Cyber Security Consultant

Application validaty till 20/Dec/2019

1        Scope of Work

BIG WATER CONSULTING is expected to find satisfying education/certification, hard and soft skills, experience, and expertise in the Resource so that he or she can be entrusted duties and responsibilities across the various phases of the Project.

The Resource will have to liaise with project managers and business analysts from other projects, i.e., SIEM, IAM, ISMS, GDPR, and “Cybersecurity Risk Management”, to ensure that actions taken from different projects as part of the roadmap are contributing to increase the overall maturity for Cybersecurity. Actions should not be viewed on a stand-alone basis.

To achieve this objective, the Project is broken down in 3 work packages.

1.1        Work package-1: Cybersecurity Strategy

The work package-1 focusing on the Cybersecurity strategy, aimed at:

1.     Preparing a Cybersecurity vision, mission statement, and key principles to be formalized in the Cybersecurity Policy

2.     Designing of a Cybersecurity strategy for the client of BWC and transpose acceptance levels into a Cybersecurity risk appetite statement;

3.     Defining the roles and responsibilities of all stakeholders involved in the Cybersecurity domain including representatives from business and IT;

4.     Selecting a Cybersecurity threat model and customize it for BWC according to the size, complexity, and nature of its business operations. The threat model process will be aligned with the security event management process to ensure that threats and events logs (generated by systems, computing devices, network devices, or anti-viruses) are incorporated;

5.     Ensuring that the client of BWC and reputation is protected against the occurrence of cybersecurity attacks;

6.     Analyzing required mitigation techniques (both preventive and reactive), more specifically analyze the Cybersecurity client policy provided by consultant of BWC.

7.     Developing a Cybersecurity Policy and request for approval to the Board of Directors;

8.     Ensuring that the awareness for Cybersecurity within the company is increased by a.o. setting up training session on the Cybersecurity Policy.

In cooperation with the Business Lead and project participants, the Resource will coordinate the activities and facilitate (technical) discussions necessary to produce required deliverables such as the Cybersecurity threat model, the brand protection approach, and the Cybersecurity Policy.

This work package will take place at the start of the pre-study phase. The purpose is to provide input to other activities within the Cybersecurity Risk Management project and to other related projects e.g. SIEM, IAM, ISMS.

1.2        Work package-2: “Embedding” of Cybersecurity domain Within clients Existing Risk Management System

The work package-2 focusing on the “embedding” of Cybersecurity domain within existing Risk Management System, with as main objectives:

1.     Set up and implement a Cybersecurity event reporting process aimed at:

a.   Ensuring that activities included in the scope of this work package will effectively and sustainably close gaps raised in the CSMR maturity assessment;

b.   Defining Cybersecurity event metadata, by analyzing reporting requirements from all required stakeholders of the client & its internal stakeholders in the 1st and 2d line of defense;

c.   Preparing a Cybersecurity event reporting process, related reporting template, and database fields;

d.   Rolling out the Cybersecurity event reporting process within the client of BWC via the SLC’s;

e.   Ensuring that internal Cybersecurity events that may occur are properly identified, measured, mitigated, and reported to the Management Committee. Remediation actions (and/or lessons learned) following the occurrence of a Cybersecurity event should be logged in the Cybersecurity tool

2.     Analyze existing Business Impact Assessment (BIA) with the purpose to improve it by including the Cybersecurity dimension.

3.     Define the Cybersecurity Threat assessment (based on the Cybersecurity threat model selected in the work package 1).

4.     Roll the Cybersecurity Treat model within the organization (based on the outcomes of the BIA for information assets or systems with high vulnerabilities), report outcomes to the Management Committee, ensure that vulnerabilities are subject to actions (eventually stored in the Cybersecurity tool).

5.     Define new Operational Risk scenario focusing specifically on Cybersecurity and roll out these scenario as part of the annual Operational Risk

Expected deliverables:

The Resource will document a process for managing technical vulnerabilities identified in applications (Contract Management Systems, and other sensitive systems), hardware, and network. The generic process will include following process steps:

– Identifying known technical vulnerabilities

– Scanning for specific, identified technical vulnerabilities

– Remediating technical vulnerabilities (e.g. using a patch management process from IT Operations).

1.3        Work package-3: Monitoring of Cybersecurity Risk

The work package-3 focusing on the monitoring of Cybersecurity risk through a predefined set of KPI / KRI and appropriate monitoring procedure.

1.     Define appropriate Cybersecurity indicators to be monitored (incl. all required data to be used in reporting).

2.     Ensure that external threats are monitored and reported in the Cybersecurity tool.

3.     Ensure that the Cybersecurity monitoring will be aligned with the Quarterly Risk reporting and that the implementation of Cybersecurity actions are reflected in the risk profile of client of BWC.

4.     Prepare a reporting procedure and template for reporting cybersecurity monitoring (on monthly basis). For instance, prepare a heat map report of Cybersecurity risks to be presented to the Management Committee.

5.     Ensure the Cybersecurity KPI monitoring and follow up of actions could be done by the Cybersecurity tool.

In cooperation with the Business Lead and project participants, the Resource will coordinate the activities and facilitate (technical) discussions necessary to produce required deliverables such as the Cybersecurity KPI template, the updated metadata to be delivered for the Quarterly reports, and the input files required to upload Cybersecurity monitoring in the internal tool, discuss with business users on management reporting to be designed to monitor cybersecurity events within BWC.

This work package will take place at the start of the pre-study phase. The purpose is to provide input to other activities within the Cybersecurity Risk Management project and to other related projects e.g. SIEM, IAM, ISMS.

2.0        Education and Certification

Minimum or equivalent Bachelor’s or Master’s degree in computer science.

3.0        Skills and Experience

· Experience in cybersecurity or information security is a plus.

· Experience in reputation risk or brand protection is a strong asset.

· Strong IT skills including knowledge on hardware, software, networks, and data centers.

· Thorough work ethic, attention to detail.

· Skills of perception and QA, ability to identify vulnerabilities and overall issues.

· Critical thinking skills, problem solving aptitude.

· Ability to think like a hacker and anticipate hacker moves and transpose into a threat model.

· Desire to self-educate on the ever-changing landscape of cyber hacking tactics.

· SSL Certification implementation and validation.

· DDOS Attack, Phishing, IP monitoring, All type of attacks, OWASP 2018 – 2019 Top 20.