Job Description:
1. Firewall Rule & Network Security Review
- Review and approve firewall and security-tool change requests from an information security perspective.
- Ensure firewall rule changes comply with organizational policies security baselines and risk mitigation controls.
- Conduct impact assessments for proposed network security changes.
2. Access Management (IAC)
- Assess and approve global IAC access requests (Internet Access Control).
- Evaluate requests to prevent data leakage unauthorized external transfers and connections to malicious or high-risk sites.
- Ensure access is granted based on the principle of least privilege and business justification.
3. Cyber Security Advisory
- Act as the Single Point of Contact (SPOC) for business and user queries.
- Provide advisory support on infrastructure cloud software integration data transfer and exceptional security scenarios.
- Coordinate with cross-functional teams to resolve security-related issues and provide risk-based recommendations.
4. Security Governance & Compliance
- Ensure compliance with global cybersecurity policies standards and procedures.
- Support adherence to data protection regulations and industry best practices across regions.
- Participate in periodic audits assessments and compliance reporting activities.
Job Description: 1. Firewall Rule & Network Security Review Review and approve firewall and security-tool change requests from an information security perspective. Ensure firewall rule changes comply with organizational policies security baselines and risk mitigation controls. Conduct impact as...
Job Description:
1. Firewall Rule & Network Security Review
- Review and approve firewall and security-tool change requests from an information security perspective.
- Ensure firewall rule changes comply with organizational policies security baselines and risk mitigation controls.
- Conduct impact assessments for proposed network security changes.
2. Access Management (IAC)
- Assess and approve global IAC access requests (Internet Access Control).
- Evaluate requests to prevent data leakage unauthorized external transfers and connections to malicious or high-risk sites.
- Ensure access is granted based on the principle of least privilege and business justification.
3. Cyber Security Advisory
- Act as the Single Point of Contact (SPOC) for business and user queries.
- Provide advisory support on infrastructure cloud software integration data transfer and exceptional security scenarios.
- Coordinate with cross-functional teams to resolve security-related issues and provide risk-based recommendations.
4. Security Governance & Compliance
- Ensure compliance with global cybersecurity policies standards and procedures.
- Support adherence to data protection regulations and industry best practices across regions.
- Participate in periodic audits assessments and compliance reporting activities.
View more
View less