Senior IT Security Officer

Company:  Keytrade Bank
Location: Mission
Closing Date: 07/11/2024
Salary: £100 - £125 Per Annum
Hours: Full Time
Type: Permanent
Job Requirements / Description

Attached to the CISO (RSSI) of Keytrade Bank, the ‘Security Correspondant of the information systems‘- CSSI mission consists of evaluating the exposure to risks of the enterprise information systems and ensuring that an appropriate level of protection, detection & reaction is guaranteed for these systems, actions performed in close collaboration with development and technical support teams. The CSSI will have an important role in establishing and maintaining a new security infrastructure during implementation of IAAS/SAAS/PAAS solutions.

Functional domains where the CSSI will intervene:

Security policies, standards, guidelines

  1. Creation and maintenance of security policies in compliance with Group policies and making sure these are understood, communicated and properly implemented.
  2. Creation of technical standards in line with these security policies and the implementation on both internal and externally hosted systems.
  3. Follow-up of evolutions within the field of information and system protection to ensure protection follows the technological evolution.

Risk analysis and risk treatment

  1. Identification of risks linked to the use of information systems, definition of risk reduction or risk treatment options, for both new projects and maintenance of existing applications and infrastructure.
  2. Analysis of security risks and coordination and follow-up of the implementation of risk treatment options in the projects. Monitoring and testing of efficiency of the implementation of these measures.
  3. Performance of security visit in the course of request for proposals of new IT outsourced activities.
  4. Verification and follow-up of compliance of suppliers, outsourcers and/or subcontractors with internal security policies and coordination of security audits.
  5. Define, implement and perform 2nd levels of controls to ensure the efficiency of 1st level of control for insourced and outsourced activities.
  6. Definition of vulnerability detection and prevention exercises or scans and follow-up of the implementation of corrective actions.

Security Operational and governance tasks

  • Operating several activities on security processes and solutions (SIEM/SOC, securitization of sensitive access, data leakage, IAM…).
  • Produce reporting elements on his area of activities and expertise for quarterly security committees.

Modernization and industrialization of security practices and regulatory compliance

  1. Identification of new technologies available on the market for reduction of risk, selection of the most appropriate one and coordination of the implementation thereof.
  2. Definition and coordination of implementation of security tools that are in compliance with market and that respond to the security challenges linked to cloud, continuous integration and deployment (CI/CD).
  3. Definition of governance structure that allows an agile organization to manage its security effectiveness without causing bottlenecks or rework and coordinate the implementation of SecOps practices at Keytrade Bank.
  4. Follow-up on regulatory aspects linked to the use of technology and adapting the policies and requirements to a changing external environment so legal and regulatory compliance can be guaranteed.

Awareness and training

  1. Ensure senior management is aware of the threats and exposure to security risks relevant for Keytrade Bank.
  2. Follow-up of the security budget.
  3. Inform and train the operational departments and make sure the necessary tools and procedures are available to ensure they comply with security requirements.

Incident and Business Continuity Management

  1. Cooperate with involved teams to resolve incidents and define short and mid-term corrective actions.
  2. Maintain the Business Continuity documentation and create, maintain and follow-up test plans.
  3. Become a crisis team member and help coordinate recovery of disaster situations.

PROFILE

  1. Minimum 10 years of experience in the field of information security.
  2. CISSP/CISM or equivalent product independent security certification.
  3. Experience with implementation of encryption technologies, access control and authentication systems.
  4. Familiar with industry standards like those from OWASP, CIS, Cloud Security Alliance, ISO and regulations/directives like GDPR and PSD2.
  5. Knowledge of and experience with security aspects of cloud architectures and automated security evaluation.
  6. You have a working knowledge of cloud infrastructures and platforms.
  7. The ideal candidate has an analytical mind and is able to synthesize complex matters into understandable, implementable, and cost-efficient solutions and has the ability to convince the organization of the benefits thereof with regard to risk reduction.
  8. Pro-activity, integrity and good communication and networking skills.

Our offer

  • Hybrid way of working: We are in a hybrid way of working that implements 50% tele working and 50% working from home.
  • Agile way of working.
  • Green surroundings.
  • An inclusive workplace with nice colleagues.
  • A competitive salary package with advantages such as:
#J-18808-Ljbffr
Apply Now
An error has occurred. This application may no longer respond until reloaded. Reload 🗙