{"id":1630,"date":"2021-12-23T11:05:35","date_gmt":"2021-12-23T10:05:35","guid":{"rendered":"https:\/\/azara.ma\/?p=1630"},"modified":"2021-12-30T15:37:28","modified_gmt":"2021-12-30T14:37:28","slug":"ingenieur-cyber-it-gouvernance-cons-3185","status":"publish","type":"post","link":"https:\/\/azara.ma\/en\/ingenieur-cyber-it-gouvernance-cons-3185\/","title":{"rendered":"Ing\u00e9nieur Cyber IT gouvernance [CONS-3185]"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Missions<\/h2>\n\n\n\n<ul><li>L\u2019ing\u00e9nieur Cyber IT Gouvernance intervient dans le cadre des activit\u00e9s projets et r\u00e9currentes de la gouvernance CYBERSECURITE de la r\u00e9gion Afrique<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Activit\u00e9s principales&nbsp;<\/h2>\n\n\n\n<ul><li>Activit\u00e9s r\u00e9currentes :<ul><li>Piloter les alertes DLP (Data Leakage) afin d\u2019identifier au plus vite des cas av\u00e9r\u00e9s de fuites de donn\u00e9es<\/li><li>Prendre le lead sur les investigations de \u00ab Forensic \u00bb issus d\u2019incidents de s\u00e9curit\u00e9 en coordination avec les \u00e9quipes CSIRT ITG \/ Groupe et IRB Head Office<\/li><li>Suivre les plans d\u2019actions issus des \u00e9v\u00e9nements et incidents de s\u00e9curit\u00e9, publier les indicateurs et dashboards de suivi<\/li><li>Assurer le suivi des vuln\u00e9rabilit\u00e9s publi\u00e9es par les \u00e9quipes CSIRT et\/ou issues des scans de vuln\u00e9rabilit\u00e9 internes \/ externes en coordination avec les \u00e9quipes de s\u00e9curit\u00e9 op\u00e9rationnelle ProdSec<\/li><li>Comprendre, challenger et traiter les demandes r\u00e9currentes d\u2019acc\u00e8s utilisateurs, d\u00e9rogations de droits et privil\u00e8ges, whitelisting et autres demandes ne respectant pas les politiques en vigueur, intervenir dans le processus de validation des flux<\/li><li>Suivre et publier les indicateurs de d\u00e9rogation aux politiques en vigueur avec un objectif proche de z\u00e9ro<\/li><li>Pr\u00e9parer et animer les comit\u00e9s Cybers\u00e9curit\u00e9 p\u00e9riodiques selon les fr\u00e9quences d\u00e9finies par la direction, aliment\u00e9s par des indicateurs de performance (KPI) et risque (KRI) synth\u00e9tis\u00e9s dans des dashboards de suivi<\/li><li>Prendre le lead sur la coordination des audits issus ou ayant besoin de contributions des \u00e9quipes s\u00e9curit\u00e9 avec un suivi de bout en bout<\/li><li>Suivre et publier des \u00e9tats r\u00e9guliers des plans d\u2019actions issus des recommandations d\u2019audits internes ou externes en coordination avec l\u2019ensemble des parties prenantes<\/li><li>Prendre le lead sur la coordination et le suivi des contr\u00f4les internes li\u00e9s aux activit\u00e9s Cybers\u00e9curit\u00e9, Risques IT et R\u00e9silience IT, suivre les plans d\u2019actions identifi\u00e9s avec l\u2019ensemble des parties prenantes<\/li><li>Participer activement \u00e0 la veille s\u00e9curit\u00e9 et aux communications li\u00e9es<\/li><li>Intervenir de fa\u00e7on active dans la sensibilisation Cybers\u00e9curit\u00e9 des populations internes \/ prestataire de la DSI r\u00e9gion Afrique, suivre le statut d\u2019avancement des E-Learnings dans le cadre de la Cyberculture<\/li><\/ul><\/li><li>Activit\u00e9s projets :<ul><li>S\u00e9curiser les applications du patrimoine en r\u00e9alisant des scans de vuln\u00e9rabilit\u00e9 applicatifs r\u00e9guliers, impl\u00e9mentation du mod\u00e8le sSDLC (secure Software Delivery Life Cycle) et int\u00e9gration de la \u00ab Security by Design \u00bb au d\u00e9but des phases projets<\/li><li>Maitriser la s\u00e9curit\u00e9 des fournisseurs de l\u2019ensemble de la r\u00e9gion en ligne avec les politiques en vigueur via un plan d\u2019assurance s\u00e9curit\u00e9 coh\u00e9rent incluant des audits r\u00e9guliers<\/li><li>Revue fr\u00e9quente des clauses s\u00e9curit\u00e9 dans les contrats fournisseurs<\/li><li>Identifier les liaisons externes pour l\u2019ensemble des fournisseurs et prestataires<\/li><\/ul><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Comp\u00e9tences<\/h2>\n\n\n\n<ul><li>Comp\u00e9tences m\u00e9tiers :<ul><li>Connaissances s\u00e9curit\u00e9 organisationnelle<\/li><li>Exp\u00e9rience de suivi d\u2019audits<\/li><li>Exp\u00e9rience contr\u00f4le interne<\/li><li>Impl\u00e9mentation certifications s\u00e9curit\u00e9<\/li><li>Connaissances Cybers\u00e9curit\u00e9<\/li><li>Connaissance des risques et sensibilisation aux risques<\/li><\/ul><\/li><li>Comp\u00e9tences transverses :<ul><li>Capacit\u00e9 \u00e0 animer une r\u00e9union, un s\u00e9minaire, un comit\u00e9, une formation<\/li><li>Capacit\u00e9 \u00e0 \u00e9laborer et \u00e0 adapter un processus<\/li><li>Capacit\u00e9 \u00e0 g\u00e9rer un projet<\/li><li>Capacit\u00e9 