Functieomschrijving
Manages the development, deployment and execution of controls and defenses to ensure the security and risk mitigation of company infrastructure technology, information systems and digital payment systems.
Identifies cybersecurity architecture, goals, objectives and metrics; analyzes business needs and priorities for protection of critical systems.
Establishes and implements operational policies and appropriate standards and criteria for hardware, software, email and web firewall, access verification and encryption requirements.
Monitors systems for cybersecurity vulnerabilities, threats and events, oversees incident response planning, and leads vulnerability audits and forensic investigations.
Evaluates potential business impacts from security breaches and provides strategic and tactical guidance to business decision-makers.
Develops and executes security systems compliance policies and procedures. Selects, develops and evaluates personnel to ensure the efficient operation of the function.
Key Roles and Responsibilities :
Assignments received include goals and the process by which to meet the goals
Gives direction to employees according to established policies and management guidelines
Recommends changes to units or sub-unit policies
Higher level management reviews work
Applies judgement within defined policies and procedures
Mistakes impact missed schedules
Interacts with subordinate managers or peers from other functional areas in other to gain cooperation
Presentations are around technical information or schedules
Subordinates are typically from P-band or S-band
Advises unit or sub-unit and may get involved to meet schedules or project deliverables or help to solve problems
Work with automation teams for effort optimization and automating routine tasks
Knowledge, Skills and Attributes :
Ability to communicate and work across different cultures and social groups
Ability to plans activities and projects well in advance, and takes into account possible changing circumstances
Ability to maintain a positive outlook at work
Ability to work well in a pressurised environment
Ability to work hard and put in longer hours when it is necessary
Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information and refraining from interrupting
Ability to adapt to changing circumstances
Ability to place client at the forefront of all interactions, understanding their requirements and creating a positive client experience throughout the total client journey
A solid understanding of Privilege Access Management, Vulnerability Management, End Point Protection, Data Loss Prevention, Identity Management, Security Information and Event Management, Cybersecurity Incident Response
Requirements Academic Qualifications :
Diploma, degree or relevant qualification in IT / Computing (or demonstrated equivalent work experience)
Advantageous Certifications :
Up to date and relevant ITIL / Cobit certification
ISC2CISSP,
Comptia CYSA, CASP,
ISACA CISM
Microsoft MS500 / AZ500
McAfee Product Specialist ePO, SIEM
Trend Apex 1 / Trend Deep Security / Trend Deep Discovery
Symantec Endpoint Detection and Response
Palo Alto PSE Cortex
Skybox SCPS
Mimecast Gladiator
Splunk Enterprise Certified Admin