HI, Hope you are doing great!
This is Harry from Dynamic Enterprise Solutions. We have urgent requirement's with one of our client's, please review below job description and let me know your interest Position ID: DYES00006849 Title: Information Security Manufacturing Architect Duration: 3 months w/ possible extension Location: Mettawa, IL Locals only (Phone and in person) Description: Pharmaceutical Client's Information Security team is seeking a candidate to join an exciting, high-performing organization. The Information Security Industrial Control Systems Architect, working within Pharmaceutical Client's enterprise-wide information security team, will be responsible for collaborating with engineering and automation business areas to design secure methods and systems to enable our manufacturing facilities. The Information Security team is looking for a highly motivated, self-driven individual that is never satisfied with the status quo. Ideal candidates will have an in-depth understanding of cyber security architectural standards and design patterns for industrial control system (ICS) environments, while providing consulting services to the manufacturing teams, including guidance around leveraging secure architectural models and solutions. Candidates must have the ability to discuss and present ICS security (vision, design, deploy) to different levels of leadership. This candidate will also be a key member of project teams for implementation and improvements in the manufacturing environment, including the design and implementation of enterprise security services into and around manufacturing systems and technologies. Major Duties and Responsibilities: * Collaborate with manufacturing teams to understand business needs and constraints, identifying workable security solutions to support business challenges * Collaborate with manufacturing technology leaders to drive or participate in initiatives to more closely integrate manufacturing tools and services * Provide guidance around architectural security solution to support the maturation of manufacturing operations * Assist incident response team in responding to cyber incidents on the manufacturing systems * Provide network and system specification documentation deliverables to address cybersecurity vulnerabilities and the security controls necessary in mitigate the vulnerabilities to an acceptable level of risk * Monitor the current state of security in the ICS environment and determine the applicability to Pharmaceutical Client to develop action plans and strategic direction. Experience and Skills * A minimum of 5-8 years of experience required in cybersecurity and/or a combination of information technology auditing and cybersecurity * Strong written and verbal communication skills * ICS network design experience and understanding of different industrial control security frameworks (i.e. Purdue model) * Information security qualification such as CISSP (or equivalent experience) is preferred * Cybersecurity Standards experience (ISO, DoD, NIST, etc.) * Experience in network design and system configuration to include firewalls, protocols, ports, VLANs, VMs, and route configuration. * Proven experience delivering facility design or design-build projects, served as a project team's cybersecurity consultant and designer to facilitate reliable, safe, and secure network and system designs * An understanding of data networks and protocols, both in IT and OT spaces * A deep understanding of cybersecurity challenges and risk in the OT space and industry solution to mitigate them * Functional knowledge and experience with systems in pharmaceuticals or other healthcare regulated sectors is preferred. Building consensus and impacting outcomes with authority and ability to negotiate trade off decisions across the organization * It is preferred if the candidate has held a cybersecurity and ICS focused role, participated in or led cybersecurity centric ICS initiatives, and/or worked with industrial control systems and networks * Years of experience/education/certifications required: * 5-8 years of experience required in cybersecurity and/or a combination of information technology auditing and cybersecurity * What are the top skills/requirements this person should have? * ICS network design experience and understanding of different industrial control security frameworks (i.e. Purdue model) * Information security qualification such as CISSP (or equivalent experience) is preferred * Cybersecurity Standards experience (ISO, DoD, NIST, etc.) * What type of environment is this person working in? * Ability to work independently. Receiving guidance and then run with it. * How soon after the request is published to the supplier are you looking to start interviewing: * ASAP * Interview Process (will this be a phone or in-person interview): * Phone and in person Position ID: DYES00006850 Title: Information Security Cloud Architect Duration: 3 months w/ possible extension Location: Mettawa, IL Locals only (Phone and in person) Description: Pharmaceutical Client's Information Security team is looking for a candidate to join an exciting, high performing organization. The Information Security Cloud Architect, working within Pharmaceutical Client's enterprise-wide information security team, will be responsible for ensuring security has been implemented in new and existing cloud technologies. The Information Security team is looking for a highly motivated, self-driven individual that is never satisfied with the status quo. This role is expected to design solutions that enforce security best-practices for cloud operations, including participating and guiding new cloud deployments. Including working with technical architects and engineers to develop secure solutions that mitigate high-risk areas. This role will also be expected to bring new technologies and designs to the table to enable competitive advantage and ensure protection of reputation and intellectual property. Major Duties and Responsibilities: * Implementation of industry leading practices around cyber risks and Cloud security * Designing and developing Cloud-specific security policies, standards and procedures e.g. firewall management, SSL/IPSec, security incident and event management (SIEM), data protection (DLP, encryption), user account management (SSO, SAML), and password/key management. * Support security aspects of business & IT initiatives by assisting in architecture, design, implementation, deployment, and