
Gavi, The Vaccine Alliance

Job Description
<!–
Description
–>
This role is responsible for developing and implementing information security and business continuity programmes, which include policies, procedures and controls designed to protect IT systems/platforms, enterprise communications, and assets from both internal and external threats, with excellent focus on process, control efficiency and risk management. This role will act as the subject matter expert on security and risk and must be able to translate risk mitigation and business continuity requirements into controls and develop metrics for ongoing security performance measurement and reporting. This role is also responsible for coordinating the internal and external IT audits and ensure risk mitigation is in place and reported on.
Main Duties/Responsibilities:
- Is part of the security team led by Gavi’s Chief Information Security Officer; leads the security team to develop a security programme and security projects that address identified risks and business security requirements;
- Manages the process of gathering, analysing and assessing the current and future threat landscape, as well as providing management with a realistic overview of risks and threats in the organisation environment;
- Tracks developments and changes in the digital business and threat environments to ensure that they’re adequately addressed in security strategy plans and architecture artifacts;
- Manages the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk;
- Defines baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation and identity and access management (IAM);
- Develops standards and practices for data encryption and tokenisation in the organisation, based on the organisation’s data classification criteria;
- Develops and maintains a security architecture process that enables the organisation to develop and implement security solutions and capabilities that are clearly aligned with business, technology and threat drivers;
- Conducts or facilitate threat modeling of services and applications that tie to the risk and data associated with the service or application;
- Establishes a taxonomy of indicators of compromise (IOCs) and share this detail with the security operations center (SOC) and infrastructure team;
- Validates IT infrastructure and other reference architectures for security best practices and recommend changes to enhance security and reduce risks, where applicable;
- Validates security configurations and access to security infrastructure tools, including firewalls, IPSs, WAFs and anti-malware/endpoint protection systems;
- Ensures a complete, accurate and valid inventory of all systems, infrastructure and applications that should be logged by the security information and event management (SIEM) or log management tool;
- Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements;
- Coordinates with DevOps teams to advocate secure coding practices, and to escalate concerns related to poor coding practices;
- Design, coordinate and oversee security testing procedures to verify the security of systems, networks and applications, and manage the remediation of identified risks;
- Provides security communication, awareness and training for audiences, which may range from senior leaders to staff;
- Leads security issues and incidents, and participate in problem and change management forums;
- Works with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation;
- Provides support and guidance for legal and regulatory compliance efforts, including audit support.
- Manages security projects and provide expert guidance on security matters for other IT projects;
- Assists and guide the disaster recovery planning team in the selection of recovery strategies and the development, testing and maintenance of disaster recovery plans;
- Works with the CISO and IT and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security programme.
Requirements and Qualifications:
- Excellent knowledge of key infrastructure domains including networking, cloud platforms, directory management, data centers and data management systems;
- Experience with common information security management frameworks, such as International Standards Organisation (ISO) 2700x, the IT Infrastructure Library (ITIL) and Control Objectives for Information and Related Technology (COBIT) frameworks;
- Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project plans;
- Expertise in cloud security and solutions like SAP, Salesforce, Azure, O365 and Snow and expertise in security configuration in Azure and O365;
- Ability to build excellent relationships at all levels and across all business units and organisations, and understand business imperatives;
- An excellent understanding of the business impact of security tools, technologies and policies;
- Excellent verbal, written and interpersonal communication skills, including the ability to communicate effectively with the IT organisation, project and application development teams, management and business personnel;
- In-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls; an excellent understanding of information security concepts, protocols, industry best practices and strategies.
Work Experience:
- A minimum of 8 years of IT experience, with 5 years in an information security role and at least two years in a supervisory capacity;
- Direct, hands-on experience or excellent working knowledge of managing security infrastructure — e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology;
- Verifiable experience reviewing application code for security vulnerabilities;
- Direct, hands-on experience or an excellent working knowledge of vulnerability management tools;
- Documented experience and an excellent working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services;
- Experience designing the deployment of applications and infrastructure into public cloud services;
- Direct, hands-on experience or excellent working knowledge of managing security infrastructure — e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology;
- Demonstrated experience in investigating security incidents is necessary;
- Demonstrated experience in responding to audits is key.
Languages :
- Fluent English is required;
- Other languages desirable, particularly French.
Source: https://fs-2662.my.salesforce-sites.com/recruit/fRecruit__ApplyJob?vacancyNo=VN1801
<!—
Recommend your friend
<!–
–>
To help us track our recruitment effort, please indicate in your cover/motivation letter where (globalvacancies.org) you saw this job posting.