Description

 Responsiblitities:

  • Develop, implement, and manage robust security policies and procedures to protect the organization’s information assets.
  • Conduct risk assessments, vulnerability assessments, and security audits to identify and mitigate potential threats.
  • Manage and oversee the company’s vulnerability management program, including the identification, classification, and remediation of security vulnerabilities.
  • Design and enforce security measures and policies for cloud computing environments, with a strong focus on AWS.
  • Stay updated on the latest cybersecurity trends, threats, and technologies to continuously improve the organization’s security posture.
  • Collaborate with development and operations teams to integrate security best practices into software development and deployment processes.
  • Ensure compliance with ISO standards and other relevant regulations.
  • Provide guidance and mentorship to junior security staff and other team members.

skills/expertise:

  • Bachelor’s degree in Computer Science, Information Security, or a related field; advanced degree preferred.
  • Minimum of 8 years of experience in information security, with a demonstrated focus on cybersecurity and vulnerability management.
  • In-depth knowledge of ISO 27001/27002 and other relevant security frameworks and standards.
  • Advanced understanding of application security principles and best practices, with solid experience in implementing security measures.
  • Extensive experience with cloud computing platforms, particularly AWS.
  • Proven experience in developing and implementing security policies and procedures.
  • Knowledge and experience with development and implementation of security controls for implementing AI security policies.
  • Experience as a participating member of a security operations organization with responsibility for monitoring, alerting and incident response.
  • Strong analytical and problem-solving skills with the ability to identify and address complex security issues.
  • Excellent communication skills, with the ability to clearly articulate security concepts to technical and non-technical stakeholders.
  • Relevant certifications such as CISSP, CISM, or CEH are highly desirable.

Education

Any Graduate