Hi, This is Suman Bakshi (Sam) from Source Chip,Inc. Need strong consultants for below Role in CA.
Submit Resume with Best Possible Rate.
Position - Security Analyst
The following requisition has been assigned:
Contract -Long Term
TITLE: Security Analyst
LOCATION: Torrance, CA, United States
# of Openings: 2
Hourly Rate-Market
Requisition Details:
Responsibilities
-------------------
Pivotal team member in developing a compliance framework including controls development, test scripts, conducting assessments, reporting evaluations performed, and providing metrics on the progress made Works with business units and with other risk functions to identify security requirements, using methods that may include risk and business impact assessments.
Components of this activity include but are not limited to:
Business system analysis, Communication, facilitation and consensus building
Assists in the coordination and completion of information securityoperations documentation
Works with information security leadership to develop strategies and plans to enforce security requirements and address identified risks
Reports to management concerning residual risk, vulnerabilities and other security exposures, including misuse assets and noncompliance
Plays an advisory role in application development or acquisition projects to assess security requirements and controls and to ensure that security controls are implemented as planned
Collaborates on critical IT projects to ensure that security controls are implemented as planned
Works with IT throughout the project life cycle as directed by management
Works with IT department and members of the information security team to identify, select and implement technical controls
Develops security processes and procedures, and supports service-level agreements (SLAB) to ensure that security controls are managed and maintained
Address security administration on a normal and exception-based processing of security authorization requests
Researches new compliance requirements, works with other team members to incorporate existing process to reduce risk exposure
Daily Tasks Performed :
Developing a single control framework to streamline the audit process into a Singular audit.
Documenting controls and test procedures surrounding privacy and financial audit assessments
Reforming independent assessments of various IT systems based on the newly defined control framework,
Work with various business unit managers, application teams, and team managers to obtain testing evidence and execute lest scripts.
Formally document test results and communicate findings to management and auditee/group/team.
Assisting with remediation activities as identified within the assessment
Actively reporting on progress and keeping management informed of the current status.
Review processes and Identify areas where efficiency can be gained.
Assist with risk mitigation strategies and framework development as needed.
Assist in other areas of the department and organization as needed based on management direction.
Musts :
---------
Bachelor's degree in Information Systems or equivalent work experience in IS auditing, governance, compliance
Business Experience :
3 to 5 years of combined IT and security work experience with a broad range of exposure to systems analysis, applications development, database design
and administration; one to two years of experience with information security
Wants :
In-depth knowledge and understanding of information risk concepts and principles, as a means of relating business needs to security controls
Knowledge of an experience in developing and documenting security controls and test plans/scripts.
Experience with SOX 404, HIPPA, GLBA, PCI, foreign and domestic privacy laws.
Experience with common Information security management frameworks, such as [International Organization for Standardization (ISO) 2700x and the ITIL,
COBIT and National Institute of Standards and Technology (NIST) frameworks.
Knowledge of the fundamentals of project management
In-depth knowledge of risk assessment methods and technologies.
Proficiency in performing risk, business impact, control and vulnerability assessments.
Strong understanding of business applications, including ERP and financial systems,
Excellent technical knowledge of mainstream operating systems [for example, Microsoft Windows and Oracle Solaris) and a wide range of security technologies, such as network security appliances, identity end access management (IAM) system, anti-malware solutions, automated policy compliance tools, and desktop security tools.
Knowledge of network infrastructure. including routers. switches. firewalls, and the associated network protocols and concepts.
Experience In developing, documenting and maintaining security policies, processes, procedures and standards. Audit, compliance or governance experience is required.
Regards,
Suman Bakshi- SAM
SourceChip, Inc
Email - sam@sourcechip.net
Phone -732-917-4895
You received this message because you are subscribed to the Google Groups "US Jobs: Requirements, Clients and Consultants" group.
To unsubscribe from this group and stop receiving emails from it, send an email to recruiters-r-us+unsubscribe@googlegroups.com.
To post to this group, send email to recruiters-r-us@googlegroups.com.
Visit this group at https://groups.google.com/group/recruiters-r-us.
For more options, visit https://groups.google.com/d/optout.
No comments:
Post a Comment