operational transition of innovative & secure cloud technology solutions. * Research, evaluate, design, test, recommend and plan the implementation of new or updated information security cloud technologies. * Play an advisory role in cloud projects to assess security requirements and controls and to ensure that security controls are implemented as planned. Complete remediation activities and initiate actions to ensure that compliance and security gaps are successfully addressed. * Evaluate security controls employed by cloud service and other third party providers to ensure information assets are adequately protected. Experience and Skills 8+ years' work experience in information security and/or related functions (such as IT Audit, Risk Management or Security Architecture). During recent history, candidate must have demonstrated exceptional ability to assess and communicate information security concepts and practices, with both business and IT stakeholders. Proven implementation of creative technology solutions that advance the business. Excellent written and oral English communication skills. Specifically, we're looking for: . Experience with one or more major cloud technologies like AWS, Azure, or Google cloud. . Has participated in the design, implementation, and migration to a cloud environment. . Specially have working experience to the following cloud security concepts; identity and compliance related disciplines such as IAM, account management, storage policies, WAF, DDoS, compliance tools, key management, logging and monitoring, data protection, etc. . Exposure or understanding of the following concepts, practices, and technologies: network security and perimeter security, firewalls, IDS/IPS, SIEM, workstation, mobile device, and network design standards. . Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project. . Strong people skills, collaborative ability to work with IT stakeholders inside and outside of the organization, able to mentor team members with diverse backgrounds. . Ability to formulate network security architecture vision and translate vision into execution. . Thorough understanding of Information Security frameworks and good practices (e.g. CSA), and proven ability to strike a balance between an academic and pragmatic approach. o Requirements: . Relevant work experience is important for successful performance of this role due to the complexity of our global IT Security environment. . Information security qualification such as ISC2 - Certified Cloud Security Professional is preferred. . Recent work experience health care/life science organization is a plus. . Are you open to look at candidates willing to relocate? * They will be required to be onsite in Lake County . Years of experience/education/certifcations required: * 8+ years' work experience in information security and/or related functions . What are the top skills/requirements this person should have? * Experience with one or more major cloud technologies like AWS, Azure, or Google cloud. * Has participated in the design, implementation, and migration to a cloud environment. * Specially have working experience to the following cloud security concepts; identity and compliance related disciplines such as IAM, account management, storage policies, WAF, DDoS, compliance tools, key management, logging and monitoring, data protection, etc. * Exposure or understanding of the following concepts, practices, and technologies: network security and perimeter security, firewalls, IDS/IPS, SIEM, workstation, mobile device, and network design standards. * Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project. * Strong people skills, collaborative ability to work with IT stakeholders inside and outside of the organization, able to mentor team members with diverse backgrounds. * Ability to formulate network security architecture vision and translate vision into execution. * Thorough understanding of Information Security frameworks and good practices (e.g. CSA), and proven ability to strike a balance between an academic and pragmatic approach. . What type of environment is this person working in? Ability to work independantly. Receiving guidance and then run with it. . How soon after the request is published to the supplier are you looking to start interviewing: ASAP . Interview Process (will this be a phone or in-person interview): Phone and in person Position ID: DYES00006851 Title: Information Security Architect Duration: 6 months w/ possible extension Location: Mettawa, IL Locals only (Phone and in person) Description: The Information Security Architect is a member of the Information Security team and works closely with other members of the team to develop and implement a comprehensive information security program. This includes defining security policies, processes, and standards. Major Duties and Responsibilities: * Develop plans for security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices. Additionally, developing requirements for public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as Windows and Unix server infrastructure, messaging, end user computing devices, and software; adhering to industry standards. * Support security aspects of business & IT initiatives by assisting in architecture, design, implementation, deployment, and operational transition of innovative & secure technology solutions. * Work with information security leadership to develop strategies and plans to enforce security requirements and address identified risks in the infrastructure. * Research, evaluate, design, test, recommend and plan the implementation of new or updated information security technologies. * Establish collaborative working relations with the Information Technology functions to ensure that solutions align with security architecture and business strategy. * Play an advisory role in application development or acquisition projects to assess security requirements and controls and to ensure that security controls are implemented as planned. Complete remediation activities and initiate actions to ensure that compliance and security gaps are successfully addressed. * Evaluate security controls employed by Cloud service and other third party providers to ensure information assets are adequately protected. * Provides second- and third-level support and analysis during and after security incidents. Assists security administrators and IT staff in the resolution of reported