VonConsulting.ro - 10 ani de Recrutare si Oursourcing IT
  • Home
  • About Us
  • Servicesarrow_drop_down
    • Recruitment
    • Outsourcing
    • Temporary Staffing
    • Consultancy
    • Payroll and Administrative services
  • Career Opportunities
  • Contact Us
  • arrow_drop_down
  • ro
  • en
  • de

Security Compliance Engineer

ID: VF00JP00058984
Full time
Bucuresti
Middle
23-01-2024
Responsibilities

Key accountabilities:

 Implements security controls that align to regulatory requirements,
ensuring documented and sustainable compliance that aligns with company’s objectives.
 Improves company’s security positioning through process improvement, policy, automation, and the continuous evolution of capabilities
 Implements processes, such as VMP (Vulnerability Management Process), to automate and continuously monitor vulnerabilities, solving actions, mitigation actions and risks. Develops reporting metrics and dashboards.
 Schedules regular assessments of controls and creates reports.
 Runs security controls and provides support to all stakeholders on security controls covering internal assets.

Assess incidents, vulnerability management, scans, patching status,
Cyber Security Baselines.
 Documents and reports control failures and gaps to stakeholders. Provides remediation guidance and prepares management reports to
track remediation activities.
 Performs other related duties as assigned.

 

Key deliverables:

 Achieves Network and IT-like assets security compliance by executing compliance programs and completing documentation.
 Prevents compliance issues by collaborating with engineering and
security teams, reviewing data, and running compliance policies.
 Prepares compliance reports by collecting, analyzing, and summarizing measurement data and trends.
 Attains compliance by isolating and resolving compliance issues,
recommending product and process changes.

Requirements

Core competencies, knowledge and
experience:

 Written and spoken English
 Other widely spoken European languages – written and spoken
 Information technology systems and processes, network infrastructure, data architecture, data processes, and protocols
 Applicable information security management, governance, and
compliance principles, practices, laws, rules and regulations
 Incident response management
 Maintaining confidentiality
 Troubleshooting and operating a computer and various software
packages
 Defining problems, collecting and analyzing data, establishing facts and drawing valid conclusions

 

Must have technical / professional
qualifications:

 Preferably higher technical studies
(e.g.: Electronics and Telecommunications, Automation and Computers, Informatics, etc.)
 Experience in cyber security programs, audits, assessments, risk,
remediation, or cyber security compliance management.
 Solid technical background with understanding and/or hands-on
experience in cloud and hosted environments and IT infrastructure
technologies.

Apply with CV
close
  • Max. file size: 50 MB.
  • Hidden
  • This field is for validation purposes and should be left unchanged.
Apply with LinkedIn
  • Similar Jobs
    • Security Compliance Engineer
    • Senior Governance, Risk and Compliance Specialist
    • Compliance Expert
    • Privacy Compliance Specialist
    • Security Champion – (Project Security Advocate…
  • Recently Added Jobs
    • Software Engineer – Security Firmware- Bucharest/Sibiu
    • Senior Staff Concept Engineer for magnetic sensors
    • E-commerce Platform Specialist
    • Senior Quality Manager
    • Service Support Manager with German
  • Recent Articles
    • Our Job Lists Explained: Today, What Does a Product Development Manager Do?
    • Returning to the Office Work: a Vital Imperative or Not?
    • Unlock the Power of Data: The Role of a Database Expert
    • Firmware Engineers: a SF Job in an Enigmatic World?
    • The Hidden Architect – The Layout Engineer
© 2025 - VonConsulting.
  • Terms and Conditions
  • Privacy
Manage Cookie Preferences
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}