Platzhalter Bild

Hybrid Expert, Cybersec Security Advisor na Schneider Electric

Schneider Electric · Bangalore, Índia · Hybrid

Candidatar-se agora
%3Cp class=%22MsoNormal%22 align=%22center%22 style=%22text-align: center;%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 18.0pt; color: #00b050;%22%3ECybersec Security Advisor%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 11.0pt; font-weight: normal; mso-bidi-font-weight: bold;%22%3E%3Co:p%3E%26nbsp;%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22%3E%3Cspan class=%22MsoIntenseEmphasis%22%3E%3Cspan lang=%22EN-GB%22 style=%22mso-fareast-font-family: %27Times New Roman%27; mso-fareast-theme-font: major-fareast;%22%3EJob description:%3C/span%3E%3C/span%3E%3Cspan class=%22MsoIntenseEmphasis%22%3E%3Cspan lang=%22EN-GB%22 style=%22mso-fareast-font-family: %27Times New Roman%27; mso-fareast-theme-font: major-fareast; font-weight: normal; font-style: normal;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22%3E%3Cspan lang=%22EN-US%22 style=%22font-size: 9.0pt; font-family: %27Arial W01 Rounded%27,serif; color: #626469; background: white; mso-ansi-language: EN-US;%22%3E%3Co:p%3E%26nbsp;%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22 style=%22text-align: justify;%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; font-family: %27Calibri%27,sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: %27Times New Roman%27; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; color: windowtext; font-weight: normal;%22%3EAre you passionate about tackling complex data problems? Do you thrive on using your analytical and cybersecurity skills to solve large-scale challenges? Are you intrigued by the intersection of complex business processes and data-driven approaches? If so, we%27d love to hear from you!%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22 style=%22text-align: justify;%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; font-family: %27Calibri%27,sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: %27Times New Roman%27; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; color: windowtext; font-weight: normal;%22%3EAt Schneider Electric, we are undergoing a transformative journey by leveraging Artificial Intelligence %26amp; Automation technologies to empower users with Machine Learning and Cognitive computing, driving business value. Simultaneously, as the number of cybersecurity threats continues to grow, we recognize the importance of having a comprehensive cybersecurity approach across our solutions to safeguard our business and customers.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22 style=%22text-align: justify;%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; font-family: %27Calibri%27,sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: %27Times New Roman%27; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; color: windowtext; font-weight: normal;%22%3EWe seek a cybersecurity professional to join our AI Digital Risk Leader %26amp; Data Officer team to drive the implementation of Secure development process in our AI organization.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22 style=%22text-align: justify;%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; font-family: %27Calibri%27,sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: %27Times New Roman%27; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; color: windowtext; font-weight: normal;%22%3ETo ensure a cohesive cybersecurity strategy implemented throughout our AI HUB, you will collaborate closely with AI Cybersecurity teams but also Autonomous spokes team in NAM and GSC.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNoSpacing%22%3E%3Cspan lang=%22EN-US%22 style=%22font-size: 12.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-US;%22%3E%3Co:p%3E%26nbsp;%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNoSpacing%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;%22%3E%3Co:p%3E%26nbsp;%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNoSpacing%22%3E%3Cb style=%22mso-bidi-font-weight: normal;%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; color: #00b050;%22%3EThe role%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/b%3E%3C/p%3E%0A%3Cp class=%22MsoNoSpacing%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;%22%3EThe Security Advisor is responsible for the adoption and implementation of the SDL framework following the Schneider Electric SDL V2 process and in compliance to the SE SDL Policy and other cybersecurity policies, procedures, and best practices, and to advise on cybersecurity technical requirements for the development of secure products and systems.%3Cspan style=%22mso-spacerun: yes;%22%3E%26nbsp; %3C/span%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNoSpacing%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;%22%3E%3Co:p%3E%26nbsp;%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNoSpacing%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;%22%3EThe Security Advisor regularly interacts with key stakeholders (including representatives from marketing, R%26amp;D offer development, technical leaders, and leadership team members) as well as stakeholders from the Business Unit Security Team and the corporate Product Security Office (PSO) to ensure that cybersecurity guidelines and processes are executed in an efficient and effective manner.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNoSpacing%22%3E%3Cb style=%22mso-bidi-font-weight: normal;%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;%22%3E%3Co:p%3E%26nbsp;%3C/o:p%3E%3C/span%3E%3C/b%3E%3C/p%3E%0A%3Cp class=%22MsoNoSpacing%22%3E%3Cb style=%22mso-bidi-font-weight: normal;%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; color: #00b050;%22%3EKey Responsibilities for the Role%3C/span%3E%3C/b%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpFirst%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-GB;%22%3EAct as Subject Matter Expert, serve as a consultant and advisor for cybersecurity topics within AI development teams.%3Cspan style=%22mso-spacerun: yes;%22%3E%26nbsp; %3C/span%3EProvide guidance, coaching and expertise to execute SDL practices such as threat modelling, secure design practices, secure coding and implementation, and security testing.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-US%22 style=%22font-size: 12.0pt; line-height: 106%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;%22%3EGather SDL and Cybersecurity metrics to contribute to data driven strategies and plans to aid in the deployment of SDL and cybersecurity functionality as required by cybersecurity standards such as IEC62443, and to further improve SDL and Cybersecurity effectiveness and efficiency.