Duties & Responsibilites : | It is mandatory for all the vendors to provide the details below while sharing the resume
Consultant Name:
Current Location:
Phone:
Email:
Work Authorization :
Rate:
Local Candidate Preferred.
-Perform detailed risk evaluation and develop mitigation plan for various IT projects, including but not limited to reviewing architecture designs and providing detailed guidance on risk mitigation.
-Provide consulting services to IT organization and confirm adherence to Company's security policy and regulatory requirements such as PCI, PII, HIPAA, and SOX.
-Act as a security liaison with Client team, and play a lead role in developing and maintaining DevOps security strategy for the organization
Serve as the subject matter expert on all matters of Enterprise Information Security.
-Research and recommend enhancements to the enterprise information security services.
-Review firewall change escalations and provide technical guidance to security engineering team
-Understand security policies and procedures and assist in enforcing them
-Research and analyze attempted breaches of data security and rectifying security weaknesses
-Assist in creating a catalog of Security standards and commonly used patterns in the organization
Education/Experience:
-5-7 years experience in Information Technology with a focus on Information Security
-Bachelor's degree in Computer Science or related field
-CISSP Certification preferred
Responsibility level:
-Exercises independent judgment with direction from supervisor
Skills:
-General knowledge surrounding Information Security as applied at multiple layers (Platform, Networking, Mobility, Application, Web, etc.)
-Good knowledge of security controls such as firewalls, IDS/IPS, SIEM, WEb Application Firewalls, Internet Proxy, etc.
-Good understanding of Identity & Access
-Good understanding of DevOps
-Capable of addressing crowds as a Security Consultant
-Proficiency in key aspects of Information Security (Confidentiality, Integrity, Accessibility, Authenticity, Non-Repudiation)
-Proficiency in Information Security controls (Administrative, Logical, Physical)
-Excellent documentation and verbal skills
-The ability to handle multiple projects simultaneously
Interview Process
In Person |