Ver oferta completa

INFORMATION SECURITY ANALYST (CYBER SECURITY)

Valencia - Valencia

Descripción de la oferta de empleo

Trigyn has a contractual opportunity for an Information Security Analyst (Cyber Security).
This resource will be working at our client site in Valencia, Spain.
ob Responsibilities.
he position will lead defensive security practices within the Information Technology Department (ICT).
ICT manages the information systems and technology services required for Iclient's Headquarters, Regional and Field Offices.
The analyst sets the standards and processes for defensive security approaches for ICT within client.
The analyst will be part of the Blue Team.
The Blue Team also monitors compliance with the standards and policies within ICT.
ob PurposeThe Analyst, Blue Team (Defensive Security) develops, implements, drives, and monitors the defensive security practices for Information Security and Risk Management at client.
e\/She acts as the authority for the development and enforcement of organization policies, standards, and processes, and has ultimate responsibility for ensuring the detection and responding to threats.
S\/he guides the design and continuous improvement of the defensive security that balances business needs with security risks.
S\/he advises the CIO, CISO and top executives on defensive security matters and sets directions for complying with regulatory inquiries, legal and compliance regulations, inspections, and audits.
S\/he is an expert in cyber security compliance standards, protocols, and frameworks, as well as the NIST , NIST CSF, and NIST (RMF).
\/he keeps abreast of cyber-related applications and hardware technologies and services and is constantly on the lookout for new technologies that may be leveraged to enhance work processes, or which may pose potential threats.
S\/he is an inspirational and influential leader, who displays sound judgment and decisiveness in ensuring that corporate information is well protected and secured.
S\/he is strategic in his\/her approach toward resource management and capability development among her\/his teams.
\/he directs and manages an independent assurance program for cybersecurity to assess, monitor and report on the operating effectiveness of security controls.
Proactively and effectively reports on information security priorities, top risks, and action plans.
\/he is responsible to formulate, implement, and manage institutional information security strategies and programs designed to protect ICT’s information technology (IT) systems and information from illegitimate access and reduce\/mitigate information security risks across the organization.
S\/he leads programs and processes to monitor the emergence of new threats and vulnerabilities, assessing impacts, and driving responses, as appropriate (incident response policies and standards).
S\/he leads the development and maintenance of a security and risk management functional capability and framework that defines and manages ICT’s overall approach to information risk and control that aligns with the client’s risk management strategy.
\/he ensures that clear and timely business advice is provided to management on key information security and assurance issues and that information security and risk is adequately represented on relevant business\/governance forums and is known, well-integrated, and addressed across the organization.
Maintain and implement business continuity and disaster recovery strategies and solutions to ensure organizational resiliency for client.
Facilitate information security governance through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board.
Lead and manage the information security team.
\/he will report to the CISO and the Blue Team Lead and may supervise international, national, and administrative staff.
esponsibilitiesa.
Information Security Strategy, Policies, and Standards•Provide vision, leadership, and direction on defensive security and IT risk for client.
Collaboratively engage with all ICT teams and businesses to facilitate a standardized approach and structure to defensive security and IT risk.•Liaise with the different ICT teams to ensure that standards, polices, and procedures are available and enacted consistently across application development projects and programs.•Oversee the development and maintenance of standards and processes that fit the organization at all levels.
Ensure consistent application of security standards across client’s (in HQ, regional and field offices) technical infrastructure.•Establish an effective defensive security capability that includes customers and resource owners in the security decision-making and oversight.
.
Incident Response Management• Incident response process from the monitoring and detection of incidents.
Establish processes to detect, respond, and recover in a timely and proactive manner from incidents.•Implement preventive, detective, and corrective technical security controls and solutions to support information security policies, standards, and procedures.•Respond appropriately to investigations and forensic requests, managing situations with discretion, sensitivity, and objectivity, and with due consideration of chain-of-custody.•Liaise with other IT specialists and relevant external parties to proactively review and address technical security vulnerabilities, threats, and risks and ensure that appropriate controls are implemented to prevent the recurrence of information security incidents.
.
Information Risk Management•Strengthen sustainability of internal control reviews and ensure ongoing analysis of information security threats, vulnerabilities, and market trends.
Determine the potential impact on the organization’s risk posture.•Implement and maintain a mechanism to monitor risk response activities in ICT, report to management regularly.•Liaise with the different ICT teams and other departments to ensure that IT audit findings are tracked, analyzed for impact, prioritized, and implemented in a systematic manner; ensure that all significant audit findings are closed in a reasonable amount of time; work closely with other ICT teams in implementing the IT policies and procedures required for addressing the audit findings.
.
Customer Service and Communications•Build sound customer service across IOM to enable a strong understanding and close alignment with customer needs, direction, and risk appetite.•Manage the creation and production of timely, accurate, and informative customer and IT metrics relating to defensive security and risk initiatives.
Utilize the metrics to prioritize key initiatives and respond to negative trends.
•Develop and promote information security awareness training and education for all levels of staff and service providers.
Regularly review and ensure its effectiveness.•Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security.
.
Cyber Security Analyst•Provide analysis of our client’s operation for the development of policies, guidelines, and methodologies.•Recommend cyber security control and measurement, and policy compliance for development operations.•Liaises with external entities, such as cybersecurity advisory bodies, cyber threat intelligence entities, member states and external partners, and law enforcement agencies (in coordination with CIO, CISO, LEG, OIO, and HR), etc.
as necessary, to ensure that the organization maintains a strong security posture and is kept well abreast of the relevant security issues identified by these external entities.
or Immediate Response, Please send your Resume to RIGYN TECHNOLOGIES is a multinational IT services company with resources deployed in 25 countries.
TRIGYN is an ISO , ISO (ISMS) and CMMI Level 5 certified company.
TRIGYN has offices in United States, Canada, Germany Switzerland and India.
Ver oferta completa

