Job Title :Info Security Analyst Vendor Pay Rate :35/hr on C2C
City :Brown State :Wisconsin *Projected 9 month contract; opportunity to extend* *Job Description:* "Part of a team that establishes, supports and continuously improves the enterprise information security policies, practices and standards. Participate in on-going operational activities that serve to establish appropriate access to and provide the appropriate protection, confidentiality, integrity and availability of enterprise systems and data through effective security controls. Validate compliance with policies and standards that keep applications and infrastructure safe and secure from vulnerabilities. *Responsibilities:* · Provide timely and effective operational support of our information security tools, processes and practices. Partner with other support teams and vendors to resolve problems or implement new products or services. Use standard technology monitoring tools to monitor assigned environments and/or technical assets and identify/detect behavior outside of established standards. Escalate key security issues to the appropriate team to be addressed. Assist with security assurance testing activities. Assist with planning and design of cloud enablement and security standard development for cloud computing environments and services. · Review, analyze and respond to security events triggered through automated security monitoring systems. Validate and track security breaches, along with threats to logical information, while still allowing for appropriate access. Coordinate responses to information security incidents. Work to reduce information security risks by effectively administering the information security processes across the vulnerability scanning, anomaly detection, intrusion detection, security policy and forensic functions. · Monitor compliance with information security policies and practices and any applicable laws. Assist with internal and external security risk assessments, risk analysis and application or system-level vulnerability testing and reviews. Participate in the assessment of compliance with security regulations such as PCI, NACHA, NYDFS, etc. Participate in periodic application security health checks. Monitor and document vendor compliance with the company’s security requirements. · Assist with the research, development, continuous improvement, and implementation of security policies, procedures, standards, and processes based on compliance requirements and industry best practices. Document information security requirements, processes, and procedures. Enforce information security policies and procedures by reviewing security violation reports, investigating possible security exceptions and documenting security controls. · Prepare status reports on information security matters that are used for a variety of purposes - tracking and monitoring security breaches, forensic investigative activities, remediation plan management and risk management as well as compliance reporting. Effectively manage and prioritize ad-hoc reporting requests, scorecards and standard departmental reporting. Coordinate with internal team and external auditors to provide documentation of compliance assessments, support and remediation activities. · Maintain and develop knowledge of regulatory security trends, new security technologies and best practices. Conduct security and industry specific research to keep self and the firm abreast of the latest security issues and regulatory developments that may impact existing policies, procedures and practices. Participate in information security education and training and awareness activities for technology and business teams." *Required:* · Bachelor’s degree in Computer Science, MIS, or related field; or equivalent work experience. · 3+ years of experience in information security or related technical field. · Broad technical experience including systems analysis, infrastructure, application development, networking, and database design and administration. · Proven experience with capabilities that include identify and access management, threat and vulnerability management, governance risk and compliance, and data security management. · Broad hands-on knowledge of firewalls, intrusions detection/prevention systems, anti-virus software, data encryption, endpoint and cloud security architecture, and other industry-standard techniques and practices. · Broad knowledge of security frameworks such as COBIT, NIST, CIS, and ISO 27000 Series Experience with regulatory compliance such as PCI, NACHA, NYDFS, etc · Effective verbal and written communication skills that include the ability to describe highly technical concepts in non-technical terms. · *Preferred:* o 5+ years of experience in roles with increasing responsibility in the technical fields of information security and/or compliance applications. o Experience with endpoint, email, and network protection, advanced persistent threat, data loss prevention, and DevSecOps. o Certifications: CISSP, CEP, CISM, CISA, or CRISC; or equivalent security certification. -- *Ian Elijah* *Sr. IT Recriter * *Waynsys Inc* *(MWBE Certified)* *Direct: 732-733-4463* *www.waynsys.com* <http://www.waynsys.com/> *(eVerified) * Disclaimer: We respect your online privacy. If you would like to be removed from our mailing list please reply with "Remove" in the subject and we will comply immediately. We apologize for any inconvenience caused. Please let us know if you have more than one domain. The material in this e-mail is intended only for the use of the individual to whom it is addressed and may contain information that is confidential, privileged, and exempt from disclosure under applicable law. If you are not the intended recipient, be advised that the unauthorized use, disclosure, copying, distribution, or the taking of any action in reliance on this information is strictly prohibited. We are an equal opportunity employer with a diverse workforce. Note: Any resume submitted by Waynsys Inc is presented with the understanding that the candidate is being considered for your direct end-client (end-client is the company where the work will be performed). If there is any other company involved between the end-client and your company, please do not submit this resume without our written approval. If you submit the resume to another third party, Waynsys Inc reserves the right to work with the third party directly. -- You received this message because you are subscribed to the Google Groups "Android Developers" group. To unsubscribe from this group and stop receiving emails from it, send an email to android-developers+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/android-developers/CAMjVX05YO7kTf6eatFtCu4qakufQCDe_fVqemQexiaw_3DbmZQ%40mail.gmail.com.