Jobs Career Advice Post Job
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

Oops! It seems this job from World Vision has expired
View current and similar jobs below
  • Posted: Nov 24, 2022
    Deadline: Dec 22, 2022
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • World Vision is a global relief, development and advocacy organization dedicated to working with children,families and communities to overcome poverty and injustice.World Vision serves all people regardless of religion,race,ethnicity,or gender.


    Read more about this company

     

    Global Cybersecurity Analyst

    Key Responsibilities:

    • Individuals working as Global Cybersecurity Analyst are responsible for working on security projects/issues for one or more functional areas (e.g., data, systems, network and/or Web) across the enterprise, develop security solutions for medium to complex assignments, work on multiple projects as a team member and lead systems-related security components.  They provide expertise and assistance to all IT projects to ensure the company’s infrastructure and information assets are protected.
    • Individuals within the IT Security job family plan, execute, and manage multi-faceted projects related to compliance management, risk assessment and mitigation, control assurance, business continuity and disaster recovery, and user awareness.  They are focused on developing and driving security strategies, policies/standards, ensuring the effectiveness of solutions, and providing security-focused consultative services to the organization. 
    • Individuals develop, execute and manage data, system, network and internet security strategies and solutions within a business area and across the enterprise. They develop security policies and procedures such as user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines. To guide enforcement of security policies and procedures, they administer and monitor data security profiles on all platforms by reviewing security violation reports and investigating security exceptions. They update, maintain and document security controls and provide direct support to the business and internal IT groups. IT Security professionals evaluate and recommend security products, services and/or procedures. They also communicate and educate IT and the business about security policies and industry standards, and provide solutions for enterprise/business security issues. 
    • IT Security professionals require strong technical, analytical, communication and consulting skills with knowledge of IT Security and related technologies. Security certifications (i.e., PCI Internal Security Assessor (PCI-ISA), CompTIA Certified Technical Trainer (CTT+), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manage (CISM), Global Information Assurance Certification (GIAC) and/or other certifications) may be required.

    MAJOR RESPONSIBILITIES:

    POLICIES, PROCESSES, & STANDARDS:

    • Maintains an up-to-date understanding of industry best practices.
    • Develops, enhances and implements enterprise-wide security policies, procedures and standards. 
    • Monitors compliance with security policies, standards, guidelines and procedures.
    • Ensures security compliance with legal and regulatory standards.

    BUSINESS REQUIREMENTS:

    • Participates with the project team(s) to gather a full understanding of project scope and business requirements.
    • Works with customers to identify security requirements using methods that may include risk and business impact assessments.
    • Provides security-related guidance on business processes.

    SECURITY SOLUTIONS:

    • Participates in designing secure infrastructure solutions and applications.

    RISK ASSESSMENTS:

    • Works directly with the customers and other internal departments and organizations to facilitate IT risk analysis and risk management processes and to identify acceptable levels of residual risk.
    • Conducts business impact analysis to ensure resources are adequately protected with proper security measures.
    • Analyzes security analysis reports for security vulnerabilities and recommends feasible and appropriate options. 
    • Creates, disseminates and updates documentation of identified IT risks and controls.
    • Reports on significant trends and vulnerabilities.
    • Develops plans to achieve security requirements and address identified risks.
    • Follows up on deficiencies identified in monitoring reviews, self-assessments, automated assessments, and internal and external audits to ensure that appropriate remediation measures have been taken. 

    SECURITY TRAINING & CERTIFICATION:

    • Performs security trainings. 
    • Develops security training and certification programs including curriculum, content, and materials.
    • Manages learning management solutions.

    PROBLEM MANAGEMENT:

    • Provides responsive support for problems found during normal working hours as well as outside normal working hours.
    • Identifies and resolves root causes of security-related problems. 

    COMMUNICATIONS/CONSULTING:

    • Interfaces regularly with staff from various departments communicating security issues and responding to requests for assistance and information. 
    • Reports to management concerning residual risk, vulnerabilities and other security exposures, including misuse of information assets and noncompliance.

    VENDOR MANAGEMENT:

    • Works with third party vendors during problem resolutions. 
    • Interfaces with third party vendors to evaluate new security products or as part of a security assessment process.

    COACHING/MENTORING:

    • Mentors less experienced team members.

    KNOWLEDGE/QUALIFICATIONS FOR THE ROLE:

    • Required Professional Experience:
    • Bachelor’s Degree in Computer Science, Information Systems or other related field, or equivalent work experience.
    • Work experience in training and certification management.
    • Work experience in designing, implementing, and security training.
    • Work experience in designing, implementing, and security policies and standards.
    • Typically has 3-5 years of combined cybersecurity work experience with a broad range of exposure to information security and data protection.
    • Willingness and ability to travel domestically and internationally, as necessary.
    • Work experience in compliance, risk, and IT service management.

    Preferred Knowledge and Qualifications:

    • CISSP certification
    • CompTIA Certified Technical Trainer (CTT+)
    • Microsoft Certified Trainer (MCT)
    • Project Management experience
    • Risk Management experience
    • Security Training and Certification

    Check how your CV aligns with this job

    Method of Application

    Interested and qualified? Go to World Vision on worldvision.wd1.myworkdayjobs.com to apply

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at World Vision Back To Home
  • Popular Jobs

Career Advice

  • Explore Careers for a Sustainable Future - British Council Are you interested in contributing to a more sustainable world? Then your skills and experiences can find expression in the Green Industry. There are many routes to finding work in the green economy. Explore the different paths into environmental work, climate change and sustainability in this upcoming webinar where we will hear from industry leaders, employers and UK alumni who have gone on to successful careers in the green industries.
  • ALI Business Development Scholarship Program The African Leadership Institute is currently on a mission to raise successful business leaders in Africa who can solve complex problems, create jobs, and establish value for their stakeholders. As such, we are giving scholarship to Africans through the ALI Online Business Development Scholarship program which is aimed at educating business enthusiasts of all levels. We invite learners, 18 years of age or older who are interested in expanding their business skills and knowledge of building a successful business to apply for the ALI Business Development Scholarship program. This program has been divided into two phases
  • Call for Applications for Mastercard Foundation Scholars Program at USIU-Africa United States International University-Africa (USIU-Africa) has partnered with the Mastercard Foundation in its global Scholars Program. This initiative will offer academically talented youth from Africa facing financial, gender, displacement, or disability constraints an opportunity to access world class university education.
  • African European Digital Venture Program (AEDV) Our goal is to give African startups access to know-how about the European market and to strengthen partnerships between African startups and established European companies and startups. The initiation of partnerships in the field of digital transformation, also across continents, will create a win-win situation for both parties. Our program gives startups the opportunity to get to know the European and German ecosystem in a concrete and practical way, to establish first contacts that can be the basis for future business and to acquire relevant knowledge for this purpose.
View All Career Advice
 

Subscribe to Job Alert

 

Join our happy subscribers

 
 
 
Send your application through

GmailGmail YahoomailYahoomail