mechanisms for IS Security processes. Assist IS Security in achieving regulatory and statutory compliance. Conduct cyber risk assessments, including evaluations of third-party suppliers. Apply threat modeling principles to system and solution designs to identify risks and mitigations. Support and improve cyber incident management processes. Contribute to operational cybersecurity projects. What to bring Experience working across different geographies and … analytical, problem-solving, and execution skills (essential). Relevant industry certifications (e.g., CySA+, Security+) and risk management knowledge (essential). Experience with cyber security tools such as SIEM, EDR, NIDS (essential). Self-motivated with a proactive attitude (essential). Strong verbal and written communication skills, capable of explaining technical concepts to diverse audiences (essential). Experience monitoring and delivering More ❯
by the IS Security team Support IS Security to achieve regulatory and statutory compliance requirements Complete cyber risk assessments, including third party suppliers Apply threat modelling principles to complex system and solution designs to identify security risks and appropriate mitigations Support, monitor and recommend improvements to cyber incident management processes Provide input and support to operational projects related to … support by relevant industry certifications (e.g. CySA+, Security+) and risk management knowledge (essential) Knowledge and experience working across a diverse range of cyber security tools, including SIEM technologies, EDR, NIDS etc. (essential) Self-motivated with a willingness to go the extra mile to achieve important goals (essential) Excellent verbal and written communication skills, including the ability to explain technical concepts More ❯
the business. It involves defining IS Security requirements for systems and solutions across vendors, project teams, and wider IS teams. Researching and providing security solutions for complex application and system integrations. Supporting the full lifecycle of design, development, and operation of security tools and services. Building successful peer relationships with other IS and business functions. Following formal governance mechanisms … by the IS Security team. Supporting IS Security to achieve regulatory and statutory compliance requirements. Completing cyber risk assessments, including third-party suppliers. Applying threat modeling principles to complex system and solution designs to identify security risks and mitigation strategies. Supporting, monitoring, and recommending improvements to cyber incident management processes. Providing input and support to operational projects related to … security-specific experience supported by relevant industry certifications (e.g., CySA+, Security+), and risk management knowledge. Knowledge and experience with a diverse range of cyber security tools, including SIEM, EDR, NIDS, etc. Self-motivated with a willingness to go the extra mile to achieve goals. Excellent verbal and written communication skills, capable of explaining technical concepts to both technical and non More ❯