Chief Security Officer
Tasks
- Build and manage security team
- Build security governance
- Conduct penetration testing
- Conduct post-incident reviews
- Conduct security risk assessments
- Coordinate cross department security integration
- Coordinate third party security providers
- Develop security training programs
- Ensure regulatory security compliance
- Establish physical security controls
- Establish security partner controls
- Formulate security strategy
- Handle regulatory inquiries
- Implement security automation and orchestration
- Implement shift left security
- Lead Cyber Security Operations
- Lead security incident response
- Manage cold hot wallet security
- Manage private key management
- Manage security crisis communications
- Manage security operations center
- Manage vulnerability scanning
- Perform root cause analysis
- Perform security audits
- Perform security compliance audits
- Respond to security incidents
- Secure payment systems
- Secure trading systems
- Secure user data systems
- Secure wallet systems
Perks/Benefits
Skills/Tech-stack
AML | Access Control | Anti Theft Controls | Anti-Money Laundering | Application Security | Asset Security | Attack analysis | Blockchain Security | Cause analysis | Cloud Security | Cold Wallet | Cold Wallet Security | Compliance Management | Crisis management | Cyber Security | Data Security | DeFi Risk Management | Digital Asset | Digital asset security | Emergency response | Encryption | FATF | Fire Protection | GDPR | Hot Wallet | Hot Wallet Security | Incident Response | Information security | Key Management | MICA | Money Laundering | Network Security | On Chain Attack Analysis | On-chain security | Operations Center | Penetration Testing | Private Key | Private key management | Public Relations | Public Relations Crisis Management | Regulatory Compliance | Risk Management | Root Cause Analysis | Root cause | SIEM | SOAR | Security Audits | Security Automation | Security Governance | Security Operations Center | Security operations | Security policies | Threat Intelligence | Threat detection | Trust Architecture | Video Surveillance | Vulnerability scanning | Wallet security | Zero Trust | Zero Trust Architecture
Education
Bachelor of Engineering | Bachelor of Science | Master of Science | PhD
Roles
Related jobs
- No jobs found.