Activez les alertes d’offres d’emploi par e-mail !

Cybersecurity And Data Protection Specialist (Dpo) - Xerox Espana, S.A.U.

buscojobs España

Lyon

Sur place

EUR 40 000 - 60 000

Plein temps

Il y a 5 jours
Soyez parmi les premiers à postuler

Mulipliez les invitations à des entretiens

Créez un CV sur mesure et personnalisé en fonction du poste pour multiplier vos chances.

Résumé du poste

A leading company specializing in technology solutions seeks a Cybersecurity and Data Protection Specialist (DPO) to manage risk strategies and resolve information security incidents. This mid-senior level position requires expertise in data protection laws and clear communication skills, along with relevant certifications in cybersecurity. The successful candidate will play a crucial role in safeguarding information systems and enhancing overall data integrity.

Qualifications

  • 3-5 years of experience in cybersecurity and data protection.
  • Fluent in Spanish and English at a professional level.
  • At least one security certification like CISSP or CISM is required.

Responsabilités

  • Plan and implement risk management strategies and processes.
  • Conduct risk assessments for information systems.
  • Apply risk management controls to enhance security.

Connaissances

Data protection regulations
Analytical skills
Problem-solving skills
Knowledge of security tools
Team communication

Formation

Degree in Computer Science
Degree in Cybersecurity
Degree in IT Engineering

Description du poste

Cybersecurity and Data Protection Specialist (DPO) - Xerox Espana, S.A.U.

EUR 40.000 - 60.000

Cybersecurity and Data Protection Specialist (DPO) - Xerox Espana, S.A.U.

Get AI-powered advice on this job and more exclusive features.

About Xerox Holdings Corporation

For more than 100 years, Xerox has continually redefined the workplace experience. Harnessing our leadership position in office and production print technology, we’ve expanded into software and services to sustainably power the hybrid workplace of today and tomorrow. Today, Xerox is continuing its legacy of innovation to deliver client-centric and digitally-driven technology solutions and meet the needs of today’s global, distributed workforce. From the office to industrial environments, our differentiated business and technology offerings and financial services are essential workplace technology solutions that drive success for our clients. At Xerox, we make work, work. Learn more about us at .

Purpose :

Responsible for planning and implementing risk management strategies, processes and programs. Manages resolution of incidents / problems throughout the information system lifecycle, including classification, prioritization and initiation of action, documentation of root causes and implementation of remedies. Development and execution of information risk controls and management strategies. Procures and governs information risk management services and consultants.

The implementation of organization-wide processes and procedures for the management of operational risk.

The development of and execution of information risk controls and management strategies to maintain the confidentiality, integrity, availability, accountability and relevant compliance of information systems.

The resolution of incidents and problems throughout the information system lifecycle, including classification, prioritization and initiation of action, documentation of root causes and implementation of remedies.

This role will specialize on a specific technology and / or risk management discipline. Examples of specialization areas can be any technology, technique, method, product or application area as they pertain to the disciplines of information security, privacy, disaster recovery, and regulatory compliance.

Candidate must reside in Spain.

Primary Responsibilities :

  • Carries out risk assessment within a defined functional or technical area of business. Uses consistent processes for identifying potential risk events, quantifying and documenting the probability of occurrence and impact on the business. Refers to domain experts for guidance on specialized areas of risk, such as privacy, security architecture and environment. Coordinates the development of countermeasures and contingency plans.
  • Applies standard procedures to enhance security or resilience to system interruptions. Can take immediate action in an incident to limit business impact and escalates event to higher authority.
  • Applies and maintains specific risk management controls as required by organizational policy and local risk assessments to maintain confidentiality, integrity and availability of business information systems. Determines when issues should be escalated to a higher level. Demonstrates effective communication of risk management issues to business managers and others.
  • Maintains knowledge of specific technical specialisms, provides detailed advice regarding their application, executes specialized tasks. Implements and administers risk management technologies and process controls in a given specialism, and conducts compliance tracking. The specialism can be any area of information or communication technology, technique, method, product or application area.

