āđāļŠāļāļāļāļĨ 1 - 2 āļāļģāđāļŦāļāđāļāļāļēāļ āļāļēāļāļāļąāđāļāļŦāļĄāļ 2 āļāļģāđāļŦāļāđāļāļāļēāļ
āļāļĩāđāļĄāļĩāļāļģāļ§āđāļē client solutions officer
āđāļĢāļĩāļĒāļāļāļēāļĄ
āļāļĢāļļāļāļēāđāļĨāļ·āļāļ
- No elements found. Consider changing the search query.
āļāļąāļāđāļŦāļĨāļāđāļĢāļāļđāđāļĄāđāļāļāļāļāļļāļ AI āļāļāļāđāļĢāļēāļāļ°āļ§āļīāđāļāļĢāļēāļ°āļŦāđāđāļĨāļ°āđāļāļ°āļāļģāļāļģāđāļŦāļāđāļāļāļēāļāļāļĩāđāļāļĩāļāļĩāđāļŠāļļāļāđāļŦāđāļāļļāļ
āļāļĢāļļāļāđāļāļ, āļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒ
,āļāļĩāđāļāļĢāļķāļāļĐāļē
āļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒ,āļāļĩāđāļāļĢāļķāļāļĐāļē
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Legal, Compliance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design and work on cybersecurity framework based on business objectives and strategic imperatives of the client organisation including goals, vision, mission, and operational plans.
- Data pattern and trend identification via metric analysis, driving operational excellence and improvement.
- Designing and implementing data protection and privacy programs for our clients and supporting their business.
- Evaluating the data protection and privacy practices of our clients and Conducting Privacy Impact Assessments.
- Monitor processes and drive improvements in efficiency and quality of cybersecurity programs.
- Assist in development of workflows for transitioning strategic plans into implementation plans and operational readiness.
- Facilitate strategic planning initiatives, documentation, technical roadmaps and security tool rationalisation.
- Assist in designing the security organisation structure including cyber defense.
- Develop security policies, procedures, standards based on the security strategy and roadmap.
- Review of cybersecurity policies and processes to identify gaps in design of control based on comprehensive assessment framework.
- Maintain continuous communication with key stakeholders in support of the security strategy, and plan and solicit feedbacks, to uplift the programs and capabilities.
- Conduct security process implementation reviews to assess security effectiveness and reporting.
- Conduct Current State Assessment of cybersecurity practices against the defined controls and provide recommendations for to-be state.
- Run Cyber Security Diagnostic Assessments and develop programs for cybersecurity skill development and enhancement.
- Provide certification advisory across Information Security Management System (ISMS).
- Implement security controls for realisation of the certification requirements and provide technology roadmap based on the security strategy.
- Assisting in delivering privacy projects to acting as a subject matter expert on them or to leading a team towards excellent client experience.
- Supporting and guiding our clients in adhering to the complex web of relevant national and international regulations (e.g. EU General Data Protection Regulation).
- Deploying processes and tools to help detect and prevent privacy breaches.
- Ensuring a harmonised approach towards data protection and privacy by bringing together our client s stakeholders (e.g. legal, compliance, risk, HR, security, business functions).
- Assisting clients in privacy related incident response activities.
- Supporting the client s team by acting as an interim team member (e.g. data protection officer, security officer, security manager, security analyst).
- Proactively identifying and pursuing opportunities for further business and team growth.
- Preferred skills.
- Bachelor s degree in Computer Science, Information Systems, Information Technology, Engineering, or equivalent education.
- Minimum 4 - 5 years of prior relevant working experience.
- Experience with vulnerability scanning solutions and cybersecurity systems.
- Possession of relevant qualifications such as CIPM, CIPT, CIPP/E, CISM, CISSP, and/or HCISSP, as well as involvement in industry related organizations (e.g. IAPP, ISACA, (ISC)Âē ) or relevant certifications.
- Strong interpersonal and stakeholder management skills with ability to coordinate between technical and business teams.
- Excellent verbal, written communication and interpersonal skills with stakeholders at all levels.
- Knowledge and experience with relevant data protection and privacy laws and regulations (e.g. PDPA, EU GDPR, and Privacy Shield) and industry standards and frameworks, such as GAPP and BCR.
- Ability to efficiently understand client organisations and their business model and to tailor relevant processes to privacy requirements.
- An analytical mindset, strive for quality and are able to work in a result-oriented environment.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Bachelor Degree Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- December 31, 2024
3 āļ§āļąāļāļāļĩāđāļāđāļēāļāļĄāļē
āļāļđāđāļāļīāđāļĄāđāļāļīāļĄkeyboard_arrow_down
āļāļąāļāļāļķāļ
āļĒāļāđāļĨāļīāļ
āļāļĢāļļāļāđāļāļ, āļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒ
,āļāļēāļĢāļāļąāļāļāļēāļĢ
āļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒ,āļāļēāļĢāļāļąāļāļāļēāļĢ
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Legal, Compliance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design and work on cybersecurity framework based on business objectives and strategic imperatives of the client organisation including goals, vision, mission, and operational plans.
