{"id":1308,"date":"2021-07-29T16:50:32","date_gmt":"2021-07-29T15:50:32","guid":{"rendered":"https:\/\/azara.ma\/?p=1308"},"modified":"2021-08-15T21:58:39","modified_gmt":"2021-08-15T20:58:39","slug":"ingenieur-securite-de-linformation-cons-2872","status":"publish","type":"post","link":"https:\/\/azara.ma\/en\/ingenieur-securite-de-linformation-cons-2872\/","title":{"rendered":"Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872]"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Missions&nbsp;<\/h2>\n\n\n\n<ul><li>Assurer<ul><li>Le pilotage et la MOA des projets s\u00e9curit\u00e9<\/li><li>L\u2019\u00e9valuation des risques IT pour les projets informatiques bancaire et infrastructure<\/li><li>La formalisation des proc\u00e9dures et processus s\u00e9curit\u00e9 de l\u2019information<\/li><li>Le reporting<\/li><li>L\u2019audit technique des syst\u00e8mes et des applications<\/li><\/ul><\/li><li>Garantir<ul><li>L\u2019appr\u00e9ciation des risques IT aussi bien sur le volet fonctionnel que technique<\/li><li>La bonne application des principes de gestion des risques et la proposition de solutions permettant de limiter les risques identifi\u00e9s<\/li><\/ul><\/li><li>Contribuer<ul><li>\u00e0 la sensibilisation des utilisateurs<\/li><\/ul><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Activit\u00e9s principales :<\/h2>\n\n\n\n<ul><li>Documenter les politiques th\u00e9matiques de gestion de s\u00e9curit\u00e9 de l\u2019information en faisant le lien avec la strat\u00e9gie m\u00e9tier<\/li><li>Appr\u00e9cier les risques IT li\u00e9s aux projets et exprimer des recommandations et mesures de traitement de risque<\/li><li>Accompagner les projets agiles et la transformation digitale de la banque<\/li><li>S\u2019assurer de la bonne prise en charge des mesures exprim\u00e9es et r\u00e9\u00e9valuer les risques r\u00e9siduels des projets<\/li><li>Formaliser et pr\u00e9senter les risques IT aux m\u00e9tiers concern\u00e9s<\/li><li>Analyser les actifs critiques de l\u2019entreprise et identifier leur faiblesse et leur vuln\u00e9rabilit\u00e9 face aux intrusions ou aux attaques<\/li><li>Etablir et suivre un plan de gestion du risque pour organiser et produire des plans d\u2019action pr\u00e9ventifs<\/li><li>R\u00e9aliser des audits techniques et pentest sur des applications internes et externes<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Nombre d\u2019ann\u00e9e minimum d\u2019exp\u00e9rience&nbsp;<\/h2>\n\n\n\n<ul><li>Exp\u00e9rience professionnelle d\u2019au moins 5 ans dans la s\u00e9curit\u00e9 de l\u2019information et les analyses de risque requise<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Comp\u00e9tences g\u00e9n\u00e9rales<\/h2>\n\n\n\n<ul><li>Maitrise des m\u00e9thodes d\u2019analyse de risque (EBIOS ou \u00e9quivalents)<\/li><li>Ma\u00eetrise les bonnes pratiques et normes d\u2019analyse de risque au sens ISO 27005<\/li><li>Ma\u00eetrise les recommandations normatives en termes de mesures de traitement de risque (ISO 27002)<\/li><li>Maitrise la DNSSI et la directive annexe pour les infrastructures d\u2019importance vitale<\/li><li>Bonne communication<\/li><li>Facult\u00e9 d\u2019adaptation<\/li><li>Connaissance du domaine bancaire<\/li><li>Connaissance de la m\u00e9thodologie Agile de gestion de projet (par ex. Scrum), avec une exp\u00e9rience en analyse de risques et accompagnement de projets Agiles<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Comp\u00e9tences s\u00e9curit\u00e9 de l\u2019information&nbsp;<\/h2>\n\n\n\n<ul><li>Ma\u00eetrise :<ul><li>Les bonnes pratiques et les normes en mati\u00e8re de s\u00e9curit\u00e9 de l\u2019information<\/li><li>les recommandations normatives en termes de mesures de traitement de risque (ISO 27002)<\/li><li>les techniques de d\u00e9tection de s\u00e9curit\u00e9, y compris li\u00e9es aux objets mobiles et num\u00e9riques<\/li><li>les techniques de cyber-attaque et les contre-mesures pour les pr\u00e9venir<\/li><li>les investigations informatiques \u00e0 mener suite \u00e0 une cyber-attaque<\/li><li>les bonnes pratiques (m\u00e9thodes) et normes et standards en mati\u00e8re d\u2019analyse des risques (ISO 27005)<\/li><li>les normes de s\u00e9curit\u00e9 pour les d\u00e9veloppements applicatifs, id\u00e9alement en adaptation avec les concepts de DevOps et services Cloud<\/li><li>Les Techniques et m\u00e9thodologie d\u2019audit et test d\u2019intrusion<\/li><\/ul><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Date