Security Department
The Vantage Cybersecurity Department for Vantage Data Centers is very hands-on. In most cases, we specify, purchase, configure, and maintain all networking and server hardware. We also work closely with partner Value Added Resellers (VARs) to learn about the latest technological changes so that we can make informed purchase decisions. We are always looking for ways to strike the best balance between technology, performance, and cost. Vantage Security Department also participates in designing each of our new data center building's security infrastructure. If you like getting your hands dirty and helping to design, build and maintain Security infrastructure in a modern data center, then come work at Vantage. We're expanding with many new builds!
Essential Job Functions
Risk Management & ISMS Support:
- Manage the ISMS risk register, ensuring that risks are identified, assessed, and mitigated effectively.
- Provide oversight on cyber risks and the implementation of appropriate controls.
- Support the ISMS program by ensuring compliance with relevant standards and conducting periodic gap assessments.
Cybersecurity Oversight:
- Maintain and track regional KPIs and global standards
- Manage, support, and maintain Vantage's security environment.
- Act as a contact for end users and individuals reporting cybersecurity issues, questions, or concerns.
- Support AI Initiatives and governance.
GRC Program & Project Management:
- Manage GRC programs and projects as assigned, ensuring that objectives are met and risks are mitigated.
- Maintain and manage policies, procedures, standards, and the Confluence site for all documentation, ensuring accuracy and conducting annual reviews.
Audit Support & Compliance:
- Support internal and external audits by providing necessary documentation and responding to audit inquiries.
- Perform periodic gap assessments to validate compliance on an ongoing basis.
Incident Response & Triage:
- Support triage and investigation of security alerts to identify potential threats and take appropriate action
- Participate and support the Business Impact Analysis (BIA) and Crisis Management Framework (CMF) Documentation
Documentation & Communication:
- Create documentation and presentations for leadership and stakeholders on relevant topics and issues.
Professional Development:
- Engage in ongoing training and professional development to stay current with the latest cybersecurity threats, vulnerabilities, trends and technologies.