-
Design, develop and propose IT security management system, IT security design programs, IT system and IT network and IT security policy and procedure including level of authority in all IT application and database access according to local and international standards and best practice to provide secure the data/information in IT network within INPEX Indonesia offices and across many different locations; infrastructure.
-
Monitor and review IT program security improvement and best practices, IT risk assessment, cyber-attacks handling; Monitor, implement and update IT security program including license and certification for software and hardware utilization in order to ensure continuous improvement of IT security & compliance with IT law and regulations in Indonesia and global world and maintain the integrity of systems.
-
Monitor and review IT security management system implementations; Socialize IT security guidelines (IT policy, procedures, and standards, and IT security management system) through determined media (intranet, training, or others); Develop, recommend and supervise plans and tracking system;Perform risk assessments and execute tests of data processing system to protect IT filesagainst accidental or unauthorized modification, destruction, or disclosure and tracking system which can control the security of data/ information in IT system/network andensure functioning of data processing activities and security measures.
-
Monitor, review and Identify violation to the IT security system (from internal and external Parties); Conduct necessary warning system in accordance with level of violation for internal violator and protective action of IT data, system and network;Request advice for IT security system or program from external parties to enhance IT security system; Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated to ensure IT operation in accordance with Company policy and procedures and Indonesian law and regulations for external violator (cyber-attacks).
-
Implement encryption of data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
Engineering - Informatic
Information Technology
To apply for this job, you need to
sign up to create an account.
If you already have an account, please
sign in first before apply.