d&rsquo;analyse<\/li><\/ul><\/li><li>Comp\u00e9tences comportementales :<ul><li>Capacit\u00e9 \u00e0 communiquer &#8211; \u00e0 l&rsquo;oral et par \u00e9crit<\/li><li>Cr\u00e9ativit\u00e9 &amp; Innovation \/ Capacit\u00e9 \u00e0 r\u00e9soudre des probl\u00e8mes<\/li><li>\u00catre orient\u00e9 r\u00e9sultat<\/li><li>Curiosit\u00e9 et autonomie<\/li><li>Rigueur<\/li><\/ul><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Date limite de r\u00e9ponse<\/h2>\n\n\n\n<p>La date limite pour postuler est le<strong> 30\/12\/2021 avant 12h<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Missions L\u2019ing\u00e9nieur Cyber IT Gouvernance intervient dans le cadre des activit\u00e9s projets et r\u00e9currentes de la gouvernance CYBERSECURITE de la r\u00e9gion Afrique Activit\u00e9s principales&nbsp; Activit\u00e9s r\u00e9currentes : Piloter les alertes DLP (Data Leakage) afin d\u2019identifier au plus vite des cas av\u00e9r\u00e9s de fuites de donn\u00e9es Prendre le lead sur les investigations de \u00ab Forensic \u00bb [&hellip;]<\/p>","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[155],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ing\u00e9nieur Cyber IT gouvernance [CONS-3185] - AZARA Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azara.ma\/en\/ingenieur-cyber-it-gouvernance-cons-3185\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ing\u00e9nieur Cyber IT gouvernance [CONS-3185] - AZARA Consulting\" \/>\n<meta property=\"og:description\" content=\"Missions L\u2019ing\u00e9nieur Cyber IT Gouvernance intervient dans le cadre des activit\u00e9s projets et r\u00e9currentes de la gouvernance CYBERSECURITE de la r\u00e9gion Afrique Activit\u00e9s principales&nbsp; Activit\u00e9s r\u00e9currentes : Piloter les alertes DLP (Data Leakage) afin d\u2019identifier au plus vite des cas av\u00e9r\u00e9s de fuites de donn\u00e9es Prendre le lead sur les investigations de \u00ab Forensic \u00bb [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azara.ma\/en\/ingenieur-cyber-it-gouvernance-cons-3185\/\" \/>\n<meta property=\"og:site_name\" content=\"AZARA Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-23T10:05:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-30T14:37:28+00:00\" \/>\n<meta name=\"author\" content=\"A. Ennabo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AzaraConsulting\" \/>\n<meta name=\"twitter:site\" content=\"@AzaraConsulting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"A. Ennabo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/\"},\"author\":{\"name\":\"A. Ennabo\",\"@id\":\"https:\/\/azara.ma\/#\/schema\/person\/bf27c1ed90f3b229c217aeefb947f348\"},\"headline\":\"Ing\u00e9nieur Cyber IT gouvernance [CONS-3185]\",\"datePublished\":\"2021-12-23T10:05:35+00:00\",\"dateModified\":\"2021-12-30T14:37:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/\"},\"wordCount\":582,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azara.ma\/#organization\"},\"articleSection\":[\"Offres de missions \u00e9chues\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/\",\"url\":\"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/\",\"name\":\"Ing\u00e9nieur Cyber IT gouvernance [CONS-3185] - AZARA Consulting\",\"isPartOf\":{\"@id\":\"https:\/\/azara.ma\/#website\"},\"datePublished\":\"2021-12-23T10:05:35+00:00\",\"dateModified\":\"2021-12-30T14:37:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/azara.ma\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ing\u00e9nieur Cyber IT gouvernance [CONS-3185]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azara.ma\/#website\",\"url\":\"https:\/\/azara.ma\/\",\"name\":\"AZARA Consulting\",\"description\":\"Transformation Digitale et Agile\",\"publisher\":{\"@id\":\"https:\/\/azara.ma\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azara.ma\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azara.ma\/#organization\",\"name\":\"AZARA Consultng\",\"url\":\"https:\/\/azara.ma\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azara.ma\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azara.ma\/wp-content\/uploads\/2021\/03\/azara-consulting-logo-nouveau.png\",\"contentUrl\":\"https:\/\/azara.ma\/wp-content\/uploads\/2021\/03\/azara-consulting-logo-nouveau.png\",\"width\":1034,\"height\":244,\"caption\":\"AZARA Consultng\"},\"image\":{\"@id\":\"https:\/\/azara.ma\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/AzaraConsulting\",\"https:\/\/www.linkedin.com\/company\/azara-consulting\/mycompany\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azara.ma\/#\/schema\/person\/bf27c1ed90f3b229c217aeefb947f348\",\"name\":\"A. Ennabo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azara.ma\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/11accfc0e8bfc13a38f3b0949e68683d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/11accfc0e8bfc13a38f3b0949e68683d?s=96&d=mm&r=g\",\"caption\":\"A. Ennabo\"},\"url\":\"https:\/\/azara.ma\/en\/author\/aennaboazara-ma\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ing\u00e9nieur