You will be part of a new global team that has the responsibility to audit, design, build and implement security measures for a large organization in industrial sector.
The role includes:
Design, build, implement and support International security infrastructure;
Align organizational security strategy and infrastructure with overall business and technology strategy;
Identify security design gaps and recommend changes or enhancements;
Implement security by design in all business projects;
Support the deployment of Cybersecurity Solutions
Responsibilities
Investigate, Audit & Provide Cyber expertise on Infrastructure and backbones;
Ensure infrastructure and solutions follow the latest security standards, systems and authentication protocols, as well as best practice security products (including but not limited to NIST);
Be the local technical expert to interface between teams in Europe and North America;
Liaise with different stakeholders and product owners in order to implement/adapt security services/products within business solutions. Support the definition of specific Standards that will have to be adopted by the company globally;
Prepare relevant Architecture Requirement Standard that will be used for solutions implementation if needed;
Assess the existing solutions in place and provide recommendations to harmonize the IT / Cybersecurity ecosystem;
Actively support the stream separation program by leading the applications security assessments in coordination with the European cybersecurity architecture team;
Support identification of system weakness and propose solutions to counter the risks and remediate to the situation;
Assess existing security measures and recommend implementing enhancements;
Support the creation of disaster recovery procedures as well as a Crisis Management Plan;
Respond to escalated security incidents and provide thorough post-event analyses.
Requirements
Bachelor/Master degree in Information Technology;
Relevant experience in information security, cybersecurity and/or IT risk management;
A strong working knowledge of current IT risks, security implementations, and computer systems;
Understanding of cybersecurity topics, such as Security protocols, PKis, authentication, authorization, Encryption, Multi-factor authentication, Single sign-on, Identity management, EDR/EPP, Security Reporting or related technologies.
Experience implementing security solutions on a large scale;
Organized with a proven ability to prioritize workload, meet deadlines, and utilize time effectively in a challenging environment to drumbeat the activity;