Senior Specialist, Agile Security and Risk Management Assessment

at  XL Catlin

Ipswich, England, United Kingdom -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate19 Feb, 2025Not Specified19 Nov, 2024N/AMicrosoft Office,Excel,Cissp,It,Powerpoint,Information Security,Security Risk,Giac,Access,Computer Science,English,EthnicityNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

SHARE YOUR TALENT

We’re looking for someone who has these abilities and skills:

  • Bachelor’s degree in computer science, Engineering, or related field with a senior level of professional experience (Required)
  • Established knowledge of performing project risk assessments (Required)
  • Experience in performing Information Security technical risk assessments (Required)
  • Proficient in information security risk and governance frameworks (ISO 27005, EBIOS)
  • Expert analytical and reporting skills (Required)
  • Expert in Microsoft Office (Word, Excel, PowerPoint, Access) (Required)
  • Ability to effectively communicate and positively influence diverse stakeholders and team members (Required)
  • Excellent attention to detail and the ability to create clear, concise, and engaging presentations (Required)
  • Fluent in English (Required)
  • Information Security and /or Information Technology industry certification (CISSP, CISM, CRISC, GIAC, CISSP or equivalent) (Required)
  • Experience in articulating IS risks in business language and advising on the appropriate risk management action
  • Experience in information security management reporting and related methodologies
  • Experience in multinational companies (Preferred)

Responsibilities:

  • Review submission of IS Criticality Assessment (ISCA) questionnaire (ISCA Dashboard)
  • Determine high level security requirements and project criticality, based on standard project activities and data classification from DP pre-screening
  • Work with assigned architect to ensure security requirements are finalized in design (High Level Design), review with Enterprise Architecture, Solutions Architecture, Cyber Security and Cyber Assurance
  • Review of all security requirements and evidence provided by the project manager to support closure of each requirement:
  • Review and feedback on ISCA questionnaire
  • Review and feedback on High Level Design (HLD)
  • Present at ISCA Project Technical Review
  • Attend and obtain HLD sign-off at Technical Design Authority, Solutions Design Authority (SDA) and Data Intelligence and Analytics (DIA)
  • Obtain Third Party Risk Evaluation Platform (TPREP) scorecard for TP SaaS solutions from Security Contracts team
  • Obtain Minimum Technical Security Baseline compliance reporting from QualysGuard
  • Obtain Cloud Permit from Enterprise Architecture
  • Obtain Code Review and Analysis – in house solutions only from SCD
  • Self-serve vulnerability assessment compliance report of assets in scope
  • Liaise with Cyber Assurance on penetration testing of solution and obtain sign off
  • Obtain Digital Hub registration for external facing solutions from Cyber Assurance
  • Produce Project Security Assessment closure report
  • Perform a final review of all open security requirements and their status before any stage gate approval can be provided (effectively the Production Go/No-go decision). Ensure AXA XL SDLC agile, waterfall and infra waterfall processes are followed
  • Store all evidence in IS projects shared area
  • Update the project register daily to ensure project status is maintained and update the Project Security Assessment (PSA) template as a record of activity. Submit PSA for sign off to complete risk assessment
  • Manage project RAG status ensuring activities trending amber and red are highlighted to management and the project manager
  • Liaise with project manager to support the development of the risk acceptance (PM is responsible) where needed
  • Attend meetings with project manager, stakeholders, ISCA technical review, architectural design authorities and pen testing reviews. Challenge design decisions not compliant with security, escalate issues when they become known, offer options to resolv


REQUIREMENT SUMMARY

Min:N/AMax:5.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Software Engineering

Graduate

Computer science engineering or related field with a senior level of professional experience (required

Proficient

1

Ipswich, United Kingdom