Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Mar 29, 2023
    Deadline: Not specified
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    Q-Sourcing Servtec Group is a global management consulting firm that helps people make significant improvements to their business performance and realize their most important career goals.
    Read more about this company

     

    QSSK-HC-IS-IT Support

    Job summary:

    The IT Support shall implement and continuously improve adequate technical and organizational measures following commonly accepted standards to manage the security of information and IT services and defend against cyber incidents (e.g., ISO 27001). Those measures shall satisfy the applicable requirements (depending on the services/products provided).

    DUTIES & RESPONSIBILITIES:

    • Define, document and implement adequate access control concepts based on business and security requirements, to prevent unauthorized access to our client.
    • Ensure that cryptography is used effectively to protect information.
    • Prevent unauthorized physical access, damage and interference (e.g. environmental threats) to information and information processing facilities required for the services.
    • Ensure correct and secure operations of information processing facilities and that operations are documented in operating procedures, including change controls, restricting access to operational software, backups & recovery, IT service continuity, capacity management and separation of operational from other IT environments.
    • Protect information and information processing facilities against malware with industry standard measures.
    • Log security events, protect them against tampering and analyze them to timely detect security incidents.
    • Manage technical vulnerabilities, including vulnerable identification (e.g., regular scans, penetration tests), risk assessment, remediation (including patching, hardening, restrictions of software installations etc.)
    • Manage IT networks to protect information in systems and applications (e.g., by firewalls, intrusion prevention systems, network segmentation)
    • Consider information security requirements right from the beginning when acquiring, developing or enhancing information systems/ software (security by design).
    • Develop information systems, ensure adequate information security measures within the development lifecycle of information systems/ software (e.g., change control procedures, secure coding, testing of security functionality, penetration testing).
    • Establish management responsibilities and procedures to ensure a quick, effective and orderly response to information security incidents.
    • Ensure the continuity of the contracted services during adverse situations, e.g., a crisis or disaster, by adequate organizational and technical measures.
    • Ensure that breaches of legal, statutory, regulatory, or contractual obligations related to information security and of any security requirements are avoided.
    • Regularly review technical and organizational measures to ensure that information security is implemented and operated as expected.

    KNOWLEDGE, SKILLS, AND EXPERIENCE:

    • Bachelor’s degree in computer science or any other Technical certification in related field.
    • Two or more years of related experience with computers and providing customer service in a technological environment.
    • Data processing training
    • Computer operations training
    • Experience in a multi-operation system

    Method of Application

    Interested and qualified? Go to Q-Sourcing Servtec Group on qsourcing.com to apply

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at Q-Sourcing Servtec Group Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail