Hi

Hope you are doing great tod

Role: Security and Risk Management

Duration: six-month

Location: Parsippany, NJ.

Interview: Phone then Skype



Description:Job Title: IT Security and Risk Management Consultant (6-month
contract role)

Our client is a not-for-profit dental benefits company. We are looking for
a contract consultant to fill the IT Security and Risk Management role for
six months on site in their Parsippany, NJ location.

Job Responsibilities:

•             Work with business units to identify security requirements,
using methods that may include risk and business impact assessments.

•             Conduct application risk managements.

•             Develop and updated policies and procedures for the general
operation of the IT Security and risk management program.

•             Create and maintain IT Security policy exceptions process.

•             Work with information security leadership to develop
strategies and plans to enforce security requirements and address
identified risks.

•             Play an advisory role in application development or other
related projects to assess security requirements and controls and to ensure
that security controls are implemented as planned.

•             Collaborates on critical IT projects to ensure that security
issues are addressed throughout the project life cycle.

•             Manage Information Security Awareness Program

•             Work with IT department and members of the information
security team to identify, select and implement technical controls.

•             Maintain up-to-date baselines for the secure configuration
and operations of all in-place devices, whether they be under direct
control (i.e., security tools) or not (i.e., workstations, servers, network
devices, etc.).

•             Maintain operational configurations of all in-place security
solutions as per the established baselines.

•             Analyze and evaluate data from multiple sources to gain
awareness of potentially suspicious and anomalous activity.

•             Follow detailed operational processes and procedures to
appropriately analyze, escalate, and assist in remediation of critical
information security incidents.

•             Review logs and reports of all in-place devices, whether they
be under direct control (i.e., security tools) or not (i.e., workstations,
servers, network devices, etc.). Interpret the implications of that
activity and devise plans for appropriate resolution.

•             Participate in investigations into problematic activity.

•             Participate in the design and execution of vulnerability
assessments, penetration tests and security audits.



Regards

*Himanshu*

978-558-4666 x 104

*himan...@teknavigators.com <himan...@teknavigators.com>*

*TekNavigators LLC*

*100 Cummings Center, Suite 207 P, Beverly, MA 01915*

*www.*teknavigators.com



DISCLAIMER: This message and any attachments are solely for the use of the
individual or entity to which it is addressed and may contain information
that is privileged or confidential. If you are not the intended recipient,
any disclosure, use or distribution of the information contained herein is
prohibited. If you have received this communication in error, please notify
the sender by reply e-mail and immediately delete this message and any
attachments.  You may reply and send an email with "Not Interested" in the
subject line in order to discontinue communication.

-- 
You received this message because you are subscribed to the Google Groups 
"MCMS" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to mcms+unsubscr...@googlegroups.com.
To post to this group, send email to mcms@googlegroups.com.
Visit this group at https://groups.google.com/group/mcms.
For more options, visit https://groups.google.com/d/optout.

Reply via email to