Cyber Defense Organization (CDO) Coordinator – Temp (OP-2024465527)

40 uur VEGHEL Staffing

Opdracht: Cyber Defense Organization (CDO) Coordinator – Temp (OP-2024465527)

Reageer direct

<div class="ck-content" data-wrapper="true" dir="ltr" style="--ck-image-style-spacing:1.5em;--ck-inline-image-style-spacing:calc(var(--ck-image-style-spacing) / 2);--ck-color-selector-caption-background:hsl(0, 0%, 97%);--ck-color-selector-caption-text:hsl(0, 0%, 20%);font-family:Segoe UI;font-size:11pt;"></div>

What you do

 

ONLY FOR FREELANCERS!                   Only freelancers are asked to respond!

 

ALLEEN VOOR FREELANCERS!                          Alleen freelancers wordt gevraagd om te reageren!

 

 

 

Position Overview:

The coordinator of Cyber Defense Organization (CDO) is responsible for designing, implementing, and evolving a robust internal cyber defense and response structure to protect the organization from cyber threats. This role will oversee the establishment and strategic development of a 2nd Tier Security Operations Center (SOC) focusing on incident response, along with related blue-team functions and setting up red-teaming, vulnerability management, attack surface management, and Cyber Security Incident Response Team (CSIRT) coordination. With a vision of maturing the organization into a fully functional, resilient Cyber Defense Organization, the ideal candidate will guide the expansion of capabilities through internal resources, external contractors, and managed security service providers (MSSPs).

 

As a result of the departure of some employees, there is currently a need for both quantitative and qualitative strengthening of the CDO. The coordinator will have to function as a hub in the web.

 

 

Key Responsibilities:

1. CDO Strategy and Vision Development:

  •  Develop and lead a multi-year roadmap for the Cyber Defense Organization, aligning with organizational risk tolerance, compliance requirements, and business objectives.

  •  Formulate strategies for setting up and expanding the CDO to a mature and fully operational state, continuously improving detection, response, and remediation capabilities.

 

2. SOC and Blue Team Operations:

  • Oversee the establishment and management of a 2nd Tier SOC, with primary responsibilities in security monitoring, incident response, threat detection, and blue team operations.

  • Integrate proactive red-teaming and vulnerability assessment capabilities to identify and mitigate internal and external threats effectively.

 

3. Vulnerability and Attack Surface Management:

  • Develop, build and run frameworks and processes for continuous vulnerability scanning, assessment, and remediation that is focused and prioritized on our organisation’s specific needs.

  • Guide the creation and evolution of attack surface management practices to minimize exposure and quickly respond to new threats.

  • Coordinate penetration (or redteaming) testing on applications, network and infrastructures (IT and OT) to identify potential vulnerabilities and weaknesses.

 

4. CSIRT Coordination and Incident Management:

  • Establish a centralized CSIRT coordination process to standardize and streamline incident handling and escalation procedures.

  • Coordinate with cross-functional teams to ensure incidents are managed with an emphasis on speed, accuracy, and effectiveness.

 

5. Team Leadership and Development:

  • Manage and coach the CDO team members. The CDO team is fairly junior, which means that as a coordinator you regularly have to roll up your sleeves.

  • Lead the hiring, training, and professional development of the CDO team, ensuring roles are filled with skilled professionals.

  • Evaluate and engage external resources (contractors, MSSPs) as necessary to augment internal capabilities.

 

6. Performance Measurement and Reporting:

  • Develop key metrics and reporting frameworks to monitor the effectiveness of cyber defense activities and SOC performance.

  • Regularly present CDO progress, challenges, and successes to executive leadership and stakeholders.

What you bring to the team

  • Hard Skills:  Technical Knowledge: Proficient in using SIEM platforms, EDR tools, threat intelligence systems, and incident response automation for reporting purposes. Experience and knowledge of OT, SCADA, ICS and/or IEC62443 would be a pre.

