KEY RESULTS ACCOUNTABILITIES
# Responsible for providing specialist inputs and review to the Request for Proposals (RfP) and for IT security
requirements and standards compliance
# Study, define, evaluate, recommend, plan and implement Information Security controls throughout the systems
development life cycle
# Bridge the gaps between security compliance and business requirements by identifying compensating
mitigation methods and/or determining the appropriate processes or controls required
# Identifies new and emerging IT security related technologies and assesses their relevance to RTA strategy and
architecture
# Perform other related duties as assigned
# Creates, reviews, and improves RTA IT security architecture practices and standards including but not limited
to cyber security, identity and access management, single sign-on, information classification, data leak
prevention, and security incident and event management
# Provide expert advice to project managers on IT security programs and projects and may lead or manage
complex IT security programs and projects
# Plan, develop, maintain, and improve the Information Security Management System (ISMS) for RTA
# Follow the ITIL standards to evaluate and approve request for changes and improve change management
procedures and post implementation audits for all operational infrastructure changes
# Develop and document corporate information security policies, standards and guidelines taking into
consideration any and all security ramifications, risk assessment and compliance issues
# Evaluate the project level compliance of all IT projects for RTA according to Enterprise Architectural standards
of RTA
# Review the security features of existing and new computing system to ensure that they meet the security
requirements of existing policies and hence ensure compliance to information security policies and procedures
# Supervises the delivery of IT security training material and training programs to end-users and RTA users
# Provides in-depth analysis of IT security architecture elements and identify target architectures and gaps from
baseline in line with RTA technology strategy
# Identifies, evaluates and recommends IT security architecture options for developed business cases
# Provides expert advice to technology portfolio manager on the portfolio dependencies and re-use of existing IT
security capabilities
# Establish design, guidelines and requirements of IT security and ensure that IT security architecture model are
part of any project
# Coordinate Information Systems audits to assess the effectiveness of security controls
# Analyses and assesses critical and high security vulnerabilities and incidents
# Identify Information Security risks and propose mitigating controls and oversee their implementation