Senior Specialist, Agile Security and Risk Management Assessment at XL Catlin
Ipswich, England, United Kingdom -
Full Time


Start Date

Immediate

Expiry Date

21 Mar, 25

Salary

0.0

Posted On

19 Nov, 24

Experience

0 year(s) or above

Remote Job

No

Telecommute

No

Sponsor Visa

No

Skills

Microsoft Office, Excel, Cissp, It, Powerpoint, Information Security, Security Risk, Giac, Access, Computer Science, English, Ethnicity

Industry

Information Technology/IT

Description

SHARE YOUR TALENT

We’re looking for someone who has these abilities and skills:

  • Bachelor’s degree in computer science, Engineering, or related field with a senior level of professional experience (Required)
  • Established knowledge of performing project risk assessments (Required)
  • Experience in performing Information Security technical risk assessments (Required)
  • Proficient in information security risk and governance frameworks (ISO 27005, EBIOS)
  • Expert analytical and reporting skills (Required)
  • Expert in Microsoft Office (Word, Excel, PowerPoint, Access) (Required)
  • Ability to effectively communicate and positively influence diverse stakeholders and team members (Required)
  • Excellent attention to detail and the ability to create clear, concise, and engaging presentations (Required)
  • Fluent in English (Required)
  • Information Security and /or Information Technology industry certification (CISSP, CISM, CRISC, GIAC, CISSP or equivalent) (Required)
  • Experience in articulating IS risks in business language and advising on the appropriate risk management action
  • Experience in information security management reporting and related methodologies
  • Experience in multinational companies (Preferred)
Responsibilities
  • Review submission of IS Criticality Assessment (ISCA) questionnaire (ISCA Dashboard)
  • Determine high level security requirements and project criticality, based on standard project activities and data classification from DP pre-screening
  • Work with assigned architect to ensure security requirements are finalized in design (High Level Design), review with Enterprise Architecture, Solutions Architecture, Cyber Security and Cyber Assurance
  • Review of all security requirements and evidence provided by the project manager to support closure of each requirement:
  • Review and feedback on ISCA questionnaire
  • Review and feedback on High Level Design (HLD)
  • Present at ISCA Project Technical Review
  • Attend and obtain HLD sign-off at Technical Design Authority, Solutions Design Authority (SDA) and Data Intelligence and Analytics (DIA)
  • Obtain Third Party Risk Evaluation Platform (TPREP) scorecard for TP SaaS solutions from Security Contracts team
  • Obtain Minimum Technical Security Baseline compliance reporting from QualysGuard
  • Obtain Cloud Permit from Enterprise Architecture
  • Obtain Code Review and Analysis – in house solutions only from SCD
  • Self-serve vulnerability assessment compliance report of assets in scope
  • Liaise with Cyber Assurance on penetration testing of solution and obtain sign off
  • Obtain Digital Hub registration for external facing solutions from Cyber Assurance
  • Produce Project Security Assessment closure report
  • Perform a final review of all open security requirements and their status before any stage gate approval can be provided (effectively the Production Go/No-go decision). Ensure AXA XL SDLC agile, waterfall and infra waterfall processes are followed
  • Store all evidence in IS projects shared area
  • Update the project register daily to ensure project status is maintained and update the Project Security Assessment (PSA) template as a record of activity. Submit PSA for sign off to complete risk assessment
  • Manage project RAG status ensuring activities trending amber and red are highlighted to management and the project manager
  • Liaise with project manager to support the development of the risk acceptance (PM is responsible) where needed
  • Attend meetings with project manager, stakeholders, ISCA technical review, architectural design authorities and pen testing reviews. Challenge design decisions not compliant with security, escalate issues when they become known, offer options to resolv
Loading...