je.st
news
Tag: cyber
DTG and Connect Devices create Smart TV cyber security scheme
2020-12-09 13:30:21| Digital TV News
The DTG in partnership with Connect Devices, is working on a cyber security certification scheme for smart TVs after being awarded U.K. Government funding under the Grant Programme for Consumer IoT Assurance Schemes.
Tags: create
security
connect
devices
Cyber Security Services Operations Manager
2020-12-02 13:12:52| Space-careers.com Jobs RSS
Position Reference 707 RHEA Group is currently recruiting a Cyber Security Services Operations Manager to manage the Services and Operations SO activities and team based in Redu, Belgium. The SO Manager will be part of the Security Services Business Unit and will be responsible for the Security Operations Center SOC, the Cyber Range including Cyber Security Trainings and the Security Services Projects delivered by the SO Team. You will have the opportunity to work in a challenging dynamic environment with stateoftheart technologies within the cybersecurity and space domains. As SO Manager you will oversee key staff working to identify and safeguard our organization, partners and clients from intrusion, security threats, security weaknesses, software bugs and exploits. You will be responsible for staff, sales and business development and the management processes keeping our organisation secure and growing the Security Services business. If you have a passion for cyber security and would like to join a team of seasoned experts with diverse backgrounds, then you are in the right place! At RHEA Group you will have the opportunity to work and learn in an exciting environment and participate in unique cybersecurity projects for institutional clients, like the European Space Agency, NATO, the European Commission and commercial clients in the Critical Infrastructure, Healthcare and manufacturing sector. Tasks and Activities The scope of work will include Technical Execution of Security Services and Operations, including but not limited to services planning and delivery, resource management, risk management and financial performance management and control. Security SO projects are those projects involving security engineering services or security operations services, including security training and awareness, security risk assessment, system security requirements analysis and solutions design, and security operations services e.g., incident monitoring and response management. Managing the daytoday activities and projects of the RHEA SOC staff, Cyber Range and SO Team and collaborating with the Director Security Services and Manager Security RD to optimize the allocation of resources across the Security Services Business Unit. Provisioning of best practice advice and guidance in the areas of cyber defence and security operations supporting incident detection, analysis and response including operations policy and procedure development, operational scenario definition, operations centre technology selection and implementation, network and host based sensor technology selection and implementation Provisioning of cyber defence and security operations advice and guidance to technical development teams in the areas of cyber defence situation awareness concepts and requirements incident detection, analysis and response management visualization requirements collaborative information sharing and relevance of security metrics Performing security risk assessment leveraging different methodologies including for example ISO27005, MEHARI, EBIOS, HTRA and tools Performing security requirements elicitation from the risk assessment results Preparing security risk treatment plan Contributing to the design of secure architecture encompassing firewalls, IDSIPS, VPN, AAA, encryption etc. Designing security solutions following a securitybydesign approach Supporting the preparation of Cyber security training and awareness, which may include training delivery as well Planning and coordinating security testing activities such as penetration testing and vulnerability assessment. Supporting commercial sales and other business development activities including contributing to the development and maintenance of client relationships, identification and evaluation of security related business opportunities, development of proposals, and direct contribution of technical and management expertise on resulting contract wins Skills and Experience The following skills and experience are mandatory You have a Bachelors or masters in computer science, engineering, IT or a related field You have at least 7 years proven work experience as a senior security engineer. You have at least 5 years PM or relevant management experience. You have experience in delivery of operations services or specification of solutions for cyber defence or security operations including some of the following o Security Information and Event Management SIEM systems and Security Orchestration Automation and Response o Information Security policies, standards, and procedures o Information Security concepts involving confidentiality, integrity and availability o Information Security concepts involving threat, vulnerability and risk analysis o Information Security concepts involving incident detection, analysis, decision support and response o Trusted Product Evaluation standards such as Common Criteria or FIPS 140 o ITOT system security. You have experience in the design of security architectures encompassing SIEM, intrusion detection systems, firewalls, antivirus software, log management, authentication systems, content filtering, etc. You have a professional qualification or certification such as CISSP. You possess strong interpersonal skills, team working, good analytic and problem solving capabilities. You have strong communication and documentation abilities. You are detailoriented. You have an analytical mind and problemsolving aptitude. You have effective time management and organizational skills. Some of the following skills would be highly desirable, in order of priority Computer network design LAN and WAN architectures, routing protocols, TCPIP Experience in cyber security for space, defense, critical infrastructure, finance or government systems Experience with best practices and standards like ISO27000, NIST Cybersecurity Framework, ISA62443, NIS directive, Common Criteria Certification and Accreditation concepts and processes Cloud Computing and virtual environment security How to Apply Looking to take your career to the next level? Interested applicants should submit their CV and Cover Letter to RHEAs Recruitment team at careersrheagroup.com no later than 14122020. Preference will be given to candidates eligible for an EU or national personal security clearance at the level of SECRET or above.