limite de r\u00e9ponse<\/h2>\n\n\n\n<p>La date limite pour postuler est le<strong> 16\/08\/2021 avant 12h<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Missions&nbsp; Assurer Le pilotage et la MOA des projets s\u00e9curit\u00e9 L\u2019\u00e9valuation des risques IT pour les projets informatiques bancaire et infrastructure La formalisation des proc\u00e9dures et processus s\u00e9curit\u00e9 de l\u2019information Le reporting L\u2019audit technique des syst\u00e8mes et des applications Garantir L\u2019appr\u00e9ciation des risques IT aussi bien sur le volet fonctionnel que technique La bonne application [&hellip;]<\/p>","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[155],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872] - AZARA Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azara.ma\/en\/ingenieur-securite-de-linformation-cons-2872\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872] - AZARA Consulting\" \/>\n<meta property=\"og:description\" content=\"Missions&nbsp; Assurer Le pilotage et la MOA des projets s\u00e9curit\u00e9 L\u2019\u00e9valuation des risques IT pour les projets informatiques bancaire et infrastructure La formalisation des proc\u00e9dures et processus s\u00e9curit\u00e9 de l\u2019information Le reporting L\u2019audit technique des syst\u00e8mes et des applications Garantir L\u2019appr\u00e9ciation des risques IT aussi bien sur le volet fonctionnel que technique La bonne application [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azara.ma\/en\/ingenieur-securite-de-linformation-cons-2872\/\" \/>\n<meta property=\"og:site_name\" content=\"AZARA Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-29T15:50:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-15T20:58:39+00:00\" \/>\n<meta name=\"author\" content=\"A. Ennabo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AzaraConsulting\" \/>\n<meta name=\"twitter:site\" content=\"@AzaraConsulting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"A. Ennabo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/\"},\"author\":{\"name\":\"A. Ennabo\",\"@id\":\"https:\/\/azara.ma\/#\/schema\/person\/bf27c1ed90f3b229c217aeefb947f348\"},\"headline\":\"Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872]\",\"datePublished\":\"2021-07-29T15:50:32+00:00\",\"dateModified\":\"2021-08-15T20:58:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/\"},\"wordCount\":496,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azara.ma\/#organization\"},\"articleSection\":[\"Offres de missions \u00e9chues\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/\",\"url\":\"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/\",\"name\":\"Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872] - AZARA Consulting\",\"isPartOf\":{\"@id\":\"https:\/\/azara.ma\/#website\"},\"datePublished\":\"2021-07-29T15:50:32+00:00\",\"dateModified\":\"2021-08-15T20:58:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/azara.ma\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azara.ma\/#website\",\"url\":\"https:\/\/azara.ma\/\",\"name\":\"AZARA Consulting\",\"description\":\"Transformation Digitale et Agile\",\"publisher\":{\"@id\":\"https:\/\/azara.ma\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azara.ma\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azara.ma\/#organization\",\"name\":\"AZARA Consultng\",\"url\":\"https:\/\/azara.ma\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azara.ma\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azara.ma\/wp-content\/uploads\/2021\/03\/azara-consulting-logo-nouveau.png\",\"contentUrl\":\"https:\/\/azara.ma\/wp-content\/uploads\/2021\/03\/azara-consulting-logo-nouveau.png\",\"width\":1034,\"height\":244,\"caption\":\"AZARA Consultng\"},\"image\":{\"@id\":\"https:\/\/azara.ma\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/AzaraConsulting\",\"https:\/\/www.linkedin.com\/company\/azara-consulting\/mycompany\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azara.ma\/#\/schema\/person\/bf27c1ed90f3b229c217aeefb947f348\",\"name\":\"A. Ennabo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azara.ma\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/11accfc0e8bfc13a38f3b0949e68683d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/11accfc0e8bfc13a38f3b0949e68683d?s=96&d=mm&r=g\",\"caption\":\"A. Ennabo\"},\"url\":\"https:\/\/azara.ma\/en\/author\/aennaboazara-ma\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872] - AZARA Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azara.ma\/en\/ingenieur-securite-de-linformation-cons-2872\/","og_locale":"en_US","og_type":"article","og_title":"Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872] - AZARA