- Professional
- Optionales Büro in Bangalore
%3Cdiv style=%22%22%3E%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3EDeep understanding of cyber security and the relationship between threat, vulnerability and information value in the context of governance, compliance and risk management.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security tools and procedures.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; An understanding of emerging technology and digital trends and their impacts on cyber security.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; High proficiency with common cyber security management frameworks, regulatory requirements and industry leading practices.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; Strong knowledge of third-party management leading practices and the potential cyber security risks involved in third-party relationships.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; Strong knowledge of organizational training and education policies, processes, and procedures.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; Deep understanding of risk-based decision-making (i.e. risk analysis, mitigation, resolution, acceptance, etc.).%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; Deep understanding of the operational impacts of cyber security lapses.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; Good/Excellent project management skills/knowledge to co-ordinate and drive security projects%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22font-family: Arial%22%3E%26nbsp;%3C/p%3E%0A%0A%3Cp style=%22font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cfont face=%22Arial, Helvetica, sans-serif%22%3E%3Cfont size=%222%22%3EJob Level - T7%3C/font%3E%3C/font%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp class=%22MsoNormal%22 style=%22margin-top: 0px; margin-bottom: 0px;;font-family: Arial%22%3E%26nbsp;%3C/p%3E%0A%0A%3Cp class=%22MsoNormal%22 style=%22margin-top: 0px; margin-bottom: 0px;;font-family: Arial%22%3E%26nbsp;%3C/p%3E%0A%3C/div%3E%0A Jetzt bewerben