Security Policy Development & Implementation Specialist

Aug 1, 2025 - Senior

$3,000.00 Fixed

1. The Challenge & Business Problem

Our organization needs to mature its cybersecurity governance. While we have some security measures in place, we lack a cohesive, organization-wide framework of security policies. This absence leaves our information assets vulnerable and exposes us to significant regulatory and compliance risks. Without clear guidelines for data handling, access control, and incident response, our employees lack a defined roadmap for protecting sensitive information, which increases the likelihood of human error and security incidents.

2. Key Problems to Be Solved

The expert on this project will be expected to resolve the following critical issues:

  • Policy Gaps: Identify and fill existing policy gaps, ensuring all critical areas of security are covered by clear, actionable guidelines.
  • Compliance: Align our security policies with relevant regulatory requirements (e.g., GDPR, HIPAA, ISO 27001) to ensure we meet legal and industry standards.
  • Lack of Awareness: Create security policies that are not only comprehensive but also easy for employees to understand and follow.
  • Inconsistent Procedures: Establish standardized procedures and controls to ensure consistent security practices across all departments.

3. Required Expertise & Technical Skills

We are seeking a specialist with a deep understanding of cybersecurity governance. The ideal candidate must have:

  • Cybersecurity Governance: Extensive experience in developing and implementing security policies, standards, and procedures from the ground up.
  • Industry Frameworks: Strong knowledge of and practical experience with leading security frameworks, such as NIST and ISO 27001.
  • Regulatory Compliance: A solid understanding of various compliance requirements (e.g., GDPR, HIPAA, CCPA).
  • Communication Skills: Excellent written communication skills to translate complex technical and legal requirements into clear, understandable policy documents.
  • Certifications: Relevant certifications like CISSP or CISM are highly desirable.

4. Post-Project Support & Expectations

Upon project completion, we require a final knowledge transfer session to educate our internal team on the new policies and their enforcement. We also expect comprehensive documentation of all policies and procedures. We will require one week of post-project email support to address any initial questions or clarification needed for policy implementation.

5. Project Goal & Our Ideal Candidate

Our goal is to establish a strong foundation of cybersecurity policies that protect our information assets and ensure sustained compliance. We are looking for a thorough and strategic professional who can deliver a practical and enforceable security framework, giving our organization confidence in its security posture.

  • France
  • Proposal: 0
  • Verified
  • Less than 3 month
Jean Dupont
Jean Dupont Inactive
Île-de-France , France
Member since
Oct 26, 2024
Total Job
4
Last seen
1 week ago