Erre az állásra pályázik:

information systems security analyst

  • új felhasználó
  • belépés
* kötelező mező
személyes adatok
nyelvtudás
  1. Dummy Language
nyelvtudás hozzáadása
nyelvtudás
  1. magyar




  2. angol




  3. német




  4. arab




  5. bolgár




  6. cseh




  7. dán




  8. egyéb




  9. észt




  10. finn




  11. francia




  12. görög




  13. héber




  14. hindi




  15. holland




  16. horvát




  17. japán




  18. kazah




  19. kínai




  20. lengyel




  21. lett




  22. litván




  23. norvég




  24. olasz




  25. orosz




  26. portugál




  27. román




  28. spanyol




  29. svéd




  30. szerb




  31. szlovák




  32. szlovén




  33. török




  34. ukrán




önéletrajz
NEM KÖTELEZŐ önéletrajzot feltöltenie ahhoz, hogy megpályázza ezt a pozíciót, de amennyiben van naprakész önéletrajza, az nagy segítséget jelent számunkra. Ha nincs most friss vagy elérhető önéletrajza, akkor azt később is bármikor fel tudja tölteni, amikor bejelentkezik a profiljába.

  1. fájl kiválasztása
 

Erre az állásra pályázik:

Elhelyezkedés:
Budapest, Budapest
Állás típus:
A feladás dátuma:
2021. február 11., csütörtök
Referenciaszám:
27378

Cégleírás / Organisation/Department

Aegon Global Technology Services (GTS) provides technology infrastructure support as well as business consulting services to the Aegon USA, European enterprise and business partners. The information technology services encompasses regional services, enterprise-wide application services, architecture, product assessment, customer service, internet and messaging, server management, telecommunications, security, data service and more.

Pozíció leírása / Job description

  • Completes the analysis, and supports the implementation and management of administrative, technical and physical safeguards to ensure the privacy and protection of company information and supporting technology and services.
  • Assist with defined tasks in support of the Information Security Program, such as Business Continuity Management (BCM), Incident Response, Cyber Threat Management, Risk Analysis, Control Design within Applications and Services, Evaluation of Control Effectiveness, and Staff Awareness, Education and Training.

Responsibilities:


  • Completes research, development and implementation of straightforward information security initiatives, including review of policy, program, process, procedural and technology improvements and solutions to ensure they are current and meet business needs.
  • Gather research covering latest security threats and vulnerabilities.
  • Identifies weaknesses and exposures.
  • Supports and maintains BCM activities
  • Provide input, creates awareness and training materials and leads certain activities, such as hardcopy and online learning content, presentations, pamphlets, electronic communications (e.g., internal blogs).
  • Perform and lead certain procedural tasks found within cyber threat management processes, such as gathering and reviewing threat intelligence, supervises vulnerability data and actions, reviewing consolidated data from security monitoring technologies, supporting countermeasure planning.
  • Perform and lead certain procedural tasks found within event and incident response processes, such as identifies issues and actions, reviews artifacts and evidence, supervises coordination of tasks
  • Perform and lead certain procedural tasks found within control self-assessments and security exception/waiver processes, such as entering and reviewing critical assets and associated ratings, recommending action plans, submitting and reviewing security exception/waivers to asset owner.
  • Perform and lead certain procedural tasks found within third-party assessments, such as reviewing due-diligence artifacts, supervising tasks, reviewing results and recommending outcomes
  • Perform procedural tasks found within other security processes, such as information management, classification and protection; policy management
  • Ability to help employees and contractors understand their role in safeguarding information, technology and services by being an ambassador.
  • Assist and show where policies, processes and procedures can be found and explain why they should be followed
  • Tracks current and impeding laws, regulations and industry requirements and best practices, such as data protection, data privacy, cyber security and information security




Elvárások / Requirements


  • 3-5 years of relevant work experience required, including experience with information technology operations and information security operations, business continuity and disaster recovery
  • Knowledge and some experience with data protection, data privacy laws, regulations and industry requirements as well as best practices

Preferred Qualifications:

  • Technology, risk management, business continuity and disaster recovery, compliance or audit background helpful
  • Excellent time management and analytical skills
  • Effective written and verbal communication skills at all levels of the organization.
  • Team oriented
  • Strong project management skills
  • Attention to detail with the ability to multi-task
  • Deadline driven, task oriented, self motivated
  • Awareness of the importance of timing, politics and group processes in managing change
  • Certification(s): CISSP, CISM, CRISC, CISA or ABCP





Amit kínálunk / Offer

  • Home office
  • Flexible working hours
  • Health Insurance
  • Yoga classes
  • Life Fitness discount
  • Training & Development opportunities
  • Highly people-centric environment
  • Modern office environment


Kapcsolattartó / Information

Rác Ildikó:


ildiko.rac@randstad.hu