الوصف الوظيفي
Cybersecurity access:
Review all IT access by manual & automated processes, and then to document, track and manage all IT access.
Implement best secure access management practices such as least privilege or just-in-time access.
Establish IT access role catalogs for internal IT consultants, IT business users and IT vendors.
Establish IT risk access for all IT access role catalogs and follow IT risk process.
Minimize IT access risk where applicable and negotiate least privilege or just-in-time access.
Obtain IT & business owners approvals for prepared IT access role catalogs and IT risk access results.
Periodically share or present IT access role catalogs and IT risk access results to relevant stakeholders.
Perform continuous reviews.
IT Security Governance:
Assist in development of IT security access requirements in IT security policy.
Establish IT security access management procedures for all IT landscape to meet IT security policy requirements for all layers of access including systems, networks, applications, development and others.
Assist in development of RACI, KPIs, KRIs and resulting reports for access.
Compliance and Monitoring:
· Periodically perform user access reviews to ensure compliance of all IT access matrix.
IT Risk Management:
Establish IT access risk for all role catalogs.
Ensure compliance with IT risk framework.
Support in annual IT access risk assessment with all key stakeholders.
Support in preparing dynamic IT access risk scenarios as per alfanar business requirements.
Dynamically manage IT access risk process with inputs from day-to-day IT business issues, Tech&Ops;issues, IT auditors’ reports, IT security consultant’s IT security compliance and monitoring reviews.
Support in establishing IT access risk KPIs and KRIs.
Support in establishing IT access risk dashboard for different stakeholder requirements.
Support in establishing IT access risk reports as directed by IT security manager, IT management & ITMB.
Support in establishing providing input for IT access risk results into IT business continuity process.
IT Business Continuity:
Perform impact analysis for providing or removing IT access from users.
Synergies all options for IT access to have timely recovery operations as per BIA.
Assist IT BCP preparation to ensure IT access risk are managed and mitigated during all case scenarios.
Be active stakeholder in IT BCP testing and results discussions.
IT Security Consultancy:
· Review and provide guidance to GIT teams and business staff for IT access subject.
المهارات
Minimum Qualifications: Bachelor’s Degree in IT/Computer Science or related fields.
Minimum Certifications:
of the below is added advantage:
Certification or training in SAP GRC, SAP BASIS, SAP IAM
Certification or training in ISO27001 and ISO22301.
Risk certification or training such as ISO27005, ISO3000 and CRISC.
Infrastructure and networks related certifications or training such as Microsoft and CISCO.
Cloud related certifications or training such as Azure, AWS, CCSK, etc.
IT privileged access management certifications or training.
IT security related certifications such as CISM, CompTIA+ security, etc.
Minimum Experience: minimum 3+ Years’ experience in IT access management and overall 5-10 years of experience.
Generic Skills: Excellent documentation, presentation and communication skills.
تفاصيل الوظيفة
منطقة الوظيفة الرياض, المملكة العربية السعودية
قطاع الشركة التصنيع
طبيعة عمل الشركة صاحب عمل (القطاع الخاص)
الدور الوظيفي تكنولوجيا المعلومات
نوع التوظيف غير محدد
الراتب الشهري غير محدد
عدد الوظائف الشاغرة غير محدد
المرشح المفضل
المستوى المهني متوسط الخبرة
عدد سنوات الخبرة الحد الأدنى: 5 الحد الأقصى: 10
الشهادة بكالوريوس/ دبلوم عالي
https://www.bayt.com/ar/saudi-arabia/jobs/cybersecurity-access-specialist-4377524/