Basic Information
Ref Number
Last day to apply
Primary Location
Additional Locations
Państwo
Job Type
Work Style
Description and Requirements
Key responsibilities:
Developing, creating, implementing and maintaining a set of security standards, controls, workflows, and protocols, covering physical, logical and technology for the assigned client.
Performing the assigned tasks with high quality and on time, creating reports, escalating detected issues, investigating and resolving incidents, following up on improvement items.
Responsible and accountable for the assigned security tools and systems, including creation and maintenance of documentation, configurations and standards.
Facilitating internal and external audits, providing evidence, following up on improvement items, serving as a liaison between internal and external teams.
Providing guidance and leadership for delegated tasks, accountable for the outcome.
Promoting the security controls, establishing processes to ensure compliance, including internal and external reporting.
Providing training for other teams and stakeholders, creating and implementing solutions, monitoring for changes to the requirements, timely introducing them and escalating any potential issues before becoming problems.
Perform other duties in his field of expertise as requested by management
Requirements:
Schedule flexibility - Required
Availability to work on-site - Required
Core competencies:
Giving support
Focusing on customers
Embracing technology
Managing self-development
Functional competencies:
English - High B2 or higher:
Oral and written comprehension.
Appropriate use of language.
Proficiency with G Suite applications (i.e. Docs, Sheets, Slides)
Knowledge of macOS, iOS, Windows OS, Linux is considered a strong advantage.
Excellent knowledge of modern operating systems, a variety of OS knowledge is considered a strong value..
Hands-on experience and understanding of Project Management lifecycle and principles is a must..
Understanding of the security governance frameworks and requirements, including risk management, compliance, audit, and incident management and response is required.
Understanding of concepts like cloud applications, directory services, mobile device management, authentication, asset management, hardening, vulnerability scanning and proper application in enterprise management.
Understanding of network technologies and protocols, including security concepts and devices like firewalls, intrusion detection and prevention systems (IDS/IPS), and cloud computing - Required
Understanding of Physical Security controls (Access Control, Badging, Cameras)
Understanding of ESG concepts preferably experience handling Environmental, Social and Governance items.
Qualifications:
Three or four -years degree in computer science or related field of study, or equivalent professional experience. - Mandatory
Five plus years of professional experience with a proven track of increases in scope, responsibilities, and successful conclusions of the assigned projects.
Any project management and/or security certifications like PMP, Security+, CISSP, CISA, CISM, ISO27001 Internal auditor is a plus.
Experience handling local health, safety & security regulations desirable.
Experience in regulated, multinational IT or services companies is a plus.
Additional Job Description
The Business Information Security role is an experienced security professional supporting the complex framework of client security controls. The candidate should be self-motivated, capable of working independently, and able to make informed decisions without constant supervision. They must possess creativity in problem-solving and take initiative in identifying and addressing security challenges. This role is responsible for providing guidance to operational and IT teams, ensuring compliance by performing regular logical and physical checks, leading and participating in audits, and monitoring consistent performance. As a senior role, it requires analysis of evolving requirements, devising plans to address them, implementing remediation activities, and ensuring collaboration from internal stakeholders. The candidate should act as an expert, promote security frameworks, and identify opportunities for improvement and efficiency gains.
Language Reference |
---|
English |
EEO Statement