- Data pattern and trend identification via metric analysis, driving operational excellence and improvement.
- Designing and implementing data protection and privacy programs for our clients and supporting their business.
- Evaluating the data protection and privacy practices of our clients and Conducting Privacy Impact Assessments.
- Monitor processes and drive improvements in efficiency and quality of cybersecurity programs.
- Assist in development of workflows for transitioning strategic plans into implementation plans and operational readiness.
- Facilitate strategic planning initiatives, documentation, technical roadmaps and security tool rationalisation.
- Assist in designing the security organisation structure including cyber defense.
- Develop security policies, procedures, standards based on the security strategy and roadmap.
- Review of cybersecurity policies and processes to identify gaps in design of control based on comprehensive assessment framework.
- Maintain continuous communication with key stakeholders in support of the security strategy, and plan and solicit feedbacks, to uplift the programs and capabilities.
- Conduct security process implementation reviews to assess security effectiveness and reporting.
- Conduct Current State Assessment of cybersecurity practices against the defined controls and provide recommendations for to-be state.
- Run Cyber Security Diagnostic Assessments and develop programs for cybersecurity skill development and enhancement.
- Provide certification advisory across Information Security Management System (ISMS).
- Implement security controls for realisation of the certification requirements and provide technology roadmap based on the security strategy.
- Assisting in delivering privacy projects to acting as a subject matter expert on them or to leading a team towards excellent client experience.
- Supporting and guiding our clients in adhering to the complex web of relevant national and international regulations (e.g. EU General Data Protection Regulation).
- Deploying processes and tools to help detect and prevent privacy breaches.
- Ensuring a harmonised approach towards data protection and privacy by bringing together our client s stakeholders (e.g. legal, compliance, risk, HR, security, business functions).
- Assisting clients in privacy related incident response activities.
- Supporting the client s team by acting as an interim team member (e.g. data protection officer, security officer, security manager, security analyst).
- Proactively identifying and pursuing opportunities for further business and team growth.
- Preferred skills.
- Bachelor s degree in Computer Science, Information Systems, Information Technology, Engineering, or equivalent education.
- Minimum 4 - 5 years of prior relevant working experience.
- Experience with vulnerability scanning solutions and cybersecurity systems.
- Possession of relevant qualifications such as CIPM, CIPT, CIPP/E, CISM, CISSP, and/or HCISSP, as well as involvement in industry related organizations (e.g. IAPP, ISACA, (ISC)Âē ) or relevant certifications.
- Strong interpersonal and stakeholder management skills with ability to coordinate between technical and business teams.
- Excellent verbal, written communication and interpersonal skills with stakeholders at all levels.
- Knowledge and experience with relevant data protection and privacy laws and regulations (e.g. PDPA, EU GDPR, and Privacy Shield) and industry standards and frameworks, such as GAPP and BCR.
- Ability to efficiently understand client organisations and their business model and to tailor relevant processes to privacy requirements.
- An analytical mindset, strive for quality and are able to work in a result-oriented environment.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Bachelor Degree Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- December 31, 2024
11 āļ§āļąāļāļāļĩāđāļāđāļēāļāļĄāļē
āļāļđāđāļāļīāđāļĄāđāļāļīāļĄkeyboard_arrow_down
āļāļąāļāļāļķāļ
āļĒāļāđāļĨāļīāļ
āļŠāđāļāđāļāđāļāđāļāļ·āļāļāļāļēāļāđāļŦāļĄāđāļĨāđāļēāļŠāļļāļāļŠāļģāļŦāļĢāļąāļclient solutions officer
- 1
āļĒāļāļāļāļīāļĒāļĄ
āļĨāļāļāļāļģ 5 āļŠāļīāđāļāļāļĩāđāļŦāļĨāļąāļāđāļĨāļīāļāļāļēāļ āļāļĩāļ§āļīāļāļāļļāļāļāļ°āđāļāļĨāļĩāđāļĒāļāđāļāļāļĨāļāļāļāļēāļĨ
āļāļģāđāļāļ°āļāļģāļāđāļēāļāļāļēāļāļĩāļāļāļĢāļīāļĐāļąāļ 7 āđāļāļāļāļĩāđāļāļļāļāđāļĄāđāļāļ§āļĢāļāļģāļāļēāļāļāđāļ§āļĒ
āļāļģāđāļāļ°āļāļģāļāļēāļĢāļŦāļēāļāļēāļāđāļāļīāļāđāļāļĨāļŠāļļāļāļĒāļāļ 50 āļāļĢāļīāļĐāļąāļāļāļĩāđāļāļāļĢāļļāđāļāđāļŦāļĄāđāļāļĒāļēāļāļĢāđāļ§āļĄāļāļēāļāļāđāļ§āļĒāļĄāļēāļāļāļĩāđāļŠāļļāļ 2024
āļāđāļēāļ§āļŠāļēāļĢāđāļŦāļĄāđāđ