Requirements: English
Company: Brainbridge IT Staffing
Region: Brussels Metropolitan Area ,
Are you an experienced IT Security Architect who thrives in the ever-changing world of Information Technology? Then we have exciting opportunities for you!
We are looking for multiple freelance professionals for different projects. Your personal passion, interests, and experience will be decisive in setting the right accents and determining your personal journey.
Your Job Responsibilities:
- Drawing up security project plans: Develop comprehensive project plans for implementing security measures across IT systems, outlining the scope, objectives, and deliverables.
- People management for the members of the various (security) teams: Lead and manage security teams, ensuring effective collaboration and performance among team members.
- Planning the security project in terms of timeline and milestones: Establish project timelines and milestones, ensuring that all phases of security implementation are completed on schedule.
- Assigning tasks and responsibilities to the security team members: Delegate tasks and responsibilities to team members based on their skills and expertise in IT security.
- Mapping and managing security risks (and measures): Identify potential security risks and develop strategies to mitigate them, ensuring the protection of IT systems and data.
- Manage security project issues: Address and resolve any issues that arise during the security project lifecycle, ensuring minimal disruption to IT operations.
- Ensuring that security solutions comply with standards and best practices: Ensure that all security solutions adhere to industry standards and best practices, including resilience patterns, monitoring, and postmortems.
- Stakeholder management: Proactively coordinate with various project stakeholders to understand their security needs and ensure their requirements are met throughout the implementation process.
- Regular coordination with the steering group: Maintain regular communication with the steering group to provide updates and receive guidance on security projects.
- Coordination with suppliers and external partners: Collaborate with suppliers and external partners to ensure the successful implementation of security solutions.
- Change management: Implement change management processes to ensure smooth transitions and adoption of new security measures.
- Reporting: Prepare and present regular reports on security project progress, risks, and outcomes to stakeholders and senior management.
Your Requirements:
- Network Security: Designing and implementing secure network architectures, including firewalls, VPNs, IDS/IPS, and network segmentation.
- Application Security: Ensuring secure software development practices, conducting code reviews, and implementing security controls in applications.
- Identity and Access Management (IAM): Managing user identities, roles, and access permissions, and implementing authentication and authorization mechanisms.
- Cryptography: Applying encryption, hashing, and digital signatures to protect data integrity and confidentiality.
- Security Policies and Compliance: Developing and enforcing security policies, standards, and procedures, and ensuring compliance with regulations like GDPR, HIPAA, and PCI-DSS.
- Incident Response: Planning and executing incident response strategies, including detection, containment, eradication, and recovery.
- Risk Management: Identifying, assessing, and mitigating security risks through risk analysis and management frameworks.
- Security Architecture Design: Creating and maintaining security architecture frameworks and models, such as SABSA, TOGAF, and NIST.
- Vulnerability Management: Conducting vulnerability assessments, penetration testing, and managing remediation efforts.
- Cloud Security: Implementing security measures for cloud environments, including AWS, Azure, and Google Cloud Platform.
Non-technical requirements:
- Good presenter who can convey stories well between business and IT stakeholders: Excellent communication skills to bridge the gap between business and IT.
- Self-disciplined, very proactive, and organized, with the ability to identify what needs to be done: Strong organizational and proactive skills.
- Strong team player, empowering and challenging squad/chapter member