MAIL RESUMES TO : <mailto:t...@vstconsulting.com> t...@vstconsulting.com Location: Wilmington DE Duration: 6-12 Months Position Title: Information Security - Application Risk Assessor Department: Information Security Reports To: Director - Information Risk Management Position Summary: This role will be responsible for developing detailed requirements and design review for applications developed internally and externally to support a new Mobile Payments Product. These applications include web, java, and middleware code in support of customer and partner facing interfaces. This role includes developing a detailed understanding of related existing applications and environment. This individual should have business acumen and detailed understanding of the Software development lifecycle. This individual will be primarily interfacing with the Mercury Security Lead to provide project status and escalation. Work with application development team leads to ensure application security is aligned with policy, security best practices and business needs. Essential Functions: Experience and knowledge in a corporate environment with the following; . Application development standards . Penetration testing tools including SNORT, NESSUS, Webinspect, Application Fuzzers etc. . information classification methods . experience with FFIEC, ISO 17799 and NIST risk management . principles of development of baselines and their relationship to risk-based assessments of control requirements . life-cycle-based risk management principles and practices . threats, vulnerabilities and exposures associated with confidentiality, integrity and availability of information resources . recommendation of appropriate user access controls, reporting and logging of each application . quantitative and qualitative methods used to determine sensitivity and criticality of information resources and the impact of adverse events . gap analysis to assess generally accepted standards of good practice for information security management against current state . risk mitigation strategies used in defining security requirements for information resources supporting business applications . cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels . managing and reporting status of identified risks . Project management experience. Other Responsibilities: . Performs other work related duties as assigned Knowledge, Skills, Education, Experience, and Competencies: . Bachelor degree in Computer Science, Information Technology or related field required. . Information security or IT Audit experience . Detailed understanding of the operations and security for Global Platform 2.2 preferred . Detailed understanding of the operations and security RFID and/or EMV preferred . Detailed understanding of the threats and associated mitigation for mobile web applications preferred . Knowledge of regulatory requirements, security standards and compliance issues (FFIEC guidelines, Sarbanes Oxley, GLBA, ISO 17799, CobiT v4.0, and Payment Card Industry Data Security Standard (PCI DSS)). . Experience with root cause analysis, risk mitigation, security assessments, analysis of security threats, trends and architecture preferred. . In addition to security, proficient in other IT control areas (i.e., change management, SDLC, Operations). . Strong project management (and time management) skills required. Ability to work on numerous projects/activities simultaneously. . Strong written and verbal communication, coordination and organizational skills required. . Proven interpersonal skills and ability to take a leadership role. The ability to communicate with management and peers to build and sustain cohesive relationships. . Superior attention to details. . Able to work well with and communicate effectively with all levels with the IT Organization. . Able to quickly grasp the big picture, yet remained focused on coordinating tasks at the detailed level The above statements reflect the general details considered necessary to decide the principal functions of the job identified, and shall not be construed as a detailed description of all work requirements, which may be inherent in the job. Thanks & Regards Tina | VST Consulting, Inc. Email : <https://mail.google.com/mail/html/compose/static_files/t...@vstconsulting.c om> t...@vstconsulting.com Yahoo ID: tina.1623 |Gtalk: tina1623 Ph : 732-404-0025 Ext : 117