{"id":1983,"date":"2022-05-23T17:29:52","date_gmt":"2022-05-23T16:29:52","guid":{"rendered":"https:\/\/azara.ma\/?p=1983"},"modified":"2022-05-31T17:13:29","modified_gmt":"2022-05-31T16:13:29","slug":"expert-fonctionnel-securite-de-linformation-cons-3435","status":"publish","type":"post","link":"https:\/\/azara.ma\/en\/expert-fonctionnel-securite-de-linformation-cons-3435\/","title":{"rendered":"Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435]"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Missions&nbsp;<\/h2>\n\n\n\n<ul><li>Assurer :<ul><li>Le pilotage et la MOA de programmes\/projets s\u00e9curit\u00e9<\/li><li>L\u2019\u00e9valuation des risques IT pour les projets informatiques bancaires et infrastructures, aussi bien sur le volet fonctionnel que technique<\/li><li>La bonne application des principes de gestion des risques et la proposition de solutions permettant de limiter les risques identifi\u00e9s<\/li><li>La r\u00e9alisation et le pilotage d\u2019audits s\u00e9curit\u00e9 organisationnels, fonctionnels et techniques<\/li><li>La formalisation des proc\u00e9dures et processus s\u00e9curit\u00e9 de l\u2019information<\/li><li>Le suivi des plans d\u2019action de rem\u00e9diation des risques IT<\/li><li>Le reporting projet et gestion des risques<\/li><\/ul><\/li><li>Contribuer \u00e0 :<ul><li>La d\u00e9finition et la mise \u00e0 jour du sch\u00e9ma directeur SSI et programmes de mise en conformit\u00e9 SSI<\/li><li>La sensibilisation des utilisateurs \u00e0 la s\u00e9curit\u00e9 de l\u2019information<\/li><\/ul><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Activit\u00e9s principales&nbsp;<\/h2>\n\n\n\n<ul><li>R\u00e9alisation de programmes\/projets visant \u00e0 renforcer les dispositifs de ma\u00eetrise des risques IT<\/li><li>Documenter les politiques th\u00e9matiques de gestion de s\u00e9curit\u00e9 de l\u2019information en faisant le lien avec la strat\u00e9gie m\u00e9tier<\/li><li>Appr\u00e9cier les risques IT li\u00e9s aux projets et exprimer des recommandations et mesures de traitement de risque<\/li><li>Accompagner les projets agiles et la transformation digitale de la banque<\/li><li>S\u2019assurer de la bonne prise en charge des mesures exprim\u00e9es et r\u00e9\u00e9valuer les risques r\u00e9siduels des projets<\/li><li>Formaliser et pr\u00e9senter les risques IT aux m\u00e9tiers concern\u00e9s<\/li><li>Analyser les actifs critiques de l\u2019entreprise et identifier leur faiblesse et leur vuln\u00e9rabilit\u00e9 face aux intrusions ou aux attaques<\/li><li>Etablir et suivre un plan de gestion du risque pour organiser et produire des plans d\u2019action pr\u00e9ventifs<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Nombre d\u2019ann\u00e9e minimum d\u2019exp\u00e9rience&nbsp;<\/h2>\n\n\n\n<ul><li>Exp\u00e9rience professionnelle d\u2019au moins 5 ans dans la s\u00e9curit\u00e9 de l\u2019information : gestion de projets, analyses de risque et audits s\u00e9curit\u00e9<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Comp\u00e9tences requises&nbsp;<\/h2>\n\n\n\n<ul><li>Ma\u00eetrise des bonnes pratiques et normes d\u2019analyse de risque au sens ISO 27005 avec une bonne connaissance de la m\u00e9thode EBIOS ou \u00e9quivalents<\/li><li>Ma\u00eetrise des recommandations normatives en terme de mesures de traitement de risque (ISO 27002)<\/li><li>Maitrise de la DNSSI et la directive annexe pour les infrastructures d\u2019importance vitale<\/li><li>Ma\u00eetrise des techniques de d\u00e9tection de s\u00e9curit\u00e9, y compris li\u00e9es aux objets mobiles et num\u00e9riques<\/li><li>Ma\u00eetrise des techniques de cyber-attaque et les contre-mesures pour les pr\u00e9venir<\/li><li>Connaissance du domaine bancaire<\/li><li>Connaissance de la m\u00e9thodologie Agile (framework Scrum) de gestion de projet<\/li><li>Bonne communication<\/li><li>Facult\u00e9 d\u2019adaptation<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Date limite de r\u00e9ponse<\/h2>\n\n\n\n<p>La date limite pour postuler est le<strong> 31\/05\/2022 avant 12h<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Missions&nbsp; Assurer : Le pilotage et la MOA de programmes\/projets s\u00e9curit\u00e9 L\u2019\u00e9valuation des risques IT pour les projets informatiques bancaires