Hi Hope you doing good. I have one direct client requirement for you. Please have a look in to this job description and let me know your interest.
Please respond to [email protected] Loc: Houston-TX Duration: Long term Rate: $45/hr on C2C Client : XXX(let u know) *JOB OVERVIEW* The candidate will lead information security objectives and processes for the client's Consumer organization; including liaising, advising, advocating, and facilitating to identify and reduce information security risk. Among other duties, the candidate will perform risk assessments on computer applications and business partners to evaluating the ability to meet control requirements. Risk assessments are conducted through a combination of documentation, vulnerability assessment tools, and manual testing. Additionally, the candidate will also lead and/or participate in projects and initiatives to design and implement information security controls in processes and systems. The successful candidate will demonstrate strong knowledge of and experience with the general information security controls employed to protect organizations and computer applications. *Organizational Structure * The Senior Information Security reports directly to the Head Business Information Security Officer for the client's Consumer. *Performance Objectives: * - Design, implementation and maintenance of RSA Web Threat Detection Solution. - Proactively and collaboratively work with business units/departments to develop and implement procedures that meet defined policies and standards for information security management. - Perform application vulnerability assessments to identify and prioritize security exposures in applications used by the business; follow up with IT staff to remediate findings - Identify, evaluate and report on information security risks - Perform security risk assessments on potential vendors and business partners (including cloud service providers) to evaluate infrastructure controls - Deploy and administer security software solutions as needed (such as encryption key management, application vulnerability scanners, etc.) - Develop business-relevant metrics to measure the efficiency and effectiveness of the company’s information security management program, forecast appropriate resource allocation and increase the maturity of the program. - Coordinate and support security audits and assessments to evaluate policy compliance and existing defenses and to identify vulnerabilities. - Advise management on industry developments in business practice, technology, security issues and legislation that impact the company’s security policy - Review firewall changes for security risks - Oversee security incident response with investigation, resolution and closure including lessons learned. - Manage projects and help implement initiatives surrounding data security and privacy - Develop, document and implement information security procedures to enforce information security standards - Provide subject matter expertise to executive management on a broad range of information security standards and best practices and offer strategic and tactical security guidance for all IT projects, including the evaluation and recommendation of technical controls. - Coordinate the use of external resources involved in the information security management program, including, but not limited to, interviewing, assisting in negotiating contracts and fees and managing external resources. - Perform other security-related duties as requested *Position Requirements:* - Advanced trouble-shooting and SME (Subject Matter Expertise) with RSA (AA – Web Threat Detection AM – Authentication Manager) toolset. Hands on experience in tuning and installing. - Bachelor’s degree in information technology, business administration or a related field, or 7 years’ experience in an information technology role, four of which are in information security. - Effective in analyzing and developing options to balance business needs with security vulnerabilities - Skilled at building strong relationships, both internally with business and technology leaders and other leaders of the information security team, and externally with service providers and business partners - Professional certification such as CISSP is preferred - Strong familiarity with security issues surrounding web application security and experience in testing such applications for vulnerabilities - Ability to lead and motivate cross-functional, interdisciplinary teams to achieve tactical and strategic goals. - Experience assessing third parties for infrastructure security controls and general security practices - Experience developing and implementing security policies and/or standards - Familiarity with security issues surrounding network computing and experience in implementation of security systems and controls - Excellent working knowledge of Microsoft and/or POSIX operating systems and related applications (such as IIS, SunOne, Oracle) - Strong understanding of multiple networking protocols (TCP/IP, NetBIOS etc.) and networking concepts - Strong understanding of OS and network security - Experience with deploying and securing Internet applications - Ability to research, analyze and resolve complex problems with minimal supervision and escalate issues as appropriate - Strong analytical skills - Excellent written and verbal communication skills - Ability to partner with and influence a variety of stakeholders to ensure security requirements are understood and met Able to work independently and be a self-starter; managing multiple tasks according to priorities; results oriented and proven ability to meet deadlines Please respond to [email protected] Sridhar.Nalluri GlobalPoint Inc-MBE Certified 850 Carolier Ln, 4th Floor, North Brunswick, NJ-08902. Email: [email protected] www.globalpointinc.com -- You received this message because you are subscribed to the Google Groups "OracleD2K" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/oracled2k. For more options, visit https://groups.google.com/d/optout.
