Jobs Career Advice Post Job
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Jul 30, 2025
    Deadline: Not specified
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • The hearX Group offers the world's first clinical smartphone hearing test solutions. Our award-winning products are used in over 25 countries. Our aim is to impact on an individual, community and global level by creating sustainable, smart solutions for hearing health for everyone.
    Read more about this company

     

    Security Engineer

    Minimum education (essential):

    • Engineering degree (Computer, Software, Mechanical or Electronic

    Minimum education (desirable):

    • OSCP (Offensive Security Certified Professional)
    • PNPT (Practical Network Penetration Tester)
    • CISSP (Certified Information Systems Security Professional)
    • CCSP (Certified Cloud Security Practitioner)

    Minimum applicable experience (years):

    AWS' ecosystem:

    • AWS Well Architected Framework
    • Trusted Advisor
    • GuardDuty / SCP / SSM / IAM / WAF
    • Container services such as ECS/EKS
    • Incident detection and response management.
    • Performing penetration tests and vulnerability scans against networks and infrastructure, applications and AWS environments.
    • Drafting and implementing security policies, security procedures, security design and implementation.

    The following would be advantageous: 

    • ISO 14971 (risk management) compliance
    • ISO 27032 (cybersecurity) compliance
    • SOC2 Type 2 (with HiTrust attestation) or HiTrust experience (or equivalent)

    Skills and Knowledge (essential):

    • Deep understanding of automation, quality engineering, architectural methodologies, principles, and solution design.
    • Familiarity with operational observability, including log aggregation, application performance monitoring, etc.
    • Understanding of the following: Linux/Windows server and application administration and configuration, networking, scripting and automation, large scale distributed computing architecture.
    • Solid knowledge of IT security (firewalls, EDR, IDS/IPS, SOAR, vulnerability scanning  forensic and Threat Hunting).
    • Understanding of AWS ECS & Kubernetes and Containerisation (Docker/Podman/Containerd) with implementation, support, and design.
    • Knowledge in security classification frameworks like MITRE or the cyber-attack kill chain.
    • Good knowledge and understanding of industry standards, memberships, and frameworks such as CIS and SOC 2.

    Cybersecurity Management 40%

    • Drive development standards and processes related to cybersecurity compliance.
    • Monitor all cybersecurity processes, operations and infrastructure, monitoring internal and external policy and regulatory compliance.
    • Review and evaluate development designs (for existing products and during design phase for new products) to identify gaps in cybersecurity controls, and drive updates to any cybersecurity or compliance documentation.
    • Liaise with internal and external stakeholders to prepare for SOC2 Type 2 and HiTrust). 
    • Drive cybersecurity audit strategy and readiness from a dev, security and devops perspective. 
    • Identify, implement and maintain all security tools and technology.
    • Schedule (and ideally automate) internal vulnerability scans, remediating findings and ensuring accurate & timely reporting to satisfy PCI DSS requirements.
    • Schedule annual Penetration Tests with external supplier(s) and ensure implementation of items identified in remediation plans.
    • Complete required cybersecurity applications and records for large customers and audits, including reporting as required.

    Infrastructure Management 30%

    • Drive and action where required  the planning, installation, monitoring and maintenance of IT systems and infrastructure focused on cyber security including any penetration testing that is required.
    • Design and execute short-  and long-term initiatives to detect and prevent any security vulnerabilities in the IT infrastructure (cloud, security and devops) to meet current and future needs.
    • Develop, execute and oversee procedures, policies and related training plans for cybersecurity project management and infrastructure administration.
    • Conduct research and recommend changes in services, products, protocols, and standards to support development efforts and infrastructure procurement.
    • Define software and hardware security standards in collaboration with stakeholders and owners for the provisioning of the development and IT infrastructure.
    • Ensure appropriate security levels on network, infrastructure and servers are maintained, ensuring that 
    • the IT team follows the requirements set in line with cybersecurity standards.
    • Implement cybersecurity continuous improvement programs.
    • Crisis management - keeping stakeholders informed and actively working with teams to return service in the shortest possible time frame. This would include documenting all disaster recovery procedures.
    • Effective management and optimisation of vendors (where applicable) as well as collaborating with the dev and IT teams as necessary.

    Risk Management and Compliance 20%

    • Collaborate with divisional the RAQA team and Senior ManagersManagerst to define and centralize risks and put mitigation measures in place for new and existing products and services, from a cybersecurity and privacy perspective.
    • Improve the automation of security controls.
    • Work closely with the dev team on defining industry-standard processes and system requirements, identifying and proposing fixes to shortcomings in the development lifecycle, code reviews and scanning as well as infrastructure provisioning.
    • Work with the dev team to ensure that security standards and policies are being set up and configured correctly, ensuring adherence to certifications and best-practice.
    • Assist with remediations on risk items identified from security and preventative detection reviews to ensure compliance and ensure the security posture of the IT landscape is ensured at all times.
    • Remediate audit items by putting measures in place to prevent the recurrence of findings. For example, by making sure that audit findings are resolved by the relevant personnel and that the resolutions are such that they prevent the item from reoccurring in the future.
    • Manage internal and external audits as required with relation to cybersecurity.
    • Maintain documentation for cybersecurity-related risks, processes and findings.

    QMS and Documentation 10%

    • Manage annual cybersecurity roadmap, IT audit (internal and external) plan and calendar.
    • Work closely with the Compliance team to gather and submit evidence for all security and IT audits.
    • Proactively keep stakeholders updated on status, progress, risks and problems.
    • Review and approve documented outcomes of Penetration Tests, Remediation Plans and required activities. 
    • Review and approve documented outcomes of Vulnerability Scans, Remediation Plans and required activities.
    • Maintain cybersecurity documents and records in line with certification requirements. 
    • Maintain document bank and matrix for the cybersecurity setup and external customer-audit matrix requests. For example, ensuring that all cybersecurity related information, such as architectural diagrams, asset lists, asset control lists and vulnerabilities, can be referenced from a single central source from which to direct the readers to the appropriate resources.

    Check how your CV aligns with this job

    Method of Application

    Interested and qualified? Go to hearX Group on hearxgroup.simplify.hr to apply

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at hearX Group Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail