9 views
King Grup
Key purpose:
Full responsibility for the information and technical security of the company's corporate and technological infrastructure, which includes the formation and end-to-end security support. The role is autonomous and does not require a separate Head of Security.
Areas of responsibility:
1. Risk and internal process management
IT and Cyber Security Risk Assessment: Initiate and conduct regular assessment IT infrastructure and cyber security risks.
Vulnerability management: Building and maintaining an effective vulnerability management systems.
Internal control: Ensuring operational control, monitoring and compliance control of all IT processes and solutions to information security requirements.
2. Organization of security tactics and strategy
Architecture: Design and optimization of secure network architecture (Zero Trust, segmentation, VLAN).
Strategic planning: Formation of a strategy and roadmap for the development of IT security companies.
Implementation of solutions: Selection, assessment and implementation of key security solutions (EDR/XDR, SIEM, PAM, NAC, FW, WAF and others).
3. Ensuring the security of internal systems and servicespan> techniques.
Management: Operational management, configuration and monitoring of protective mechanisms IT infrastructure.
4. Key security domains
Access control (system and network):
Implementation of RBAC (Multi-Factor Authentication); (PAM).
Protection of endpoints and infrastructure:
Policies: Control and administration of MDM tools and policies.
Stress testsorganization of phishing tests, etc.
Experience in the field of information security or infrastructure: 5+ years.
Experience of independently building security processes.
Experience in network architecture.
Практика роботи з firewall/VPN enterprise-рівня.
Впровадження та EDR/XDR, NGAV settings
Understanding the principles of working with SIEM and its implementation.
Cloud security (Microsoft 365/Azure/Google Workspace).
Understanding cryptography and key management principles.
Experience in vulnerability & patch management.
Will be a plus:
Expectations from the role
Complete autonomy in acceptance solutions.
Responsibility for the level of cyber risk of the company.
Focus on building and developing a security system.
Ability to justify the budget and investments in security.
We we offer