Develop an information security management strategy that is aligned to service and operational requirements and develop information security design criteria and templates.
Review service level and business requirements to develop service methodologies and an information security policy, assessments and methodologies.
Review the security policy with the relevant 3rd parties ensuring that ISM service requirements are met and that integration into access management and security reporting occurs.
Log major service requests for ISM transition and ensure that service activation, knowledge transfer and change management processes takes place.
Manage the prevention and resolution of security breaches and ensure incident and problem management processes are initiated.
Perform access management activities according to the policy.
Develop, scope and discuss security service audit schedules, review access authorisation and perform the required access controls and penetration testing to identify security weaknesses.
Document improvement in service design and ensure that the required security plan is developed and reviewed.
إخلاء المسؤولية: د.جوب هو مجرد منصة تربط بين الباحثين عن عمل وأصحاب العمل. ننصح المتقدمين بإجراء بحث مستقل خاص بهم في أوراق اعتماد صاحب العمل المحتمل.
نحن نحرص على ألا يتم طلب أي مدفوعات مالية من قبل عملائنا، وبالتالي فإننا ننصح بعدم مشاركة أي معلومات شخصية أو متعلقة بالحسابات المصرفية مع أي طرف ثالث. إذا كنت تشك في وقوع أي احتيال أو سوء تصرف، فيرجى التواصل معنا من خلال تعبئة النموذج الموجود على الصفحة اتصل بنا