Full Job Description
As the Security Advisor your role will be to act as the central point for all metric related activities such as metric collation, creation and ongoing support in line with the firm’s IAM policies and standards. The metrics need to be produced at the firm-wide level as well as the individual Line of Business/Function level. Also, the production of these metrics must be designed in a matter that is sustainable and scalable. These metrics will be shared with Senior Management – risks associated with Identity and Access management must be highlighted by the metrics. You will also partner with the broader Cybersecurity Governance and Control teams to ensure alignment on strategy and roadmap.
Key Responsibilities
- Lead the production of key documents including business requirements, UX wireframes, test scenarios and acceptance criteria.
- Work with business and development teams to design, document, and deliver dashboards, alerts, and reports.
- Educate and train customers to use the data as an analytical tool, displaying the information in new forms and content for analysis exploration.
- Interface with members of your scrum team, and line of business product teams, business analysts to ensure prioritization of key business needs.
- Work with scrum team to test and certify metrics and dashboards before they are deployed to production.
- Own the development vision, strategy and quarterly plan and ground delivery measurable metrics.
- Actively manage the JIRA backlog defining user stories and acceptance criteria and refining with the team
- Work with Developers and Subject Matter Experts to understand the work effort for a requirement, and, managing cross dependencies across teams to ensure alignment, as well as adjusting team directions when gaps exist
- Triage new requests and production issues
- Actively participate in adding to Confluence that is living documentation of the latest business and technical requirements
- Be responsible for delivery world class user experiences that provide actionable insights and integrated remediation steps.
Qualifications
Required Qualifications:- Bachelor’s degree or equivalent cyber security training.
- Experience in a technical support/helpdesk environment.
- Trained in latest Cyber Security threat vectors.
- Trained in managing security incidents that involve privacy.
Preferred Qualifications:- Has solid experience or training in working in a Security Operation Center
- Has previous experience or training in performing Digital Forensics and Incident Response.
- A degree in an applicable subject, such as; Cyber Security or Computer Science. Cyber security training will be accepted in lieu of degree
- Trained in responding to, investigating, and recovering from compromise and data breach events.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. In accordance with applicable law, we make reasonable accommodations for applicants’ and employees’ religious practices and beliefs, as well as any mental health or physical disability needs.Equal Opportunity Employer/Disability/Veterans
As the Security Advisor your role will be to act as the central point for all metric related activities such as metric collation, creation and ongoing support in line with the firm’s IAM policies and standards. The metrics need to be produced at the firm-wide level as well as the individual Line of Business/Function level. Also, the production of these metrics must be designed in a matter that is sustainable and scalable. These metrics will be shared with Senior Management – risks associated with Identity and Access management must be highlighted by the metrics. You will also partner with the broader Cybersecurity Governance and Control teams to ensure alignment on strategy and roadmap.
Key Responsibilities
- Lead the production of key documents including business requirements, UX wireframes, test scenarios and acceptance criteria.
- Work with business and development teams to design, document, and deliver dashboards, alerts, and reports.
- Educate and train customers to use the data as an analytical tool, displaying the information in new forms and content for analysis exploration.
- Interface with members of your scrum team, and line of business product teams, business analysts to ensure prioritization of key business needs.
- Work with scrum team to test and certify metrics and dashboards before they are deployed to production.
- Own the development vision, strategy and quarterly plan and ground delivery measurable metrics.
- Actively manage the JIRA backlog defining user stories and acceptance criteria and refining with the team
- Work with Developers and Subject Matter Experts to understand the work effort for a requirement, and, managing cross dependencies across teams to ensure alignment, as well as adjusting team directions when gaps exist
- Triage new requests and production issues
- Actively participate in adding to Confluence that is living documentation of the latest business and technical requirements
- Be responsible for delivery world class user experiences that provide actionable insights and integrated remediation steps.
Qualifications
Required Qualifications:- Bachelor’s degree or equivalent cyber security training.
- Experience in a technical support/helpdesk environment.
- Trained in latest Cyber Security threat vectors.
- Trained in managing security incidents that involve privacy.
Preferred Qualifications:- Has solid experience or training in working in a Security Operation Center
- Has previous experience or training in performing Digital Forensics and Incident Response.
- A degree in an applicable subject, such as; Cyber Security or Computer Science. Cyber security training will be accepted in lieu of degree
- Trained in responding to, investigating, and recovering from compromise and data breach events.
To apply for this job email your details to recruit@cysecon.com