  • Hard Skills:  Security Architecture: Knowledge of cybersecurity frameworks (e.g., NIST, MITRE ATT&CK) and best practices for network and application security.
  • Hard Skills:  Threat Detection and Incident Response: Expertise in setting up and leading blue team operations, incident response protocols, and cyber threat intelligence analysis.
  • Hard Skills:  Vulnerability Management: Experience with vulnerability assessment tools and practices for effective vulnerability lifecycle management.
  • Hard Skills:  Red-Teaming and Penetration Testing: Familiarity with red-team methodologies, attack simulation, and reporting requirements for ethical hacking to achieve maximum results.
  • Soft Skills:   Strategic Leadership: Ability to create a long-term vision, develop actionable roadmaps, and drive projects to successful implementation.

  • Soft Skills:  Team Building and Mentorship: Proven ability to build, mentor, and inspire teams to excel in high-stakes environments.
  • Soft Skills:  Cross-Functional Communication: Skillful in communicating complex technical issues to non-technical stakeholders, with clarity and precision.
  • Soft Skills:   Vendor and Contract Management: Experience in managing vendor relationships and negotiating service-level agreements (SLAs) with external partners.
  • Cybersecurity Leadership: 5+ years in cybersecurity, with at least 2 years in a leadership role focused on SOC management, incident response, or cyber defense.

  • Organizational Build-out: Experience in creating or scaling cyber defense organizations or security operations teams, ideally within a globally operating corporate setting.

  • Managed Services Collaboration: Experience working with external MSSPs and managing outsourced security functions.

  • Project Management: Demonstrated ability to manage multi-phase security projects on time and within budget.

  • Preferred Certifications: CISSP, CISM, or CISA

  • Preferred Certifications:  GIAC Certified Incident Handler (GCIH), Offensive Security Certified Professional (OSCP), or Certified Red Team Operator (CRTO)

 

Educational Background:

- Bachelor’s degree in Cybersecurity, Information Technology, or related field (Master’s preferred).

- Relevant security certifications and advanced training are highly desirable.

 

This role offers an opportunity to build and shape the future of the organization’s cybersecurity defense and response, with significant potential for strategic impact on organizational resilience and security culture.

What we offer

ONLY FOR FREELANCERS!             Only freelancers are asked to respond!

 

ALLEEN VOOR FREELANCERS!                Alleen freelancers wordt gevraagd om te reageren!

 

 

Period of deployment: asap till 31-12-2025  
Type of contract: Temp 
Weekly deployment: 40 hours a week   
Work location: Veghel          
Remote working: It is possible to work from home for max. 2 days a week.
Maximum rate: € 90,00 - € 120,00 competitive  (medior - senior)
Working distance: living within a radius of 60 minutes from (requirement of the customer!)

Motivation: describe your work experience with the requested skills (knockouts) in a short motivation! Also reflect this in your profile. 
Candidate : lives in the Netherlands and holds a Dutch passport and speaks and writes Dutch

For more information contact resourcedesk@centric.eu o.v.v.  OP-2024465527


 

Disclaimer:
It is not allowed to post an application/vacancy from Centric on a public or non-public website (e.g. freelance.nl or own website) or to distribute it further to other suppliers.
 

Impactvolle en vooruitstrevende projecten

Diverse en complexe IT-vraagstukken

Ambitieuze en betrokken collega's

Zelfstandig professional of leverancier?

Neem contact op met onze Resource Desk via resourcedesk@centric.eu.

Sollicitatiestappen freelancer

  • Meld je aan

    Mooie opdracht gezien? Meld je dan aan bij onze portal MyCentric.

  • So now you wait...

    Onze IT Sourcing-specialist neemt contact met je op.

  • Hebben we een match?

    Als jouw kennis en ervaring matchen met de functie, sturen we je cv door naar de opdrachtgever.

  • Is de opdrachtgever enthousiast?

    Dan doet de accountmanager van Centric eerst een zogenoemde pre-intake met je. Daarna ga je op gesprek bij de opdrachtgever.

  • De deal is rond

    De handtekeningen zijn gezet, veel succes!

Eindeloze mogelijkheden