Information Systems Security Manager

novojob

Job Purpose
Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.
Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
Ensure that security processes and procedures are in line with information security policies and standards.
Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
Develop the configuration management processes and engineering documentation for security policy and implementation activities.
Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
Process KPIs - measure the efficiency or productivity of a business process
Third-Party risks
Benchmarking cybersecurity performance
Training and security awareness
Cost driving and ROI indicators
Directly managed staff (n-1): 2
Global managed staff: 2 to 4
Internal Partners Communication Purpose
All JESA Employees Define needs, resolve issues and respond to requests
IT team Coordinate for technical architecture and design
Risk and audit managers Coordinate cross activities
Top management Decision making
External Partners Communication Purpose
Cybersecurity suppliers & partners Partnership and needs study
Standards and accreditations organism Partnership and needs study
Bac+4 minimum
6 to 8 years
2 to 4 years
Main Scope/Responsibilities
Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.
Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
Ensure that security processes and procedures are in line with information security policies and standards.
Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
Develop the configuration management processes and engineering documentation for security policy and implementation activities.
Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
Process KPIs - measure the efficiency or productivity of a business process
Third-Party risks
Benchmarking cybersecurity performance
Training and security awareness
Cost driving and ROI indicators
Directly managed staff (n-1): 2
Global managed staff: 2 to 4
Internal Partners Communication Purpose
All JESA Employees Define needs, resolve issues and respond to requests
IT team Coordinate for technical architecture and design
Risk and audit managers Coordinate cross activities
Top management Decision making
External Partners Communication Purpose
Cybersecurity suppliers & partners Partnership and needs study
Standards and accreditations organism Partnership and needs study
Bac+4 minimum
6 to 8 years
2 to 4 years
Education
Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.
Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
Ensure that security processes and procedures are in line with information security policies and standards.
Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
Develop the configuration management processes and engineering documentation for security policy and implementation activities.
Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
Process KPIs - measure the efficiency or productivity of a business process
Third-Party risks
Benchmarking cybersecurity performance
Training and security awareness
Cost driving and ROI indicators
Directly managed staff (n-1): 2
Global managed staff: 2 to 4
Internal Partners Communication Purpose
All JESA Employees Define needs, resolve issues and respond to requests
IT team Coordinate for technical architecture and design
Risk and audit managers Coordinate cross activities
Top management Decision making
External Partners Communication Purpose
Cybersecurity suppliers & partners Partnership and needs study
Standards and accreditations organism Partnership and needs study
Bac+4 minimum
6 to 8 years
2 to 4 years
Global Experience
Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.
Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
Ensure that security processes and procedures are in line with information security policies and standards.
Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
Develop the configuration management processes and engineering documentation for security policy and implementation activities.
Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
Process KPIs - measure the efficiency or productivity of a business process
Third-Party risks
Benchmarking cybersecurity performance
Training and security awareness
Cost driving and ROI indicators
Directly managed staff (n-1): 2
Global managed staff: 2 to 4
Internal Partners Communication Purpose
All JESA Employees Define needs, resolve issues and respond to requests
IT team Coordinate for technical architecture and design
Risk and audit managers Coordinate cross activities
Top management Decision making
External Partners Communication Purpose
Cybersecurity suppliers & partners Partnership and needs study
Standards and accreditations organism Partnership and needs study
Bac+4 minimum
6 to 8 years
2 to 4 years
Specific Experience in the position
Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.
Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
Ensure that security processes and procedures are in line with information security policies and standards.
Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
Develop the configuration management processes and engineering documentation for security policy and implementation activities.
Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
Process KPIs - measure the efficiency or productivity of a business process
Third-Party risks
Benchmarking cybersecurity performance
Training and security awareness
Cost driving and ROI indicators
Directly managed staff (n-1): 2
Global managed staff: 2 to 4
Internal Partners Communication Purpose
All JESA Employees Define needs, resolve issues and respond to requests
IT team Coordinate for technical architecture and design
Risk and audit managers Coordinate cross activities
Top management Decision making
External Partners Communication Purpose
Cybersecurity suppliers & partners Partnership and needs study
Standards and accreditations organism Partnership and needs study
Bac+4 minimum
6 to 8 years
2 to 4 years
Lieu de travail
Casablanca, Maroc
Date d'expiration
14 Avril
Secteur d'activité
Nombre de postes
01

Aperçu

  • Titre d'emploi: Information Systems Security Manager
  • Date de publication : 2022-03-23 Peut être expiré
Postuler pour cet emploi

Postuler pour cet emploi