For a first-class client, we are seeking an Information Security Specialist
The Information Security professional, reporting to Chief Information Security officer, is responsible for implementing, managing, and maintaining the organization's information security policies, procedures, and technologies. This role ensures the confidentiality, integrity, and availability of data and systems by identifying vulnerabilities, mitigating risks, and responding to security incidents.
Key Responsibilities:
...
Risk Management:
Identify, assess, and prioritize risks to the organization's information assets.
Develop and implement risk mitigation strategies.
Provide internal customer support and security advice in IT (e.g. DAM, Zscaler, Defender) and business (e.g. Horn) initiatives and projects. Report risk assessment status to management. Management - IT Systems (Microsoft Windows, Linux, Public Cloud Platforms) and Networking
Security Policies and Procedures:
Create, update, and enforce information security policies, standards, and guidelines.
Ensure compliance with regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS).
Incident Response:
Monitor systems for security breaches and investigate violations.
Lead incident response efforts, including containment, eradication, and recovery.
Security Audits and Assessments:
Conduct regular security audits, vulnerability assessments, and penetration testing.
Collaborate with internal and external auditors to ensure compliance.
Security Awareness Training:
Develop and deliver training programs to educate employees on security best practices.
Promote a culture of security awareness across the organization.
Technology Implementation:
Manage and configure security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus software, and encryption technologies.
Evaluate and recommend new security technologies and solutions.
Network and System Security:
Monitor network traffic for unusual activity and potential threats.
Implement and manage endpoint security solutions.
Data Protection:
Ensure the security of sensitive data through encryption, access controls, and data loss prevention (DLP) strategies.
Manage identity and access management (IAM) systems.
Collaboration:
Work closely with IT teams, developers, and business units to integrate security into all aspects of the organization.
Liaise with external stakeholders, such as vendors and law enforcement, on security-related matters.
Monitoring and analysing cyber threats (threat intelligence and hunting) :
Automatically or manually monitor threat conditions that could affect the organisation's security posture. Analysing the presence of new indicators of compromise (IoC) on monitored services.
Cyber Threat Intelligence :
Scripting (SPL, KQL, Python, PowerShell, Bash)
Security Architecture
Analysis and definition of automatic security controls :
When new technological solutions, security recommendations or incidents are introduced, analyse and propose new automatic security controls to be implemented in the control technology (SIEM, SOAR, XDR). Management - Digital Forensics and Incident Response (DFIR)