公司简介
-Profile of services - Global.
-Compliance & Regulatory Management - Management and contribution to any regulatory request relating to IT Security globally.
-Vendor/Supplier Management – Liaison and potential management of IT Security vendors, consultants or suppliers. Reliant and adaptive to changing situations, with strong desire to delegate and empower the team.
-Strategic Security Leadership:
-Lead the development and execution of strategic security initiatives to strengthen network defences
-Provide expert guidance on cybersecurity strategies to senior management and stakeholders.
-Being responsible for maintaining up-to-date security documentation
-Security Documentation Review:
-Taking a risk based approach to conduct in depth reviews of security design documentation and firewall rules and identify potential gaps in security controls.
-Support the development and implementation of remediation plans for identified security deficiencies.
-Advanced Technical Support and Guidance:
-Offer advanced technical support and guidance on complex network solutions, cryptography, and data security projects.
-Ensure compliance with global cybersecurity standards and drive the adoption of best practices across the organization.
-Risk Management:
-Lead risk assessment activities and develop comprehensive risk management plans.
-Collaborate with the Business as part of the first line of defence (1LOD) to maintain visibility of IT security risk profiles and control effectiveness.
-Assist in engaging with regional and global cybersecurity stakeholders to address security concerns.
-Knowledge and Best Practices:
-Maintain up-to-date knowledge of relevant security frameworks, standards, and best practices.
-Participate in special projects and perform other duties as assigned.
-Mentorship and Team Development:
-Mentor junior members of the team by providing leadership, support and setting an example
-Foster a culture of continuous learning and innovation within the cybersecurity team.
-7+ years of experience focused on all aspects Networks and Network Security, from Design, Testing, and Implementation, through to policy certification and effectiveness review aligned to Cyber controls
-Extensive understanding of cybersecurity controls and industry trends.
-Proficiency with cybersecurity technologies such as IDS/IPS, firewalls, and proxies.
-In depth knowledge of network protocols (e.g., TCP, UDP, DNS) and network protocol analysis tools.
-Experience with cloud computing platforms like AWS, Azure, or Google is desirable.
-Proven ability to create comprehensive reports, documenting findings and providing strategic recommendations.
-Ability to build connections and work collaboratively across boundaries.
-Willingness to continuously learn and share learnings with others.
-Advanced Industry certifications such as CISSP, CISA, or CISM or equivalent are highly desirable.
-Experience in IT or cybersecurity, preferably within a financial or regulated environment.