drjobs
GRC CYBERSECURITY ENGINEER
drjobs
GRC CYBERSECURITY EN....
drjobs GRC CYBERSECURITY ENGINEER العربية

GRC CYBERSECURITY ENGINEER

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs

Job Location

drjobs

Abu Dhabi - UAE

Monthly Salary

drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Req ID : 2653555

The profile should be certified ISO

  • Establish Objectives and Scope: Define the goals and scope of the risk assessment. Identify what assets systems or processes will be included in the assessment.
  • Asset Inventory and Classification: Identify and catalog all assets within the organization including hardware software data and personnel. Classify assets based on their importance and sensitivity to the business.
  • Identify Threats and Vulnerabilities: Analyze potential threats that could affect your assets. This involves understanding the various types of cyber threats (e.g. malware phishing insider threats) and vulnerabilities (e.g. unpatched systems weak passwords) that could exploit those assets.
  • Risk Identification: Assess the likelihood and potential impact of threats exploiting vulnerabilities. This involves determining the risk level associated with each potential threat and vulnerability combination.
  • Risk Analysis and Evaluation: Evaluate the identified risks based on their likelihood and potential impact. Assign a risk score or ranking to prioritize which risks are most critical.
  • Risk Treatment and Mitigation: Develop strategies to address and mitigate the identified risks. This might involve implementing security controls conducting regular software updates employee training or other measures to reduce risk.
  • Create a Risk Management Plan: Develop a comprehensive plan outlining how identified risks will be managed. This plan should include prioritization responsibilities timelines and the allocation of resources.
  • Implement and Monitor Controls: Implement the risk mitigation measures and security controls as outlined in the risk management plan. Continuously monitor these controls to ensure their effectiveness.
  • Review and Update: Regularly review and update the risk assessment process to adapt to new threats changes in technology or modifications in business operations.
  • Documentation and Reporting: Document all steps taken during the risk assessment process and create reports summarizing the identified risks mitigation strategies and the overall risk landscape for stakeholders.
  • Remember a risk assessment is an ongoing process that needs regular review and updates to address emerging threats and changes in the organizations infrastructure or operations.

The Cyber security engineer should also conduct a Risk assessment following the principle below :

  • Risk Context: Understanding the context of risk is crucial. This involves considering the organizations objectives the business environment legal and regulatory requirements and the expectations of stakeholders.
  • Risk Assessment Methodology: Establish a structured and systematic approach to risk assessment. Define methodologies and criteria for identifying analyzing and evaluating risks consistently across the organization.
  • Risk Identification: Identify potential threats to information assets and vulnerabilities within the organizations systems processes and infrastructure. This includes internal and external threats intentional or unintentional.
  • Risk Analysis: Assess the likelihood and impact of identified risks. Determine the potential consequences and the likelihood of those consequences occurring to prioritize risks for mitigation.
  • Risk Evaluation: Evaluate the significance of identified risks based on their potential impact on the organizations objectives assets and operations. Determine the level of risk tolerance or acceptance for each risk.
  • Risk Treatment: Develop risk treatment plans to manage and mitigate identified risks. Implement appropriate controls safeguards or countermeasures to reduce risks to an acceptable level.
  • Risk Communication and Consultation: Ensure effective communication and consultation with stakeholders involved in the risk assessment process. This includes sharing riskrelated information findings and decisions.
  • Documentation and Records: Maintain comprehensive documentation of the risk assessment process including methodologies used risk analysis results identified risks treatment plans and ongoing monitoring activities.
  • Ongoing Review and Improvement: Continuously review and update the risk assessment process. Regularly reassess risks monitor the effectiveness of implemented controls and adapt to changes in the business environment or threat landscape.
  • Integration with Business Processes: Integrate risk assessment activities with the organizations overall business processes and decisionmaking to ensure that information security risks are considered in strategic planning.

Vertical:

Technology

Remote Work :

No

Employment Type

Full Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobs.ae is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.