Smart Nas app


Take control with SmartNas!
Download the app!


Cyber Security Administrator

January 16, 2022 | Cyber Security | 1 positions in Phnom Penh

Job responsibilities

Building and managing cyber assurance and vulnerability management, performing security controls assessments, vulnerability assessment, remediation management, penetration testing, and risk assessment.

  • Develop and maintain vulnerability management standards, processes, and guidelines
  • Develop and maintained vulnerability assessment and pen testing calendar
  • Perform vulnerability assessment and pen testing (IT/Telco network, operating system, database, and mobile application)
  • Analyse vulnerabilities assessment results, recommend remediation and mitigation strategies
  • Performing forensic and analyse incident investigation
  • Identify false positives and risk acceptance candidates
  • Clearly understand and communicate risks associated with vulnerabilities
  • Perform Red Team adversary simulation activities, applying attacker tools, tactics, and procedures in a safe and controlled manner.
  • Conduct logical security audits and hands-on technical security evaluations
  • Develop subject matter expertise in focused areas of security
  • Implement and manage tools (SIEM, SOC, CDP, EDR, PAM/PIM, Nessus, Metaplot, Nexpose, …)
  • Maintaining, coordination and evaluation incident management via SOC/EDR between SOC/EDR vendor and incident response owner for the remediation
  • Develop and maintaining up to date remediation tracking of incident identified via SOC
  • Develop deliverable reporting on vulnerability remediation progress.
  • Conduct research on current vulnerabilities and exploits using publicly available, trusted resources and other finished vulnerability products

Job requirements

  • Bachelor Degree in Information Technology or Cyber Security, Computer science or related field.
  • Strong analytical and problem solving skill.
  • Minimum 3 years of experience in IT Security field, experience in developing and administering an Information Security policies and procedure.
  • Proficiency understanding the technical architecture of IT/Telco systems built using Windows, UNIX, Linux, IBM AIX, VMware, Citrix, Oracle and MySQL, GSM platforms.
  • Good in English, both written and spoken.
  • Self-confident and able to work in a team.

Be the next Smart Hero

Job Application

Files must be less than 2 MB.
Allowed file types: rtf, pdf, doc, docx, odt.

Top up with:

Top up Top up