HI,

Hope you are doing great!

This is Harry from Dynamic Enterprise Solutions. We have urgent
requirement's with one of our client's, please review below job description
and let me know your interest

 

Position ID: DYES00006849

Title: Information Security Manufacturing Architect
Duration: 3 months w/ possible extension
Location: Mettawa, IL

 

Locals only (Phone and in person)

 

Description:

Pharmaceutical Client's Information Security team is seeking a candidate to
join an exciting, high-performing organization. The Information Security
Industrial Control Systems Architect, working within Pharmaceutical Client's
enterprise-wide information security team, will be responsible for
collaborating with engineering and automation business areas to design
secure methods and systems to enable our manufacturing facilities. The
Information Security team is looking for a highly motivated, self-driven
individual that is never satisfied with the status quo.
Ideal candidates will have an in-depth understanding of cyber security
architectural standards and design patterns for industrial control system
(ICS) environments, while providing consulting services to the manufacturing
teams, including guidance around leveraging secure architectural models and
solutions. Candidates must have the ability to discuss and present ICS
security (vision, design, deploy) to different levels of leadership.

This candidate will also be a key member of project teams for implementation
and improvements in the manufacturing environment, including the design and
implementation of enterprise security services into and around manufacturing
systems and technologies.

Major Duties and Responsibilities:

*       Collaborate with manufacturing teams to understand business needs
and constraints, identifying workable security solutions to support business
challenges
*       Collaborate with manufacturing technology leaders to drive or
participate in initiatives to more closely integrate manufacturing tools and
services
*       Provide guidance around architectural security solution to support
the maturation of manufacturing operations
*       Assist incident response team in responding to cyber incidents on
the manufacturing systems
*       Provide network and system specification documentation deliverables
to address cybersecurity vulnerabilities and the security controls necessary
in mitigate the vulnerabilities to an acceptable level of risk
*       Monitor the current state of security in the ICS environment and
determine the applicability to Pharmaceutical Client to develop action plans
and strategic direction.

Experience and Skills

*       A minimum of 5-8 years of experience required in cybersecurity
and/or a combination of information technology auditing and cybersecurity
*       Strong written and verbal communication skills
*       ICS network design experience and understanding of different
industrial control security frameworks (i.e. Purdue model)
*       Information security qualification such as CISSP (or equivalent
experience) is preferred
*       Cybersecurity Standards experience (ISO, DoD, NIST, etc.)
*       Experience in network design and system configuration to include
firewalls, protocols, ports, VLANs, VMs, and route configuration.
*       Proven experience delivering facility design or design-build
projects, served as a project team's cybersecurity consultant and designer
to facilitate reliable, safe, and secure network and system designs
*       An understanding of data networks and protocols, both in IT and OT
spaces
*       A deep understanding of cybersecurity challenges and risk in the OT
space and industry solution to mitigate them
*       Functional knowledge and experience with systems in pharmaceuticals
or other healthcare regulated sectors is preferred. Building consensus and
impacting outcomes with authority and ability to negotiate trade off
decisions across the organization
*       It is preferred if the candidate has held a cybersecurity and ICS
focused role, participated in or led cybersecurity centric ICS initiatives,
and/or worked with industrial control systems and networks
*       Years of experience/education/certifications required: 

*       5-8 years of experience required in cybersecurity and/or a
combination of information technology auditing and cybersecurity

*       What are the top skills/requirements this person should have?

*       ICS network design experience and understanding of different
industrial control security frameworks (i.e. Purdue model)
*       Information security qualification such as CISSP (or equivalent
experience) is preferred
*       Cybersecurity Standards experience (ISO, DoD, NIST, etc.)

*       What type of environment is this person working in? 

*       Ability to work independently. Receiving guidance and then run with
it.

