Share
Job Description
Current Contingent Workers apply
healthcare biopharma companyand be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare.
Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products.
Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats.
connections and share best practices across the Tech Centers.
Role Overview
Cybersecurity Engineer, you willbe responsible fordesigning, implementing, andsecurity measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches.You will be tasked with, supporting the response to incidents, and ensuring that security protocolsand controlsare adhered to. Your role is vital in safeguarding critical assets and ensuring compliance with legal and regulatory standards.
What will you do in this role:
Contribute to the development of enhanced cloud and application security control integrations and architectural best practices.
tothe development and implementation of product security policies and standards to ensure that application, cloud services and infrastructure meet organizational security requirements.
maintainand monitor security tools and dashboards, ensuring that applications deployed in our environments adhere to organizational security standards and compliance requirements.
Identify
Follow standard approaches and established design patterns to createnew designsfor systems or system components.Identifyand resolve minor design issues.
ssistin implementing andmaintainingspecific security controls as required by organisational policyandlocal risk assessments and contribute toidentifyingrisks that arise from potential technical solution architectures.
Monitor and log the actual service provided, compared to that required by service level agreements.
Undertake low-complexity routine vulnerability assessments using automated and semi-automated tools and contribute toevaluatingand documentingthe scope of results.
Design, implement, test, document, and support integration of security tools and technologies in pipelines, Also,assistthe product teams in related activities
Assistinmaintainingsecurity infrastructure and performing system updates
Investigate minor security breachesin accordance withestablished procedures.Assistusers in defining their access rights and privileges and perform non-standard operational security tasks. Resolve security events and operational security issues.
Work closely with cross-functional Infrastructure teams on Automation and Orchestration.
Create and document detailed designs for simple software applications or components. Apply agreedmodellingtechniques, standards, patterns,and tools.
Work within a matrix organizational structure, reporting to both the functional manager and the project manager.
What should you have:
Bachelors’ degree in Information Technology, Computer Science or any Technology stream.
Working experience in cloud environments AWS must have and good to have Azure, or GCP.
Understanding of OWASP Top 10 security risks and mitigation strategies, relevant NIST standards, and Zero Trust principles.
Familiarity withprogramming/scriptinglanguages like Python, Bash, Terraform, Ansible, JSON, PowerShell, or JavaScript for automating tasks.
Familiarity with software development/delivery lifecycle and related technologies
1+ years of hands-on experience working with network protocols, firewalls, intrusion detection systems, encryption technologies, and endpoint security solutions.
in security tools in the areas of cloud, application, endpoint, network or identity, vulnerability scanners, and malware analysisplatforms..
Knowledge of authentication methods, identity management, and security access protocols (e.g., SSO, MFA, LDAP).
Ideally AWS certified.
Good interpersonal and communication skills (verbal and written).
Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are oftenrequiredor highly desirable.
Proven record of delivering high-quality results.
Product and customer-centric approach.
Innovative thinking, experimental mindset.
*A job posting is effective until 11:59:59PM on the dayBEFOREthe listed job posting end date. Please ensure you apply to a job posting no later than the dayBEFOREthe job posting end date.
These jobs might be a good fit