Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Nov 4, 2021
    Deadline: Not specified
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    Black Pen Recruitment is a diversified specialist recruitment consultancy situated in the heart of Cape Town, led by highly respected recruitment professionals, each accomplished in their own right to consult and deliver on staff placement assignments.
    Read more about this company

     

    Chief Information Security Officer (Cryptocurrency/Fintech)

    Job Description

    Chief Information Security Officer (Cryptocurrency/Fintech)

    Are you an experienced Chief Information Security Officer with a strong understanding of cloud architecture environment? Are you passionate about cryptocurrency? 

    Then we have the opportunity for you! 

    Our client, an American and African-based remote company, is looking to hire a Chief Information Security Officer, with experience in the financial services industry, to join their exciting team. 

    Our client is one of the fastest growing cryptocurrency exchange companies in Africa and is aiming to make cryptocurrency accessible to everyone on the continent, which was backed by some of the biggest names in the industry.

    A top candidate is someone who is a clear communicator, highly self-motivated, eager to collaborate, exchange knowledge and who apply new skills to proactively seek out weaknesses in the environment.

    Job Type: Full-Time | Remote

    Requirements

    Requirements:

    • Demonstrated track record of building a successful security function in a recognised financial technology company.

    • Experience working in a cloud architecture environment such as AWS or Azure is essential.

    • Comfort with driving the implementation of security compliance projects.

    • Demonstrated skills of hiring and growing a team.

    • Supplier selection and management in procuring security software and contracting in penetration testing services.

    • On the ground knowledge of computer vulnerability assessment, threat modelling, networks, operating systems and software security.

    • A good working knowledge of various security technologies such as network and application firewalls, host intrusion prevention and anti-virus.

    • Analytical and problem-solving skills to identify and assess risks, threats, patterns and trends.

     

    Responsibilities:

    • Keep up to date with the latest security and technology developments.

    • Research/evaluate emerging security threats and ways to manage them.

    • Plan for disaster recovery and create contingency plans in the event of any security breaches.

    • Ensure monitoring for attacks, intrusions and unusual, unauthorised or illegal activity.

    • Drive the testing and evaluation of security products.

    • Design new security systems or upgrade existing ones.

    • Use advanced analytic tools to determine emerging threat patterns and vulnerabilities.

    • Engage in 'ethical hacking', for example, simulating security breaches.

    • Identify potential weaknesses and implement measures, such as firewalls and encryption.

    • Investigate security alerts and provide incident response.

    • Monitor identity and access management, including monitoring for abuse of permissions by authorised system users.

    • Liaise with stakeholders in relation to cyber security issues and provide future recommendations.

    • Generate reports for both technical and non-technical staff and stakeholders.

    • Maintain an information security risk register and assist with internal and external audits relating to information security.

    • Monitor and respond to 'phishing' emails and 'pharming' activity.

    • Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues.

    • Analysis and Monitoring of entry points, activity logs, internal environments, and databases.

    • Data Security and Fraud Prevention.

    • Ensuring security on all platform infrastructure and external integrations.

    • Identity and Access Management.

    • Security Investigations, Digital Forensics.

    • Disaster Recovery and Business Continuity.

    • Leading auditing and security compliance initiatives.

    • Security education and training

     

    Key Soft Skills:

    • Verbal communication skills, including presentation skills, with an ability to communicate with a range of technical and non-technical team members and other relevant individuals.

    • Time-management and organisational skills to manage a variety of tasks and meet deadlines.

    • The ability to multitask and prioritise your workload.

    • Excellent attention to detail.

    • An ability to work under pressure, particularly when dealing with threats and at times of high demand.

     

    Team:

    • Exude your upbeat energy and enthusiasm each and every day to motivate your team to be the best they can in every aspect of what they do

    • Celebrate the success of others by recognising the contributions of committed team members and their achievements

    • Communicate in a fashion that is respectful and well understood

    • Collaborate with your peers to collectively think of innovative ideas that drive business through technology

    • Build and utilise working relationships with internal business partners across the organisation and external business contacts

    Method of Application

    Interested and qualified? Go to Black Pen Recruitment on blackpenrecruitment.zohorecruit.com to apply

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at Black Pen Recruitment Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail