*HI Position : Risk Assessment Analyst Location : Foster City,CA Duration : 1 year Rate : Open* ** *Job Description : * Should have good knowledge of Cisco, Active Directory, and Linux background. this would likely be a sys admin or LAN admin moved into security for at least a year - Tools being used are Netwitness, Redseal, and FireEye.
This position will be performing IT risk assessments and contributing toward better risk management of the company’s information systems. The understanding IT risks as it relates to the business, viewing security holistically, applying risk management intelligently, using creative problem solving techniques and working successfully with others to achieve goals are key to doing well in this position. JOB RESPONSIBILITIES 25% Perform enterprise level IT Risk Assessments of IT systems and networks by analyzing complex technical information to ascertain areas of risk exposure. 20% Publish reports, track remediation, and maintain metrics. 15% Recommend remediation strategies and actions for mitigating risk. 15% Perform peer review of risk assessments 10% Engage in the Risk Assessment process improvement and update process documentation as necessary 5% Support and manage the risk assessment software tools. 5% Coordinate other required risk assessment or group functions. 5% Core Company Value – Safety EXPERIENCE AND EDUCATION 3+ years previous experience in IT. 1+ years experience in IT Security/Security Risk Management function. CISSP certification, or ability to obtain via self-study within one year of date of hire, other relevant IT or security certifications. Bachelor's degree in Computer Science or related field or equivalent work experience. PERSONAL ATTRIBUTES REQUIRED Strong sense of professionalism and ethics. Enthusiasm and interest in information security. Ability to build rapport and cooperation among teams and internal stakeholders. Methodical and detail oriented. Self motivated. REQUIRED SKILLS Good grasp of information security fundamentals, concepts, and strategy. Knowledge of application security best practices. Understanding of security framework and standards such as ISO 17799, COBIT etc. Risk assessment and risk analysis. Clear understanding of common protocols such as TCP/IP and network architecture. Well versed in one or more operating systems such as Windows, Unix, Linux, or AIX. Understands the use and application of preventive, detective, and corrective controls. Vulnerability scanning using approved tools. Ability to manage a project effectively. Excellent written and verbal communications skills. Good documentation skills. -- Thanks and Regard’ anshu IT Recruiter G technologies 4340 Stevens Creek Blvd San Jose , CA 95129 Email: [email protected] Office: 408-414-2032 Ext: 204 Fax: 408-716-8873 http://www.gtechnologiesinc.com Under Bill s.1618 Title III passed by the 105th U.S. Congress this mail cannot be considered Spam as long as we include contact information and a remove link for removal from our mailing list. To be removed from our mailing list reply with "remove" in the subject heading and your email address in the body. Include complete address and/or domain/ aliases to be removed. If you still get the emails, please call us at the numbers given above. -- You received this message because you are subscribed to the Google Groups "ORACLE DWH DBA" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/oracle-dwh-dba?hl=en.
