*HI

Position : Risk Assessment Analyst
Location : Foster City,CA
Duration : 1 year
Rate     : Open*
**
*Job Description : *
Should have good knowledge of Cisco, Active Directory, and Linux background.
this would likely be a sys admin or LAN admin moved into security for at
least a year
- Tools being used are Netwitness, Redseal, and FireEye.

This position will be performing IT risk assessments and contributing toward
better risk management of the company’s information systems.  The
understanding IT risks as it relates to the business, viewing security
holistically, applying risk management intelligently, using creative problem
solving techniques and working successfully with others to achieve goals are
key to doing well in this position.
JOB RESPONSIBILITIES
25%     Perform enterprise level IT Risk Assessments of IT systems and
networks by analyzing complex technical information to ascertain areas of
risk exposure.
20%     Publish reports, track remediation, and maintain metrics.
15%     Recommend remediation strategies and actions for mitigating risk.
15%     Perform peer review of risk assessments
10%     Engage in the Risk Assessment process improvement and update process
documentation as necessary
5%       Support and manage the risk assessment software tools.
5%       Coordinate other required risk assessment or group functions.
5%       Core Company Value – Safety
EXPERIENCE AND EDUCATION
3+ years previous experience in IT.
1+ years experience in IT Security/Security Risk Management function.
CISSP certification, or ability to obtain via self-study within one year of
date of hire, other relevant IT or security certifications.
Bachelor's degree in Computer Science or related field or equivalent work
experience.
PERSONAL ATTRIBUTES REQUIRED
Strong sense of professionalism and ethics.
Enthusiasm and interest in information security.
Ability to build rapport and cooperation among teams and internal
stakeholders.
Methodical and detail oriented.
Self motivated.
REQUIRED SKILLS
Good grasp of information security fundamentals, concepts, and strategy.
Knowledge of application security best practices.
Understanding of security framework and standards such as ISO 17799, COBIT
etc.
Risk assessment and risk analysis.
Clear understanding of common protocols such as TCP/IP and network
architecture.
Well versed in one or more operating systems such as Windows, Unix, Linux,
or AIX.
Understands the use and application of preventive, detective, and corrective
controls.
Vulnerability scanning using approved tools.
Ability to manage a project effectively.
Excellent written and verbal communications skills.
Good documentation skills.



-- 

Thanks and Regard’
anshu
IT Recruiter
G technologies
4340 Stevens Creek Blvd
San Jose , CA 95129
Email: [email protected]
Office: 408-414-2032 Ext: 204
Fax: 408-716-8873

http://www.gtechnologiesinc.com

Under Bill s.1618 Title III passed by the 105th U.S. Congress this mail
cannot be considered Spam as long as we include contact information and a
remove link for removal from our mailing list. To be removed from our
mailing list reply with "remove" in the subject heading and your email
address in the body. Include complete address and/or domain/ aliases to be
removed. If you still get the emails, please call us at the numbers given
above.

-- 
You received this message because you are subscribed to the Google Groups 
"ORACLE DWH DBA" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/oracle-dwh-dba?hl=en.

Reply via email to