IT Security Manager
TELUS International Philippines Inc
Metro Manila, PH
15d ago
source : Monster

Position Summary

  • Manages (deploy, maintain, improve) the Information Security Compliance & Risk Management Program to TELUS International'
  • s various geographies, campaigns / programs / lines of business in support its core business of Business Process Outsourcing (BPO), Contact Center Outsourcing (CCO), and Information Technology Outsourcing (ITO).Â

  • Responsible for ensuring security systems are working properly, and security controls are in place.Â
  • Responsible for evaluating and recommending security systems and controls. Manages the day-to-day operations and performance of the IT Security group.Â
  • Functional Responsibilities :

    Manage the Information Security Compliance & Risk Program :

  • Deploy, maintain, and improve the Information Security Compliance & Risk Processes (education, risk assessment exercise)Â
  • Partners and / or advice Management and / or the Customer on the assessment and definition of the risk tolerance levels;Â
  • Partners and / or advice Management and / or the Customer on the acceptance of specific information security risk event based upon impact analysis;Â
  • Partners with Management and / or the Customer to minimize and control identified information security risks through monitoring of implementation of controlsÂ
  • Supports the business ensuring compliance to agreements and standards required by the industry; and, by identifying, assessing and overseeing the mitigation of Information Security Risks;Â
  • Develop, implement; and improve an Information Security Compliance & Risk Assessment scorecardÂ
  • Reports on matters that warrant the attention of Management. The reports must include, as a minimum, exceeded risk tolerance levels and unacceptable business practices.Â
  • Manage the Information Security Risk Assessment Process :

  • Familiarize and integrate standards and client requirementsÂ
  • Develop, implement, review, and assess an inter-company Risk Assessment ProcessÂ
  • Collect and collate Risk Assessment ResultsÂ
  • Conduct the Risk Assessment reviews in a structured and periodic cycleÂ
  • Integration / Onboarding of Existing Programs into the Unified Compliance Framework and Adherence.Â
  • Required Technical Skills :

  • Certified in Risk and Information Systems Control (CRISC)Â
  • Certified Information Systems Auditor (CISA)Â
  • Certified Information Security Manager (CISM)Â
  • Certified in the Governance of Enterprise IT (CGEIT)
  • Step 2
    Add to favorites
    Remove from favorites
    My Email
    By clicking on "Continue", I give neuvoo consent to process my data and to send me email alerts, as detailed in neuvoo's Privacy Policy . I may withdraw my consent or unsubscribe at any time.
    Application form