Hi, This is Suman Bakshi (Sam) from Source Chip,Inc. Need strong consultants for below Role in CA.
*Submit Resume with Best Possible Rate.* Position - Security Analyst The following requisition has been assigned: Contract -Long Term TITLE: Security Analyst LOCATION: Torrance, CA, United States # of Openings: 2 Hourly Rate-Market Requisition Details: Responsibilities ------------------- Pivotal team member in developing a compliance framework including controls development, test scripts, conducting assessments, reporting evaluations performed, and providing metrics on the progress made Works with business units and with other risk functions to identify security requirements, using methods that may include risk and business impact assessments. Components of this activity include but are not limited to: Business system analysis, Communication, facilitation and consensus building Assists in the coordination and completion of information securityoperations documentation Works with information security leadership to develop strategies and plans to enforce security requirements and address identified risks Reports to management concerning residual risk, vulnerabilities and other security exposures, including misuse assets and noncompliance Plays an advisory role in application development or acquisition projects to assess security requirements and controls and to ensure that security controls are implemented as planned Collaborates on critical IT projects to ensure that security controls are implemented as planned Works with IT throughout the project life cycle as directed by management Works with IT department and members of the information security team to identify, select and implement technical controls Develops security processes and procedures, and supports service-level agreements (SLAB) to ensure that security controls are managed and maintained Address security administration on a normal and exception-based processing of security authorization requests Researches new compliance requirements, works with other team members to incorporate existing process to reduce risk exposure Daily Tasks Performed : Developing a single control framework to streamline the audit process into a Singular audit. Documenting controls and test procedures surrounding privacy and financial audit assessments Reforming independent assessments of various IT systems based on the newly defined control framework, Work with various business unit managers, application teams, and team managers to obtain testing evidence and execute lest scripts. Formally document test results and communicate findings to management and auditee/group/team. Assisting with remediation activities as identified within the assessment Actively reporting on progress and keeping management informed of the current status. Review processes and Identify areas where efficiency can be gained. Assist with risk mitigation strategies and framework development as needed. Assist in other areas of the department and organization as needed based on management direction. Musts : --------- Bachelor's degree in Information Systems or equivalent work experience in IS auditing, governance, compliance Business Experience : 3 to 5 years of combined IT and security work experience with a broad range of exposure to systems analysis, applications development, database design and administration; one to two years of experience with information security Wants : In-depth knowledge and understanding of information risk concepts and principles, as a means of relating business needs to security controls Knowledge of an experience in developing and documenting security controls and test plans/scripts. Experience with SOX 404, HIPPA, GLBA, PCI, foreign and domestic privacy laws. Experience with common Information security management frameworks, such as [International Organization for Standardization (ISO) 2700x and the ITIL, COBIT and National Institute of Standards and Technology (NIST) frameworks. Knowledge of the fundamentals of project management In-depth knowledge of risk assessment methods and technologies. Proficiency in performing risk, business impact, control and vulnerability assessments. Strong understanding of business applications, including ERP and financial systems, Excellent technical knowledge of mainstream operating systems [for example, Microsoft Windows and Oracle Solaris) and a wide range of security technologies, such as network security appliances, identity end access management (IAM) system, anti-malware solutions, automated policy compliance tools, and desktop security tools. Knowledge of network infrastructure. including routers. switches. firewalls, and the associated network protocols and concepts. Experience In developing, documenting and maintaining security policies, processes, procedures and standards. Audit, compliance or governance experience is required. *Regards,* *Suman Bakshi- SAM * *SourceChip, Inc * *Email - s...@sourcechip.net <s...@sourcechip.net> * *Phone -732-917-4895 * -- You received this message because you are subscribed to the Google Groups "SAP BASIS" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-basis+unsubscr...@googlegroups.com. To post to this group, send email to sap-basis@googlegroups.com. Visit this group at https://groups.google.com/group/sap-basis. For more options, visit https://groups.google.com/d/optout.