Connectez-vous pour accéder plus rapidement aux meilleurs offres. Cliquez ici si vous n'avez pas encore un compte.

16 févr. 2022 à 0h01   Autre   Casablanca   33 vues
Détails de l'annonce

Job Purpose

Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM  inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.

  • Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
  • Ensure that security processes and procedures are in line with information security policies and standards.
  • Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
  • Develop the configuration management processes and engineering documentation for security policy and implementation activities.
  • Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
  • Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
  • Process KPIs - measure the efficiency or productivity of a business process                
  • Third-Party risks                
  • Benchmarking cybersecurity performance                
  • Training and security awareness                 
  • Cost driving and ROI indicators    
  • Directly managed staff (n-1): 2   
  • Global managed staff: 2 to 4
Internal Partners Communication Purpose
All JESA Employees Define needs, resolve issues and respond to requests
IT team Coordinate for technical architecture and design
Risk and audit managers Coordinate cross activities
Top management Decision making
External Partners Communication Purpose
Cybersecurity suppliers & partners Partnership and needs study
Standards and accreditations organism Partnership and needs study
  • Bac+4 minimum
  • 6 to 8 years
  • 2 to 4 years

Main Scope/Responsibilities

Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM  inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.

  • Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
  • Ensure that security processes and procedures are in line with information security policies and standards.
  • Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
  • Develop the configuration management processes and engineering documentation for security policy and implementation activities.
  • Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
  • Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
  • Process KPIs - measure the efficiency or productivity of a business process                
  • Third-Party risks                
  • Benchmarking cybersecurity performance                
  • Training and security awareness                 
  • Cost driving and ROI indicators    
  • Directly managed staff (n-1): 2   
  • Global managed staff: 2 to 4
Internal Partners Communication Purpose
All JESA Employees Define needs, resolve issues and respond to requests
IT team Coordinate for technical architecture and design
Risk and audit managers Coordinate cross activities
Top management Decision making
External Partners Communication Purpose
Cybersecurity suppliers & partners Partnership and needs study
Standards and accreditations organism Partnership and needs study
  • Bac+4 minimum
  • 6 to 8 years
  • 2 to 4 years

Education

Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM  inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.

  • Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
  • Ensure that security processes and procedures are in line with information security policies and standards.
  • Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
  • Develop the configuration management processes and engineering documentation for security policy and implementation activities.
  • Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
  • Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
  • Process KPIs - measure the efficiency or productivity of a business process                
  • Third-Party risks                
  • Benchmarking cybersecurity performance                
  • Training and security awareness                 
  • Cost driving and ROI indicators    
  • Directly managed staff (n-1): 2   
  • Global managed staff: 2 to 4
Internal Partners Communication Purpose
All JESA Employees Define needs, resolve issues and respond to requests
IT team Coordinate for technical architecture and design
Risk and audit managers Coordinate cross activities
Top management Decision making
External Partners Communication Purpose
Cybersecurity suppliers & partners Partnership and needs study
Standards and accreditations organism Partnership and needs study
  • Bac+4 minimum
  • 6 to 8 years
  • 2 to 4 years

Global Experience

Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM  inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.

  • Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
  • Ensure that security processes and procedures are in line with information security policies and standards.
  • Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
  • Develop the configuration management processes and engineering documentation for security policy and implementation activities.
  • Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
  • Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
  • Process KPIs - measure the efficiency or productivity of a business process                
  • Third-Party risks                
  • Benchmarking cybersecurity performance                
  • Training and security awareness                 
  • Cost driving and ROI indicators    
  • Directly managed staff (n-1): 2   
  • Global managed staff: 2 to 4
Internal Partners Communication Purpose
All JESA Employees Define needs, resolve issues and respond to requests
IT team Coordinate for technical architecture and design
Risk and audit managers Coordinate cross activities
Top management Decision making
External Partners Communication Purpose
Cybersecurity suppliers & partners Partnership and needs study
Standards and accreditations organism Partnership and needs study
  • Bac+4 minimum
  • 6 to 8 years
  • 2 to 4 years

Specific Experience in the position

Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM  inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.

  • Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
  • Ensure that security processes and procedures are in line with information security policies and standards.
  • Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
  • Develop the configuration management processes and engineering documentation for security policy and implementation activities.
  • Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
  • Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
  • Process KPIs - measure the efficiency or productivity of a business process                
  • Third-Party risks                
  • Benchmarking cybersecurity performance                
  • Training and security awareness                 
  • Cost driving and ROI indicators    
  • Directly managed staff (n-1): 2   
  • Global managed staff: 2 to 4
Internal Partners Communication Purpose
All JESA Employees Define needs, resolve issues and respond to requests
IT team Coordinate for technical architecture and design
Risk and audit managers Coordinate cross activities
Top management Decision making
External Partners Communication Purpose
Cybersecurity suppliers & partners Partnership and needs study
Standards and accreditations organism Partnership and needs study
  • Bac+4 minimum
  • 6 to 8 years
  • 2 to 4 years
  • Lieu de travail Casablanca, Maroc
  • Date d'expiration 14 Avril
  • Secteur d'activité
  • Nombre de postes 01