Sector : IT
Summary : This role is responsible for developing and managing the company’s Information Security and Business Continuity programs.
The role requires effectiveness in managing in a highly matrixes environment managing governance and execution.
Qualifications required :
Minimum of a Bachelor’s degree in Computer Science, Software Engineering, or a related field.
Strong consideration will be given for advanced degrees in related fields.
Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or similar are preferred.
Experience required :
The Incumbent is required to have knowledge & experience in the following domains :
The individual must possess sound experience of Networking, Windows, MAC Unix, Middleware, Firewalls and Security Systems.
Skills required :
Deep and fundamental knowledge of best practices from both a technical and operational perspective.
Extensive knowledge of computer systems, computer network systems, telecommunications and all associated hardware, software and associated protocols.
Extensive knowledge of the Internet, intranet and extranet technologies and applications.
Extensive knowledge of risk analysis and the development of security systems and protocols.
Knowledge of various encryption techniques and their proper utilization.
Knowledge of specialized telecommunication techniques such Virtual Private.
Adept at working in a fast pace, dynamic, multi-channel environment.
Ability and willingness to be visionary yet also hands on.
Excellent interpersonal skills.
Strong sense of team and support of culture.
Very strong analytical approach to problem solving and solution development.
Very strong communication skills (verbal and written).
Key Responsibilities :
Create and manage global security policy, standards, guidelines and procedures to ensure ongoing maintenance of information security.
Oversee and coordinate information security efforts across the company, including information technology, human resources, communications, legal, facilities management and other groups
Identify and prioritize security initiatives and standards.
Oversee safeguarding of intellectual property and computer systems.
Create information security awareness programs.
Develop network access and monitoring policies.
Develop and maintain Information Security metrics program to track short and long term health of the environment and program effectiveness.
Manage Identity and Access Management direction.