Qualification & Experience:
Essential:
- 16-year bachelor’s degree in computer science, information technology, software engineering, information security or equivalent from HEC recognized University with 4-5 years of hands-on experience in systems/networks/information security domains.
Desirable:
- 18-year master’s degree in information security from HEC recognized University with 5-7 years of Post Qualification Experience in information security domains.
Key Responsibilities:
- Implementation of a comprehensive cybersecurity plan aligned with business goals and requirements.
- Oversee the design, implementation, and maintenance of cybersecurity wing including solutions, documentation and testing.
- Analyze vulnerabilities, threats, and develop appropriate responses and countermeasures including dissemination of security advisories.
- Improve security in existing information system including system/network/application etc
- Lead the identification, assessment, and mitigation of cybersecurity risks across the IT infrastructure, systems, and data.
- Oversee the security operations center (SOC) for monitoring security posture, ensuring timely detection, analysis, and response to security incidents.
- Provide guidance and oversight in the design, implementation, and maintenance of secure IT architecture, systems, and networks.
- Promote a culture of cybersecurity awareness and shared responsibility.
- Liaison with external organizations, such as government agencies, law enforcement, and industry groups on cybersecurity matters.
Knowledge/Skills/Abilities:
Essential:
- Technical experience with system/network monitoring, Incident handling and hardening of IT setup.
- Technical experience in implementing cybersecurity solutions.
- Knowledge and Hands-on experience on standards (ISO, CIS, NIST)
- Hands-on experience with implementation of Security Control.
- Practical experience with digital forensic tools and procedures.
- Practical understanding of exploiting vulnerabilities, cracking wireless network, and Web application exploitation techniques is desired.
- Candidate must possess excellent communication and interpersonal skills, perform as a team player, and have demonstrated an ability to work independently, lead collaboratively and execute objectives and expected outcomes.
- Strong analytical, logical reasoning and problem-solving skills.
- Self-motivated and ability to work with minimal supervision.
- Technical report writing skills are required.
Desirable:
- Practical experience in setting up cybersecurity systems.
Training/Certification:
Essential:
- At least 01x professional certifications followed by formal training: CEH, CHFI, CISSP, CCSP, LPT, CISA, CISM or comparable skill is mandatory.
Desirable:
- Two or more cybersecurity certifications
Terms and Conditions:
- Candidates are required to attach scanned copies of their documents (Academics /Professional).
- Last education certificate/degree must be attested/verified by HEC.
Candidates may be considered ineligible for the post due to any of the following reasons:
- 3rd Div in academic career / weak academic profile.
- NUST employees with less than one year of service with NUST and / or absence of NOC from Head of Institution.
- In process of pursuing a required degree.
- Only selected candidates will be contacted and issued offer letter.
- Candidates serving in Govt departments, Armed forces may apply after seeking NOC from their respective parent department / organizations.
- Late / incomplete applications will be ignored.
- Only short-listed candidates will be considered / called for test / interview and no TA / DA will be admissible.
- NUST reserves the right to cancel, modify / terminate the recruitment program due to any reason, without notice, at any time.