16 févr. 2022 à 0h01 Autre Casablanca 33 vues
Détails de l'annonce
Job Purpose
Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.
- Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
- Ensure that security processes and procedures are in line with information security policies and standards.
- Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
- Develop the configuration management processes and engineering documentation for security policy and implementation activities.
- Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
- Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
- Process KPIs - measure the efficiency or productivity of a business process
- Third-Party risks
- Benchmarking cybersecurity performance
- Training and security awareness
- Cost driving and ROI indicators
- Directly managed staff (n-1): 2
- Global managed staff: 2 to 4
Internal Partners | Communication Purpose |
All JESA Employees | Define needs, resolve issues and respond to requests |
IT team | Coordinate for technical architecture and design |
Risk and audit managers | Coordinate cross activities |
Top management | Decision making |
External Partners | Communication Purpose |
Cybersecurity suppliers & partners | Partnership and needs study |
Standards and accreditations organism | Partnership and needs study |
- Bac+4 minimum
- 6 to 8 years
- 2 to 4 years
Main Scope/Responsibilities
Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.
- Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
- Ensure that security processes and procedures are in line with information security policies and standards.
- Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
- Develop the configuration management processes and engineering documentation for security policy and implementation activities.
- Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
- Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
- Process KPIs - measure the efficiency or productivity of a business process
- Third-Party risks
- Benchmarking cybersecurity performance
- Training and security awareness
- Cost driving and ROI indicators
- Directly managed staff (n-1): 2
- Global managed staff: 2 to 4
Internal Partners | Communication Purpose |
All JESA Employees | Define needs, resolve issues and respond to requests |
IT team | Coordinate for technical architecture and design |
Risk and audit managers | Coordinate cross activities |
Top management | Decision making |
External Partners | Communication Purpose |
Cybersecurity suppliers & partners | Partnership and needs study |
Standards and accreditations organism | Partnership and needs study |
- Bac+4 minimum
- 6 to 8 years
- 2 to 4 years
Education
Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.
- Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
- Ensure that security processes and procedures are in line with information security policies and standards.
- Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
- Develop the configuration management processes and engineering documentation for security policy and implementation activities.
- Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
- Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
- Process KPIs - measure the efficiency or productivity of a business process
- Third-Party risks
- Benchmarking cybersecurity performance
- Training and security awareness
- Cost driving and ROI indicators
- Directly managed staff (n-1): 2
- Global managed staff: 2 to 4
Internal Partners | Communication Purpose |
All JESA Employees | Define needs, resolve issues and respond to requests |
IT team | Coordinate for technical architecture and design |
Risk and audit managers | Coordinate cross activities |
Top management | Decision making |
External Partners | Communication Purpose |
Cybersecurity suppliers & partners | Partnership and needs study |
Standards and accreditations organism | Partnership and needs study |
- Bac+4 minimum
- 6 to 8 years
- 2 to 4 years
Global Experience
Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.
- Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
- Ensure that security processes and procedures are in line with information security policies and standards.
- Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
- Develop the configuration management processes and engineering documentation for security policy and implementation activities.
- Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
- Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
- Process KPIs - measure the efficiency or productivity of a business process
- Third-Party risks
- Benchmarking cybersecurity performance
- Training and security awareness
- Cost driving and ROI indicators
- Directly managed staff (n-1): 2
- Global managed staff: 2 to 4
Internal Partners | Communication Purpose |
All JESA Employees | Define needs, resolve issues and respond to requests |
IT team | Coordinate for technical architecture and design |
Risk and audit managers | Coordinate cross activities |
Top management | Decision making |
External Partners | Communication Purpose |
Cybersecurity suppliers & partners | Partnership and needs study |
Standards and accreditations organism | Partnership and needs study |
- Bac+4 minimum
- 6 to 8 years
- 2 to 4 years
Specific Experience in the position
Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. The ISSM inform users about security measures, explain potential threats, design, implement security measures and monitor them. Create and institute measures to safeguard sensitive information within the company.
- Manage the security profile and implementation for all systems and services slated for Certification and Accreditation
- Ensure that security processes and procedures are in line with information security policies and standards.
- Work with all stakeholders to develop and maintain the SSPs (System Security Plans) and associated documentation
- Develop the configuration management processes and engineering documentation for security policy and implementation activities.
- Maintain records and documentation on all IT systems, upgrades, patches, and connectivity configurations.
- Evaluate security solutions and implementations strategies for IT systems and services and maintain operational security posture of development, integration, and deployed capabilities.
- Process KPIs - measure the efficiency or productivity of a business process
- Third-Party risks
- Benchmarking cybersecurity performance
- Training and security awareness
- Cost driving and ROI indicators
- Directly managed staff (n-1): 2
- Global managed staff: 2 to 4
Internal Partners | Communication Purpose |
All JESA Employees | Define needs, resolve issues and respond to requests |
IT team | Coordinate for technical architecture and design |
Risk and audit managers | Coordinate cross activities |
Top management | Decision making |
External Partners | Communication Purpose |
Cybersecurity suppliers & partners | Partnership and needs study |
Standards and accreditations organism | Partnership and needs study |
- Bac+4 minimum
- 6 to 8 years
- 2 to 4 years
- Lieu de travail Casablanca, Maroc
- Date d'expiration 14 Avril
- Secteur d'activité
- Nombre de postes 01