Consulting","og_description":"Missions&nbsp; Assurer Le pilotage et la MOA des projets s\u00e9curit\u00e9 L\u2019\u00e9valuation des risques IT pour les projets informatiques bancaire et infrastructure La formalisation des proc\u00e9dures et processus s\u00e9curit\u00e9 de l\u2019information Le reporting L\u2019audit technique des syst\u00e8mes et des applications Garantir L\u2019appr\u00e9ciation des risques IT aussi bien sur le volet fonctionnel que technique La bonne application [&hellip;]","og_url":"https:\/\/azara.ma\/en\/ingenieur-securite-de-linformation-cons-2872\/","og_site_name":"AZARA Consulting","article_published_time":"2021-07-29T15:50:32+00:00","article_modified_time":"2021-08-15T20:58:39+00:00","author":"A. Ennabo","twitter_card":"summary_large_image","twitter_creator":"@AzaraConsulting","twitter_site":"@AzaraConsulting","twitter_misc":{"Written by":"A. Ennabo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/#article","isPartOf":{"@id":"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/"},"author":{"name":"A. Ennabo","@id":"https:\/\/azara.ma\/#\/schema\/person\/bf27c1ed90f3b229c217aeefb947f348"},"headline":"Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872]","datePublished":"2021-07-29T15:50:32+00:00","dateModified":"2021-08-15T20:58:39+00:00","mainEntityOfPage":{"@id":"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/"},"wordCount":496,"commentCount":0,"publisher":{"@id":"https:\/\/azara.ma\/#organization"},"articleSection":["Offres de missions \u00e9chues"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/","url":"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/","name":"Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872] - AZARA Consulting","isPartOf":{"@id":"https:\/\/azara.ma\/#website"},"datePublished":"2021-07-29T15:50:32+00:00","dateModified":"2021-08-15T20:58:39+00:00","breadcrumb":{"@id":"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azara.ma\/ingenieur-securite-de-linformation-cons-2872\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/azara.ma\/"},{"@type":"ListItem","position":2,"name":"Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872]"}]},{"@type":"WebSite","@id":"https:\/\/azara.ma\/#website","url":"https:\/\/azara.ma\/","name":"AZARA Consulting","description":"Transformation Digitale et Agile","publisher":{"@id":"https:\/\/azara.ma\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azara.ma\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azara.ma\/#organization","name":"AZARA Consultng","url":"https:\/\/azara.ma\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azara.ma\/#\/schema\/logo\/image\/","url":"https:\/\/azara.ma\/wp-content\/uploads\/2021\/03\/azara-consulting-logo-nouveau.png","contentUrl":"https:\/\/azara.ma\/wp-content\/uploads\/2021\/03\/azara-consulting-logo-nouveau.png","width":1034,"height":244,"caption":"AZARA Consultng"},"image":{"@id":"https:\/\/azara.ma\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/AzaraConsulting","https:\/\/www.linkedin.com\/company\/azara-consulting\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/azara.ma\/#\/schema\/person\/bf27c1ed90f3b229c217aeefb947f348","name":"A. Ennabo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azara.ma\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11accfc0e8bfc13a38f3b0949e68683d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11accfc0e8bfc13a38f3b0949e68683d?s=96&d=mm&r=g","caption":"A. Ennabo"},"url":"https:\/\/azara.ma\/en\/author\/aennaboazara-ma\/"}]}},"_links":{"self":[{"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/posts\/1308"}],"collection":[{"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/comments?post=1308"}],"version-history":[{"count":2,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/posts\/1308\/revisions"}],"predecessor-version":[{"id":1324,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/posts\/1308\/revisions\/1324"}],"wp:attachment":[{"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/media?parent=1308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/categories?post=1308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/tags?post=1308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}