security incidents. * Research and assess new information security threats and recommend remedial actions. * Foster an information security culture through education, skill development, and implementation of effective information security processes and practices. * Understand and adhere to corporate standards regarding applicable Corporate and Divisional Policies, including code of conduct, safety, GxP compliance, data security, and the software development lifecycle * May mentor/supervise a team of one or more and guide and evaluate the performance of those individuals; is accountable for the effective performance of the team/individuals. * Matures and leverages relationships with affiliates, subsidiaries, vendors, and industry peers in accordance with Pharmaceutical Client Values, Vendor Management Office, and Purchasing to further the mission, vision and goals of the organization. Experience and Skills 8+ years' work experience in information security and/or related functions (such as IT Audit, Risk Management or Security Architecture). During recent history, candidate must have demonstrated exceptional ability to assess and communicate information security concepts and practices, with both business and IT stakeholders. Requires in-depth knowledge of the systems development life cycle, client area's functions and systems, and systems applications programs development technological alternatives. Proven implementation of creative technology solutions that advance the business. Excellent written and oral English communication skills. Specifically, we're looking for: * Significant exposure or understanding of the following concepts, practices, and technologies: network security and perimeter security, firewalls, IDS/IPS, SIEM, workstation, mobile device, and network design standards. * Understanding the following concepts is a plus; identity management, federated identity services, incident management, access control, end-point protections, desktop security tools, anti-malware solutions, application vulnerability testing, public key infrastructure, Windows, and Unix/Linux. * Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project. * Signification SOX and HIPAA experience in dealing with IT general controls (ITGC), demonstrated through hands-on audit, remediation, and/or computer system validation. Excellent understanding of current Information Security & Architecture trends and their impact on business strategies including: key Information Security vendors and solutions, audit organizations and influential market research firms. * Excellent communications and influencing skills with strong ability to balance differing stakeholder interests through sound analysis and persuasion. * Strong people skills, collaborative ability to work with IT stakeholders inside and outside of the organization, able to mentor team members with diverse backgrounds. * Ability to formulate network security architecture vision and translate vision into execution. * Thorough understanding of Information Security frameworks and good practices (e.g. ISO, NIST), and proven ability to strike a balance between an academic and pragmatic approach. Requirements: * Relevant work experience is important for successful performance of this role due to the complexity of our global IT Security environment. * Information security qualification such as CISSP is preferred. * Recent work experience in a "Big Four" focused in health care or Fortune 100 health care/life science organization is a plus. * Are you open to look at candidates willing to relocate? * - They will be required to be onsite in Lake County * Years of experience/education/certifcations required: * 8+ years' work experience in information security and/or related functions * What are the top skills/requirements this person should have? * Significant exposure or understanding of the following concepts, practices, and technologies: network security and perimeter security, firewalls, IDS/IPS, SIEM, workstation, mobile device, and network design standards. * Understanding the following concepts is a plus; identity management, federated identity services, incident management, access control, end-point protections, desktop security tools, anti-malware solutions, application vulnerability testing, public key infrastructure, Windows, and Unix/Linux. * Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project. * Signification SOX and HIPAA experience in dealing with IT general controls (ITGC), demonstrated through hands-on audit, remediation, and/or computer system validation. Excellent understanding of current Information Security & Architecture trends and their impact on business strategies including: key Information Security vendors and solutions, audit organizations and influential market research firms. * Excellent communications and influencing skills with strong ability to balance differing stakeholder interests through sound analysis and persuasion. * Strong people skills, collaborative ability to work with IT stakeholders inside and outside of the organization, able to mentor team members with diverse backgrounds. * Ability to formulate network security architecture vision and translate vision into execution. * Thorough understanding of Information Security frameworks and good practices (e.g. ISO, NIST), and proven ability to strike a balance between an academic and pragmatic approach. * What type of environment is this person working in? * Ability to work independantly. Receiving guidance and then run with it. * How soon after the request is published to the supplier are you looking to start interviewing: * ASAP * Interview Process (will this be a phone or in-person interview): * Phone and in person Thanks & Regards Harry John Business Development Manager Dynamic Enterprise Solutions Inc 1801 Hicks Rd, unit A Rolling Meadows, IL -60008 (847) 719-7902 / (847) 874-7274 C 224-635-0898 Email: <mailto:[email protected]> [email protected] URL: http// <http://www.dynamic-enterprise.net/> www.dynamic-enterrise.net -- You received this message because you are subscribed to "rtc-linux". Membership options at http://groups.google.com/group/rtc-linux . Please read http://groups.google.com/group/rtc-linux/web/checklist before submitting a driver. --- You received this message because you are subscribed to the Google Groups "rtc-linux" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/rtc-linux/00ea01d59a2d%24e7467d60%24b5d37820%24%40dynamic-enterprise.net.