%3C/span%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-GB;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-GB;%22%3EEnsure that their assigned development teams abide with risk-driven cybersecurity processes and controls.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-GB;%22%3ESupport development teams to manage vulnerability triage and resolution%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-GB;%22%3ESupport internal SDL audits and Formal Cybersecurity Reviews (FCSRs) and other supported Schneider data security and privacy processes.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-GB;%22%3EConduct training and presentations to build cybersecurity competencies within teams.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpLast%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-GB;%22%3ETrack organizational maturity using cybersecurity maturity frameworks and track other SDL-related goals as directed.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E
%3Ch2%3E%3Cb%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: %27Calibri%27,sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; color: #00b050; mso-ansi-language: EN-GB;%22%3EKey skills and requirements%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/b%3E%3C/h2%3E%0A%3Cp class=%22MsoListParagraphCxSpFirst%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3EAbility to align operational/information security policies with business requirements.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3EProcess driven with attention to detail, ability to translate operational/information security requirements into security controls in coordination with architects.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3EAbility to effectively adapt to and apply rapidly changing technology and security requirements to business needs.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3EKnowledge of static code analysis tools, secure coding standards, fuzz and penetration testing, and formal security reviews.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3EWorking knowledge of security and privacy standards, regulations, and legislation.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3EDemonstrated ability to develop threat models, analysing threats, and rate threat severity using established industry practices%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; line-height: 107%; mso-list: l0 level1 lfo1;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 107%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 107%; mso-ansi-language: EN-GB;%22%3EExperience with AI and ML technologies and services (Machine Learning, Conversational AI, Computer Vision, No Code / Low Code AI) %3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify;%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3E%3Co:p%3E%26nbsp;%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpLast%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify;%22%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3E%3Co:p%3E%26nbsp;%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Ch2%3E%3Cb%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: %27Calibri%27,sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; color: #00b050; mso-ansi-language: EN-GB;%22%3EQualifications %26amp; Experience%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/b%3E%3C/h2%3E%0A%3Cp class=%22MsoListParagraphCxSpFirst%22 style=%22mso-add-space: auto; text-indent: -18.0pt; mso-list: l1 level1 lfo2; margin: 3.0pt 0cm 0cm 18.0pt;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-US%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-bidi-font-weight: bold;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-US%22 style=%22font-size: 12.0pt; line-height: 106%; mso-bidi-font-weight: bold;%22%3ECustomer-oriented with a service-oriented attitude (flexible, personable, and approachable)%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l1 level1 lfo2;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-US%22 style=%22font-size: 12.0pt; line-height: 106%; mso-bidi-font-weight: bold;%22%3ECertification in Cybersecurity Management such as CISSP, CSSLP; and/or IEC 62443 Certified Specialist.%3C/span%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l1 level1 lfo2;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-US%22 style=%22font-size: 12.0pt; line-height: 106%; mso-bidi-font-weight: bold;%22%3EExperience of working in an Engineering/R%26amp;D group following a Secure Development Lifecycle based on standards such as IEC 62443, ISO 21434, or Microsoft SDL; %3C/span%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3Ewith a proven ability to engage with management and development teams.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l1 level1 lfo2;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3EExperience guiding and assisting organizations in implementing security product/system development practices.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l1 level1 lfo2;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3EExperience in driving corporate programs using influence, negotiation, and persuasion soft skill set.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l1 level1 lfo2;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-US%22 style=%22font-size: 12.0pt; line-height: 106%; mso-bidi-font-weight: bold;%22%3EAn understanding of domain appropriate communication mechanisms protocols %3C/span%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l1 level1 lfo2;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3EStrong communication skills, including the ability to render concise reports, summaries, and presentations.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoListParagraphCxSpLast%22 style=%22margin-left: 18.0pt; mso-add-space: auto; text-align: justify; text-indent: -18.0pt; mso-list: l1 level1 lfo2;%22%3E%3C!-- [if !supportLists]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-GB;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%26middot;%3Cspan style=%22font: 7.0pt %27Times New Roman%27;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan lang=%22EN-GB%22 style=%22font-size: 12.0pt; line-height: 106%; mso-ansi-language: EN-GB;%22%3EProject management or technical leadership skills preferred.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/p%3E
Candidatar-se agora

Outros empregos