Permanent position only
WHAT IS CREAM ALL ABOUT?
We could be a Cream Factory, a cooking blog or even a detective agencybut in reality, we are a consulting company in Business & Technology active in large organizations and industry leaders in Banking, Insurance, Telecom, Energy, Pharmaceutical & Transport.
CREAM''S SPECIAL RECIPE :
* 1/3 of Personal development
* 1/3 of Collective Intelligence
* 1/3 of Intrapreneurship
And Bonus ingredient: Some passionate colleagues : )
IS THIS JOB MADE FOR YOU?
As a Cybersecurity Analyst, embrace your role and be responsible for ensuring security of infrastructure or application technology through the implementation of security services, risk assessments, requirements setting and active participation in project delivery lifecycle, as well as ensuring adequate processes and procedures.
YOUR ROLE WILL BE:
* Define and submit security configuration and operations standards for security systems and applications, including policy assessment and compliance tools.
* Develop and propose baseline security configurations for operating systems, applications, networking and communications equipment.
* Perform technical security audits.
* Perform log analysis and security monitoring.
* Proactively work with our clients to deliver high quality advice and assurance on management and/or technical challenges in the domain of cybersecurity and IT risk.
* Identify, analyze and transform Cybersecurity and IT risk related issues into practical solutions, in view of the clients business agenda.
* Communicate relevant Cybersecurity and IT risk issues and recommendations to internal and external stakeholders.
HOW DO WE IMAGINE OUR FUTURE CONSULTANT ?
1. You have at least a Bachelor degree or equivalent by experience.
2. You have at least 5 years of relevant experience in IT security.
3. You have advanced knowledge in security best practices references such as ISO 2700X, OWASP Guidelines
4. You handle security risk management methods and tools, network protocols, and application communications.
5. You have a good knowledge of the following security technologies: SIEM, Firewalls, intrusion detection, and prevention systems, security information and event management, identity and access management, remote access methods, wireless protocols, and services.
6. * You have a good knowledge of Advanced Persistent Threat detection, data loss prevention, vulnerability analysis and mitigation, Public Key Infrastructure, communications, and data encryption.
7. * You have a good knowledge of backup and disaster recovery methodologies, business continuity planning and governance.
8. You are able to work w