Cyber Security Manager
Main responsibilities for the roles are:
- Analyse and correlate information security events to identify appropriate event handling actions.
- Assess operational and implementation costs and evaluate them against the potential business impact if the policies and controls are not implemented.
- Assess the effectiveness of the measures against security risk management plan.
- Develop IT security policy and operational procedures based on information collected.
- Develop a documented action plan containing policies, practices and procedures that mitigate the identified risks.
- Document information related to IT security attacks, threats, risks and controls.
- Establish a standard methodology for performing security tests in accordance with security requirements.
- Establish review procedures based on organisation's security risk management plan.
- Evaluate effectiveness of current incident response plan against industry good practices.
- Evaluate response plans periodically to ensure relevance.
- Identify threats and risks that are relevant to organisation's operations and systems.
- Monitor the effectiveness of action plans in addressing information risks.
- Maintain the DevSecOps pipeline and gates from security side.
- Obtain corporate management's endorsement of security policies, standards, and procedures by articulating cost and benefits.
- Perform comparative analysis of security service performance level parameters against security information sources.
- Prepare information security performance report based on results from analysis and correlation of information security events.
- Rate and categorise potential security incidents.
- Recommend suitable enhancements to improve information security performance.
- Review business and security environment to identify existing requirements.
- Review security policies, standards, and procedures by considering the threats identified and other information collected.
- Test incident response plans periodically to ensure response times and executed procedures are acceptable.
- Test Cyber Defence preparedness for the organization
Didn’t find the job appropriate? Report this Job
Download the iimjobs app to
apply for jobs anywhere, anytime
Download on
App Store
Get it on
Google Play
Scan to Download