You will partner with technology delivery teams to assure that security is properly built in to the technology during the design phase, and engage with development teams to educate them around secure designs and compliance with the Information Security Policy.
You will champion the use of NIS best practices and approved tools, perform security review as part of the application readiness review process (ARR), and provide consultation support on a variety of security related subjects.
You will work collaboratively with development, BISO and project management teams to drive the successful implementation of security controls, perform perimeter application reviews before launch, and produce solution design documents and ISP documents.
You will work collaboratively with application teams to ensure they are meeting internal firm security standards, and apply knowledge and understanding of the fundamentals of security in the cloud to; secure data at rest, secure data in motion, secure API's and perform encryption key management.
Your profile
You demonstrate extensive knowledge on understanding effective control implementation in the following domains:Application Security,Cloud & Services Hosting,Identity and Access Management, Data Protection, Borderless Connectivity,Endpoint Security and Cyber Security Operations.
You have extensive knowledge and understanding of migration or development experience in one of the major cloud platforms, possess extensive experience in security design review and recommendations and are conversant with ISO 27002:2005/2013 information security standards.
You have a working knowledge of user and data driven design approaches as well as understanding best practices for key management, demonstrating architectural domain knowledge including cloud application architecture and container-based deployment, and understanding established Software Development Lifecycles and methodologies including agile, scrum, iterative and waterfall.
You have the capacity to analyse Identity access management integration for projects to assure security, to identify complex security vulnerabilities and design compensatory controls and to analyse network security controls, including firewall and router security configuration.
You demonstrate the ability to collaborate with multiple stakeholders across functional and technical skill sets, work with developers and application architects to make IT security design recommendations, and ensure the effective design of security controls and solutions related to people, process, and technology are in place.
Trust to go aheader
Robert Jacsman
Recruitment Team
Tel. +41 58 792 16 24 At PwC we don't just go ahead with things that are important to us, we go one step further: we go aheader.
And we're ready to go ahead with you. Trust to go aheader with us and apply.
Do you have any questions? Give us a call, we are happy to help.