NEED PROFILES ON PRIORITY


LOCATION – LINCOLNSHIRE, IL



DURATION – 6 MONTHS





Role & Responsibility (Not in priority order):

·         Manage enterprise perimeter security

·         Manage application onboarding (security Compliance framework for
internet, intranet applications)

·         Define and develop the Information Security Assurance and Testing
strategy

·         Perform project management of penetration testing, security code
review, and security design and architecture engagements

·         Develop and maintain information security framework including
mapping to standards like ISO 27001

·         Define and maintain information security policies and procedures

·         Translate security metrics into operational risk measures and
enterprise risk terminology

·         Design and deliver information security operations reports to
management

·         Document Service Level Agreement (SLAs) with security service
providers

·         Capture the existing operating model for security teams and
assist in the development of the target operating model for global
operations

·         Oversee the design and development of vendor assessment and
governance, Risk and Compliance tracking of security activities and metrics

·         Understand present & future business objectives from CxOs & map /
align the objectives to enterprise security framework

·         Mentor & manage infoSec team

Required Skills:

•    Bachelors degree in Information Technology, Information Security,
Business or Risk Management (or equivalent experience)

•   10 years of experience as an Information Security and technology risk
practitioner

•    Process and detail oriented with an ability to think strategically

•    Ability to articulate risk management concepts to all levels of the
organization

•    Prior experience interfacing with C-Level executives, Board of
Directors, auditors and regulators

•    Excellent written and verbal communication skills

•    Proficient with Microsoft Office Suite

•    Prior experience documenting tool requirements to support risk
management

•    Proven ability to manage issues through to resolution; skilled at
making judgment calls.

•    Ability to successfully multitask and complete difficult assignments
within deadlines

•    InfoSec certifications like CISSP, CISM, CISA







Thanks & Regards

Abhay Tiwari

Sr. Technical Recruiter

abha...@idctechnologies.com <jama...@idctechnologies.com> | 408-457-9399
Ex. 2033

Gtalk : abhaytiwari9009

Skype: akt.idc

IDC Technologies, Inc. |1851 McCarthy Boulevard, Suite 116, Milpitas, CA,
USA, 95035
Web: www.idctechnologies.com

ISO 9001-2008 Certified



"Under Bill s. 1618 Title III passed by the 105th U.S. Congress this mail
cannot be considered spam as long as we include a way to be removed from
our mailing list. Simply send us an e-mail with REMOVE in the subject and
we will gladly REMOVE you from our mailing list.”

-- 
You received this message because you are subscribed to the Google Groups 
"Citrix and Sap problems" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to citrix-and-sap-problems+unsubscr...@googlegroups.com.
To post to this group, send email to citrix-and-sap-problems@googlegroups.com.
Visit this group at http://groups.google.com/group/citrix-and-sap-problems.
For more options, visit https://groups.google.com/d/optout.

Reply via email to