VonConsulting.ro - 10 ani de Recrutare si Oursourcing IT
  • Home
  • About Us
  • Servicesarrow_drop_down
    • Recruitment
    • Outsourcing
    • Temporary Staffing
    • Consultancy
    • Payroll and Administrative services
  • Career Opportunities
  • Contact Us
  • arrow_drop_down
  • ro
  • en
  • de

Security Compliance Engineer

ID: von_24002069
Full time
Bucharest
Entry
08-10-2024
Coordinates and performs security assessment functions, control reporting and activities in accordance with Internal Controls compliance, regulatory and departmental policy and procedures. The Security Compliance Engineer updates and maintains control matrices and spreadsheets and provides recommendations for management’s consideration. This position ensures compliance with internal controls, regulatory and information security policies and procedures. Security Compliance Engineer works with internal audit, external audit firms to provide supportive documentation as applicable. Security Compliance Engineer takes a lead role in ensuring the security of all protected information collected, used and maintained.
Responsibilities

Key accountabilities:

  • Implements security controls that align to regulatory requirements, ensuring documented and sustainable compliance that aligns with objectives.
  • Improves security positioning through process improvement, policy, automation, and the continuous evolution of capabilities;
  • Implements processes, such as VMP (Vulnerability Management Process), to automate and continuously monitor vulnerabilities, solving actions, mitigation actions and risks. Develops reporting metrics and dashboards.
  • Schedules regular assessments of controls and creates reports.
  • Runs security controls and provides support to all stakeholders on security controls covering internal assets.
Requirements

Core competencies, knowledge and experience:

  • Written and spoken English
  • Other widely spoken European languages – written and spoken
  • Information technology systems and processes, network infrastructure, data architecture, data processes, and protocols
  • Applicable information security management, governance, and compliance principles, practices, laws, rules and regulations
  • Incident response management
  • Maintaining confidentiality
  • Troubleshooting and operating a computer and various software packages
  • Defining problems, collecting and analyzing data, establishing facts and drawing valid conclusions
  • Assess incidents, vulnerability management, scans, patching status, Cyber Security Baselines.
  • Documents and reports control failures and gaps to stakeholders.
  • Provides remediation guidance and prepares management reports to track remediation activities.
  • Performs other related duties as assigned.

 

Must have technical / professional qualifications:

  • Preferably higher technical studies
    (e.g.: Electronics and Telecommunications, Automation and Computers, Informatics, etc.)
  • Experience in cyber security programs, audits, assessments, risk, remediation, or cyber security compliance management.
  • Solid technical background with understanding and/or hands-on experience in cloud and hosted environments and IT infrastructure technologies.
Apply with CV
close
  • Max. file size: 50 MB.
  • Hidden
  • This field is for validation purposes and should be left unchanged.
  • Similar Jobs
    • Security Compliance Engineer
    • Security Compliance Engineer
    • Senior Governance, Risk and Compliance Specialist
    • Security Engineer (Bespoke Solutions)
    • Supplier Security Assurance Specialist
  • Recently Added Jobs
    • Technical Account Manager
    • Supplier Security Assurance Specialist
    • Software Senior Tester / Test Architect
    • TouchSense Tools SW Engineer
    • SW Engineer – ML framework
  • Recent Articles
    • Our Job Lists Explained: Today, What Does a Product Development Manager Do?
    • Returning to the Office Work: a Vital Imperative or Not?
    • Unlock the Power of Data: The Role of a Database Expert
    • Firmware Engineers: a SF Job in an Enigmatic World?
    • The Hidden Architect – The Layout Engineer
© 2025 - VonConsulting.
  • Terms and Conditions
  • Privacy
Manage Cookie Preferences
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}