et infrastructures, aussi bien sur le volet fonctionnel que technique La bonne application des principes de gestion des risques et la proposition de solutions permettant de limiter les risques identifi\u00e9s La r\u00e9alisation et le pilotage [&hellip;]<\/p>","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[155],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435] - AZARA Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azara.ma\/en\/expert-fonctionnel-securite-de-linformation-cons-3435\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435] - AZARA Consulting\" \/>\n<meta property=\"og:description\" content=\"Missions&nbsp; Assurer : Le pilotage et la MOA de programmes\/projets s\u00e9curit\u00e9 L\u2019\u00e9valuation des risques IT pour les projets informatiques bancaires et infrastructures, aussi bien sur le volet fonctionnel que technique La bonne application des principes de gestion des risques et la proposition de solutions permettant de limiter les risques identifi\u00e9s La r\u00e9alisation et le pilotage [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azara.ma\/en\/expert-fonctionnel-securite-de-linformation-cons-3435\/\" \/>\n<meta property=\"og:site_name\" content=\"AZARA Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-23T16:29:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-31T16:13:29+00:00\" \/>\n<meta name=\"author\" content=\"A. Ennabo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AzaraConsulting\" \/>\n<meta name=\"twitter:site\" content=\"@AzaraConsulting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"A. Ennabo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/\"},\"author\":{\"name\":\"A. Ennabo\",\"@id\":\"https:\/\/azara.ma\/#\/schema\/person\/bf27c1ed90f3b229c217aeefb947f348\"},\"headline\":\"Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435]\",\"datePublished\":\"2022-05-23T16:29:52+00:00\",\"dateModified\":\"2022-05-31T16:13:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/\"},\"wordCount\":440,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azara.ma\/#organization\"},\"articleSection\":[\"Offres de missions \u00e9chues\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/\",\"url\":\"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/\",\"name\":\"Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435] - AZARA Consulting\",\"isPartOf\":{\"@id\":\"https:\/\/azara.ma\/#website\"},\"datePublished\":\"2022-05-23T16:29:52+00:00\",\"dateModified\":\"2022-05-31T16:13:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/azara.ma\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azara.ma\/#website\",\"url\":\"https:\/\/azara.ma\/\",\"name\":\"AZARA Consulting\",\"description\":\"Transformation Digitale et Agile\",\"publisher\":{\"@id\":\"https:\/\/azara.ma\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azara.ma\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azara.ma\/#organization\",\"name\":\"AZARA Consultng\",\"url\":\"https:\/\/azara.ma\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azara.ma\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azara.ma\/wp-content\/uploads\/2021\/03\/azara-consulting-logo-nouveau.png\",\"contentUrl\":\"https:\/\/azara.ma\/wp-content\/uploads\/2021\/03\/azara-consulting-logo-nouveau.png\",\"width\":1034,\"height\":244,\"caption\":\"AZARA Consultng\"},\"image\":{\"@id\":\"https:\/\/azara.ma\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/AzaraConsulting\",\"https:\/\/www.linkedin.com\/company\/azara-consulting\/mycompany\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azara.ma\/#\/schema\/person\/bf27c1ed90f3b229c217aeefb947f348\",\"name\":\"A. Ennabo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azara.ma\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/11accfc0e8bfc13a38f3b0949e68683d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/11accfc0e8bfc13a38f3b0949e68683d?s=96&d=mm&r=g\",\"caption\":\"A. Ennabo\"},\"url\":\"https:\/\/azara.ma\/en\/author\/aennaboazara-ma\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435] - AZARA Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azara.ma\/en\/expert-fonctionnel-securite-de-linformation-cons-3435\/","og_locale":"en_US","og_type":"article","og_title":"Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435] - AZARA