Technical Compliance offers Internal and External services relating to Compliance Standards Regulations and Information Security to ensure alignment of our Technology offering with the obligations that the organization is exposed to.
These requirements come mainly from the Regulatory Compliance team but are also defined by other stakeholders such as Finance Payments Marketing etc.
As an Identity / Privileged Access Management Specialist you will be responsible for coordinating and reviewing Technical Compliances quarterly Privileged User Access Review process. The role is to engage with the key business owners and guide an evaluation of defined roles and their appropriateness. As part of Technical Compliance you will assist with designing and implementing improvements to address identified gaps and to help adapt the security posture of the organisation to the evolving global threat and regulatory landscape.
Primary Responsibilities:
- Assist managing the IT and Information Security access audits across the global Entain business:
- Assist in defining the global access review process and how they meet the Cybersecurity requirements
- ISO27001 PCIDSS and ITGC Identity access requirements.
- Own the periodic / quarterly user access review process and ensure it runs effectively.
- Assist with coordinating multiple concurrent external audit requests for PUAR detail in IT and Cybersecurity audits support several stakeholders:
- Regulatory compliance
- Finance
- B2B partners
- Other assessments
- Partner with the business to coordinate and conduct privileged user access assessments
- Assist Technical Compliance program of expanding the user access reviews across all key applications ensuring adherence to information security policy.
- Assist with the selection of a Identity Access control system for the business.
- Apply basic scripting skills at Operating system layer for access logs review & auditing.
- Assist with designing Cybersecurity controls to adapt to new emerging threats and challenges.
- Design and implement improvements to Cybersecurity processes and controls to increase their effectiveness.
- Design and implement changes in the Technology platform to align with Cybersecurity compliance requirements.
- Assist with Cybersecurity discussions with regulators B2B partners and other external stakeholders as subject matter expert.
- Analyze existing and upcoming IT Product and Cybersecurity regulatory obligations and translate these into Entain policies processes and controls.
- Execute projects to implement the group Technical Compliance strategy.
- This role performance will directly impact the costs of bringing our technology and applications aligned with jurisdictional regulatory requirements participating in key decisions to enter new markets.
Qualifications :
Essential
- At least two years experience in a similar role working in the following areas:
- Privileged and User Access Control IT and Cybersecurity Audits
- ISO 27001 SOC or PCI DSS audit experience
- Risk management
- Excellent knowledge of Cybersecurity processes as well as outstanding technical knowledge of the underlying technical foundations
- Minimum 1 year of Handson experience on Linux windows server environments as part of auditing.
- Good technical understanding of various Authentication methods & Identity & Access Management types
- Customeroriented person with the ability to educate a nontechnical audience on Technical Compliance and Cybersecurity subjects.
Desired
- B. Tech in Cybersecurity or CS or IT.
- Previous experience in security consultancy
- Familiar with global Security Standards such as SOC NIST ISO GLI33 etc.
- Basic understanding of Windows PowerShell Linux Shell scripting.
- Relevant professional qualifications will be considered although not a requirement e.g. CISA CISM CISSP GIAC PCI ISA etc.
- Relevant professional qualifications will be considered although not a requirement.
Competencies/behaviours
With the capacity to display initiative as part of a very strong Technology Governance team this position plays a key role in ensuring the continued alignment of our Technology department with business objectives.
The Candidate should be able to think laterally; suggest process improvements; drive results; Confident with other team members and able to engage with Vendor third parties to ensure Entains data and confidentiality is maintained to the highest of security standards.
Remote Work :
No
Employment Type :
Fulltime