Key accountabilities:
Implements security controls that align to regulatory requirements,
ensuring documented and sustainable compliance that aligns with company’s objectives.
Improves company’s security positioning through process improvement, policy, automation, and the continuous evolution of capabilities
Implements processes, such as VMP (Vulnerability Management Process), to automate and continuously monitor vulnerabilities, solving actions, mitigation actions and risks. Develops reporting metrics and dashboards.
Schedules regular assessments of controls and creates reports.
Runs security controls and provides support to all stakeholders on security controls covering internal assets.
Assess incidents, vulnerability management, scans, patching status,
Cyber Security Baselines.
Documents and reports control failures and gaps to stakeholders. Provides remediation guidance and prepares management reports to
track remediation activities.
Performs other related duties as assigned.
Key deliverables:
Achieves Network and IT-like assets security compliance by executing compliance programs and completing documentation.
Prevents compliance issues by collaborating with engineering and
security teams, reviewing data, and running compliance policies.
Prepares compliance reports by collecting, analyzing, and summarizing measurement data and trends.
Attains compliance by isolating and resolving compliance issues,
recommending product and process changes.
Core competencies, knowledge and
experience:
Written and spoken English
Other widely spoken European languages – written and spoken
Information technology systems and processes, network infrastructure, data architecture, data processes, and protocols
Applicable information security management, governance, and
compliance principles, practices, laws, rules and regulations
Incident response management
Maintaining confidentiality
Troubleshooting and operating a computer and various software
packages
Defining problems, collecting and analyzing data, establishing facts and drawing valid conclusions
Must have technical / professional
qualifications:
Preferably higher technical studies
(e.g.: Electronics and Telecommunications, Automation and Computers, Informatics, etc.)
Experience in cyber security programs, audits, assessments, risk,
remediation, or cyber security compliance management.
Solid technical background with understanding and/or hands-on
experience in cloud and hosted environments and IT infrastructure
technologies.