I

Cyber Security Specialist at Infitech Global Solutions Limited

Infitech Global Solutions Limited
April 20, 2026
Full-time
On-site
We are seeking a Cyber Security Specialist responsible for protecting the organization's systems, networks, and data from security threats. This role focuses on proactively identifying vulnerabilities, strengthening defenses, and responding to security incidents to ensure a secure IT environment.

Key Responsibilities:


Monitor networks and systems for security breaches and suspicious activity
Conduct vulnerability assessments and penetration testing to identify risks
Implement security controls, including firewalls, encryption, and access management
Perform system hardening to minimize exposure to threats
Investigate and respond to security incidents, including threat containment and remediation
Develop and enforce security policies, procedures, and best practices
Carry out regular security audits and compliance checks
Manage identity and access controls (user permissions, authentication systems)
Ensure secure configuration of servers, databases, and applications
Stay updated on emerging cybersecurity threats and recommend improvements


Key Requirements / Expertise:


Strong foundation in information security and risk management
Hands-on experience with penetration testing and vulnerability scanning tools
Knowledge of encryption methods and secure communication protocols
Familiarity with network security, firewalls, IDS/IPS, and endpoint protection
Understanding of system hardening and secure system configuration
Experience with incident detection and response
Ability to analyze threats and implement effective countermeasures


Preferred Qualifications:


Degree in Cybersecurity, Computer Science, or related field
Certifications such as CEH, CISSP, CompTIA Security+, or similar
Experience working in a security operations or IT environment


Performance Metrics:


Effectiveness in preventing and mitigating security threats
Speed and efficiency of incident response
Reduction in system vulnerabilities over time
Compliance with security standards and policies