1. 執行第三方資訊安全相關管理系統的驗證稽核服務。
(如:資訊安全管理系統、個資管理系統、營運持續管理系統、Cyber Security相關...)。
2.新國際資安標準的研讀及推動。
3 .擔任相關管理系統課程的教育訓練講師,如:公開班或包班講師。
Key responsibilities and accountabilities
· Ensure that value is added to customers and their business/organization through the assessment of their systems and processes against BSI requirements
· Prepare assessment reports and deliver findings to clients to ensure client understanding of the assessment decision and clear direction to particular items of corrective action where appropriate.
· Recommend the issue, re-issue or withdrawal of certificates, and report recommendations in accordance with BSI policy, procedures and prescribed time frame.
· Continually enhance & uphold the reputation and perception of BSI through excellent planning, delivery, report writing and day-to-day interactions with customers and other key stakeholders
· Demonstrate commercial acumen and real added value when feeding back to clients
· Continually demonstrate a professional and engaging approach w
• 制定和實施集團全面資訊安全策略與計劃。
• 評估潛在的安全風險,並制定相應緩解措施。
• 與IT團隊合作,確保安全措施得到有效執行。
• 定期進行安全審計和風險評估
• 為集團全體員工提供資訊安全培訓和意識提升。
• 監控安全基礎設施,確保系統和數據的安全。
I. Program Management
1. ISMS/Trade Secret Implementation and Maintenance
2. 配合事業單位建置資訊安全專案
3. 跨部門資訊安全事務之協調
4. 進行電腦鑑識與法律配合行動
II. Maintenance and Management of Information Security Solutions and Equipment
1. Security Monitoring
2. Event & Incident Management
III. Risk assessment and management
IV. Security Audit
1. 執行內部安全查核,包含制度管理定期查核、IT環境安全評估、專案查核等
2. 配合客戶要求查核及執行委外安全查核
【主要工作內容】
1.資訊安全相關專案執行
2.維運及管理個人資料防護系統
3.維運及管理帳號權限管理系統
4.維運及管理資料庫稽核系統
5.執行弱點掃描作業
6.資訊安全事件分析與後續追蹤
7.定期辦理資訊安全事件演練,如分散式阻斷服務攻防演練、模擬駭客攻擊演練、防範個資洩漏演練。
8.辦理資訊安全通報作業
【Job description】
1.Executing information security projects
2.Maintaining and managing personal data protection system, DLP
3.Maintaining and managing user access permissions
4.Maintaining and managing database audit system
5.Performing the vulnerability scan
6.Information security incident analysis and follow-up
7.Regularly conducting the information security incident drill such as decentralized denial of service, DDOS, attack and defense
drill, simulated hacker attack drills and drills on preventing personal information leakage
8.Handling information security notification