Cn / En
ACIC CHINA
Certification Project
Information security officer

Information Security Officer Job Introduction

 

Core Positioning: A "security protection specialist   risk guardian" in the digital world, for the security architecture design, vulnerability protection, and emergency response of network and information systems, resisting security threats such as network attacks and data leaks, and ensuring the security of assets.

 

Core Responsibilities:

 

- Security Protection System Establishment: Design network security architecture (such as firewalls, intrusion detection/defense systems), security strategies such as data encryption and access control, and build a multi-level protection system.

 

- Risk Assessment and Vulnerability Repair: Regularly carry out security scanning penetration testing, identify system vulnerabilities and security risks, issue assessment reports and promote repair optimization.

 

- Emergency Response and Disposal: Monitor network security incidents (such as hacker attacks virus invasions), quickly locate the source of the attack, block threats, restore the system to normal operation and trace the cause of the incident.

 

- Security Compliance Training: Ensure that the system meets the requirements of network security laws, data security laws and other regulations, carry out internal security training, and enhance the safety awareness of employees.

Core Requirements:

 

- Skills: Proficient in network security technology (such as firewall configuration, penetration testing, vulnerability mining), familiar with operating systems (Windows/Linux, database security, encryption technology, and master the use of security tools (Nessus, Metasploit, etc.).

 

- Qualifications: Common cert include CISAW (Information Security Assurance Personnel), CISP (Certified Information Security Professional), CEH (Certified Ethical Hacker), C (Certified Information Systems Auditor), etc.

 

- Quality: Strong logical analysis ability, risk prediction awareness, confidentiality awareness, and need to continuously track the latest network methods and protection technologies.

 

Application Scenarios: Covering key industries such as finance, Internet, government, energy, and medical care, such as bank transaction system security, enterprise customer data encryption protection, government platform security operation and maintenance, hospital medical data leakage prevention, etc.

Consult
Tel 400-809-1233
Query
Follow

Scan WeChat