Security Program Management
- Develop, implement, and maintain the organization’s security program, ensuring alignment with industry security frameworks.
- Conduct regular security assessments and audits to identify gaps and recommend improvements.
- Establish and enforce security policies, controls, and best practices to mitigate risks.
- Evaluate and implement security tools to enhance monitoring, detection, and prevention capabilities.
Risk Assessment & Compliance
- Conduct risk assessments for projects involving technological components and provide recommendations for mitigating security risks.
- Ensure compliance with internal security policies and external regulatory requirements.
- Oversee the evaluation of compliance with company security controls, identifying areas for improvement.
- Review and assess security clauses in contracts to ensure alignment with company policies and industry standards.
- Incident Management & Response
- Serve as the escalation point for security incidents, coordinating responses and ensuring adherence to incident management protocols.
- Work closely with the Security team and Service Desk to assess risks associated with incidents and user requests.
- Develop, execute, and improve business continuity and incident response plans through testing and analysis.
Customer & Stakeholder Engagement
- Act as the primary point of contact for customer inquiries related to security practices.
- Respond to customer security assessments and provide technical guidance on security implementations and requirements.
- Coordinate security initiatives with different departments to promote a company-wide security culture.
Governance, Risk, & Compliance (GRC) Management
- Manage Governance, Risk, and Compliance (GRC) tools and oversee security risk assessments using platforms like Black Kite.
- Provide security advisory services for internal and external stakeholders on IT governance, risk, and compliance matters.
- Support security initiatives by identifying key security improvements and driving their implementation.