VonConsulting.ro - 10 ani de Recrutare si Oursourcing IT
  • Startseite
  • Über uns
  • Dienstleistungenarrow_drop_down
    • Rekrutierung
    • Outsourcing
    • Zeitarbeit
    • Beratung
    • Payroll and Administrative services
  • Berufschancen
  • Kontaktiere uns
  • arrow_drop_down
  • ro
  • en
  • de

Cyber Security Expert, IT&Digital

ID: Security Operations
Full time
bucharest
Middle
19-12-2023
In this role, you will carry out the Secure by Design assessments and provide guidance to projects and BAU activities across the following UK business functions: Consumer & Business: Your focus will be to ensure we deliver secure products and services to our customers across Consumer & Business markets, as defined by company UK’s Consumer & Business functions. Internal: Your focus will be to ensure we deliver secure solutions to support company UK’s internal business functions. These internal business functions include Technology, Finance, HR, Corporate & External Affairs, and Business Intelligence
Arbeitgeberprofil

Technology Centre of a multinational Telecom company.

Verantwortlichkeiten

With these activities you will have a great impact on our business:

  • Ensure project designs comply with Baseline Security Requirements and security policy
  • Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & Access Management, SIEM, and Vulnerability Management
  • Ensure internal customers, external suppliers, and delivery partners are aware of security standards and future strategies to influence development roadmaps
  • Identify security risks, manage them with key stakeholders, and provide recommendations for risk mitigation
  • Build relationships with your stakeholder community across the company business
  • Escalate deviations from baseline security requirements and security architecture
  • Provide advice and guidance to SbD Managers, Specialists, and Cyber Security Champions
  • Approves designs that comply with policies and standards and are within parameters set by the Secure by Design Managers
Anforderung

With these skills you are a great candidate:

  • Competent in understanding network designs and equipment configurations used to deliver a wide range of IT and telecommunications solutions
  • Competent in applying security policies and principles defined in security architecture to real world scenarios
  • Understands and applies risk management principles
  • Effective communication skills to influence stakeholders and explain complex security requirements in simple terms
  • Stakeholder Management – established as the go-to person for any project issues impacting on Corporate & External Affairs teams
  • Establishing and maintaining single point of contact relationship with key project manager(s)
Bewerben Sie sich mit Lebenslauf
close
  • Max. file size: 50 MB.
  • Hidden
  • This field is for validation purposes and should be left unchanged.
  • Ähnliche Jobs
    • Security Champion – (Project Security Advocate…
    • Fixed Data Core OSS Operations with Italian
    • Fixed Data Core OSS Operations with Italian
    • SME Architect Voice & Data Core Operations
    • Senior Privacy Operations Specialist
  • Kürzlich hinzugefügte Jobs
    • E-commerce Platform Specialist
    • Service Support Manager with German
    • Supply Chain Coordinator – D2C, E-Commerce
    • IT Software Tester – German
    • Automotive Solutions Engineer (Bucharest/Sibiu)
  • Aktuelle Artikel
    • Our Job Lists Explained: Today, What Does a Product Development Manager Do?
    • Returning to the Office Work: a Vital Imperative or Not?
    • Unlock the Power of Data: The Role of a Database Expert
    • Firmware Engineers: a SF Job in an Enigmatic World?
    • The Hidden Architect – The Layout Engineer
© 2025 - VonConsulting.
  • Geschäftsbedingungen
  • Privatleben
Manage Cookie Preferences
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}