*       How soon after the request is published to the supplier are you
looking to start interviewing: 

*       ASAP

*       Interview Process (will this be a phone or in-person interview): 

*       Phone and in person

 

Position ID: DYES00006850

Title: Information Security Cloud Architect
Duration: 3 months w/ possible extension
Location: Mettawa, IL

Locals only (Phone and in person)

 

Description:

Pharmaceutical Client's Information Security team is looking for a candidate
to join an exciting, high performing organization. The Information Security
Cloud Architect, working within Pharmaceutical Client's enterprise-wide
information security team, will be responsible for ensuring security has
been implemented in new and existing cloud technologies. The Information
Security team is looking for a highly motivated, self-driven individual that
is never satisfied with the status quo. This role is expected to design
solutions that enforce security best-practices for cloud operations,
including participating and guiding new cloud deployments. Including working
with technical architects and engineers to develop secure solutions that
mitigate high-risk areas. This role will also be expected to bring new
technologies and designs to the table to enable competitive advantage and
ensure protection of reputation and intellectual property.

Major Duties and Responsibilities:

*       Implementation of industry leading practices around cyber risks and
Cloud security
*       Designing and developing Cloud-specific security policies, standards
and procedures e.g. firewall management, SSL/IPSec, security incident and
event management (SIEM), data protection (DLP, encryption), user account
management (SSO, SAML), and password/key management.
*       Support security aspects of business & IT initiatives by assisting
in architecture, design, implementation, deployment, and operational
transition of innovative & secure cloud technology solutions.
*       Research, evaluate, design, test, recommend and plan the
implementation of new or updated information security cloud technologies.
*       Play an advisory role in cloud projects to assess security
requirements and controls and to ensure that security controls are
implemented as planned. Complete remediation activities and initiate actions
to ensure that compliance and security gaps are successfully addressed.
*       Evaluate security controls employed by cloud service and other third
party providers to ensure information assets are adequately protected.

 

Experience and Skills
8+ years' work experience in information security and/or related functions
(such as IT Audit, Risk Management or Security Architecture). During recent
history, candidate must have demonstrated exceptional ability to assess and
communicate information security concepts and practices, with both business
and IT stakeholders.
Proven implementation of creative technology solutions that advance the
business.
Excellent written and oral English communication skills.

Specifically, we're looking for:

.      Experience with one or more major cloud technologies like AWS, Azure,
or Google cloud.

.      Has participated in the design, implementation, and migration to a
cloud environment.

.      Specially have working experience to the following cloud security
concepts; identity and compliance related disciplines such as IAM, account
management, storage policies, WAF, DDoS, compliance tools, key management,
logging and monitoring, data protection, etc.

.      Exposure or understanding of the following concepts, practices, and
technologies: network security and perimeter security, firewalls, IDS/IPS,
SIEM, workstation, mobile device, and network design standards.

.      Knowledge of and experience in developing and documenting security
architecture and plans, including strategic, tactical and project.

.      Strong people skills, collaborative ability to work with IT
stakeholders inside and outside of the organization, able to mentor team
members with diverse backgrounds.

.      Ability to formulate network security architecture vision and
translate vision into execution.

.      Thorough understanding of Information Security frameworks and good
practices (e.g. CSA), and proven ability to strike a balance between an
academic and pragmatic approach.

o    Requirements:

.      Relevant work experience is important for successful performance of
this role due to the complexity of our global IT Security environment.

.      Information security qualification such as ISC2 - Certified Cloud
Security Professional is preferred.

.      Recent work experience health care/life science organization is a
plus.

. Are you open to look at candidates willing to relocate? 

*       They will be required to be onsite in Lake County

. Years of experience/education/certifcations required: 

*       8+ years' work experience in information security and/or related
functions

. What are the top skills/requirements this person should have?

