RESPONSIBILITIES:
• Be responsible for Post-sales activities of wide range of Cyber Security products.
• Involve in Large-scale (Local & Regional) Project Implementation.
• Provide on-site implementation services including design, testing, deployment & documentation.
• Provides timely and adequate response to threats/alerts, including off-hour support.
• Analyse and clarify customer queries though troubleshooting and researching existing knowledgebase articles/known issues
• Be on routine standby to support 24x7 maintenance support calls
• Requires the ability to communicate issues clearly and concisely.
• Excellent written and verbal communication skills are a necessary part of the job
• Actively participate in team and departmental meetings by providing feedback on current day to day activity and recommendations for improvement.
REQUIREMENTS:
• Min Diploma or Bachelor's degree in Cyber Security, Computer Science, Computer Engineering or related field
• At least 3-5 years of experience supporting systems and network related solutions (i.e. Web Proxy or Intrusion Prevention System (IPS)). Particularly in the areas of network administration.
• Qualified candidates without any relevant working experience are welcome to apply
• Equip with knowledge & experience in networking such as routing and switching technology.
• Able to perform endpoint & network troubleshooting to isolate the cause of the issue
• Past experience on Cyber Security Products & Cyber Security Knowledge are added advantages
• Able to work independently as well as in a team environment.
• Willing to work hard and eager to learn about new technologies.
• Strong, organizational, analytical, and interpersonal skills.
• Ability to execute with a sense of urgency.
DESIRABLES:
• Microsoft MCSA & MCSE certification.
• Cisco CCNA & CCNP certification.
• Familiarity on Databases such as MSQL, Oracle, MySQL.
• Familiarity on Cloud Architecture such as IaaS or PaaS.
• Familiarity on DevOps Knowledge.
• Exposure to security software solutions like Endpoint Security, Firewall, Content Security, Intrusion prevention, Web & Email Security, Encryption, Data Protection, Vulnerability Management and Compliance & Audit will be added advantage.