In this role, you will carry out the Secure by Design assessments and provide guidance to projects and BAU activities across the following UK business functions:
Consumer & Business: Your focus will be to ensure we deliver secure products and services to our customers across Consumer & Business markets, as defined by company UK’s Consumer & Business functions.
Internal: Your focus will be to ensure we deliver secure solutions to support company UK’s internal business functions. These internal business functions include Technology, Finance, HR, Corporate & External Affairs, and Business Intelligence
Employer Profile
Technology Centre of a multinational Telecom company.
Responsibilities
With these activities you will have a great impact on our business:
Ensure project designs comply with Baseline Security Requirements and security policy
Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & Access Management, SIEM, and Vulnerability Management
Ensure internal customers, external suppliers, and delivery partners are aware of security standards and future strategies to influence development roadmaps
Identify security risks, manage them with key stakeholders, and provide recommendations for risk mitigation
Build relationships with your stakeholder community across the company business
Escalate deviations from baseline security requirements and security architecture
Provide advice and guidance to SbD Managers, Specialists, and Cyber Security Champions
Approves designs that comply with policies and standards and are within parameters set by the Secure by Design Managers
Requirements
With these skills you are a great candidate:
Competent in understanding network designs and equipment configurations used to deliver a wide range of IT and telecommunications solutions
Competent in applying security policies and principles defined in security architecture to real world scenarios
Understands and applies risk management principles
Effective communication skills to influence stakeholders and explain complex security requirements in simple terms
Stakeholder Management – established as the go-to person for any project issues impacting on Corporate & External Affairs teams
Establishing and maintaining single point of contact relationship with key project manager(s)
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.