designs
• Ability to establish effective working relationships internally and externally to the client organization
• Developed technical documentation and white papers
• Knowledge of emerging security issues, risks, and vulnerabilities
• Maintains and continuous improvement of processes, standards, policies, working methods, and tools using ITIL best practices

Skills

• Hands-on experience with security tools and devices, operating systems, and/or networking devices desired
• Knowledge of IT Security Standards, Control Frameworks and Risk Management techniques
• Proven skills and experience in log analysis, incident investigations – including guidance for remediation.
• Excellent oral and written communication skills
• Excellent interpersonal and organizational skills
• Effective leadership skills and experience

Qualifications

• Bachelor Degree Computer Science
• Experience working in a multinational organization desired
• Experience with technical IT security incident response, host and network forensics, malware analysis
• Certifications such as CISSP, GIAC certifications, Certified Ethical Hacker (CEH) preferred
• At least 2 years working in IT Security

Job Location

Afghanistan - Kabul: PROVINCIAL CENTER (KABUL)

Education:

Bachelors Degree, IT

Submission Guideline

Interested of afghan nationals should submit their updated application comprises your CV and a non-page cover letter explaining your interest and suitability for the advertised position.
Email:
Human resource directorate
Ministry of communication and information technology.
PLEASE MENTION THE VACANCY NUMBER & NAME OF POSITION YOU ARE APPLYING IN YOUR E-MAIL SUBJECT LINE otherwise the application will not be considered
APPLICATIONS RECEIVED AFTER THE DEADLINE WILL NOT BE CONSIDERED.
ONLY SHORT LISTED CANDIDATES WILL BE CONTACTED FOR INTERVIEW.
Females are highly encouraged to apply.

Submission Email

recruitment@mcit.gov.af

Email Print Report
More jobs in this category
Re-announced - Deputy IT Manager at Tetra Tech Kabul 23 Aug 2018
Web Developer at Ministry of Economy Kabul 23 Aug 2018
IT Technician at Giganor ISP Kabul 28 Aug 2018
مدیر عمومی تکنالوژی معلو.. at Afghanistan Urban Wate.. Kabul 21 Aug 2018
Network Administrator – Part-time at The Asia Foundation Kabul 25 Aug 2018
IT Manager at Internews – Afghanistan Kabul 16 Aug 2018
Database Officer at Afghan United Bank Kabul 17 Aug 2018
Infrastructure Administrator at Afghan United Bank Kabul 17 Aug 2018
Officer Network at Afghanistan International Bank Kabul 20 Aug 2018
Senior Officer Network at Afghanistan International Bank Kabul 20 Aug 2018
IT Manager at Venco Imtiaz Construction Company Kabul 22 Aug 2018
New to Jobs.af?
Not Registered? Big companies in Afghanistan hiring through Jobs.af!
Register
Recommend us on Facebook

Women in Economy

Like Jobs.af to get new job alerts through your Facebook