*       Experience with one or more major cloud technologies like AWS,
Azure, or Google cloud.
*       Has participated in the design, implementation, and migration to a
cloud environment.
*       Specially have working experience to the following cloud security
concepts; identity and compliance related disciplines such as IAM, account
management, storage policies, WAF, DDoS, compliance tools, key management,
logging and monitoring, data protection, etc.
*       Exposure or understanding of the following concepts, practices, and
technologies: network security and perimeter security, firewalls, IDS/IPS,
SIEM, workstation, mobile device, and network design standards.
*       Knowledge of and experience in developing and documenting security
architecture and plans, including strategic, tactical and project.
*       Strong people skills, collaborative ability to work with IT
stakeholders inside and outside of the organization, able to mentor team
members with diverse backgrounds.
*       Ability to formulate network security architecture vision and
translate vision into execution.
*       Thorough understanding of Information Security frameworks and good
practices (e.g. CSA), and proven ability to strike a balance between an
academic and pragmatic approach.

. What type of environment is this person working in? Ability to work
independantly. Receiving guidance and then run with it.

. How soon after the request is published to the supplier are you looking to
start interviewing: ASAP

. Interview Process (will this be a phone or in-person interview): Phone and
in person

 

 

Position ID: DYES00006851

Title: Information Security Architect
Duration: 6 months w/ possible extension
Location: Mettawa, IL

 

Locals only (Phone and in person)

 

Description:

The Information Security Architect is a member of the Information Security
team and works closely with other members of the team to develop and
implement a comprehensive information security program. This includes
defining security policies, processes, and standards.

Major Duties and Responsibilities:

*       Develop plans for security systems by evaluating network and
security technologies; developing requirements for local area networks
(LANs), wide area networks (WANs), virtual private networks (VPNs), routers,
firewalls, and related security and network devices. Additionally,
developing requirements for public key infrastructures (PKIs), including use
of certification authorities (CAs) and digital signatures as well as Windows
and Unix server infrastructure, messaging, end user computing devices, and
software; adhering to industry standards.
*       Support security aspects of business & IT initiatives by assisting
in architecture, design, implementation, deployment, and operational
transition of innovative & secure technology solutions.
*       Work with information security leadership to develop strategies and
plans to enforce security requirements and address identified risks in the
infrastructure.
*       Research, evaluate, design, test, recommend and plan the
implementation of new or updated information security technologies.
*       Establish collaborative working relations with the Information
Technology functions to ensure that solutions align with security
architecture and business strategy.
*       Play an advisory role in application development or acquisition
projects to assess security requirements and controls and to ensure that
security controls are implemented as planned. Complete remediation
activities and initiate actions to ensure that compliance and security gaps
are successfully addressed.
*       Evaluate security controls employed by Cloud service and other third
party providers to ensure information assets are adequately protected.
*       Provides second- and third-level support and analysis during and
after security incidents. Assists security administrators and IT staff in
the resolution of reported security incidents.
*       Research and assess new information security threats and recommend
remedial actions.
*       Foster an information security culture through education, skill
development, and implementation of effective information security processes
and practices.
*       Understand and adhere to corporate standards regarding applicable
Corporate and Divisional Policies, including code of conduct, safety, GxP
compliance, data security, and the software development lifecycle
*       May mentor/supervise a team of one or more and guide and evaluate
the performance of those individuals; is accountable for the effective
performance of the team/individuals.
*       Matures and leverages relationships with affiliates, subsidiaries,
vendors, and industry peers in accordance with Pharmaceutical Client Values,
Vendor Management Office, and Purchasing to further the mission, vision and
goals of the organization.

Experience and Skills
8+ years' work experience in information security and/or related functions
(such as IT Audit, Risk Management or Security Architecture). During recent
history, candidate must have demonstrated exceptional ability to assess and
communicate information security concepts and practices, with both business
and IT stakeholders.
Requires in-depth knowledge of the systems development life cycle, client
area's functions and systems, and systems applications programs development
technological alternatives.
Proven implementation of creative technology solutions that advance the
business.
Excellent written and oral English communication skills.

