Shared Services - Technical Security Architect
This job does not exist anymore.
Try running a new search or browse our vacancies.
Or fill in the form below to receive job alerts.
| Job Type | Contract |
| Area | City of London, England |
| Sector | Consultancy / IT |
| Salary | GBP 475 - 575 Day Rate |
| Advertiser | Eurobase People |
| Job Ref | 25322 |
| Job Views | 22 |
- Description
- Reporting to GTO UK Security, Risk & Quality Manager whose main responsibilities are to:
• Play an active part in projects and discussions relating to the security of the clients and its clients IT systems, covering business applications, voice and data systems, internet access and LAN/WAN networks.
• As and when required provide consultancy on all matters relating to IT security to both CGI and its clients, advising on industry best practice, security frameworks, including the design and monitoring of computer control systems which ensure the integrity and security of data.
• To provide input to contingency planning and risk management analysis, where required.
The candidate will need in-depth knowledge in own discipline and basic knowledge of related disciplines
Uses best practices and knowledge of internal and external business issues to improve processes
● Typically resolves complex problems or problems where precedent may not exist
● Often leads the work of small project teams; may formally train junior staff
● Works independently
Evaluates, tests, recommends, develops, coordinates, monitors and maintains information systems (IS) and cyber security policies, procedures and systems, including access management for hardware, firmware and software
Ensures that IS and cyber security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS and cyber security
Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security
Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents
Implements IS and cyber security policies and takes measures against intrusion, frauds, attacks or leaks



