Skip to content
mimi

Information Security Senior Specialist

The Windsor Consulting

Cary · Hybrid Full-time Senior Today

About the role

About Information Security

Information Security is responsible for preventing IT-based crime, hacking, intentional or inadvertent modification, disclosure, or destruction to the organization's information systems and IT assets and intellectual property. The focus of the role is to ensure highly professional and productive procedures, policies and processes are in place and aligned and agreed with relevant stakeholders. Roles within Information Security may cover one or more areas of specialty:

  • Identity & Access Management (which may include, for example, authentication; access management & control; recertification etc.)
  • Information Security (“IS”) Operations (which may for example include, cyber threat operations, cyber forensics, protection against data leakage etc.)
  • IS Technology (which may include IS architecture, IS engineering, cryptographic services etc.).

Work Includes

  • Identifying and evaluating potential areas of Information Security threat by assessing the probability and impact, and implementing associated mitigations
  • Monitoring and contributing to the implementation of the Information Security strategy
  • Evaluating the adequacy and effectiveness of internal controls relating to Information Security risks
  • Ensuring appropriate procedures, policies and processes are in place, and aligned and agreed with relevant stakeholders
  • Developing appropriate, pragmatic strategies to deliver effective controls and Information Security management objectives and implementation across the bank
  • Managing client relationships and ensuring management focuses on the Information Security agenda

Additional Skills Required

  • Audit experience or implementation experience for the below Identity and Access concepts
  • Identity & Access Management: Authentication; Access management & control.
  • IAM concepts: least privilege, SoD, access certifications, and privileged access management
  • Knowledge of control frameworks and regulations (ISO 27001/27002, NIST, SOX, SOC 1/2, GDPR)
  • Familiarity with IAM and PAM technologies (e.g., Active Directory, Azure AD/Entra ID, CyberArk)
  • Joiner/Mover/Leaver (JML) automation using IAM tools integrated with HR systems
  • Role-based or policy-based access models enforcing least privilege and approved access paths
  • SSO and MFA controls
  • Preferred certifications (e.g., CISA, CISSP, CRISC)

Skills

Active DirectoryAzure ADCyberArkEntra IDGDPRISO 27001ISO 27002MFANISTSOC 1SOC 2SOXSSO

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free