Consulting","og_description":"Missions&nbsp; Assurer : Le pilotage et la MOA de programmes\/projets s\u00e9curit\u00e9 L\u2019\u00e9valuation des risques IT pour les projets informatiques bancaires et infrastructures, aussi bien sur le volet fonctionnel que technique La bonne application des principes de gestion des risques et la proposition de solutions permettant de limiter les risques identifi\u00e9s La r\u00e9alisation et le pilotage [&hellip;]","og_url":"https:\/\/azara.ma\/en\/expert-fonctionnel-securite-de-linformation-cons-3435\/","og_site_name":"AZARA Consulting","article_published_time":"2022-05-23T16:29:52+00:00","article_modified_time":"2022-05-31T16:13:29+00:00","author":"A. Ennabo","twitter_card":"summary_large_image","twitter_creator":"@AzaraConsulting","twitter_site":"@AzaraConsulting","twitter_misc":{"Written by":"A. Ennabo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/#article","isPartOf":{"@id":"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/"},"author":{"name":"A. Ennabo","@id":"https:\/\/azara.ma\/#\/schema\/person\/bf27c1ed90f3b229c217aeefb947f348"},"headline":"Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435]","datePublished":"2022-05-23T16:29:52+00:00","dateModified":"2022-05-31T16:13:29+00:00","mainEntityOfPage":{"@id":"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/"},"wordCount":440,"commentCount":0,"publisher":{"@id":"https:\/\/azara.ma\/#organization"},"articleSection":["Offres de missions \u00e9chues"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/","url":"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/","name":"Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435] - AZARA Consulting","isPartOf":{"@id":"https:\/\/azara.ma\/#website"},"datePublished":"2022-05-23T16:29:52+00:00","dateModified":"2022-05-31T16:13:29+00:00","breadcrumb":{"@id":"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azara.ma\/expert-fonctionnel-securite-de-linformation-cons-3435\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/azara.ma\/"},{"@type":"ListItem","position":2,"name":"Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435]"}]},{"@type":"WebSite","@id":"https:\/\/azara.ma\/#website","url":"https:\/\/azara.ma\/","name":"AZARA Consulting","description":"Transformation Digitale et Agile","publisher":{"@id":"https:\/\/azara.ma\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azara.ma\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azara.ma\/#organization","name":"AZARA Consultng","url":"https:\/\/azara.ma\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azara.ma\/#\/schema\/logo\/image\/","url":"https:\/\/azara.ma\/wp-content\/uploads\/2021\/03\/azara-consulting-logo-nouveau.png","contentUrl":"https:\/\/azara.ma\/wp-content\/uploads\/2021\/03\/azara-consulting-logo-nouveau.png","width":1034,"height":244,"caption":"AZARA Consultng"},"image":{"@id":"https:\/\/azara.ma\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/AzaraConsulting","https:\/\/www.linkedin.com\/company\/azara-consulting\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/azara.ma\/#\/schema\/person\/bf27c1ed90f3b229c217aeefb947f348","name":"A. Ennabo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azara.ma\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11accfc0e8bfc13a38f3b0949e68683d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11accfc0e8bfc13a38f3b0949e68683d?s=96&d=mm&r=g","caption":"A. Ennabo"},"url":"https:\/\/azara.ma\/en\/author\/aennaboazara-ma\/"}]}},"_links":{"self":[{"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/posts\/1983"}],"collection":[{"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/comments?post=1983"}],"version-history":[{"count":2,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/posts\/1983\/revisions"}],"predecessor-version":[{"id":2007,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/posts\/1983\/revisions\/2007"}],"wp:attachment":[{"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/media?parent=1983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/categories?post=1983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azara.ma\/en\/wp-json\/wp\/v2\/tags?post=1983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}