Business Information Security Officer Ref: ZR

 

Recruiter:

Progressive IT Resourcing

Job Ref:

639580546

Date posted:

Wednesday, November 24, 2021

Location:

Bellville, South Africa


SUMMARY:
-

POSITION INFO:

Establish and manage a Business Information Security Programme, effective participation in Group Information Security Programme (GISP) initiatives, Information Security Incident response and Cyber Crisis Management, Information Security Governance and assurance, Application (including cloud) and Infrastructure Security, and Cybersecurity Education, Training and Awareness.
The BISO will implement processes and controls as agreed with the CISO and the Business CIO. The BISO will be responsible for quality and cost effectiveness of delivery of information security services in the BU and will report on these metrics to the GISP.

Cape Town, permanent

ROLE RESPONSIBILITIES

  • Regular feedback to Business Manco on Group-wide information security issues.
  • The BISO must have an action plan to implement these initiatives in the Business
  • The BISO will report to the GISP Manager on new initiatives, plans and progress which will be discussed at the Cyber Steering Committee.
  • Review and improve existing IT and Information Risk assessment, reporting and management practices.
  • Up to date and complete Business IT and Information Security Risk register.
  • Documented Security risk management action plan. This must include relative priorities of agreed actions; Ownership of the actions; Agree timelines. Priorities will be aligned to Business and GISP priorities.
  • Up to date and complete Business Cloud registers, if these services are used in the Business
  • Review and respond to Policies, Standards, Procedures and Guidelines and Risk Acceptance requests within the agreed time
  • Document processes and artefacts that prove that the relevant Governance and Assurance processes were implemented as designed
  • Clear and timely communication to management and users regarding planned group awareness campaigns
  • Risk assessment that identifies a requirement for additional awareness or targeted education, training and awareness interventions
  • Maintenance of Business/ Cluster and alignment with the Group annual security education, training and awareness plan
  • Documented Logical Access review schedule for Line of Business Applications, review results, facilitate resolution, progress report on resolution of issues that were identified during the reviews
  • Review and respond to audit findings related to application logical access and other Business specific Information Security findings. Ensure that the ratings are accurate
  • Provide management comment to the audit observations/ findings, that is specific as far as actions and due dates are concerned
  • Track and follow up on audit finding commitments
  • Report all cyber security incidents, or information security incidents (including privacy related incidents) where the compromise was through technology
  • Be contactable or provide alternative contact details for Cybersecurity incidents that are identified
  • Ensure appropriate actions are taken when policy breaches are identified in the Business.
  • Assist by facilitating engagement and communication with key stakeholders in the Cluster during a major incident.
  • Provide context on system and process criticality.
  • Produce Quarterly Group ISO Forum and GISP reports.
  • Provide input into requirements documents - ensure security roles; auditing; data protection (in transit and rest); monitoring etc. are defined in line with approved. Information Security policies and standards.
  • Ensure that Security ''gates'' are a formal part of the SDLC/ Agile/ relevant solution development methodology.
  • Interventions and role-players must be clearly specified.
  • Active participation in sanctioned industry bodies (e.g. ISF Live, ISACA).
  • Timeous escalation of new, high or escalating risks.
  • Engage with application owners and Group Cyber Security Centre Operations Team to ensure that system vulnerabilities are addressed that were identified during Penetration tests, Red Team exercises or Vulnerability scans. Ensure that the Business CIO’s are aware of risk and actions required.
  • Facilitate workshops and risk documentation during Control Self Assessments, or Crown Jewel Risk Assessment processes.

QUALIFICATIONS

  • Grade 12
  • Bachelor’s degree in Information Technology, Commerce, Science, or Social Science (preferable).
  • In force Information Security Certifications such as CISM, CISSP, CCSP, CISA, ISO 27000 Lead Implementer/ Auditor.

EXPERIENCE AND KNOWLEDGE

  • Experience in policy writing and reviews
  • Experience in Agile/ relevant solution development methodologies
  • Familiarity with security practices and standards in development like the security development life cycle (e.g. OWASP)
  • Understanding of the technical and application environment of the Cluster/ Business
  • Experience in analysis and control design, strong written and verbal communication skills
  • Knowledge of ISO27k, COBIT, ITIL, CIS and ISF best practices
  • Knowledge of Information Risk Methodologies (ideally ISF IRAM2), threat modelling and Operational Risk management methodologies
  • Knowledge of the key business processes, key stakeholders and have their contact details readily available
  • Understanding of the risk management and governance structures within the Cluster

 



 

NB! This job is now closed. You can apply for other jobs by uploading your CV.



 

 

 

Similar jobs you might be interested in:

Property Leasing Administrator
Location: Cape Town
Salary:
Today


Kafka Event Management Platform Engineer
Location: Cape Town
Salary:
2 days ago


Kafka Event Management Platform Engineer
Location: Cape Town
Salary: market related Monthly
Role:This is a technical Kafka Event Management support job.  This is for an Individual with Linux Certification and Integration and DEVSECOPS experience and some Coding background. Operational support is key and Standby and after-hours support will be expected. Manage and maintain Kafka Event Management platforms to ensure stability and continued high performance of said platforms and applic...
3 days ago


Senior Project Manager - (CONTRACT)
Location: Cape Town
Salary:
5 days ago


IT Risk Manager
Location: Cape Town
Salary:
7 days ago


IT Risk Manager
Location: Cape Town
Salary: market related Monthly
Role:The role of IT Risk Manager resides in the Governance, Risk and business Engagement function of our client that is responsible for Governance and IT Risk Management. The IT Risk Manager will be actively involved in defining, implementing and management of the IT Risk Management Framework and processes for our client. The IT Risk Manager will be involved in reporting on IT related risks i...
8 days ago


Agile Practice Lead
Location: Cape Town
Salary:
11 days ago


Database Administrator
Location: Cape Town
Salary: 1 Monthly
Database Administrator 
12 days ago


Database Administrator (DB2 LUW)
Location: Cape Town
Salary: market related Monthly
Role:The Database Administrator’s role is to design, support, monitor, maintain, and performance tune production databases while ensuring high levels of data availability. This individual is also responsible for developing, implementing, and overseeing database policies and procedures to ensure the integrity and availability and recoverability of databases and their accompanying software.&nb...
12 days ago


Kubernetes Platform Engineer
Location: Cape Town
Salary:
14 days ago


Create a free job alert for Business Information Security Officer Ref: ZR in Bellville

Enter your email address below and we will email you similar jobs when they become available:

You can cancel at any time. We will not spam you.
By giving us your email address your agree to our Terms and Conditions