[F-550] - CYBER SECURITY SPECIALIST

Bebeecompliance


Job Title: Cyber Security Specialist As a key member of our team, you will play a vital role in ensuring the security and integrity of information systems. The cyber security specialist position is responsible for reviewing privileged accesses and configurations on a scheduled basis to identify areas where access and configurations have been changed without cause. - You will be responsible for demonstrating that security operation teams adhere to defined processes and procedures, supporting the achievement of organizational information security objectives. - Reviewing operational practices, reporting gaps, and working with process owners to achieve resolution of any identified deficiencies. - Identifying and managing compliance-related issues, tracking IT risks as well as other key performance indicators. Key Responsibilities: - Champion a customer-focused culture to deepen client relationships and leverage broader systems and knowledge. - Review access to systems including critical information assets (CIA). - Validate that access was due to sanctioned and documented activities. - Ensure configurations are changed with cause and appropriate documentation. - Identify malicious activity. - Conduct detailed risk-based evaluations/monitoring of Information Technology (IT) controls utilizing organizational information security standards and regulatory requirements. - Review reports to investigate, escalate, and track control deficiencies, ensuring action items and remediation plans are vigorously tracked to closure. - Provide knowledgeable opinion on entities' compliance with information security standards. - Understand how the organization's risk appetite and risk culture should be incorporated into day-to-day activities and decisions. - Actively pursue effective and efficient operations of your respective area in accordance with organizational values, code of conduct, and Global Sales Principles. - Champion a high-performance environment and contribute to an inclusive work environment. Dimensions: - The incumbent will conduct reviews of IT application and supporting pervasive controls. - The incumbent will maintain documentation supporting SOX Business Processes and SOX IT Pervasive areas under the direction of management and control owners. - The incumbent receives general direction from the senior manager/team lead. Day-to-day tasks are handled independently. - The incumbent will maintain documentation supporting business. - Day-to-day decisions regarding approaches to security and control reviews are handled independently by the incumbent using a high degree of discretion and judgment. - The incumbent is guided by organizational information security policy and standards and departmental procedures.

trabajosonline.net © 2017–2021
Más información