• Leads the design, implementation, operation and maintenance of the Information Security Management System based on an industry standard.
• Leads or facilitates the preparation and implementation of necessary information security policies, standards, procedures and guidelines.
• Leads the design and operation of related compliance monitoring and improvement activities to ensure compliance both with internal security policies etc. and applicable laws and regulations.
• Leads or facilitates suitable information security awareness, training, educational activities, security risk assessments, controls selection activities and value add security monitoring solutions, processes and metrics.
• Establishing cost-efficient risk based information security services and solutions that effectively manage risks to the business
• Designing and conducting security assessments or audits.
• Defining, implementing and managing security policy, standards and procedures.
• Vendor selection and negotiation for information security related solutions
• Managing incident response and incident management
• Vulnerability Management program development and operations.
• Security Architecture review and design
• Vulnerability & Threat Detection & Prevention
• Leads the design, implementation, operation and maintenance of the Information Security Management System based on an industry standard. • Leads or facilitates the preparation and implementation of necessary information security policies, standards, procedures and guidelines. • Leads the design and operation of related compliance monitoring and improvement activities to ensure compliance both with internal security policies etc. and applicable laws and regulations. • Leads or facilitates suitable information security awareness, training, educational activities, security risk assessments, controls selection activities and value add security monitoring solutions, processes and metrics. • Establishing cost-efficient risk based information security services and solutions that effectively manage risks to the business • Designing and conducting security assessments or audits. • Defining, implementing and managing security policy, standards and procedures. • Vendor selection and negotiation for information security related solutions • Managing incident response and incident management • Vulnerability Management program development and operations. • Security Architecture review and design • Vulnerability & Threat Detection & Prevention
การแปล กรุณารอสักครู่..
