you’ll do:
The Cyber Security Account Manager plays a pivotal role in fostering strong
join their team on a permanent basis Security Auditing Risk management Incident Investigation Responsible Logical Access Management Security, CISSP - beneficial Vulnerability Management Salary Market Related
chain . Reporting into the OMF Information Security Risk Manager, essential in providing oversight, monitoring management. Reporting into the OMF Information Security Risk Manager, this role also provides specialist assistance effective functioning of OMF's Information Security Management System (ISMS). Assists business unit management information security policies as per the OMF risk requirements. Ensures that risk management processes embed risk management and information security. Challenge management where deemed appropriate and express
Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web, and Email Security Operations (Security, CISSP will be beneficial) Vulnerability Management (use of well-known vulnerability CVSS scores) Knowledge and Skills: Security Auditing. Risk management. Incident Investigation. Reporting Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web, and Email Security Operations (Security, CISSP will be beneficial) Vulnerability Management (use of well-known vulnerability
Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web and Email Security Operations (Security, CISSP will be beneficial) Vulnerability Management (use of well-known vulnerability CVSS scores) Knowledge and Skills Security Auditing Risk management Incident Investigation Reporting and
Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web, and Email Security Operations (Security+, CISSP will be beneficial)
general controls, access security, change control, configuration management, IT back-up and continuity
continuity, and IT service and security management (infrastructure security, network security, application security
data security as well as end user security)
• Build and manage relationships with IT stakeholders
include architecture design, system testing, security management, and second-line support. Requirements include
training protocols.
companys promotional cycle.