3-5 years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Job Category:
Information Services
See more jobs for students and recent grads who studied:
Data Policy Risk Engineer/DLP
Tell Us More About Your Job Preferences
By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this job isn't what you are looking for, click the frowny face. Learn More...

Follow This Company

Job Description

Permanent Full time role

Prestigious Global Company is currently seeking a Risk Security Engineer for the Data Loss Prevention/
DLP policies. Candidate will serve as an SME for the IS area, and perform risk management functions to both technical ond non-technical teams on a project basis.


  • Perform risk assessments for IT projects, technologies, vendors and service providers.
  • Coordinate with IT teams in delivering recommendations and following up on action items.
  • Maintain, manage and monitor compliance to ISO 27001 requirements.
  • Assist in coordination of the Security Awareness program
  • Research emerging threats, software vulnerabilities, and ensure these are remediated
  • Development and maintenance of security policies, standards, processes and guidelines
  • Help with long-term strategy and planning for the Information Security area


  • 3+ years working in area of risk management, governance, IT security,or compliance.
  • Data Loss Prevention experience
  • Security frameworks and regulations: ISO 27001, NIST, etc.
  • Knowledge of basic security technology capabilities.
  • Strong knowledge of anti-malware technologies.
  • Strong knowledge of security administration and role based security controls.
  • Strong knowledge of authentication technologies and their interaction with different platforms, both on-site and remote.
  • Knowledge of both client and server Firewalling technologies and their configuration and administration.
  • Knowledge of security systems log correlation and analysis.
  • Knowledge of data encryption technologies.
  • Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities.
  • Knowledge of web filtering and email SPAM prevention techniques.
  • Knowledge of vulnerability assessment and forensic tools.


Applicants must be eligible to work in the specified location

This company profile was created by AfterCollege and is about Request Technology - Craig Johnson. This page is not endorsed by or affiliated with Request Technology - Craig Johnson. For questions regarding company profiles, please email: care@aftercollege.com.