Technical IT Security Officer


Employer/Recruiter: Indeed SA (8060)

Job Status: Active βœ…

https://jobking.co.za/75912

⚠ Safety Tips For Job Seekers!


βœ“ Check if the Job is Still Active
βœ“ Check the start date
βœ“ Never Pay for a Job
βœ“ Always Report Scams to us
βœ“ Meet Employer in a professional location

Employer/Recruiter: Indeed SA (8060)


πŸ—Job TypeFull Time

Standard Bank is a firm believer in technical innovation, to help us guarantee exceptional client service and leading edge financial solutions. Our growing global success reflects our commitment to the latest solutions, the best people, and a uniquely flexible and vibrant working culture. To help us drive our success into the future, we are looking for an experienced Technical IT Security Officer to join our team at our Johannesburg offices. Standard Bank is a leading African banking group focused on emerging markets globally. It has been a mainstay of South Africa's financial system for 150 years, and now spans 16 countries across the African continent.

Job Purpose

To implementation of a comprehensive Information Technology security program with the Information Technology lines of business to protect their applications and supporting infrastructure from both internal and external threats, manage threats and incidents when these materialise, ensure compliance with regulatory requirements regarding Information Technology security, ensure the appropriate use of bank assets and educate employees about their Information Technology security responsibilities.


Key Responsibilities/Accountabilities

Work with IT partners to provide IT Security Advisory services and guidance

Develop and maintain relationships with key stakeholders to further embed the partnership that exists between IT Security, IT and the business.
Research and maintain knowledge of the IT threat landscape, security trends, regulatory requirements, new technologies and best practices in order to provide sensible and pragmatic security advice to stakeholders.
Provide ad-hoc consulting and engagement with various business units on secure, cost effective and practical control implementations across various platforms and/or systems.

Β 

Β 
Facilitate the adoption of IT Security solutions e.g. privilege user management or access management processes and services e.g. IT Security risk assessments and penetration tests.
Provide adequate IT Security input into all technology solutions; this includes the requirements for the evaluation, selection, installation, configuration and maintenance of hardware, applications and software.
Develop an effective line of business IT Security strategy that supports and enables business strategy.
Advise IT business partners on regulatory and/or legal requirements as it relates to securing of data as well as assist with the implementation of the controls to support these requirements.
Establish relevant metrics and management information to facilitate reporting and decision making.
Facilitate the reduction in the number and impact of IT Security incidents.
Act as a single point of contact for IT security risks, incidents and controls within the business units.
Identify, Assess and remediate Technology and IT Security risks

Develop an IT risk assessment schedule across the respective lines of business / business units.
Conduct reviews of applications, systems, underlying infrastructure and related processes as per the schedule.
Establish and maintain risk profiles for business units by facilitating the implementation and ongoing management of general control reviews.
Develop a cost-conscious risk treatment plan based on identified risks, vulnerabilities, audit findings, policies and regulatory requirements.
Collaborate with project management, architecture, IT, business, vendors and other stakeholders to investigate risk remediation controls.
Assist in documenting and tracking security findings into a formal risk register. Provide the necessary information to support any deviation to IT Security policies and standards.
Facilitate technical system reviews by working with the Penetration Test Team and assist business with interpretation and implementation of required controls.
Recommend the implementation of effective controls to support defined security policies and standards. Co-ordinate and track the implementation of remediation plans.
Establish relevant metrics and produce risk reports for stakeholders highlighting key risks, incidents progress and status to assist in decision making.
Participate in incident response planning and investigation of security breaches, and assist with disciplinary and legal matters associated with such breaches as necessary.
Drive appropriate Logical Access Management practices in IT

Establish, maintain and improve logical access management practices by the application of appropriate manual and/or automated processes – in order to provide assurance that the right people have the right level of access to the bank’s information.
Implement and validate all aspects of the access management lifecycle, as prescribed by the appropriate policies and standards.
Implement additional processes, such as Segregation of Duties, Password Safes and Audit trails, to address the risk posed by privileged IT users.
The success of these activities must translate into the reduction of logical access audit findings and security breaches of a logical access nature, by embedded logical access practices into Business processes, and by a positive trend of various metrics being used to track maturity and control failures.
Create awareness of IT Security good practices to the IT community
Develop an awareness plan for the line of business that is fit for purpose, aligned with strategy and considers a range of risk data points e.g. audit findings, risk and control self-assessments, IT Security risk assessments, emerging threats and risks, and incidents.
Create awareness to the IT Executives and broader IT community on the back of new threat and risk intelligence. Proactively create awareness on recurring risk themes.
Implement the awareness plan through various delivery mediums.
Measure the effectiveness of the awareness plan through sampling, surveys, tests, attendance registers or equivalent.
Assist with implementation of IT Security Policies, Standards and Guidelines

Participate in the development of new and the annual review of existing IT Security Policies, Standards and Guidelines by providing input to enhance the quality and completeness of these documents.
Communicate the requirements for compliance to the IT Security Policies, Standards and Guidelines to the relevant parties within IT.
Identify areas of non-compliance to IT Security Policies and Standards within IT.
Alert the responsible parties in IT where there is non-compliance to IT Security Policies and Standards and work with them to identify and recommend practical and feasible remediation plans and technical solutions.
Report on the level of compliance and progress towards achieving compliance to IT Security Policies, Standards and Guidelines to the IT business partners.

Preferred Qualification and Experience
Qualifications:

Degree in Computer Science
Information Security related Certification (CISSP, CISM, CRISC, CISA)
Experience:
7 - 10 years' prior industry experience in the corporate (preference Financial Institution) environment in an IT Security role.
7 - 10 years' experience in directly assessing and communicating Risk Exposures and developing risk mitigation plans.
Experience in working with international and cross functional matrix environments. Experience in engaging with a broad spectrum of stakeholders including senior executives. 3-4 Experience in managing and coaching people.

Knowledge/Technical Skills/Expertise

The ability to assess and mitigate the risks associated with the storage and retrieval of electronic information.
The examination of the essential elements of risk such as; assets, threats, vulnerabilities, safeguards, consequences and the likelihood of the threats materialising.
The ability to define and analyse risk identification information in a quantitative and/or qualitative way.
The management of, and provision of expert advice on, the selection, design, justification, implementation and operation of information security controls and management strategies to maintain the confidentiality, integrity, availability, accountability and relevant compliance of information systems.
The independent, third-party assessment of the conformity of any activity, process, deliverable, product or service with the criteria of specified standards, such as BS EN ISO 9000/14000, local standards, best practice or other documented requirements. May relate to, for example, asset management, network security tools, firewalls and Internet security, real-time systems and application design.
Knowledge of the process for evaluating, selecting and managing products, tools, services, infrastructure components and applications in line with the organisations business needs and architectural principles.


Apply Here http://bit.ly/2I25vZE

Job id : , #75912, 74 views,


Β« Sales ConsultantDiesel Pump Technician Β»

Please Share this Great Opportunity!
X

Get Job Alerts On Whatsapp

Send Me Job Alerts

OR

Continue to APPLY!
Β 
By Clicking Continue, You will be redirected to the Job Offer
We are redirecting you to the job.
If you are not redirected within 5 seconds,
Β 
View Job Here