Job Details
Skills And Tools:
Job Description
- Develop horizontal view of risk posture across multiple technology domains.
- Improve the efficiency of information security processes and advance the effectiveness of the information security controls of the operating model.
- Work with various risk and information security teams in presenting recommendations for improvement to technology subject matter experts and management.
- Engage with cross sector global and risk teams in the review and re-engineering of key controls and processes to effectively and efficiently manage IS issues.
-
Developing data security procedures
-
Conducting data security assessments and reporting on security threats
-
Implementing end user controls across employee IT devices
-
Meeting data security compliance policies and regulations
-
Develop plans to Maximize network performance by monitoring performance; troubleshooting network problems and outages; and scheduling upgrades
-
Communicating security threats, results of security audits and current practices to key stakeholders
-
Maintaining, verifying and validating inventories of computer systems and networks
-
Directing training for all employees, or other third parties with information security clearance on the company's information security policies and procedures
-
Troubleshooting office hardware including servers, desktops, laptops and routers
Job Requirements
-
Solid data IT security skills including SIEM
- Certified Information Systems Security Professional (CISSP)
- Minimum of 5 Years of experience direct data management experience
- Minimum of 5 year of experience with data loss prevention technology and support
- Minimum of 5 Years of experience in defining data security standards used as a guide for secure security implementation and configuration.
- Minimum of 5 Years of experience with multiple security frameworks and standards; NIST CSF, NIST 800-53, ISO/IEC 27001, ITIL.
- Extensive knowledge of security industry best-practices on data handling, protection, auditing, and monitoring.
- Proven ability to succeed in a complex, fast-moving, and regulated cutting edge environment.
- Familiarity with agile development.
- Ability to interact communicate with business effectively
- Ability to maintain current knowledge of all relevant security technology, operations, management developments and seek opportunities to deploy new technologies that benefit the business
- Ability to assemble and test security components
- Ability to provide technical leadership on client engagement, including serving as a resource to the project team and the client by evaluating and proposing appropriate methods to protect data while resolving business and technology issues.
- Ability to document and communicate the status of progress against plans, taking corrective action as necessary