Agencja zatrudnienia nr licencji 3260
Find your own at devire.pl
Location: Wrocław
As a truly worldwide organization, Company spans all geographies, practices, service lines, sectors and competencies with deeply-integrated services. With 20,000 people working from nine centres in five countries, Company is online everywhere, helping deliver exceptional client service all the time; providing what you need, where you need it.
Company office in Poland has been in operation since 2011, supporting 30 countries across 12 services in English and non-English languages. Join one of our innovative and highly skilled teams and gain valuable experiences that will last a lifetime.
IT Services is a global organization that works with our internal clients, to provide IT support and solution to client teams, internal support functions and global projects and programs. Over the next few years, Company will increase the number of IT professionals in its center to develop and support Company business and internal applications. These professionals include IT project managers, business analysts, software architects, infrastructure engineers.
IT Services team maintains and enhances Company IT infrastructure and works for our internal clients across the globe. You will work with Company locations, supporting our service lines and key business processes or be part a dedicated IT team handling cross-organizational initiatives and transformational projects.
•English language skills - excellent written and verbal communication
•Five or more years of experience in an Information Security or Information Technology discipline with demonstrated experience in one or more the following:
•Experience providing and validating security requirements related to cloud security for private, public and hybrid
•Experience with one or more of the cloud technologies - Microsoft Azure, Rackspace, AWS, or Softlayer
•Experience with providing security controls for global deployments, preferably in cloud environments
•Experience providing and validating security requirements related to information system design and implementation
•Experience providing and validating security requirements related to a broad range of operating systems and databases
•Experience conducting risk assessments, vulnerability assessments, vendor and third party risk assessments and recommending risk remediation strategies
•Experience in the use of tools and methods to identify security exposures and business risks
•Knowledge of common information security standards, such as: ISO 27001/27002, NIST, PCI DSS, ITIL, COBIT
•Knowledge of OWASP top 10 and remediation’s of attacks against web applications. The ability to convey the risks to IT and business stakeholders
•Knowledge of Cloud Security Alliance’ cloud security controls
•Familiarity with information system attack methods and vulnerabilities
•Working experience with the design and engineering of web-based multi-tier information systems and architecture design
•Working experience with web technologies, application firewalls and programming languages
•Working experience with operating systems and database platforms
•Working experience with mobile applications and mobile enterprise application platforms
•Working experience with more than one of these technologies, i.e. Java, .NET, Oracle, SQL, C++, webSphere, Sharepoint, IIS, Apache, etc.
•Working experience of Exchange Server Roles and RBAC model
•Contact of employment
•Fair salary
•Relocation package
•Participating in interesting projects
•Work in a professional, dynamic, truly global team
•Development opportunities in international multilingual environment
•Attractive social package (sport card, medical insurance, life insurance, wellness & spa program, sport events and many others)
•Language courses
•Modern office space near market square
•Home office up to 3 days per week
•Define and provide pragmatic security guidance that balance business benefit and risks in both on premise and cloud based systems (applications and infrastructure)
•Engage IT project teams involved in developing cloud based application, throughout the SDLC to identify and prioritize applicable security controls and provide guidance on how to implement these controls
•Perform risk assessments of information systems and infrastructure
•Maintain and enhance the Information Security risk assessment methodology
•Develop appropriate risk treatment and mitigation options to address security risks identified during security review or audit
•Translate technical vulnerabilities into business risk terminology for business units and recommend corrective actions to customers and project stake-holders
•Provide knowledge sharing and technical assistance to other team members in the area of cloud security
•Act as Subject Matter Expert (SME) in applying and evaluating loud security capabilities and have deep technical understanding of responsible portfolios