information security lead | budapest

megjelenés dátuma
randstad hungary
állás típusa
határozatlan idejű

az állás részletei

megjelenés dátuma
IT / Telekom
állás típusa
határozatlan idejű
27045 / 27840
randstad hungary
Nem kötelező önéletrajzot feltöltenie ahhoz, hogy megpályázza ezt a pozíciót, sőt egyszerű megoldásként akár a Linkedin profiljával is jelentkezhet. Kattintson a jelentkezem gombra és válasszon a maximum 2 percet igénylő jelentkezési lehetőségek közül.
Bizonyos pozícióink esetében videóinterjút folytatunk. Ha szeretne többet megtudni, hogyan készülhet fel hatékonyan, itt megosztjuk Önnel a sikeres online bemutatkozás fortélyait.

Cégleírás / Organisation/Department

Aegon Global Technology Service (GTS) provides technology infrastructure support as well as business consulting services to the Aegon USA, European enterprise and business partners.

The information technology services encompasses regional services, enterprise-wide application services, architecture, product assessment, customer service, internet and messaging, server management, telecommunications, security, data service and more.

Pozíció leírása / Job description

The Information Security Leas position is focused on global delivery providing centralized services and supporting global program build-out.

On a day to day basis, this position will perform responsibilities such as some or all of the following straightforward information security initiatives:

  • Define and provide generalized (e.g., general computer controls) and specialized (e.g., security architecture) IT risk and control services
  • Support the design and implementation of IT controls across businesses
  • Enable and manage technology supporting IT governance, risk, control and compliance issues
  • Maintain oversight of information security assurance activities
  • Engage with key stakeholders to manage, maintain, assess and monitor the risk and control framework and provide timely reporting to relevant stakeholders
  • Work in a role on a global team including regular communications with individuals in different business units and different countries
  • Lead monitoring and evaluation of the effectiveness of the enterprise’s cybersecurity safeguards to help ensure that they provide the intended level of protection.
  • Lead information security risk assessments.
  • Lead control assessments of the security environment.
  • Lead security reviews, identify gaps in security architecture, and develop a security risk management plan.
  • Lead the verification that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.
  • Validate implementation and functionality of security requirements and appropriate information technology (IT) policies and procedures that are consistent with the organization's mission and goals.
  • Lead the determination if gaps in security design or controls exist and providing recommendations for remediation or mitigating controls.
  • Lead in the development or modification of the computer environment cybersecurity program plans and requirements.
  • Conduct risk analysis whenever an application or system undergoes a major change.
  • Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).
  • Lead Risk Governance process to provide security risks, mitigations, and input on other technical risk.
  • Provide security input into exception management processes.
  • Verify and update security documentation reflecting the application/system security design features.
  • Lead the preparation, distribution, and maintenance of plans, instructions, guidance, and standard operating procedures.
  • Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information.
  • Help ensure that security design and cybersecurity development activities are properly documented (providing a functional description of security implementation) and updated as necessary.
  • Participate in the policy standards implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.
  • Recommend policy/standard updates and coordinate review and approval.
  • Track audit findings and recommendations to ensure that appropriate mitigation actions are taken.
  • Help ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
  • Assist in the development of security compliance processes and/or audits for external services (e.g., cloud service providers, data centers).
  • Lead necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).
  • Support the verification that all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.

Elvárások / Requirements

  • 8+ years of relevant experience
  • Bachelor’s degree in IT, system security, engineering or relevant field.
  • Financial Services experience

Amit kínálunk / Offer

  • Home office
  • Flexible working hours
  • Health Insurance
  • Yoga classes
  • Life Fitness discount
  • Training & Development opportunities
  • Highly people-centric environment
  • Modern office environment

Kapcsolattartó / Information

Rác Ildikó