Responsibilities
Responsible for end-to-end management of 3rd Parties/Technology partners from onboarding to operations by evaluating partner competencies in security, business continuity, operations, infrastructure, and architectural capabilities.
Key Accountabilities and Decision Ownership
- Security Management
- Ensure 3rd Parties/Technology Partners’ security is properly managed.
- Provide the required assurance to remain compliant with security and privacy laws and regulations.
- Architectural Evaluation
- Ensure 3rd Parties/Technology Partner architectures are properly evaluated, maintained, and periodically reviewed.
- Maintain system design, integration, and data flows to align with organizational goals.
- Infrastructure Assessment
- Evaluate infrastructure in terms of capability, scalability, and reliability.
- Assess both internally and externally hosted IT infrastructure.
- Operational Readiness
- Evaluate and periodically review the partner’s readiness to support product operations.
- Cover areas of resources and Service Level Agreements (SLA).
Must Have Technical / Professional Qualifications
- Educational Background
- Bachelor’s Degree in Information Technology, Computer Science, Cyber Security, or relevant domain.
- Technical Knowledge
- Strong understanding of key Cyber Security technologies & tools and general Information Technologies.
- Knowledge of Cyber and Risk Management frameworks and international security standards.
- High-level knowledge in areas including:
- Internet protocols
- Firewalls
- VPN technologies
- IDS/IPS
- Network access control and network segmentation
- Anti-malware and spam technologies
- Risk and vulnerability assessments
- Compliance
- Regulatory Compliance
- Knowledge of legal, regulatory, and privacy requirements such as:
- Personally Identifiable Information (PII) Protection
- Payment Card Industry (PCI)/Data Security Standard (GDPR, PCI DSS)
- Knowledge of legal, regulatory, and privacy requirements such as:
- Operating Systems and Security
- Proficiency in Windows, UNIX, and Linux operating systems.
- Expertise in web security & encryption.
- Frameworks and Standards
- Knowledge of common IT management/compliance frameworks such as:
- ISO/IEC 27001
- SOC 2
- SOX
- ITIL
- COBIT
- NIST
- Knowledge of common IT management/compliance frameworks such as:
- Certifications
- An industry security certification is an added advantage.
Core Competencies, Knowledge, and Experience
- Customer Focus
- A customer-focused, responsive, and transparent attitude.
- Strategic Thinking
- Ability to think strategically and drive change.
- Communication Skills
- Ability and desire to communicate and work with a broad set of stakeholders.
- Technical Expertise
- A deep understanding of tech security risks and mitigating solutions.
- Agile Methodologies
- Familiarity with agile ways of working.
How to Apply:
This is Full-time Job, To submit your application, please follow the link provided below.
JIUNGE NA GROUP ZETU ZA WHATSAPP & TELEGRAM