Head of Cyber Security Governance and Compliance

Dialog Axiata PLC
a month ago
2 Applied
Expired on: Feb 27 2024

Ref.No 00001414


Entry Requirements

The Person

  • Bachelor’s degree in IT / Engineering
  • Master’s degree in IT / Engineering will be an added advantage
  • CISSP, CISM, CRISC, CDPSE, CCISO, CDPP, CLIP ISO 27000 ISO 22301, BS10012, MCSE, CCNA, ITIL (F) will be considered as an added advantage
  • More than 10 Years work experience in the industry

  • The position holder is responsible to direct and enforce mitigation strategies to reduce Dialog Group’s attack surface and ultimately reduce and maintain the risk exposure of the organisation within acceptable limits
  • Responsible in assisting Axiata and Dialog senior management in formulating the cyber security strategy across Dialog and Axiata group and will be responsible to ensure that Dialog is adequately protected and resilient against cyber threats and attacks
  • Responsible to architect proactive defense mechanisms to mitigate cyber-attacks and be the focal point for cyber defense and information risk related matters
  • Accountable for planning, designing and improving information security across Dialog and its subsidiaries
  • Provide senior expertise and thought leadership for other experts in the information/cyber security domain
  • Ensure the design of Cyber Security detection and protection is always in operation
  • Establish TVM functional processes and Group Security Operations Center interactions
  • Coordinate with external stake holders, consultants and Axiata group and OPCOs Cyber security teams to maintain an accurate cyber security platform
  • Present findings on cyber security related incidents and overall status of cyber hygiene to Cyber Security Steering Committee
  • Direct the enterprise security roadmap for Dialog Group in collaboration with Axiata
  • Identify root cause analysis for outages that may have security implications and disrupt operations
  • Coordinate with project stakeholders and advice on evaluating information security related risks
  • Drive privacy related initiatives to be incorporated into the Cyber security program
  • Address supplier shortages and performance issues within the supply chain to increase process efficiency and effectiveness
  • Design information security processors for required areas of work to assure mechanism are in place
  • Communicate with end users on existing cyber security policy’s, new changers, new and emerging threats to the organization and educate them of the importance of adherence
  • Responsible for electronic Information protection, to prevent internal information from being disclosed
  • Performing activities as per Infosec Calendar, risk register and Infosec related activities
  • Establish succession planning, and track the progress of employee’s carrier development goals
  • Budgeting and capacity planning for deployed and proposed projects
  • Interface to resolve issues between business requirements and security requirements
Cyber Security
Industry Sector