Job Description
Our Culture:
At STS we are proud of our culture and how it drives everything we do. We are looking for individuals who share our values and want to be part of a unique and engaging culture that revolves around collaboration and innovation. If you are looking for a role where you can drive engagement and excellence across teams through commitment and collaboration, and are someone who is customer-centric and appreciates an organization with uncompromised integrity that focuses on employee engagement then read on to learn more about how you can become part of the STS family.
The Information Security Manager is responsible for monitoring the efficiency of implementing the cyber security policies, procedures, and practices, and ensuring that they are applied effectively in every aspect of the business and in compliance with them. The Security Specialist also develops and updates the Cyber Security Risk methodology and procedures and ensure compliance with the relevant regulatory and legislative bodies.
Duties and Responsibilities
- Ensure the implementation of the Cyber Security policies, procedures, and practices
- Monitoring the efficiency of implementing the cyber security policies, procedures, and practices
- Develop and update the Cyber Security Risk methodology and procedures
- Implement the cyber security risk management process
- Identify and assess potential cyber security risks and develop procedures to mitigate them.
- Conduct cyber security reviews, identifying gaps.
- Manage compliance with laws, policies, procedures, and cybersecurity standards.
- Supervise the periodic review and audit of cybersecurity programs and requirements.
- Prepare reports of compliance with cybersecurity requirements
- Implementing the cyber security compliance program and reviewing it annually
- Assist in reviewing and auditing the implementation of cybersecurity controls in accordance with auditing standards
- Preparing audit and evaluation reports and presenting them to top management
- Follow up on the regulatory and legislative requirements related to cybersecurity and ensure compliance with them