VonConsulting.ro - 10 ani de Recrutare si Oursourcing IT
  • Home
  • About Us
  • Servicesarrow_drop_down
    • Recruitment
    • Outsourcing
    • Temporary Staffing
    • Consultancy
    • Payroll and Administrative services
  • Career Opportunities
  • Contact Us
  • arrow_drop_down
  • ro
  • en
  • de

Cyber Security Expert, IT&Digital

ID: Security Operations
Full time
bucharest
Middle
19-12-2023
In this role, you will carry out the Secure by Design assessments and provide guidance to projects and BAU activities across the following UK business functions: Consumer & Business: Your focus will be to ensure we deliver secure products and services to our customers across Consumer & Business markets, as defined by company UK’s Consumer & Business functions. Internal: Your focus will be to ensure we deliver secure solutions to support company UK’s internal business functions. These internal business functions include Technology, Finance, HR, Corporate & External Affairs, and Business Intelligence
Employer Profile

Technology Centre of a multinational Telecom company.

Responsibilities

With these activities you will have a great impact on our business:

  • Ensure project designs comply with Baseline Security Requirements and security policy
  • Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & Access Management, SIEM, and Vulnerability Management
  • Ensure internal customers, external suppliers, and delivery partners are aware of security standards and future strategies to influence development roadmaps
  • Identify security risks, manage them with key stakeholders, and provide recommendations for risk mitigation
  • Build relationships with your stakeholder community across the company business
  • Escalate deviations from baseline security requirements and security architecture
  • Provide advice and guidance to SbD Managers, Specialists, and Cyber Security Champions
  • Approves designs that comply with policies and standards and are within parameters set by the Secure by Design Managers
Requirements

With these skills you are a great candidate:

  • Competent in understanding network designs and equipment configurations used to deliver a wide range of IT and telecommunications solutions
  • Competent in applying security policies and principles defined in security architecture to real world scenarios
  • Understands and applies risk management principles
  • Effective communication skills to influence stakeholders and explain complex security requirements in simple terms
  • Stakeholder Management – established as the go-to person for any project issues impacting on Corporate & External Affairs teams
  • Establishing and maintaining single point of contact relationship with key project manager(s)
Apply with CV
close
  • Max. file size: 50 MB.
  • Hidden
  • This field is for validation purposes and should be left unchanged.
  • Similar Jobs
    • Security Champion – (Project Security Advocate…
    • Fixed Data Core OSS Operations with Italian
    • Fixed Data Core OSS Operations with Italian
    • SME Architect Voice & Data Core Operations
    • Senior Privacy Operations Specialist
  • Recently Added Jobs
    • Software Engineer – Security Firmware- Bucharest/Sibiu
    • Senior Staff Concept Engineer for magnetic sensors
    • E-commerce Platform Specialist
    • Senior Quality Manager
    • Service Support Manager with German
  • Recent Articles
    • Our Job Lists Explained: Today, What Does a Product Development Manager Do?
    • Returning to the Office Work: a Vital Imperative or Not?
    • Unlock the Power of Data: The Role of a Database Expert
    • Firmware Engineers: a SF Job in an Enigmatic World?
    • The Hidden Architect – The Layout Engineer
© 2025 - VonConsulting.
  • Terms and Conditions
  • Privacy
Manage Cookie Preferences
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}