Tags: services
security
manager
operations
Cyber security round-up
2020-10-30 12:12:29| Oil IT Journal - www.oilit.com
Lloyd's Register reports on IIoT cyber-risk. NIST publications: Zero Trust architectures, Recovering from ransomware. OGTC/Baringa study of Cyber security in UK oil and gas. Acronis Cyber Backup for 'air-gapped' environments. Asigra's Deep MFA cloud-based backup. Noble Group deploys Alsid's Active Directory security. SCADAWall, new 'data diode' from Bayshore Networks. Chevron selects SecurityGate.io for OT cyber security. Cynet's breach prevention platform. RigNet's Cyphre encryption for the harsh edge. CME Software Engineering Institute open sources Kalki IoT security platform. SEI announces 'Vince' vulnerability reporting platform. IIC white paper on software trustworthiness best practices. Surge Engineering joins ISA Global Cyber Security Alliance. ISA/Saudi Aramco host ISA/IEC 62443 OT cyber security webinars.
Tags: security
cyber
roundup
cyber security
DOE awards more than $7M for efforts to protect electric grid from cyber attacks on EVs and chargers
2020-10-12 12:55:34| Green Car Congress
Tags: on
efforts
awards
protect
Analyst, Cyber Security Incident Response
2020-08-31 11:10:07| Space-careers.com Jobs RSS
ROLE DESCRIPTION SUMMARY The position is responsible for monitoring and analyzing security events from multiple sources and for managing security incidents to ensure a coordinated, timely and effective response to security incidents. The job holder ensures SES security incident response readiness and drives the definition, implementation and continuous improvement of SESs security incident response framework. He She supports key security management processes by providing intelligence from security incidents and identified vulnerabilities and threats. PRIMARY RESPONSIBILITIES KEY RESULTS AREAS Collect and analyze security information from different information resources to identify relevant threats and vulnerabilities and disseminate synthesized intelligence information within the organization Monitor and analyse security events from multiple sources to identify security incidents Perform indepth technical analyses of security threats and incidents, including malware analysis, network and system forensic analyses Manage security incidents to ensure a coordinated, timely and effective response to security incidents Assess and triage security incidents and coordinate the appropriate notifications and escalations in a timely manner Coordinate response actions in virtual incident response teams Document security incidents, including analysis results, the timeline of events and incident response activities Ensure SES security incident response readiness by driving the definition, implementation and continuous improvement of SESs security incident response framework, including relevant policies, processes and procedures, incident response tools and training of actors in the response process. Provide synthesized intelligence from different information resources and security incidents to support key security management processes, such as the development and promotion of information security policies, standards, processes and procedures and monitoring compliance to the information security policy framework information security risk management and the development and maintenance of SESs information security awareness program Oncall duty as required COMPETENCIES Ability to coordinate crossfunctional incident response teams and work Excellent experience in managing large and small scale incidents Autonomous Innovative mind Strong analytical and problem solving skills Stress resistant and able to manage multiple incidents and tasks at the same time Good written and verbal communication skills Excellent team player Ability to effectively interact with all organization stakeholders QUALIFICATIONS EXPERIENCE Minimum Bachelors Degree in Computer Science or equivalent Minimum of six years industry related experience in computer security and incident response Excellent experience managing large and small scale incidents Solid knowledge of and handson experience with state of the art incident response and forensics tools, techniques and tactics Experienced in employing best practices and forensically sound principles, such as evidence handling and chain of custody Good experience in malware analysis and reverse engineering Experienced in capturing memory, disk images and network traffic and analyzing them for indicators of compromise Good experience in analyzing and triaging security events from various sources Good programming and scripting skills in different programmingscripting languages Excellent understanding of the tools and tactics used by different threat agents Indepth knowledge of computer forensics, security vulnerabilities and exploits Strong knowledge in system security, application security and network security Indepth system security knowledge multiple operating systems, including Windows platforms, and Linux and application security knowledge, including a clear understanding of their vulnerabilities, exploits and how to secure them Solid working knowledge of security technologies, such as Antivirus, Network and Host Intrusion Detection Systems, Web ProxyContent Filtering, Authentication technologies, Security Information and Event Management Relevant security certifications e.g., GCIH, GCFE, GCFA, GREM, GCIA and product certifications are a plus Fluency in English, any other language is considered as an asset Willingness to travel internationally OTHER KEY REQUIREMENTS COMMENTS NATOEU SECRET clearances are considered a strong asset. Candidate must be willing to undergo a security clearance procedure as this position might require holding security clearance Openness for worktime flexibility within 0600am 1000 pm timeframe Apply HERE
Tags: security
response
incident
analyst
Sites : [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] next »