Information Technology Security Officer - Sydney

Apply
  • Posting Date: 11-11-2019
  • Vacancy number: 23516

We are a global financial services firm with activities in over 25 countries and 85 of the world's securities exchanges.  We offer a broad range of products and services to professional market participants. We have offices around the world, operating in Sydney since 1998; other main offices are located in Hong Kong, Singapore, Tokyo, Sao Paulo, London, Amsterdam and Chicago.

The IT Security Officer role reports to the CIO and the GITSO and is based in our ABN AMRO Clearing Office in Sydney.  This role is a Permanent full time.

 

ROLE PURPOSE

 

  • Continuously improve the cyber security of IT by using industry best practices such as security and control frameworks
  • Knowing what needs to be secured and assessing the effectiveness & efficiency of the current preventive security controls
  • The implementation of preventive controls, where the minimum control level is defined by corporate policies, procedures and baselines the detection of security events as soon as possible after the events took place
  • Detect security events as soon as possible
  • Responding quickly and adequately to security events
  • Recovering from a security incident in a controlled and predictable way
  • Work closely with the global cyber security team based in Chicago and Amsterdam

 


RESPONSIBILITIES

 

  • Work with the LISO to develop a security program and security projects that address identified risks and business security requirements.
  • Maintaining and updating the security risk register and security reporting
  • Ensure security requirements are identified, designed and implemented
  • Manage the process of gathering, analysing and assessing the current and future threat landscape, as well as providing the CIO and GITSO with a realistic overview of risks and threats in the enterprise environment.
  • Encourage, consult and explain security related issues to (senior) stakeholders
  • Provide security communication, awareness and training for audiences, which may range from senior leaders to field staff. Manage security issues and incidents, and participate in problem and change management forums.
  • Ensure that security is factored into the evaluation, selection, installation and configuration of hardware, applications and software.
  • Ensure the implementation of technical controls to support and enforce defined security policies.
  • Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyse its impact on the existing environment; provide technical and managerial expertise for the administration of security tools.
  • Work with the global enterprise architecture team to ensure that there is a convergence of business, technical and security requirements; liaise with IT management to align existing technical installed base and skills with future architectural requirements.
  • Manage and coordinate operational components of cyber security of incident management, including detection (monitoring), response and reporting.
  • Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk.
  • Manage security projects and provide expert guidance on security matters for other IT projects.
  • Conduct assessments to evidence the effectiveness of IT security controls that are implemented on/in processes, procedures, software and hardware.
  • Oversight of and reporting on the use of Highly Priviledge Accounts (HPAs). Initiates and monitors periodical user access reviews for the IT owned systems.

 

TECHNICAL REQUIREMENTS

 

  • Knowledge of information management at a bachelors / masters level or equivalent work experience Information security management qualifications such as CISSP
  • Thread intelligence, network security, application security, incident response and vulnerability management.
  • In-depth knowledge of standard hard and software solutions (linux, windows, vmware, x86 servers, firewalls, routers, switches etc.)
  • Experience in enterprise application security and security for Cloud based systems
  • Experience with selecting, implementing and operating various security tools (SIEM, IAM, DLP, Splunk)
  • >7 years of IT experience, >5 years of experience in an information security role

 

ABN AMRO fosters a working environment for people who want to contribute to a culture of excellence. We make a difference with our expert employees, who are driven by a desire to continue developing. We have confidence in the professionalism and entrepreneurship of our employees.  We attract people who take their job and their talents very seriously, and in return we give employees the responsibility and the scope to excel in their role.  You will be working with a group of people who have the same drive and vision, but whose backgrounds and experience are as diverse as those of our clients. That is a way of ensuring that we exceed each other's expectations and continually grow. 

We are looking for an exceptional candidate who has a professional approach, is a subject matter expert and has demonstrated IT Security experience.  In return, we will offer you an attractive remuneration package, great employee benefits and the opportunity to work in a progressive and innovative working environment. 

 

If you think you are what we are looking for, please apply now and in your cover letter, please let us know how your experience fits the above criteria.

 

Applicants will only be contacted if they are successful for an interview.

 

NO AGENCIES PLEASE

Indication of Application Process

Step 1: Application

Fill out the information on the application form and upload your motivation letter and resume

Step 2: First interview

You will receive a confirmation of your application by e-mail. Within two weeks you will hear if you are invited for an interview

Step 3: Online assessment

You make an online cognitive test or an online assessment

Step 4: Second interview

You are invited for a second interview

Step 5: Job offer

You receive your job offer, once you have accepted it is time to start!

Related vacancies