Business Risk Management :

  • Carries out risk assessment within a defined functional or technical area of business. Uses consistent processes for identifying potential risk events, quantifying and documenting probability of occurrence and impact on the business.
  • Refers to domain experts for guidance on specialized areas of risk, such as privacy, compliance, architecture, finance and environment.
  • Co-ordinates response to quantified risks, which may involve acceptance, transfer, reduction or elimination. Assists with development of agreed countermeasures and contingency plans.
  • Monitors status of risks, and reports status and need for action to senior management.

Information Assurance :

  • Applies procedures to assess security of information and infrastructure components. Identifies risks of unauthorized access, data loss, compromise of data integrity, or risk of business interruption.
  • Reviews compliance to information security policies and standards. Applies procedures to assess compliance of hardware and software configurations to policies, standards, legal and regulatory requirements.
  • Communicates information assurance issues effectively to users and operators of systems and networks
  • Demonstrates effective communication of security issues to business managers and others.
  • Develops and maintains knowledge of the technical specialism by, for example, reading relevant literature, attending conferences and seminars, meeting and maintaining contact with others involved in the technical specialism and through taking an active part in appropriate learned, professional and trade bodies.
  • Maintains an awareness of current developments in the technical specialism.
  • Applies and maintains specific security controls as required by organizational policy and local risk assessments to maintain confidentiality, integrity and availability of business information systems.
  • Determines when security issues should be escalated to a higher level.
  • Analyzes incidents and problems to show trends and potential problem areas, so that actions can be taken to minimize the occurrence of incidents and to improve the process of problem reporting, analysis and clearance. Assesses and reports the probable causes of incidents and consequences of existing problems and known defects.
  • Conducts security control reviews in well defined areas.
  • Provides advice, both reactively and pro-actively, to those engaged in activities where the technical specialism is applicable, including those in areas such as budgetary and financial planning, litigation, legislation, and health and safety.
  • Identifies opportunities to apply the technical specialism within employing organization and closely associated organizations, such as customers, suppliers and partners, and advises those responsible.
  • Carries out specific assignments related to the technical specialism, either alone or as part of a team.
  • Maintains knowledge of the technical specialism at a detailed level, and is responsible for own personal growth and technical proficiency.

Requirements :

  • Academic Background : Degree in Computer Science, Cybersecurity, IT Engineering, Telco, or a related field.
  • Language : Spanish and English fluent speaker – professional level.
  • Experience : Minimum of 3-5 years of experience in cybersecurity and data protection.

Certifications :

At least one current professionally recognized security and privacy certification, examples include :

  • Certified Information Systems Security Professional (CISSP) : Advanced certification that validates the ability to design, implement, and manage a cybersecurity program.
  • Certified Information Security Manager (CISM) : Focused on information security management and IT governance.
  • Certified Data Protection Professional (CDPP) : Specific to data protection and GDPR compliance.
  • Certified Information Privacy Manager (CIPM) : privacy program administration to establish, maintain and manage a privacy program across all stages of its life cycle.

Required Skills :

  • Deep knowledge of data protection regulations (GDPR).
  • Deep knowledge of the NIS, NIS2 and DORA EU Directives.
  • Experience in managing security incidents.
  • Analytical and problem-solving skills.
  • Ability to work in a team and communicate effectively.
  • Knowledge of security tools and technologies (firewalls, IDS / IPS, SIEM).

Seniority level

  • Seniority level Mid-Senior level

Employment type

  • Employment type Full-time

Job function

  • Job function Engineering and Information Technology
  • Industries IT Services and IT Consulting, Software Development, and Retail Office Equipment

Referrals increase your chances of interviewing at Xerox by 2x

Junior Cybersecurity Analyst - Remote (Spain or the UK based)

Madrid, Community of Madrid, Spain 3 weeks ago

Information Security Engineer - (Remote - Worldwide)

Madrid, Community of Madrid, Spain 5 days ago

Madrid, Community of Madrid, Spain 1 month ago

AWS Cloud Security Specialist - 100% REMOTE

Madrid, Community of Madrid, Spain 6 months ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

J-18808-Ljbffr

Obtenez votre examen gratuit et confidentiel de votre CV.
ou faites glisser et déposez un fichier PDF, DOC, DOCX, ODT ou PAGES jusqu’à 5 Mo.