Location: Dublin 15, (required to attend Meetings at client offices)
Contract / Permanent: FTC 12 Months, With further extension
Service Delivery
1. The nominated person would be required to attend Meetings at client offices. In addition, the nominated person would be required on an “on-call” basis for Ad Hoc calls during business hours.
2. It is envisioned that up to 8 days per month may be required, on average 2 days per week, but there is no commitment on minimum days.
Experience Level Required:
1. It is a mandatory requirement that the Resource proposed for this role has not less than 4 years relevant experience. Any other experience levels less than this will not be accepted.
2. It is a mandatory requirement that the Resource proposed hold the following qualifications or equivalents:
CISM (or equivalent), CISSP (or equivalent), or CCSP (or equivalent)
The following non-exhaustive list of Key Deliverables are applicable to this Role:
1. An initial review of the current environment and security framework to develop knowledge required to provide in context advice.
2. Creation of a defined IT security strategy and roadmap.
3. Lead the implementation of the agreed IT security strategy and roadmap.
4. Recommend improvements to the current security framework, security policies and cybersecurity strategy.
5. On-going advice and guidance in relation to information security and cybersecurity.
6. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements.
7. Assist with the selection of appropriate cybersecurity technologies, services, and solutions.
8. Provide thought leadership in cybersecurity.
9. Keep abreast of the latest cyber security trends, technologies, threats, and solutions in order to keep the organisation informed of developing threats and improvements to the security framework.
Requirements
The following Experience/Competencies/Skillsets are applicable to this Role. The proposed resource must have experience in performing and delivering the following:
1. NIST-CSF, CIS critical controls gaps and risk assessments.
2. Review of current security environment and security framework.
3. Creation of IT security strategy and roadmap.
4. Project management of the implementation of IT security strategy and roadmap.
5. Risk Assessment of Microsoft M365 Services.
6. Review, design and implement Incident response, business continuity and disaster recovery process.
7. Assessment of Threat and vulnerability management and patch management.
8. Information security controls implementation and maintenance.
9. Development and management of IT Risk Register.
#J-18808-Ljbffr