KEY RESULTS ACCOUNTABILITIES# Responsible for providing specialist inputs and review to the Request for Proposals (RfP) and for IT securityrequirements and standards compliance# Study, define, evaluate, recommend, plan and implement Information Security controls throughout the systemsdevelopment life cycle# Bridge the gaps between security compliance and business requirements by identifying compensatingmitigation methods and/or determining the appropriate processes or controls required# Identifies new and emerging IT security related technologies and assesses their relevance to RTA strategy andarchitecture# Perform other related duties as assigned# Creates, reviews, and improves RTA IT security architecture practices and standards including but not limitedto cyber security, identity and access management, single sign-on, information classification, data leakprevention, and security incident and event management# Provide expert advice to project managers on IT security programs and projects and may lead or managecomplex IT security programs and projects# Plan, develop, maintain, and improve the Information Security Management System (ISMS) for RTA# Follow the ITIL standards to evaluate and approve request for changes and improve change managementprocedures and post implementation audits for all operational infrastructure changes# Develop and document corporate information security policies, standards and guidelines taking intoconsideration any and all security ramifications, risk assessment and compliance issues# Evaluate the project level compliance of all IT projects for RTA according to Enterprise Architectural standardsof RTA# Review the security features of existing and new computing system to ensure that they meet the securityrequirements of existing policies and hence ensure compliance to information security policies and procedures# Supervises the delivery of IT security training material and training programs to end-users and RTA users# Provides in-depth analysis of IT security architecture elements and identify target architectures and gaps frombaseline in line with RTA technology strategy# Identifies, evaluates and recommends IT security architecture options for developed business cases# Provides expert advice to technology portfolio manager on the portfolio dependencies and re-use of existing ITsecurity capabilities# Establish design, guidelines and requirements of IT security and ensure that IT security architecture model arepart of any project# Coordinate Information Systems audits to assess the effectiveness of security controls# Analyses and assesses critical and high security vulnerabilities and incidents# Identify Information Security risks and propose mitigating controls and oversee their implementation
Education
# Bachelor’s in Computer Science / Information technology from a recognized university.
Skills
# Results-driven achiever with exemplary planning and organizational skills, along with a high degree of detail
orientation
# Exceptional listener and communicator who effectively conveys information verbally and in writing.
# Computer-literate performer with extensive software proficiency covering wide variety of applications
# Flexible team player who thrives in environments requiring ability to effectively prioritize and juggle multiple
concurrent projects.
# Innovative problem-solver who can generate workable solutions and resolve complaints.
# Goal-driven leader who maintains a productive climate and confidently motivates, mobilizes, and coaches
employees to meet high performance standards.
# 8 years of working experience.
# Very strong knowledge of current internet security practices
# Highly analytical thinking with demonstrated talent for identifying, scrutinizing, improving, and streamlining
complex work processes.
# Resourceful team player who excels at building trusting relationships with customers and colleagues