Information Security Policies & Procedures
- Participate in the development and maintenance of information security plans, policies and procedures to support and align with organizational mission and initiatives.
- Ensure the alignment with National information’s security framework services (ex. NIA, FIFA Cyber FrameServices …).
Vulnerability Management
Partner with system owners to track identified vulnerabilities. Participate in the assessment, research and remediation of vulnerabilities.Review and maintain information security vulnerability management framework services & tools.Security Incident Management
Respond and report on security incidents and provide post‑incident analysis, documenting lessons learned and recommendations.Review and maintain information security incident management framework services & tools.Information Security Audit
Coordinate internal and external audits and assessments to ensure the effectiveness of security controls for various systems and applications.IT Risk Management
Participate with GRC specialist in conducting periodic Information Security risk assessments, updating information asset profiles, identifying vulnerabilities and proposing treatments.IT Systems & Applications
Advise and support IT systems and applications design, implementation and operation according to information security standards and guidelines.Training & Awareness
Participate in developing and delivering information security training and perform general security awareness.Other
Monitor Information Security queue, investigate and resolve tickets within agreed service level.Participate in review and approve IT changes as required.Threat hunting across the environment to identify and manage threats and vulnerabilities.Perform any other duties assigned by the supervisor directly related or relevant to the job.Ensure the assigned responsibilities are delivered to a high standard of quality and timeliness.In full compliance with the SC Quality Policy and the Safety and Security rules and requirements.In line with any standards and objectives designated in the Employee Performance Management system.Requirements
Bachelor’s degree in computer engineering, Computer Science or equivalent.Relevant IT certifications will be an advantage.Minimum 6+ years’ experience in Information Security Policies & Procedures, Vulnerability Management, Security Incident Management, Information Security Audit, IT Risk Management, IT Systems & Applications, Training & Awareness, monitoring Information Security queue, investigating and resolving tickets within agreed service level.Participate in review and approve IT changes as required.Threat hunting across the environment to identify and manage threats and vulnerabilities.Perform any other duties assigned by the supervisor directly related or relevant to the job.Ensure the assigned responsibilities are delivered : high standard of quality and timeliness in full compliance with the SC Quality Policy and the Safety and Security rules and requirements, and in line with any standards and objectives designated in the Employee Performance Management system.#J-18808-Ljbffr