Security Technology Expert

lxbfYeaa - المغرب - Kenitra Morocco

Key Responsibilities:


  • Strategic Leadership and Vision: Develop and implement a comprehensive strategy for security technology deployment and operations management. Provide visionary leadership in integrating cutting-edge security technologies to protect the organization against emerging threats.
  • Security Technology Management: Oversee the selection, implementation, and management of security technologies, including but not limited to, intrusion detection systems, firewalls, antivirus software, and security information and event management (SIEM) solutions. Ensure these technologies are optimally configured, updated, and maintained to provide maximum protection.
  • Operational Security Oversight: Manage day-to-day security operations, ensuring robust monitoring, detection, and response processes are in place. Oversee the security operations center (SOC) and ensure incident response plans are effectively executed.
  • Audit, Compliance, and Risk Management: Conduct regular security assessments and audits to identify vulnerabilities. Manage the risk assessment process and ensure compliance with relevant security standards and regulations. Oversee the development and implementation of policies and procedures to mitigate identified risks.
  • Stakeholder Engagement and Communication: Act as a key liaison between the security team and other business units. Communicate effectively with stakeholders at all levels, including executive management, to align security initiatives with business goals.

Votre Profil
    • Technical Skills Required:


      • Advanced Security Technologies Expertise: Deep knowledge of and experience with advanced security technologies and solutions, including Next-Generation Firewalls (NGFWs), Intrusion Prevention Systems (IPS), Security Information and Event Management (SIEM) systems, Endpoint Detection and Response (EDR) solutions, and Advanced Threat Protection (ATP) tools. Familiarity with encryption technologies, identity and access management (IAM) solutions, and network segmentation strategies.
      • Cybersecurity Operations Management:  Proven track record of effectively managing a Security Operations Center (SOC), including incident detection, response, and recovery. Expertise in developing and implementing operational procedures for threat monitoring, analysis, and rapid incident response. Knowledge of threat hunting practices and the use of artificial intelligence (AI) and machine learning (ML) in enhancing detection capabilities.
      • Cloud Security: Comprehensive understanding of cloud computing models (IaaS, PaaS, SaaS) and cloud security frameworks. Experience in securing cloud environments, including AWS, Azure, and Google Cloud, through the implementation of cloud security best practices and tools.
      • Security Architecture Design and Review: Ability to design, review, and enhance security architectures for complex IT environments. This includes understanding the principles of secure network design, application security, and data security. Expertise in conducting security architecture reviews and vulnerability assessments to identify and mitigate potential security risks.
      • Regulatory Compliance and Standards: In-depth knowledge of international and regional regulatory compliance requirements and security standards, such as GDPR, HIPAA, PCI-DSS, ISO/IEC 27001, and NIST frameworks. Ability to guide the organization in achieving and maintaining compliance with these standards.
      • Risk Management: Strong skills in identifying, assessing, and prioritizing cybersecurity risks. Experience in developing and managing risk mitigation strategies, conducting risk assessments, and implementing risk management frameworks.
      • Project Management: Excellent project management skills, with experience in leading cross-functional teams in the deployment of security technologies and the execution of security projects. Familiarity with project management methodologies and tools.
      • Automation and Orchestration: Knowledge of security automation, orchestration, and response (SOAR) tools and practices. Ability to implement automation to streamline security operations and response processes.
      • Cryptography and Data Protection: Understanding of cryptographic principles and data protection technologies. Experience in implementing data encryption, tokenization, and data masking solutions to protect sensitive information.
      • Communication Networks: Solid understanding of communication network structures, protocols, and security challenges. Experience in securing wired and wireless networks, including VPNs, and managing network access controls.
      • Relationship with Partners: Establishing and Maintaining Strong Professional Relationships: Ability to forge and sustain robust professional relationships with a wide range of. This includes regular communication, understanding their capabilities and limitations, and aligning their services with the organization's security needs.
      • Negotiation and Contract Management: Skilled in negotiating terms and managing contracts with security service providers to ensure that agreements meet the organization's security requirements and budget constraints. This includes the ability to articulate clear service level agreements (SLAs) and ensure compliance through regular review and adjustment processes.
      • Collaboration on Shared Security Initiatives: Experience in initiating and managing collaborative security projects between companies, including joint ventures, shared threat intelligence, and collective defense strategies. Demonstrating the ability to work across organizational boundaries to enhance the overall security posture.
      • Security Governance with Partners: Developing and implementing governance frameworks to oversee the security aspects of partnerships. This involves setting up regular governance meetings, establishing clear roles and responsibilities, and ensuring that partners adhere to agreed-upon security standards and practices. It includes the management of shared risks and the seamless integration of partner services into the organization's overall security strategy.
      • Continuous Improvement and Alignment: Continuously assessing and improving the effectiveness of partnerships in contributing to the organization's security objectives. Ensuring that partner strategies remain aligned with the evolving security landscape and organizational priorities. 
      • Compliance and Risk Management: Ensuring that all partnerships comply with relevant laws, regulations, and industry standards related to security. Proactively identifying and mitigating risks associated with third-party services, including conducting regular audits and assessments of partner security measures.
    • Qualifications: 
      • Advanced degree in computer science, information security, or a related field.
      • Significant experience in a similar role, ideally in a similar environment.
      • Desired professional security certifications (ISO27XXX, CISSP, CISM, CRISC, etc.).
      • Proficiency in English, both written and spoken.
      • Intercultural sensitivity, flexibility.
      • Organized with a proven ability to manage workload, meet deadlines, and use time efficiently.
      • Good interpersonal and communication skills, effective teamwork.
      • Ability to function in a matrix structure.
      • Strong analytical skills.

