Note: Looking for cyber security professionals with good experience in Vulnerability remedies and not only Vulnerability Assessments experience.
Skills -
- 12+ Years of Experience with 5+ years experience in Information/ Enterprise Security
- Excellent Project Management and Customer Management skills
- Experience of working with global customers would be preferable.
- Coordination expertise
- Good Communication skills
Responsible for the oversight of all Information Security operations including
- Responsible for researching, recommending and implementing changes to policies, procedures and systems to enhance the protection of software, systems and information owned, controlled, used and managed by Customer.
- Review the vulnerability assessment report published by 3rd party run SOC team
- Understand the underlying cause of the security issue
- Work with Global and country IT, advise them to fix it
- Incase the country IT and Global team say security issue cannot be fixed - the individual should help create risk assessment sheet for customer executive leadership
- Development and maintenance of information security systems, enhancements, and support processes to meet external and internal customer requirements.
- Configures and validates secured environments. Monitors, evaluates and maintains secured networks and environments through the use of information security to ols, processes, and procedures.
- Reviews, documents, and takes action to ensure that electronic, computer and development environments meet security policies and standards
- Identifies, summarizes, reviews, and reports potential/actual actions that may threaten client environments.
- Participates in information security audits to proactively minimize and eliminate information security vulnerabilities. Responds to information security incidents and assists with internal information security investigations.
- Participates in the development of technical security standards for system platforms and performs platform vulnerability management.
- Develops technical specifications to satisfy customer requirements and meet security policies and standards which represent efficient and effective solutions in relationship to operational costs, usability, and maintainability.
- Performs detailed security evaluations associated with designing and installing owned and third party software, systems, components, and hardware.
Other tasks:
- Management of Security Policy Framework
- Customer relation matters (c ontract reviews, RFP questionnaires, audits)
- Information Security Management with/of vendors (e.g. IBM, McAfee, BT)
- Hold Security Call with the countries
- Communicate with Regional Leads
- Global Datacenter security
- Staff Meetings, It Steering Committee Meetings, Governance Board, initiatives, etc.
- Quarterly Review of Audit/Security Issues, responses to audit reports for security items, partnering for audit initiatives.
- Vendor Management related to Security
Didn’t find the job appropriate? Report this Job