Dear Candidate, we have an urgent requirement for Sr. information security risk manager Please forward your update resume as per the requirement with the below requested skills. kindly fill the details given below. Candidate Details:- Full Name as per passport : Email : Phone: visa status: Date of Birth: Willing to relocate: expected hourly: Currently on Assignment? Home Location Interview Availability: Start Availability: Summary of Qualifications: References : last four digit SSN number job location: Dallas TX job duration : 1 plus year
*Job Description:* Primary responsibilities: Perform Security risk assessments for various IT projects, including but not limited to reviewing architecture designs and providing detailed guidance on risk mitigation. Provide consulting services to IT organization and confirm adherence to Company's security policy and regulatory requirements such as PCI, PII, HIPAA, and SOX. Serve as the subject matter expert on all matters of Enterprise Information Security. Research and recommend enhancements to the enterprise information security services. Review firewall change escalations and provide technical guidance to security engineering team Understand security policies and procedures and assist in enforcing them Research and analyze attempted breaches of data security and rectifying security weaknesses Assist in creating a catalog of Security standards and commonly used patterns in the organization Education/Experience 5-7 years experience in Information Technology with a focus on Information Security Bachelor's degree in Computer Science CISSP Certification preferred Responsibility level Exercises independent judgment with direction from supervisor Skills Experienced in performing security risk assessments based on risk management frameworks such as ISO or NIST. Strong knowledge in security architecture and design for Information Technology systems and infrastructure. Good understanding for various protocols, and applications, such as TCP/IP stack Good knowledge with various types of identity & access control mechanisms and network security concepts Capable of addressing crowds as a Security Consultant Proficiency in key aspects of Information Security (Confidentiality, Integrity, Accessibility, Authenticity, Non-Repudiation) Proficiency in Information Security controls (Administrative, Logical, Physical) General knowledge surrounding Information Security as applied at multiple layers (Platform, Networking, Mobility, Application, Web, etc.) Excellent documentation and verbal skills The ability to handle multiple projects simultaneously CISSP certification preferred Network Security – 3-5 years Security Architecture & Design – 2-3 years Security Risk Management – 2-3 years Identity & Access Management – 1-2 years Thanks & Regards, Imran TechLeap Systems Las Colinas Business Park , 4324 N Beltline Rd, S# C-110,Irving, TX 75038 im...@techleapsystems.com <a...@techleapsystems.com> office number:469-713-3530, www.TechLeapSystems.com <http://www.techleapsystems.com/> -- You received this message because you are subscribed to the Google Groups "Resumes" group. To unsubscribe from this group and stop receiving emails from it, send an email to resumes+unsubscr...@googlegroups.com. To post to this group, send email to firstname.lastname@example.org. Visit this group at https://groups.google.com/group/resumes. For more options, visit https://groups.google.com/d/optout.