Executive Recruitment Company Monroe Consulting Group Indonesia is recruiting on behalf of a reputable property developer for the role of Infrastructure Security and Governance Head. This job is based in Jakarta.
Key Responsibilities:
Infrastructure Management:
- Develop and execute robust strategies for the organization's IT infrastructure.
- Involve in infrastructure design, implementation, and maintenance of server, storage, and network infrastructure
- Establish and manage disaster recovery and business continuity plans.
Security Enforcement:
- Establish and implement a profound security policies and procedures.
- Contributing in the Implementation and management of security technologies such as Antivirus, firewall, and encryption.
- Conducting regular security assessments and audits to identify and solve vulnerabilities
- Define and assess potential cyberthreats and risk and develop mitigation strategies.
- Implement procedures of incident response to address security incidents
Governance and Compliance:
- Develop and enforce IT governance frameworks and ensuring compliance with industry and company's regulation and policy
- Monitor and report on compliance with security standards and regulatory requirements.
- Collaborate with other related teams such as enterprise risk, internal audit, and compliance teams in regards of Governance and Compliance
Team Leadership and Development:
- Lead a team of IT professionals and providing guidance and support in the infrastructure, security, and governance field
- Foster a culture of continuous learning and development within the IT department.
Requirements:
- Hold a Bachelor's or Master's degree in Information Technology, Computer Science, or related field.
- Proven track and experience in IT infrastructure management, security, and governance.
- Hold certifications in the Infrastructure Security and Governance area such as CISSP, CISM, or ITIL.
- Showcase a strong leadership personality and communication skills.
- Thorough understanding of current IT trends, security threats, and best practices