Review submission of the IS Criticality Assessment (ISCA) questionnaire.
Determine high-level security requirements and project criticality, based on standard project activities and data classification from DP pre-screening.
Work with assigned architect to ensure security requirements are finalised in design (High-Level Design), review with Enterprise Architecture, Solutions Architecture, Cyber Security and Cyber Assurance.
Review of all security requirements and evidence provided by the scrum master to support closure of each requirement.
Review and feedback on the ISCA questionnaire.
Review and feedback on High-Level Design (HLD).
Present at ISCA Project Technical Review.
Attend and obtain HLD sign-off at Technical Design Authority, Solutions Design Authority (SDA).
Obtain Business Partner Risk Evaluation Platform (BPREP) scorecard for 3 rd Party SaaS solutions from the Security Contracts team.
Obtain Identity & Access Management (IAM) assessment signoff from the IAM Team.
Obtain Minimum Technical Security Baseline compliance reporting from QualysGuard.
Obtain a Cloud Permit from Enterprise Architecture.
Obtain Code Review and Analysis - in-house solutions only.
Self-serve vulnerability assessment compliance report of assets in scope.
Liaise with Cyber Assurance on penetration testing of solution and obtain sign-off.
Obtain Digital Hub registration for external facing solutions from Cyber Assurance.
Produce ASRM Security Assessment closure report.
Perform a final review of all open security requirements and their status before any stage gate approval can be provided (effectively the Production Go/No-go decision). Ensure AXA XL ASRM processes are followed.
Store all evidence in the IS projects shared area.
Update the project register daily to ensure project status is maintained and update the ASRM Security Assessment template as a record of activity. Submit the ASRM form for sign-off to complete the risk assessment.
Manage project RAG status ensuring activities trending amber and red are highlighted to management and the scrum master.
Liaise with the scrum master to support the development of the risk acceptance (PM is responsible) where needed.
Attend meetings with the scrum master, delivery squads, stakeholders, ISCA technical review, architectural design authorities and pen testing reviews. Challenge design decisions not compliant with security, escalate issues when they become known, and offer options to resolve them.
All deliverables are subject to internal quality assurance and peer reviews will be conducted by the Information Security team.
Required Skills and Abilities:
Bachelor s degree in computer science, Engineering, or related field with relevant years of experience.
Effective knowledge of working within an Agile Framework such as SAFe.
Effective knowledge of performing project risk assessments.
Experience in performing Information Security technical risk assessments.
Proficient in information security risk and governance frameworks (ISO 27005, EBIOS).
Expert analytical and reporting skills.
Expert in Microsoft Office (Word, Excel, PowerPoint, Access).
Ability to effectively communicate and positively influence diverse stakeholders and team members.
Desired Skills and Abilities:
Excellent attention to detail and the ability to create clear, concise, and engaging presentations.
Fluent in English.
Information Security and /or Information Technology industry certification (CISSP, CISM, CRISC, GIAC, CISSP or equivalent).
Experience in articulating IS risks in business language and advising on the appropriate risk management action.
Experience in information security management reporting and related methodologies.
Experience in multinational companies.