Sunday, Oct 22nd

Last update10:00:00 AM GMT

  • Create an account
    *
    *
    *
    *
    *
    Fields marked with an asterisk (*) are required.

IT Security & Risk Management Featured

it_security-risk_management

Position Title: IT Security & Risk Management

Experience:

• Works with business units to identify security requirements, using methods that may include risk and business impact assessments.
• Conduct application risk managements.
• Develop and updated policies and procedures for the general operation of the IT Security and risk management program.
• Create and maintain IT Security policy exceptions process.
• Works with information security leadership to develop strategies and plans to enforce security requirements and address identified risks.
• Plays an advisory role in application development or other related projects to assess security requirements and controls and to ensure that security controls are implemented as planned.
• Collaborates on critical IT projects to ensure that security issues are addressed throughout the project life cycle.
• Manages Information Security Awareness Program
• Works with IT department and members of the information security team to identify, select and implement technical controls.
• Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).
• Maintain operational configurations of all in-place security solutions as per the established baselines.
• Analyzing and evaluating data from multiple sources to gain awareness of potentially suspicious and anomalous activity.
• Following detailed operational processes and procedures to appropriately analyze, escalate, and assist in remediation of critical information security incidents.
• Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution.
• Participate in investigations into problematic activity.
• Participate in the design and execution of vulnerability assessments, penetration tests and security audits.

Duration: Available upon request

Location: Available upon request

Contact us

You are here: Staffing Jobs IT Security & Risk Management