Hi Hope you are doing great tod
Role: Security and Risk Management Duration: six-month Location: Parsippany, NJ. Interview: Phone then Skype Description:Job Title: IT Security and Risk Management Consultant (6-month contract role) Our client is a not-for-profit dental benefits company. We are looking for a contract consultant to fill the IT Security and Risk Management role for six months on site in their Parsippany, NJ location. Job Responsibilities: • Work with business units to identify security requirements, using methods that may include risk and business impact assessments. • Conduct application risk managements. • Develop and updated policies and procedures for the general operation of the IT Security and risk management program. • Create and maintain IT Security policy exceptions process. • Work with information security leadership to develop strategies and plans to enforce security requirements and address identified risks. • Play an advisory role in application development or other related projects to assess security requirements and controls and to ensure that security controls are implemented as planned. • Collaborates on critical IT projects to ensure that security issues are addressed throughout the project life cycle. • Manage Information Security Awareness Program • Work with IT department and members of the information security team to identify, select and implement technical controls. • Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). • Maintain operational configurations of all in-place security solutions as per the established baselines. • Analyze and evaluate data from multiple sources to gain awareness of potentially suspicious and anomalous activity. • Follow detailed operational processes and procedures to appropriately analyze, escalate, and assist in remediation of critical information security incidents. • Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution. • Participate in investigations into problematic activity. • Participate in the design and execution of vulnerability assessments, penetration tests and security audits. Regards *Himanshu* 978-558-4666 x 104 *himan...@teknavigators.com* <himan...@teknavigators.com> *TekNavigators LLC* *100 Cummings Center, Suite 207 P, Beverly, MA 01915* *www.*teknavigators.com DISCLAIMER: This message and any attachments are solely for the use of the individual or entity to which it is addressed and may contain information that is privileged or confidential. If you are not the intended recipient, any disclosure, use or distribution of the information contained herein is prohibited. If you have received this communication in error, please notify the sender by reply e-mail and immediately delete this message and any attachments. You may reply and send an email with "Not Interested" in the subject line in order to discontinue communication. -- You received this message because you are subscribed to the Google Groups "Hot List" group. To unsubscribe from this group and stop receiving emails from it, send an email to directclienteq+unsubscr...@googlegroups.com. To post to this group, send email to directclienteq@googlegroups.com. Visit this group at https://groups.google.com/group/directclienteq. For more options, visit https://groups.google.com/d/optout.