NEED PROFILES ON PRIORITY


LOCATION – LINCOLNSHIRE, IL



DURATION – 6 MONTHS





Role & Responsibility (Not in priority order):

·         Manage enterprise perimeter security

·         Manage application onboarding (security Compliance framework for
internet, intranet applications)

·         Define and develop the Information Security Assurance and Testing
strategy

·         Perform project management of penetration testing, security code
review, and security design and architecture engagements

·         Develop and maintain information security framework including
mapping to standards like ISO 27001

·         Define and maintain information security policies and procedures

·         Translate security metrics into operational risk measures and
enterprise risk terminology

·         Design and deliver information security operations reports to
management

·         Document Service Level Agreement (SLAs) with security service
providers

·         Capture the existing operating model for security teams and
assist in the development of the target operating model for global
operations

·         Oversee the design and development of vendor assessment and
governance, Risk and Compliance tracking of security activities and metrics

·         Understand present & future business objectives from CxOs & map /
align the objectives to enterprise security framework

·         Mentor & manage infoSec team

Required Skills:

•    Bachelors degree in Information Technology, Information Security,
Business or Risk Management (or equivalent experience)

•   10 years of experience as an Information Security and technology risk
practitioner

•    Process and detail oriented with an ability to think strategically

•    Ability to articulate risk management concepts to all levels of the
organization

•    Prior experience interfacing with C-Level executives, Board of
Directors, auditors and regulators

•    Excellent written and verbal communication skills

•    Proficient with Microsoft Office Suite

•    Prior experience documenting tool requirements to support risk
management

•    Proven ability to manage issues through to resolution; skilled at
making judgment calls.

•    Ability to successfully multitask and complete difficult assignments
within deadlines

•    InfoSec certifications like CISSP, CISM, CISA







Thanks & Regards

Abhay Tiwari

Sr. Technical Recruiter

abha...@idctechnologies.com <jama...@idctechnologies.com> | 408-457-9399
Ex. 2033

Gtalk : abhaytiwari9009

Skype: akt.idc

IDC Technologies, Inc. |1851 McCarthy Boulevard, Suite 116, Milpitas, CA,
USA, 95035
Web: www.idctechnologies.com

ISO 9001-2008 Certified



"Under Bill s. 1618 Title III passed by the 105th U.S. Congress this mail
cannot be considered spam as long as we include a way to be removed from
our mailing list. Simply send us an e-mail with REMOVE in the subject and
we will gladly REMOVE you from our mailing list.”

-- 
You received this message because you are subscribed to the Google Groups "Open 
Source Erp & Crm" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to open-source-erp-crm+unsubscr...@googlegroups.com.
To post to this group, send email to open-source-erp-crm@googlegroups.com.
Visit this group at http://groups.google.com/group/open-source-erp-crm.
For more options, visit https://groups.google.com/d/optout.

Reply via email to