Technical Information Security Officer / IT Security

Full Job Description

The Company

Robert Half Technology are working with this dynamic, rapidly expanding investment bank as they continue to commit to building out their business internationally. The organisation seek a talented Information Security Officer / IT Security Analyst to provide direction drive for Information / IT Security improvements to the areas of software development infrastructure as they continue to see significant change enhancement.

The Role

The primary role of this IT Security Analyst / Technical Information Security Officer will be to provide local direction and drive for information/IT security improvements/maintenance close to the areas that can affect change. The Technical Information Security Officer (TISO) should be in a senior role with a good knowledge of security and control issues, be capable of to working across systems development, IT operations, and infrastructure units on behalf of technology management to ensure compliance with information security policies, standards and procedures. The position is responsible for all technology-specific information security activities such as: interpreting policy, conducting reviews and assessments, implementing standard procedures and conducting awareness training sessions. The successful IT Security Analyst will also be accountable for ensuring that the specific security responsibilities of the technology manager are performed. The key focus is to provide technical risk assessments into IT, business projects and BAU activities. The risks must be managed in a transparent and pragmatic way.

Key Responsibilities:
*Identify, Assess and Maintain the list of the organisation's technology assets and Information security risks
*Provide expertise in respect of Information Security, enabling the firm to meet its business objectives and act appropriately in the face of rapidly changing threats, technologies and business conditions
*Liaise with the IT to ensure that all projects complete required security documentation. Formally document residual risks and areas of policy non-compliance for project for risk mitigation
*Provide information security controls in the organisation's change management procedure by means of reviewing all changes which could affect information security level (i.e. network perimeter changes, endpoint security perimeter changes, including storage and mobile devices connections, end users internet access and privileged access, Information Security Standards exceptions, etc)
*Maintain and track a list of Information Security Standards exceptions and Risk Register to ensure an accepted by the firm s Information Security Risk level
*Communicate Information Security standards and guidelines to maximise the effectiveness of security architecture and controls in meeting these requirements§Work closely with Audit, Compliance, Risk managers, Data Protection, HR and Corporate Security and Business Continuity teams, ensure the execution of information security related awareness program globally
*Participate actively and support information security driven projects and initiatives
*Ensure that all new systems development and infrastructure projects, maintenance, enhancements and other project activity within their area are conducted according to the Policy and standards;
*Produce, or help IT project managers conduct risk analysis, and define security and control requirements for new systems being developed within their area and ensure these requirements are met in the resultant system;
*Work with technology line managers at all levels to ensure they are enacting their specific security responsibilities for ensuring technologist access to information resources are according to their job role, are current, regularly reviewed and administered securely;
*Perform periodic assessments of information security status and report on Policy implementation;
*Perform security awareness training to staff and management in the technology area;
*Assist in investigations of security and control breaches;
*Advise on security issues directly or in conjunction with Security Management;

Key Competencies Qualifications:
*Min 5+ years experience in information security, technology risk controls or related fields, with experience of risk analysis techniques, design and architectural reviews, and risk management.
*Demonstrable technical knowledge and experience of security principles, risk assessment, products architecture in distributed computing environments, core platforms and network technologies in a global infrastructure
*Previously worked with policies and standards providing risk analysis throughout the development lifecycle of core business applications and infrastructure
*Understanding of information security risks associated with the introduction of new technologies as well as the demonstrated ability to define appropriate countermeasures, both technological and procedural
*Good understanding of development practices and lifecycles.
*Team player with energy and a desire to progress in a fast moving, demanding and progressive environment
*Strong written and verbal communication skills
*Be able to articulate an independent and balanced opinion in both written and oral form, identifying real issues and providing compelling solutions in a succinct manner.
*Have excellent report writing skills and an ability to communicate complex issues clearly and concisely to non-technical persons
*Have an excellent grounding in information technology applications and infrastructure technologies
*Have a solid foundation in IT operations understanding how effective organisations and processes operate
*Bachelor's degree preferred, or other professional qualification and/or
*Industry certifications such as CISM, CISA and CISSP

Salary Benefits

£55,000-£70,000/Annum + Excellent Benefits Bonus

Robert Half Ltd acts as an employment business for temporary positions and an employment agency for permanent positions. Robert Half is committed to equal opportunity and diversity. Suitable candidates with equivalent qualifications and more or less experience can apply.

September 6, 2012 • Posted in: General

Leave a Reply

You must be logged in to post a comment.