Life on the team
Operates the Third-Party Cyber Risk Management framework to ensure cybersecurity risks related to our supply chain are effectively, managed to maintain a resilient and compliant security posture.
What you’ll do
Operate the Third-Party Cyber Risk Management Framework (~ 90%)
- Third-Party Risk Management framework : operate processes and procedures as part of the Third-Party Cyber Risk Management framework.
- Third-Party Risk Assessment : Identify, assess, evaluate, monitor and communicate cybersecurity risks within our supply chain across Computacenter, ensuring new and existing suppliers respond to robust cybersecurity questionnaires aligned to our cybersecurity control set.
- Third-Party Security Posture : Operate supply chain cyber posturing tooling to proactively monitor the security of our key suppliers.
- Third-Party Risk Mitigation Plans : Work with supplier relationship owners, BISOs and supplier management teams to creation of risk management plans, controls, and mitigation strategies to minimise risk related to suppliers.
- Reporting : in collaboration with the Security Management Office and GIS Performance Management, create timely and high-quality reporting on third-party cyber risk that feeds into governance forums such as the Security Risk Review.
Business Engagement and Collaboration (~10%)
Work closely with supplier, partner and vendor management teams, supplier relationship owners and BISOs to identify, assess and manage risks within the business’ supply chain.Work with the relevant business stakeholders to identify and evaluate actions to improve effectiveness of controls and risk mitigation.Collaborate with other teams, BISOs, Security Management Office and business stakeholders to collate relevant information to support the third-party cyber risk assessment process, taking large volumes of complex data and translating into actionable insights.What you’ll need
More than 6 years of professional experience in an Information Security / Cyber Security function in an international environment, Completed university degree.GIS operating modelGIS adopted frameworks and processes including ITIL, SAFe, DevSecOps, etc.Key Competencies (SFIA Codes and levels where applicable)
Information security SCTY.Governance GOVNRisk management BURMInformation assurance INASStakeholder relationship management RLMTKey Technical Skills (SFIA Codes where applicable)
Knowledge across cybersecurity domains.Security+ or equivalent certified.Cybersecurity frameworks including NIST CSF, NIST 800-53, Secure Controls Framework and CE+.Information security standards including GDPR, TISAX, SOC 2, ISO27001 and ISO27005.Has broad IT estate / technology knowledge.