Job Description
Secure Remote Access and Network IsolationSheffield
The Head of Proxies and Remote Access is a capability owner role and reports to the Global Head of Network Security.
Capability owners define and maintain Capability Strategy, supported by Enterprise Architecture, Security Architecture and Control Owners, in response to business strategies, regulator expectations, technology and practise advancement, best practise and threat actor evolution, they also runs / drives respective Delivery forums, QBRs, SteerCos and Capability PODs.
Defines & delivers vision, strategy & roadmap of the Capability.
Prioritises teams' backlogs based on objectives & value released to identify what teams work on next.
Lead definition of scope and prioritisation of user stories to be developed in teams, including acceptance criteria/definition of done.
Leads vendor relationships with owned technologies.
Interacts with stakeholders across the organisation to understand their security needs and expectations.
Evaluate and adoption of new technologies and practices which may impact the control environment.
Monitors & communicates progress of capability performance through agreed KPIs and metrics
Runs a Pod per L2 capability with Architecture, Engineering, Service Delivery, Control Owner, Program Manager and Product Management
The Head Of Proxies and Remote Access is responsible for developing and leading strategies to enhance forward and reverse proxying of network traffic into and out of HSBCs network infrastructure, as well as remote access for colleagues and 3rd parties remotely accessing the HSBC network. The role ensures the implementation and management of comprehensive internet proxy, content filtering, and remote access/B2B VPN solutions, that underpin a number of key cybersecurity controls moving forward. The role will involve significant collaboration throughout HSBC. This position requires strong technical expertise, strategic vision, and strong leadership and communication skills to ensure success.
͏
Do
1. Design and develop enterprise cyber security strategy and architecture
a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses
b. Identify risks associated with business processes, operations,
information security programs and technology projects
c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge
d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations
f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc.
g. Provide support during technical deployment, configuration, integration and administration of security technologies
h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc.
i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity
j. Provide solution of RFPâÃÂÃÂs received from clients and ensure overall design assurance
͏
i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives
ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture
iii. Depending on the clientâÃÂÃÂs need with particular standards and technology stacks create complete RFPs
iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology
v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions
vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps
vii. Evaluate and recommend solutions to integrate with overall technology ecosystem
viii. Tracks industry and application trends and relates these to planning current and future IT needs
͏
2. Stakeholder coordination & audit assistance
a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations
b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security
c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements
d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers
e. Provide training to employees on issues such as spam and unwanted or malicious emails
͏
Deliver
| No | Performance Parameter | Measure |
| 1 | Customer centricity | Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. |
| 2 | Support sales team to create wins | % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led |
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.