Detalles de la oferta

Empresa
  • Trigyn
Localidad
Dirección
  • Sin especificar - Sin especificar
Tipo de Contrato
  • Sin especificar
Fecha de publicación
  • 21/06/2024
Fecha de expiración
  • 19/09/2024
QA Analyst
Aldia group

We are looking for a qa analyst to perform the following functions:requisitos del puesto participate in the quality assurance team in order to identify, analyse and evaluate issues around the installation process preparation of monitoring reports... perform organizational coaching to do right first and......

BUSINESS ANALYST
COSTA BRAVA FOODS

Descripció de l'ofertadescripció de l'ofertapara importante empresa en crecimiento y expansión, precisamos incorporar a una persona para trabajar en nuestro departamento comercial como business analyst , reportando directamente al director comercial... funcional, escrit c1 - d......

ADMINISTRATIVE DEPARTMENT
Rainsteal Oil & Gas, UK.

Food and restaurant department bakers / bartenders / chefs / chef de partie / sous chef / chef d 'cuisine / cooks / dietitians, food and beverage servers, food service supervisors, restaurant and food service manager, catering manager, assistant beverage manager, kitchen manager, banquet coordinator......

Ingeniero CIM / Analista de datos (Experto SAP)
VALEO

If you do not meet all the requirements, don't worry, we want to meet you too! more information on valeo: https://www... which make a lot of opportunity for career growth- a business highly committed to limiting the environmental impact if its activities and ranked by corporate knights as the number......

Graduate program it hub-nestlé global
Nestlé

• academical background: bachelor or master’s degree in computer science, mathematics, econometrics, information technologies, social sciences, business analytics, machine learning or another similar relevant quantitative degree... what is the it graduate program? the 2-year it graduate program is designed......

Call 39-2023-1 Researcher position
Centre Tecnològic de Telecomunicacions de Catalunya

For more information about the pons research unit click here (https://www... more information about cttc professional categories can be found at this link: (https://www... * cvs and any other information gathered during this process will be handled confidentially who are we? the center tecnològic de......

CALL 39-2023-2
Centre Tecnològic de Telecomunicacions de Catalunya

For more information about the pons research unit click here (https://www... more information about cttc professional categories can be found at this link: (https://www... * cvs and any other information gathered during this process will be handled confidentiallyotros datos del puestowho are we? the......

Research Position - Sustainable Artificial Intelligence RU
Centre Tecnològic de Telecomunicacions de Catalunya

More information on the greenedge project: https://greenedge-itn... more information on the research unit: https://www... * cvs and any other information gathered during this process will be handled confidentially who are we? the center tecnològic de telecomunicaciones de catalunya (cttc) is a non-profit......

Purchasing & import administrative (People Setup)
People Setup

All while safeguarding your privacy and the security of your data... create and maintain the external supplier database with the commercial and administrative information of each... strong collaboration skills to work effectively with internal teams... each person has a unique and special value to bring......

Data Engineer
Innoit

Closely collaborates with information architect and system leads of it domains... your profile: bachelor's or master's in information technology or equivalent education with it focus... experience working in a virtual, international and multicultural environment... willingness and readiness to travel......