Responsibilities:
Broad knowledge of IT systems (HW, SW, and data flows)
Good knowledge of a variety of cyber related services. It is understood that each candidate will cover some, but not all of the items below.
- Asset Management, including asset discovery
- Cyber Threat Intelligence
- Risk Management, including Supply Chain (3rd Party) Risk Management
- Vulnerability Management and Remediation
- Endpoint Protection (Defender, McAfee)
- Endpoint Detection and Response (Secureworks Redcloak, Palo Alto XDR)
- Privileged Access Management (Secret Server)
- Identity Management and Access Control
- MFA for privileged accounts (Safenet currently used for external MFA)
- Security Operations Center interaction with customer (GB uses Secureworks Taegis XDR)
- Measurement of Security KPIs
- Cybersecurity Awareness Training (Proofpoint)
- Simulated Phishing Campaigns (Proofpoint)
- Planning and organizing cyber table top exercises
- Secure Configuration Standards
- Implementing data in motion encryption
- Penetration test design and followup
- Incident Response Playbooks
- Participate and lead incident response
- Frame and organize business impact analysis
- Business Continuity Planning and testing