Defend Point
Purpose The role is part of Network and Infrastructure Security Operations. Candidate should have a high technical knowledge in the subjecet matter, capable of building, creating and supporting the Cloud and On-prem Infrastructure for the application, have good knowledge of running proof of concepts, providing deliverables in a timely manner, according to agree upon timelines.
Responsibilities 1. Implementation and Deployment: responsible for the implementation and deployment of the Beyond Trust Defend Point application across the organisation’s endpoint infrastructure, ensuring adherence to best practices and security standards. 2. Configuration and Customisation: Configure and customise Beyond Trust Defend Point to meet specific organisational requirements, including policy creation, rule configuration, and integration with existing security systems. 3. Policy Management: Develop and maintain endpoint security policies within the Beyond Trust Defend Point console, including whitelisting, blacklisting, and device control policies, to mitigate security risks and ensure compliance. 4. Documentation and Reporting: Maintain accurate documentation of Beyond Trust Defend Point configurations, policies, and procedures, and generate regular reports on [system performance, security posture, and compliance status. 5. Training and Knowledge Sharing: Provide training and support to IT staff and end-users on the use of beyond Trust Defend Point.
Qualification • 3+ years of experience in endpoint security management, including hands-on experience with Beyond Trust Defend Point or similar endpoint security solutions. • Strong understanding of endpoint security concepts, malware detection/prevention, and vulnerability management. • Proficiency in scripting languages (e.g., PowerShell, Python) for automation and customization tasks. • Excellent analytical and problem-solving skills, with the ability to troubleshoot complex technical issues and implement effective solutions. • Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate technical concepts to non-technical stakeholders. • Relevant certifications such as Certified Information Systems Security Professional (CISSP) or Beyond Trust certifications are a plus.