Cyber IT gouvernance [CONS-3185] - AZARA Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azara.ma\/en\/ingenieur-cyber-it-gouvernance-cons-3185\/","og_locale":"en_US","og_type":"article","og_title":"Ing\u00e9nieur Cyber IT gouvernance [CONS-3185] - AZARA Consulting","og_description":"Missions L\u2019ing\u00e9nieur Cyber IT Gouvernance intervient dans le cadre des activit\u00e9s projets et r\u00e9currentes de la gouvernance CYBERSECURITE de la r\u00e9gion Afrique Activit\u00e9s principales&nbsp; Activit\u00e9s r\u00e9currentes : Piloter les alertes DLP (Data Leakage) afin d\u2019identifier au plus vite des cas av\u00e9r\u00e9s de fuites de donn\u00e9es Prendre le lead sur les investigations de \u00ab Forensic \u00bb [&hellip;]","og_url":"https:\/\/azara.ma\/en\/ingenieur-cyber-it-gouvernance-cons-3185\/","og_site_name":"AZARA Consulting","article_published_time":"2021-12-23T10:05:35+00:00","article_modified_time":"2021-12-30T14:37:28+00:00","author":"A. Ennabo","twitter_card":"summary_large_image","twitter_creator":"@AzaraConsulting","twitter_site":"@AzaraConsulting","twitter_misc":{"Written by":"A. Ennabo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/#article","isPartOf":{"@id":"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/"},"author":{"name":"A. Ennabo","@id":"https:\/\/azara.ma\/#\/schema\/person\/bf27c1ed90f3b229c217aeefb947f348"},"headline":"Ing\u00e9nieur Cyber IT gouvernance [CONS-3185]","datePublished":"2021-12-23T10:05:35+00:00","dateModified":"2021-12-30T14:37:28+00:00","mainEntityOfPage":{"@id":"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/"},"wordCount":582,"commentCount":0,"publisher":{"@id":"https:\/\/azara.ma\/#organization"},"articleSection":["Offres de missions \u00e9chues"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/","url":"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/","name":"Ing\u00e9nieur Cyber IT gouvernance [CONS-3185] - AZARA Consulting","isPartOf":{"@id":"https:\/\/azara.ma\/#website"},"datePublished":"2021-12-23T10:05:35+00:00","dateModified":"2021-12-30T14:37:28+00:00","breadcrumb":{"@id":"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azara.ma\/ingenieur-cyber-it-gouvernance-cons-3185\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/azara.ma\/"},{"@type":"ListItem","position":2,"name":"Ing\u00e9nieur Cyber IT gouvernance [CONS-3185]"}]},{"@type":"WebSite","@id":"https:\/\/azara.ma\/#website","url":"https:\/\/azara.ma\/","name":"AZARA Consulting","description":"Transformation Digitale et Agile","publisher":{"@id":"https:\/\/azara.ma\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azara.ma\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azara.ma\/#organization","name":"AZARA Consultng","url":"https:\/\/azara.ma\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azara.ma\/#\/schema\/logo\/image\/","url":"https:\/\/azara.ma\/wp-content\/uploads\/2021\/03\/azara-consulting-logo-nouveau.png","contentUrl":"https:\/\/azara.ma\/wp-content\/uploads\/2021\/03\/azara-consulting-logo-nouveau.png","width":1034,"height":244,"caption":"AZARA Consultng"},"image":{"@id":"https:\/\/azara.ma\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/AzaraConsulting","https:\/\/www.linkedin.com\/company\/azara-consulting\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/azara.ma\/#\/schema\/person\/bf27c1ed90f3b229c217aeefb947f348","name":"A. Ennabo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azara.ma\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11accfc0e8bfc13a38f3b0949e68683d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11accfc0e8bfc13a38f3b0949e68683d?s=96&d=mm&r=g","caption":"A. Ennabo"},"url":"https:\/\/azara.ma\/en\/author\/aennaboazara-ma\/"}]}},"_links":{"self":[{"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/posts\/1630"}],"collection":[{"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/comments?post=1630"}],"version-history":[{"count":1,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/posts\/1630\/revisions"}],"predecessor-version":[{"id":1631,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/posts\/1630\/revisions\/1631"}],"wp:attachment":[{"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/media?parent=1630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/categories?post=1630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/tags?post=1630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}