Information Security Specialist - CapDel
Location:
Makati, Fourth District, Philippines
Date:
Oct 10, 2025
Education
Bachelor's Degree of Information Technology or any related IT course.
Qualifications
Qualifications
- Proven experience in designing, implementing, and maintaining scalable IAM solutions and platforms
- Expertise in developing and enforcing access control policies and procedures
- Hands-on experience with implementing automated workflows for identity and access requests
- Proficiency in IAM tools such as SailPoint, Microsoft Entra ID, and Aveksa
- Strong background in IAM automation and scripting (e.g., Python, PowerShell, Java), including API integrations
- Familiarity with cloud security and IAM frameworks across Azure, AWS, and Google Cloud environments
Duties and Responsibilities
Role Definition
Plans, designs and implements cybersecurity strategies and solutions to prevent critical damage to the organization brought by cyber-attacks.
Responsibilities
- Develops and implements security controls, systems, remote access solutions, and infrastructure architecture in alignment with defined requirements and guidelines; configures network controls to protect the organization's environment in a timely manner.
- Provides recommendations for security products, services, and procedures to enhance system architecture and security controls; conducts testing and evaluation of new cybersecurity technologies and controls.
- Collaborates with cybersecurity and technology teams to deploy vulnerability mitigations and support integration activities; leverages industry standards and frameworks to identify capabilities and technologies that strengthen cyber defenses across diverse scenarios.
- Implements security systems by defining intrusion detection methodologies and preparing both preventive and reactive measures.
- Reviews security technologies, tools, and services, and provides recommendations to the broader security team based on security, financial, and operational metrics.
- Defines processes and architectures for securing networks, applications, and infrastructure; builds firewalls and implements intrusion detection systems in complex environments.