The successful candidate will work side by side with other departments to ensure security is baked in at every stage of IT operations.
- Report on implementation of controls and measurement of their success.
- Investigation of security breaches within Incident Response Process.
- Review proposed IT changes at Change Advisory Board to ensure conformance with Group policies.
- Understanding of cloud based hosting, associated risks and security applications and infrastructure.
- Solid understanding of information security risk management including risk analysis, mitigation, resolution and acceptance.
- Understanding of defence in depth principles and the role of WARP.