Remote - OT Consultants / Colombia

at  GSB SOLUTIONS

Medellín, Antioquia, Colombia -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate19 Dec, 2024Not Specified21 Sep, 20245 year(s) or aboveCryptography,Pmi,Maintenance,Solvency Ii,Availability,Security,Privacy Protection,Edr,Difficult Situations,Scrum,Iso,Commitments,Communication Skills,Siem,Cissp,Proxy,It Security,Protection,Cisa,Sarbanes Oxley Act,Soft Skills,Itil,Firewall,VulnerabilityNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

QUALIFICATIONS:

  • Bachelor’s degree in Computer Science, Engineering, or related discipline with an IT focus.
  • Desired Certifications: CISSP, CISM, CISA, ITIL, ISO 27001.

REQUIRED EXPERIENCE:

  • At least 5 years of experience in IT Security, management of network infrastructure, including
    implementation and maintenance, delivering IT security projects, assessments and audits.

DESIRED EXPERIENCE:

  • Experience of security incident handling & response.
  • Knowledge in cryptography, data protection and privacy protection.
  • Experience of more than 5 years in the creation or monitoring of information systems architecture.
  • Strong knowledge of regulatory requirements (e.g. Sarbanes Oxley Act, Solvency II) and security

policies, frameworks and standards like NIST, SOC2, ISO 27000.

  • Desire at least B2 English Level.

SOFT SKILLS:

  • Experience coordinating and completing multiple tasks within established and changing deadlines.
  • Excellent organizational, analytical, and independent problem solving skills.
  • Demonstrated excellent oral and written communication skills necessary to interact effectively with

colleagues and with users of varying technological skill levels.

  • Strong customer / end-user / client service orientation.
  • Thrives working in a highly collaborative and team environment.
  • Highly self-motivated and directed.
  • Keen attention to detail.
  • Capability for problem solving, decision-making, sound judgment, assertiveness.
  • Ability to deal with difficult situations, unclear priorities and blocking stakeholders.
  • Ability to work decisively under heavy workload considering the criticality, urgency and extended

work hours required to ensure availability of the service in accordance with service level

commitments.

  • Ability to manage multi-cultural and multi-located teams.

LEADERSHIP SKILLS:

  • Lead by example on values and culture.
  • A natural leader whose personality and communication skills instill a sense of credibility and trust.
  • Able to coherently explain the proposed design and gain stakeholder buy in to the proposed

solution.

  • Cost conscious and keeps a big picture perspective.

REQUIRED SKILLS:

  • Incident and Response Management Process.
  • Authentication and Access Control Tools, Management and Administration.
  • Vulnerability Management process.
  • Security Architecture & Infrastructure Concepts.
  • Knowledge of project methodologies such as PMI, Lean or Scrum work frameworks.
  • Knowledge Security controls like Firewall, Proxy, Malware Detection, PAM, SIEM, Endpoint
    protection (EDR), Vulnerability scanning and so on.

Responsibilities:

  • Systems Architecture: Ensures that the stakeholder security requirements necessary to protect
    the organization’s mission and business processes are adequately addressed in all aspects of
    enterprise architecture including reference models, segment and solution architectures, and the

resulting systems supporting those missions and business processes.

  • Develops and maintains business, systems, and information processes to support

enterprise mission needs; develops information technology (IT) rules and requirements

that describe baseline and target architectures.

  • Ensures that the stakeholder security requirements necessary to protect the organization’s

mission and business processes are adequately addressed in all aspects of enterprise
architecture including reference models, segment and solution architectures, and the

resulting systems supporting those missions and business processes.

  • Align security solutions to the methodologies and standards of Holcim.
  • Design, implement, and support the security model for general security solutions.
  • Design, deploy and monitor security framework to Network environments
  • Vulnerability Assessment and Management: Performs assessments of systems and networks

within the network environment or enclave and identifies where those systems/networks deviate
from acceptable configurations, enclave policy, or local policy. Measures effectiveness of
defense-in-depth architecture against known vulnerabilities. Provide technical Support for security

issues related to in-scope network infrastructure.

  • Cyber Operations: Conducts collection, processing, and/or geolocation of systems to exploit,

locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and,

when directed, executes on-net operations.

  • Incident Response: Responds to crises or urgent situations within the pertinent domain to

mitigate immediate and potential threats. Uses mitigation, preparedness, and response and
recovery approaches, as needed, to maximize survival of life, preservation of property, and

information security. Investigates and analyzes all relevant response activities.

  • Security in Network Infrastructure Changes and Configuration: Review requests for new

systems or changes to existing systems and evaluate the impact to security. Use the best practices
and security standards to guarantee the integrity, confidentiality and availability of information and
data. Cover all the company’s current and future Network Infrastructure, within the best practices,
thereby preventing the company’s vulnerability and exposure to cyber-attacks.


REQUIREMENT SUMMARY

Min:5.0Max:10.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Software Engineering

Graduate

Computer science engineering or related discipline with an it focus

Proficient

1

Medellín, Antioquia, Colombia