Hi

Hope you are doing great today

*Title:* Senior Information Security Specialist

Location: Shrewsbury MA

Duration: 6+ months

Senior Information Security Specialist to support the Information Security
Department. The Senior Information Security Specialist position is
responsible for designing, implementing and maintaining information
security protection, monitoring and reporting tools and processes.
Experience with SEIM, IDS, Log Aggregation, Vulnerability Management and
Firewall governance is required. A strong networking background is
necessary. This individual must have hands on experience with managing
Information Security and Threat Management tools.



*Required Qualifications:*

•             Degree in an information technology, risk management,
information security, privacy, or compliance discipline, or equivalent
experience;

•             Minimum of 5 years of experience in information technology or
information security;

•             Strong understanding of networking technologies and protocols;

•             Understanding of relevant state and federal regulations that
drive security requirements (HIPAA, FISMA, FERPA, etc.);

•             Ability to collaborate closely with senior networking and
system administrators;

•             Ability to present findings and recommendations to senior
management.



*Preferred Qualifications:*

•             Information security or privacy certification such as CISSP
or GIAC;

•             Demonstrative knowledge of IT and information security
frameworks and standards such as ISO/IEC 27000, NIST, CoBit, HiTRUST, etc.;

•             McAfee EPO experience;

•             Proofpoint solutions experience;

•             Checkpoint firewall experience.



*Specific goals for the contract resulting from this RFQ include:*

•             Identify critical technology risks to the school and propose
secure solutions to remediate;

•             Assist in the design of a secure network architecture;

•             Optimize SEIM and IDS to ensure that critical logs and events
are being captured and analyzed;

•             Assist in operationalizing the schools’ Vulnerability
Management program;

•             Design and implement a log aggregation facility;

•             Design and assist in implementing data center control
requirements for VBlock VCE Private Cloud;

•             Design and implement an incident response and forensics
program;

•             Assist in designing control responses to ongoing and future
data center audits and assessments;

•             Assist in the development of information security programs
that address people, process and technology risks;

•             Work closely with other Information Technology (IT) teams to
define required security, technology-based control definitions, and IT
policy and procedural documentation;

•             Implement or enhance defense-in-depth information security
tools for optimal threat protection, monitoring and reporting;

•             Investigate potential security incidents using forensically
sound methods and techniques;

•             Lead technical security requirements and controls development
ensuring integrity in security analysis, quality and timeliness in customer
deliverables;

•             Develop and implement critical technology based security
tools for identifying, correlating and remediating security threats and
vulnerabilities;

•             Review firewall rule requests for security best practices;

•             Monitor and advise on information security compliance related
to IT to ensure internal security controls are functioning appropriately;

•             Provide technical security training to create information
security awareness and aptitude;

•             Develop and promote secure architecture and solution options
for the University, working closely with IT and business leadership;

•             Review system-related security plans throughout the
organization's network, acting as a liaison to IT staff;

•             Advise the organization with current information about
information security threats, technologies and related regulatory
requirements;

•             Assist in the development and implementation of information
security metrics, measurement criteria and reporting to ensure compliance
and continuous improvement.



Regards

*Himanshu*

978-558-4666 x 104

*himan...@teknavigators.com* <himan...@teknavigators.com>

8875 Hidden River Parkway

Suite 300

Tampa,FL 33637

*www.*teknavigators.com



DISCLAIMER: This message and any attachments are solely for the use of the
individual or entity to which it is addressed and may contain information
that is privileged or confidential. If you are not the intended recipient,
any disclosure, use or distribution of the information contained herein is
prohibited. If you have received this communication in error, please notify
the sender by reply e-mail and immediately delete this message and any
attachments.  You may reply and send an email with "Not Interested" in the
subject line in order to discontinue communication.

-- 
You received this message because you are subscribed to the Google Groups 
"MCMS" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to mcms+unsubscr...@googlegroups.com.
To post to this group, send email to mcms@googlegroups.com.
Visit this group at https://groups.google.com/group/mcms.
For more options, visit https://groups.google.com/d/optout.

Reply via email to