Cyber Security Officer Region Europe in Essen bei Evonik
Cyber Security Officer (m/f/div) Region Europe in Essen bei Evonik
What you can expect
Explore a world of opportunities with us. Look ahead with us and help shape innovative solutions to make our world more sustainable and life healthier, more vibrant and more comfortable.
At Evonik, you have the chance to explore, thrive, and grow alongside 33,000 colleagues. Among attractive career paths and high-quality development programs, we not only offer performance-based remuneration and occupational health benefits but also hybrid and flexible working environments with #SmartWork.
Bring your fresh perspective, develop your strengths, break out your mold, and find a career that fits your dreams with us.
Click on the link below to learn what our employees have to say about Evonik:
https
://careers.evonik.com/en/about/meet-the-team/
What your challenges are
-
You work with the CISO to develop a security program and initiate security projects that address identified risks and business security requirements
-
You manage the process of collecting, analyzing and assessing the current and future threat landscape, as well as providing the CISO with a realistic overview of risks and threats in the region
-
You engage with the CISO to develop budget projections based on short and long-term goals and objectives
-
You propose changes to existing internal policies and procedures to ensure operational efficiency and regulatory compliance, i.e., with respect to regional aspects
-
You maintain oversight of regional laws and regulations
-
You assist and guide the disaster recovery planning team in selecting recovery strategies and in developing, testing, and maintaining disaster recovery plans
-
You maintain and improve processes to ensure that security is taken into account in the evaluation, selection, installation and configuration of applications and software
-
You ensure the implementation of security design and manage the remediation of identified risks
-
You identify the risks and ensure that the rules are enforced in the region in charge
-
You prepare and evaluate exception requests
-
You conduct audits
-
You monitor and report on compliance with security policies, as well as policy enforcement
-
You manage processes related to daily activities, identify risk tolerances, recommend treatment plans, and communicate information about residual risks
-
You participate (and collaborate) in the development of external IT security standards
Tactical and Operational Level
-
You actively develop and manage a computer security organization (ISO organization) within the region that ensures cooperation between the various security areas and thus a holistic management of computer security. The ISO organization controls the implementation of corporate IT compliance and IT security guidelines
-
You advise, initiate and coordinate the implementation of technical controls to support and enforce defined corporate security policies
-
You are accountable for incident management and coordination in the region in charge
-
You deliver expert guidance on security issues for projects
Security Liaison
-
You facilitate the understanding of and response to safety audit findings reported by auditors
-
You work closely with the ISO Global Function team to ensure that the development and implementation of controls and configurations are aligned with security policies and legal, regulatory and audit requirements
-
You consistently work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements
-
You provide security communication, awareness and training channels to the public, which may range from senior leaders to field employees
-
You establish and maintain strategic liaison with vendors, legal and procurement departments to establish mutually acceptable contracts and service level agreements
-
You work with the CISO, Global Function ISOs, and business stakeholders to define metrics and reporting strategies that effectively communicate security program successes and progress
-
You collaborate with the Group's IT Security Administration
-
You participate with other stakeholders, e.g. OSOs for OT security, SO for know-how protection, and DP for data protection
-
You act as an active and consistent leader in the regional information security g