Hi , Urgent Position in OH ...need help Information security specialist
location-Youngstown, OH Rate-Open Duration- 1 year Summary: Involved in the full life cycle of network security management. Develops and implements security policies, procedures and measures in a networking environment. Responsible for firewall configuration, maintenance, monitoring and other various network security measures. Performs security assessments and reviews networking initiatives for security compliance. Prepares status reports on security matters to develop security risk based scenarios and response procedures. Involved in the continual improvement of the network infrastructure and implementation of new security-based technologies. Evaluates and recommends security products for various platforms in the networking environment. Educates users about network security policies and consults on security issues. Must have breadth of technical knowledge regarding client/server, network topology and network/infrastructure security. Position requires scheduling flexibility to address work assignments which includes regular scheduled on-call, unscheduled on-call support in the event of system problems, and may involve evening and early morning and weekends for planned/unplanned activities. *DUTIES AND RESPONSIBILITIES:* * * Serves as an Information Security Subject Matter Expert (SME) by maintaining knowledge of industry recognized security technologies and concepts; actively engages and assists lines of business to understand their needs and develop secure business solutions. Remains knowledgeable of changes in security technology, industry practices, and state and federal regulatory requirements; provides technical assistance to IT staff in the detection and resolution of security problems; monitors security advisory groups to ensure security updates, patches and preventive measures are in place. Assists as a technical liaison between the bank and third party vendors in defining, designing, and implementing security systems. Works with software developers, systems, operations, and business stakeholders to ensure technical and functional requirements are securely implemented; maintains application security infrastructures to ensure access controls meet established policies and business requirements. Monitors, analyzes, and interprets system logs for events and incidents reflective of unauthorized access or operational irregularities and escalates for action as appropriate; coordinates and/or participates in risk assessment activities and/or analyzes the output of audits to produce recommendations of acceptable risk. Researches, analyzes, maintains documents, recommends, and implements specific software and security applications and solutions. Perform scans of network attached systems to ensure compliance with policies and configuration documents. Correlates network based events with system events and performs analysis to determine the extent of exposure. Responsible for the design, deployment, and management of Intrusion Detection and Intrusion Prevention System sensors (IDS/IPS), security event collection, and reporting software. Monitor attack patterns and vulnerabilities in order to develop effective detection signatures. Coordinates, performs, and documents the results of penetration tests and vulnerability assessments against servers, appliances, and applications. Creates policies, procedures, standards, and guidelines used to secure assets against unauthorized or accidental modification, destruction, or disclosure. Investigates and recommends appropriate corrective actions for information security events and incidents; performs procedures required for forensics data recovery and the handling of digital evidence. Evaluates data systems security, researches attempted breaches of data security and remediate security weaknesses. Conducts on the job security training; develops materials for both technical and non-technical computer users. Collaborate with Chief Information Security Officer and Technical audit functions. Performs other duties as assigned. *SUPERVISORY RESPONSIBILITIES:* None. COMPLEXITY: Intermediate professional role combining technical, operational and analytical skills. Develops security solutions for medium to highly complex assignments. Works on multiple projects as a team member and leads systems and network related security efforts. *KNOWLEDGE & SKILLS REQUIRED*: Bachelor Degree in Computer Science, Information Systems, or other related information technology field. CISSP, GIAC, OR CISM needed 3 to 5 years of combined IT and security work experience with a broad exposure to infrastructure/network and multi-platform environments; requires knowledge of security issues, techniques and implications across all existing computer platforms. Knowledge of information security frameworks and governance standards; (ISO 27000 series, NIST SP 800 series). Knowledge of audit frameworks such as COSO, COBIT or other. Knowledge of federal and regulatory compliance standards; GLBA (FFIEC Guidelines), PCI-DSS, HIPAA, SOX, and SAS70). Familiarity with redundancy, high-availability, and scalability approaches and technology Knowledge of UNIX and Microsoft Server & Windows operating systems and Microsoft SQL or Oracle database concepts. Knowledge of LAN, WAN, and wireless communication concepts and monitoring; DNS, TCP/IP, SMTP, HTTP, SSL, SSH, web services and encryption technologies. Experience in banking, financial services or insurance industry coupled with knowledge of information security compliance and regulatory requirements. PLEASE SUBMIT ALL CVS WITH BELOW DETAILS- Name: Rate: Tel: E.mail: Visa Staus: Availibility: Current Location City &State: Ready to relocate ?: Ready for Face to Face? : Updated CV -- *Regards,******* ** ** *Suman Guha Bakshi-Sam * Harrier Infotech USA Inc**** Office: 732 637 0815 Fax:732-626-8888**** [email protected] [email protected] 2 King Arthur Court, Suite#11,**** North Brunswick, NJ 08902**** * * -- You received this message because you are subscribed to the Google Groups "SAP BASIS" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/sap-basis?hl=en.
