IT Risk Officer

The Contraste Europe Group builds strong relations with its clients. It offers a range of IT services such as: Advisory, Solutions, Applications and Infrastructure. The Group’s sector focus is with finance, utilities, public institutions and non-commercial organisations. We are operating on three countries located in Belgium, Luxemburg and France.

Language(s)

English, French, Dutch

Référence

200224/0215

Lieu

Brussels

Nous offrons

• A challenging position in a fast growing company with an international presence.
• A stimulating working environment with a really good team spirit maintained by lots of internal events (teambuilding, ...).
• A dynamic culture focused on personal development.
• A wide range of training and career development opportunities.

Votre profil

• Bachelor's degree or equivalent experience
• 3 to 10 years of relevant experience in risk management and / or information security
• Knowledge of ISO2700x, ISO31000, COBIT5, ITIL, …
• Experience in assessing and managing IT and/or Information Risk
• Broad knowledge of IT processes and technology
• Knowledge of security architectures and controls
• Knowledge of ISF IRAM is a plus
• Experience in managing and overseeing security in third party service providers.
• Certifications: CISSP, CISM, CISA or CRISC is a plus
• Problem analysis and conflict management
• Customer focus and able to handle in an organisation-sensitive way
• Record of responsibility
• Spoken and written fluency in English, and Dutch or French

Votre rôle

The IT Risk Officer will join the Risk & ITSCM team within the CISO organization (Cyber and
Information Security Office). The IT Risk Officer is responsible for guarding the vision, the development
of strategy and the implementation of the Information Security Risk and IT Risk Management
programme.
• You identify, analyze and report information security risks for different Business Units.
• You provide Information Security requirements for IT projects. You will follow up on the
implementation status of agreed controls.
• You identify, analyze and report on the internal IT risks, and take care of the follow-up. You maintain the risk register and take care of the management reporting.
• You participate in the implementation of an ISMS. You define risk policies, standards, procedures and guidelines. You take care of their communication and awareness at the respective audiences. You follow up and report on their implementation and status.

The influence of the IT Risk Officer extends across the entire enterprise. The Risk Officer reports to the
Risk & Service Continuity Manager within the CISO organization.

Information Risk Management
• Setting up and maintaining an Information Risk Management framework, based on the ISF IRAM methodology.
• Defining, organizing and applying "information risk analysis", "treatment" and “monitoring” processes.
• Incorporation of information risk management processes in the existing business and IT processes.
• Setting up and maintaining an information risk registry.
• Active execution, monitoring and adjusting of information risk analysis (Business Impact Assessments, Threat & Vulnerability Assessments)
• Guiding business about their availability requirements versus disaster recovery capabilities, in cooperation with the Service Continuity Officers.
• Aligning risk assessments and controls with the Data Protection Officers.

IT Risk Management
• Setting up and maintaining an IT risk management framework, based on ISO 31000, COBITv5
and the Enterprise Risk Management framework.
• Defining, organizing and applying IT risk analysis, treatment and monitoring processes.
• Incorporation of this IT risk management processes in the existing business and IT processes.
• Active execution, monitoring and adjusting IT risk analyses.
• Setting up and maintaining an IT risk register.
• Setting up and maintaining relationships and act as point of contact with (internal) audit and
other risk departments.

In both of these domains, you will work closely with IT PMO to align with existing IT processes, with IT
project managers and operational managers to identify or mitigate risks, with Data Protection Officers to guard privacy, with IT Compliance Officers, with the CyberSecurity team, and with IT Service Continuity Officers to align on risks and BIA’s.