We at ASML enable groundbreaking technology to solve some of humanity’s toughest challenges. Together with our partners, we provide leading patterning solutions that drive the advancement of microchips.
Would you like to contribute by having security embedded in the processes and Information Technology?
We have a job for you!
As a Cryptography and Security Specialist you are part of the Application Security team within the Technology Security Competence Center (TSCC) which is part of the Risk & Business Assurance (R&BA) department of ASML Corporate.
Your primary job is to analyze (assess) security systems for any vulnerabilities that may be targeted. You identify weaknesses and give advice on how cryptography can be applied and/or strengthen. In this role you will help identifying and testing of new technologies, which may fit in our organization.
You will also be responsible for conducting detailed security assessments mainly on new and existing applications and IT services within ASML, assist and advice projects on security related questions and help drive the security improvements for ASML. You will be interacting with stakeholders on different levels in ASML IT, but also within ASML sectors.
The role is contributing in protection of ASML’s information, Intellectual Property (IP) and assets, and that of ASML’s customers and suppliers for the scope of the projected solution. This includes the alignment of the solution with ASML Information Security strategies and security policies/standards/guidelines, and where necessary suggesting additions and improvement to standards.
As a Cryptography and Security Specialist you will be responsible for:
Giving advice on which cryptographic tools/products to use and how to embed these in the environment;
Giving advice on which form of encryption best fits the environment, taking into account different factors, i.e., the classification of the data;
Keeping your knowledge up-to-date, especially in the cryptographic domain;
Setting up and monitoring governance and (co-) setting up processes and monitoring of these processes;
Performing project intake assessments in cooperation with the Project Security Officer;
Assessing applications and systems to be implemented or actual implementations based on assessments of high- and low-level designs, interviews and/or testing;
Assessing existing or new IT services (on premise or cloud) on technical vulnerabilities and weaknesses based on ASML process and tooling;
Translating assessment results into an Information Security Specification (security plan for service);
Communicate observations to the relevant stakeholders, advise on mitigation and follow up on actions;
Adding information to the different security registers from Business Impact assessments (BIA’s), IT Security Assessments (ITSA’s), penetration/security tests, vulnerability scans, exceptions and other sources;
Adding information to security finding register, which contains all security assessment findings and risks that are reported within the TSCC, and is used to follow up on security assessment findings;
Improving and maintaining an Application Security Register, manage and follow-up on actions and register application progress;
Keep track of follow up actions and deliver management reporting;
Represent, on occasion, the TSCC in IT projects and intake boards where required;
Assess IT security exception requests on validity and provide advice to the team lead application security and business stakeholder for acceptance or rejection including advice on additional security controls;
Improve procedures to keep the security registers, application registers and assessment processes up to date;
Creation, and execution of roadmaps, standards, design patterns and frameworks, specifically on cryptography. Working together with different stakeholders within and outside of ASML e.g., external auditors and Core IT services;
Creation of cryptography KPI’s, assuring right cryptography within ASML is being used;
Advise on strategic future developments in cryptography;
Update and maintain security baselines and standards;
Assist IT Security risk management;
Train and coach DevOps teams on security aspects, standards and security solutions in CI/CD.
Bachelor’s or Master’s degree in mathematics in combination with cybersecurity/information security (or equivalent experience);
Valid industry certifications such as CISSP, CISM and/or CISA are a plus;
CCSP or equivalent is a plus;
Min 6+ years professional experience with a focus on IT applications / information security, risk and compliance;
Strong mathematical/algorithmic understanding of symmetric and asymmetric cryptography, hash functions, digital signatures etc.;
Experience and good hands on knowledge of PKI and certificate management in complex large enterprise settings, including Business Analysis;
Experience with tools/products (i.e. Docker) where cryptography is embedded is a plus;
Experience in executing Threat and Vulnerability Analysis (TVA) or IT Security risk assessments on IT services and applications;
Experience with a wide range of SAP applications is a plus (no authorization management);
Experience with Cloud security and 3rd party management;
Experience in collecting information through research and interviews;
Good working knowledge of Office suite applications like Excel, SharePoint and Teams;
Deep Knowledge of current security technologies and governance processes;
IT audit experience is a plus;
In-depth working knowledge of IT Risk / security frameworks and best practices, such as: NIST Cyber, security, framework, ISF Standard of Good Practice for Information Security, NIST SP 800 30 framework, ISO 27001/2 framework;
Knowledge of the Scaled Agile Framework (SAFe) is a plus.
Able to operate independently/with minimal supervision, self-starter;
Ability to interact with all levels including users, engineers, executives and senior managers;
Analytical, precise, tenacious, autonomous;
Knowledge of IT-security, Information Security and Architecture methodology;
Ability to overcome organizational resistance;
Excellent organizational skills and the ability to prioritize multiple tasks and assignments;
Able to manage large amounts of new information quickly; grasp the deep technical characteristics of new environments; draft clear and concise visualizations of complex processes and environments, stand your ground in a flexible / changing environment.
Context of the position
To be completed
ASML does not accept unsolicited resumes from any agencies that have not signed a mutual service agreement. All unsolicited resumes will be considered ASML’s property, and ASML will not be obligated to pay a referral fee. This includes resumes submitted directly to hiring managers without contacting the Resource Center Department.
ASML is GDPR compliant, therefore we cannot process applications sent outside of our recruitment system.
If you are interested in this vacancy please apply.