Overview
Our organization is seeking a highly skilled Information Security Specialist to join our team. In this critical role, you will be responsible for designing and implementing effective cybersecurity risk management strategies to safeguard our business operations.
Responsibilities
- Design and Assess Controls : Develop and evaluate controls for ERP, IAM, Cloud, and IT Resiliency to ensure robust security measures are in place.
- Implement Compliance Frameworks : Implement compliance frameworks and manage risk remediation to maintain regulatory requirements.
- Deliver Risk Assessments : Conduct thorough security risk assessments and provide detailed reporting for large-scale IT projects.
- Consult on Security Measures : Offer expert advice on authentication, cryptography, and infrastructure hardening to enhance overall security posture.
- Collaborate with Teams : Work closely with architecture, assurance, and offensive security teams to integrate security into the project lifecycle.
- Support Secure Implementation : Guide IT teams on secure implementation and external service coordination to minimize risks.
- Communicate Risks Clearly : Effectively communicate risks to stakeholders and train teams on mitigation strategies.
- Advocate for Security : Promote security across business units and technical teams to ensure a unified approach.
Required Skills and Qualifications
Strong Background in Cybersecurity : Possess a deep understanding of cybersecurity risk management and regulatory compliance principles.Experience with GRC Tools : Have hands-on experience with GRC tools (ServiceNow, Archer) and technical hardening practices.Familiarity with SDLC and ITIL : Be familiar with Software Development Life Cycle (SDLC) and IT Infrastructure Library (ITIL) principles.Ability to Balance Security Needs : Demonstrate the ability to balance security needs with business goals while maintaining a proactive approach to risk management.Up-to-Date Knowledge : Stay current with emerging threats, controls, and security technologies to ensure our organization remains ahead of potential vulnerabilities.#J-18808-Ljbffr