A propos d'AXA

Leader mondial de l’assurance et de la gestion d’actifs,  AXA aide  ses 100 millions de clients à traverser les petites et grandes difficultés de la vie et les accompagne dans la sécurisation de leurs projets. Pour aider ses collaborateurs dans leur mission, AXA se donne comme priorité de prendre soin d’eux.  Ainsi, en rejoignant AXA France vous travaillerez dans une entreprise responsable, offrant une véritable culture d’expertise, accélérant le développement des compétences de chacun, proposant une rémunération attractive et une évolution régulière. Pour vous, nous réinventons notre métier.


AXA évolue pour devenir une entreprise durable axée sur la technologie et, à AXA Group Operations, nous sommes l’un des principaux moteurs de cette transformation.


Nous favorisons l'évolution de notre modèle commercial dans le secteur des assurances grâce à la technologie et à l’innovation, pour garantir sa mise en œuvre concrète rapide au niveau global, avec des conseils et une exécution de grande qualité. Nous sommes présents dans 17 pays avec des équipes engagées et hautement qualifiées. Nous mettons à profit la technologie, les données, l'approvisionnement, la sécurité et l'allocation des investissements de manière globale, mais nous réalisons également des économies d'échelle et des synergies lorsque cela est nécessaire.



A propos de notre entité

Présente au Maroc depuis 2009, AXA Group Opérations Maroc est une entité d’offshoring. Avec ses 300 collaborateurs et ses différents centres d’expertise opérant dans les domaines de l’informatique, de la Gestion de projet, de la Finance et des Ressources Humaines, AXA GO Maroc soutient Group Operations dans la réalisation de sa mission.



Pourquoi nous rejoindre ?

Nous célébrons l'expertise, la diversité culturelle et la créativité de plus de 8 000 employés de par le monde.  Nous nous engageons à assurer l'égalité des chances en matière d'emploi (parité hommes-femmes, communauté LGBT+, personnes handicapées ou personnes d'origines diverses) et à promouvoir la diversité et l'inclusion en créant un environnement de travail où tous les employés sont traités avec dignité et respect, et où les différences individuelles sont valorisées.


تاريخ النشر: ١٠ يوليو ٢٠٢٤
الناشر: Bayt
تاريخ النشر: ١٠ يوليو ٢٠٢٤
الناشر: Bayt