Specifically, we're looking for:

*       Significant exposure or understanding of the following concepts,
practices, and technologies: network security and perimeter security,
firewalls, IDS/IPS, SIEM, workstation, mobile device, and network design
standards.
*       Understanding the following concepts is a plus; identity management,
federated identity services, incident management, access control, end-point
protections, desktop security tools, anti-malware solutions, application
vulnerability testing, public key infrastructure, Windows, and Unix/Linux.
*       Knowledge of and experience in developing and documenting security
architecture and plans, including strategic, tactical and project.
*       Signification SOX and HIPAA experience in dealing with IT general
controls (ITGC), demonstrated through hands-on audit, remediation, and/or
computer system validation. Excellent understanding of current Information
Security & Architecture trends and their impact on business strategies
including: key Information Security vendors and solutions, audit
organizations and influential market research firms.
*       Excellent communications and influencing skills with strong ability
to balance differing stakeholder interests through sound analysis and
persuasion.
*       Strong people skills, collaborative ability to work with IT
stakeholders inside and outside of the organization, able to mentor team
members with diverse backgrounds.
*       Ability to formulate network security architecture vision and
translate vision into execution.
*       Thorough understanding of Information Security frameworks and good
practices (e.g. ISO, NIST), and proven ability to strike a balance between
an academic and pragmatic approach.
Requirements:
*       Relevant work experience is important for successful performance of
this role due to the complexity of our global IT Security environment.
*       Information security qualification such as CISSP is preferred.
*       Recent work experience in a "Big Four" focused in health care or
Fortune 100 health care/life science organization is a plus.
*       Are you open to look at candidates willing to relocate? 

*       - They will be required to be onsite in Lake County

*       Years of experience/education/certifcations required: 

*       8+ years' work experience in information security and/or related
functions

*       What are the top skills/requirements this person should have?

*       Significant exposure or understanding of the following concepts,
practices, and technologies: network security and perimeter security,
firewalls, IDS/IPS, SIEM, workstation, mobile device, and network design
standards.
*       Understanding the following concepts is a plus; identity management,
federated identity services, incident management, access control, end-point
protections, desktop security tools, anti-malware solutions, application
vulnerability testing, public key infrastructure, Windows, and Unix/Linux.
*       Knowledge of and experience in developing and documenting security
architecture and plans, including strategic, tactical and project.
*       Signification SOX and HIPAA experience in dealing with IT general
controls (ITGC), demonstrated through hands-on audit, remediation, and/or
computer system validation. Excellent understanding of current Information
Security & Architecture trends and their impact on business strategies
including: key Information Security vendors and solutions, audit
organizations and influential market research firms.
*       Excellent communications and influencing skills with strong ability
to balance differing stakeholder interests through sound analysis and
persuasion.
*       Strong people skills, collaborative ability to work with IT
stakeholders inside and outside of the organization, able to mentor team
members with diverse backgrounds.
*       Ability to formulate network security architecture vision and
translate vision into execution.
*       Thorough understanding of Information Security frameworks and good
practices (e.g. ISO, NIST), and proven ability to strike a balance between
an academic and pragmatic approach.

*       What type of environment is this person working in? 

*       Ability to work independantly. Receiving guidance and then run with
it.

*       How soon after the request is published to the supplier are you
looking to start interviewing: 

*       ASAP

*       Interview Process (will this be a phone or in-person interview): 

*       Phone and in person

 

 

 

 Thanks & Regards 

Harry John
Business Development Manager
Dynamic Enterprise Solutions Inc 

1801 Hicks Rd, unit A

Rolling Meadows, IL -60008

(847) 719-7902 / (847) 874-7274
C 224-635-0898

Email:  <mailto:[email protected]> [email protected]

URL: http//  <http://www.dynamic-enterprise.net/> www.dynamic-enterrise.net

-- 
You received this message because you are subscribed to "rtc-linux".
Membership options at http://groups.google.com/group/rtc-linux .
Please read http://groups.google.com/group/rtc-linux/web/checklist
before submitting a driver.
--- 
You received this message because you are subscribed to the Google Groups 
"rtc-linux" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/rtc-linux/00ea01d59a2d%24e7467d60%24b5d37820%24%40dynamic-enterprise.net.

Reply via email to