Senior Security Consultant

IAM / AD / ITAM / SW Development

Senior Security Consultant IAM AD ITAM SW Development

Projects to review and advise on are for example:

  • IT Asset Management (Design and implement tool-based, automated and global IT asset management, identify all IT assets, define use case to disconnect unregistered assets)
  • Identity & Access Management (Design and implement enterprise-wide Identity Management tool-based solution for internal, external and non-personal identities)
  • Improved AD Security (de-activate outdated active directories and design and implement new AD security concept)
  • Secure Development Lifecycle

Senior Security Consultant

Cloud & Digital Security / Security Assurance / Vulnerability Management

 

Senior Security Consultant Cloud & Digital SecurityProjects to review and advise on are for example:

  • Patch Management (Implement processes incl. responsibility split department-supplier, design Use Case to disconnect non-compliant assets).
  • Vulnerability Management (Implement process,incl. KPI-definition and monitoring, implement solution for vulnerability scanning).
  • Security Assurance & Framework (Implement end-to-end pentesting-processes that include alignment on cross-departmental responsibilities).
  • Cloud & Digital Security (Design concepts and requirements for use of cloud services and implement monitoring activities).
  • Provider Security Framework (Implement monitoring activities and process to ensure third party suppliers follow security requirements).
  • Compliance monitoring (Design and implement monitoring on users and systems)

Senior Security Consultant

Networks & Servers & Endpoint Security / Perimeter Device Protection

Senior Security Consultant Networks & Servers & Endpoint Security

Projects to review and advise on are for example:

  • Special Networks Security (Identify and classify special networks, integrate these networks in IT Asset management process and implement additional technological measures)
  • Secure Server & Client Admin Concept (Design and implement enterprise-wide admin concepts and processes to increase security in data centers and on all servers)
  • Endpoint Security (DWP and mobile devices)
  • SOC improvement (Increase detection capabilities on existing and develop capabilities on new IT systems and OT environment, global rollout of detection agents, increase incident response and incident management capabilities)
  • Cross-Platform File Encryption (Implement process and tool to automatically encrypt all "files in rest", replace existing SGLC (Safeguard Lan Crypt) with fitting new tool)
  • Perimeter Device Protection

Senior Security

Consultant / Transformation Lead

Senior Security Consultant / Transformation Lead

Role specific requirements:

  • Project structure and design, approach, requirements, scope, deliverables, dependencies, risks, etc.
  • Solutions and working methods that are being considered.
  • Advise in project risk/issue management and the organizing of risk/issue mitigation and reduction.
  • Coach your team in their efforts to effectively address the escalation items, attention points and decision/acceptance requests.
  • Develop collective knowledge and understanding on the project content amongst stakeholder.
  • Support prioritization of activities on project level when requested.
  • Assist on project reporting.

 >> view more information <<

Security Professional/Architect

CISSP, CEH, OSCP, CCNP/CCIE, TOGAF, ITIL

Security Professional/Architect

Role specific requirements:

  • Fluent English language, eventually minimum Europass C1 level. Czech and German languages are welcome
  • Experience in cyber security areas – crypto, identity/access, cyber hacking, etc.
  • Experience in various ICT areas – operating systems, networks, databases, application frameworks, etc.
  • Experience with enterprise level cyber security and ICT.
  • Experience in consulting is welcome
  • The following certifications are welcome: CISSP, CEH, OSCP, CCNP/CCIE, TOGAF, ITIL, etc.
  • Creativity skills backed with technical knowledge
  • Consistency in work
  • Representative communication and behavior

Security Auditor

CISA, CISM, CISSP

Security Auditor

Role specific requirements:

  • Minimum of Master’s degree from accredited university
  • Fluent English language, eventually minimum Europass C1 level. Czech and German languages are welcome
  • Experience in standards and compliance – e.g. ISO27001, PCI DSS, FISMA, BaFin, EU Critical Infrastructure, Cyber and data protection regulations in different countries (EU, USA, Russia, China, Switzerland, Saudi Arabia, etc.)
  • Knowledge of cyber security areas is welcome
  • Knowledge of various ICT areas is welcome
  • Experience in audit is welcome
  • The following certifications are welcome: CISA, CISM, CISSP, etc.
  • Representative communication and behavior

 >> view more information <<

Security Governance Architect/Manager

CISM, PRINCE2, PMP, TOGAF, COBIT

Security Governance Architect/Manager

Role specific requirements:

  • Minimum of Master’s degree from accredited university
  • Fluent English language, eventually minimum Europass C1 level. Czech and German languages are welcome
  • Strong understanding of security governance, risk management and compliance.
  • Strong experience in standards and compliance – e.g. ISO27001, PCI DSS, FISMA, BaFin, EU Critical Infrastructure, Cyber and data protection regulations in different countries (EU, USA, Russia, China, Switzerland, Saudi Arabia, etc.)
  • Project management or Security Operations experience
  • Knowledge of cyber security areas is welcome
  • Knowledge of various ICT areas – operating systems, networks, databases, application frameworks, etc.
  • Hands on experience with enterprise level cyber security and ICT at least at basic level
  • Leadership is welcome
  • The following certifications are welcome: CISM, PRINCE2, PMP, TOGAF, COBIT, etc.
  • Representative communication and behavior