VonConsulting.ro - 10 ani de Recrutare si Oursourcing IT
  • Home
  • About Us
  • Servicesarrow_drop_down
    • Recruitment
    • Outsourcing
    • Temporary Staffing
    • Consultancy
  • Career Opportunities
  • Contact Us
  • arrow_drop_down
  • ro
  • en
  • de

Security Operations Compliance

ID: von_80591567
Full time
Bucharest
Middle, Senior
29-07-2021
We are now looking for a Security Operations Compliance professional for our Managed Security team. This position will ensure that the Managed Services delivery unit adheres to the security compliance requirements as per the customer’s security policy and any applicable regulatory requirements, in addition to supporting assessment and audit activities. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured.
Employer Profile

Telecom company

Responsibilities

– Ensure that Information Security Requirements for the specific contract will be adhered to and maintained
– Perform periodic risk and security assessments, review and propose updates to the Information Security – Requirements based on risk and security assessments
– Maintain the personnel’s awareness of up-to-date security policies and procedures
– Maintain procedures to ensure management of security for systems under company Management
– Perform periodic checks that only the authorized persons have access rights to information, systems, and facilities, and report findings
– Perform periodic review of baseline security standard for the operating systems and network devices
– Track closure of identified gaps and report compliance periodically
– Ensure that all relevant security process and procedure documents are up to date and reviewed periodically
– Perform periodic review of the contracted customer delivery against ISO27001 standard
– Test the security control effectiveness and identify gaps (if any)
– Assist in security exception handling process
– Provide recommendations in lieu of security exceptions, provide risk analysis, and recommend actions

Requirements

General competencies:
– 4 to 7 years experience with at least 4 years of experience in IT
– 2 years in Security Governance, Risk and Compliance (GRC)
– Good documentation, analysis skills
– The ability to work constructively under pressure
– Ability to work both in a team as well as individually
– Knowledge sharing & collaboration skills
– Customer oriented, Service minded
– Deliver results & meet customer expectations
– Excellent communication skills, English is a must

Technical competencies:
– Good knowledge and understanding of information security
– Good understanding of ISMS (Information Security Management System), ISO 27001 standard and prior experience of conducting IT audits
– Knowledge of data privacy and GDPR
– Should be adept at conducting gap analysis & risk assessments to identify high risk areas and recommend controls to address the risk areas
– Understanding of enterprise computing environments, distributed applications, and a strong understanding of TCP/IP networks, also with available security control (technical & process control) for respective layers

Academics and Certifications:
– Education: BE/ B.Tech (Telecommunication/ Computer Science)
– ISO 27001 Lead Implementer, CISA, ITIL, CISSP, and CISM certifications will be an advantage

Apply with CV
close
  • Max. file size: 50 MB.
  • Hidden
  • This field is for validation purposes and should be left unchanged.
  • Similar Jobs
    • Security Compliance Coordinator
    • IoT 2nd Level Operations Engineer – DBA
    • 2nd Level Operations Core CS and IMS
    • IoT VoLTE Operations Engineer
    • 1st Level Operations Engineer – Italian
  • Recently Added Jobs
    • Regional People Team Administrator
    • .NET Software Engineer
    • FULL STACK DEVELOPER
    • Customer Success Executive
    • GO Senior Full Stack Developer
  • Recent Articles
    • Codex – a future addition for professional programmers
    • How the world is tackling the semiconductor crisis in 2021 and beyond
    • How to fill the gap between apps and infrastructure after Kubernetes
    • 2021 tech acquisitions to watch
    • SMEs rely on RPA for business efficiency
© 2022 - VonConsulting.
  • Terms and Conditions
  • Privacy
Manage Cookie Preferences
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Preferences
{title} {title} {title}