Platzhalter Bild

GRC Resource bei Mercedes-Benz Group AG

Mercedes-Benz Group AG · Bangalore, Indien · Onsite

Jetzt bewerben
%3Cp class=%22MsoNormal%22 style=%22margin-top: 0px; margin-bottom: 0px;;font-family: Arial%22%3E%26nbsp;%3C/p%3E%0A%0A%3Cp class=%22MsoNormal%22 style=%22margin-top: 0px; margin-bottom: 0px;;font-family: Arial%22%3E%3Cfont face=%22Arial%22 size=%222%22%3EJob Responsibilities :%3C/font%3E%3C/p%3E%0A%0A%3Cp class=%22MsoNormal%22 style=%22margin-top: 0px; margin-bottom: 0px;;font-family: Arial%22%3E%26nbsp;%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3EPolicy %26amp; Standards Management: Develop and oversee the adoption of a global security policies and standards framework in the region. In addition, ensure these global policies and standards (and any exceptions to them) are maintained current, relevant, and appropriately managed over their lifecycle.%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3EInformation Management: Lead the development of a high-value asset framework, information management controls to drive the proper application of security controls in a manner that is commensurate with the associated risks. Ensure all relevant information repositories and sources are updated for effective coverage of security control implementation.%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3ERisk Management: Coordinate with regional security officers to ensure the timely identification of cyber risk across markets as well as compliance with all appropriate regulatory requirements and internal cyber security policies and standards.%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3ECommunications, Awareness %26amp; Training: Lead the development of and oversee regional cyber security training, education, and spread awareness.%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3ECompliance Management: Report on the effectiveness of governance and compliance activities by collecting and aggregated key risk and compliance metrics globally.%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A
%3Cdiv style=%22%22%3E%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3EDeep understanding of cyber security and the relationship between threat, vulnerability and information value in the context of governance, compliance and risk management.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security tools and procedures.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; An understanding of emerging technology and digital trends and their impacts on cyber security.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; High proficiency with common cyber security management frameworks, regulatory requirements and industry leading practices.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; Strong knowledge of third-party management leading practices and the potential cyber security risks involved in third-party relationships.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; Strong knowledge of organizational training and education policies, processes, and procedures.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; Deep understanding of risk-based decision-making (i.e. risk analysis, mitigation, resolution, acceptance, etc.).%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; Deep understanding of the operational impacts of cyber security lapses.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22margin-bottom:12px;font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:11pt%22%3E%3Cspan style=%22line-height:107%%22%3E%3Cspan style=%22font-family:Calibri,sans-serif%22%3E%26middot;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; Good/Excellent project management skills/knowledge to co-ordinate and drive security projects%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp style=%22font-family: Arial%22%3E%26nbsp;%3C/p%3E%0A%0A%3Cp style=%22font-family: Arial%22%3E%3Cspan style=%22font-family:Arial%22%3E%3Cfont face=%22Arial, Helvetica, sans-serif%22%3E%3Cfont size=%222%22%3EJob Level - T7%3C/font%3E%3C/font%3E%3C/span%3E%3C/p%3E%0A%0A%3Cp class=%22MsoNormal%22 style=%22margin-top: 0px; margin-bottom: 0px;;font-family: Arial%22%3E%26nbsp;%3C/p%3E%0A%0A%3Cp class=%22MsoNormal%22 style=%22margin-top: 0px; margin-bottom: 0px;;font-family: Arial%22%3E%26nbsp;%3C/p%3E%0A%3C/div%3E%0A
Jetzt bewerben

Weitere Jobs