Hi ,

Urgent Position in OH ...need help
Information security specialist

location-Youngstown, OH
Rate-Open
Duration- 1 year

Summary:
Involved in the full life cycle of network security management.  Develops

and implements security policies, procedures and measures in a networking

environment.  Responsible for firewall configuration, maintenance,

monitoring and other various network security measures.  Performs security

assessments and reviews networking initiatives for security compliance.

Prepares status reports on security matters to develop security risk based

scenarios and response procedures.  Involved in the continual improvement
of

the network infrastructure and implementation of new security-based

technologies.  Evaluates and recommends security products for various

platforms in the networking environment.  Educates users about network

security policies and consults on security issues.  Must have breadth of

technical knowledge regarding client/server, network topology and

network/infrastructure security.

Position requires scheduling flexibility to address work assignments which

includes regular scheduled on-call, unscheduled on-call support in the
event

of system problems, and may involve evening and early morning and weekends

for planned/unplanned activities.

*DUTIES AND RESPONSIBILITIES:*
*
*
Serves as an Information Security Subject Matter Expert (SME) by
maintaining

knowledge of industry recognized security technologies and concepts;

actively engages and assists lines of business to understand their needs
and

develop secure business solutions.
Remains knowledgeable of changes in security technology, industry
practices,

and state and federal regulatory requirements; provides technical
assistance

to IT staff in the detection and resolution of security problems; monitors

security advisory groups to ensure security updates, patches and preventive

measures are in place.
Assists as a technical liaison between the bank and third party vendors in

defining, designing, and implementing security systems.
Works with software developers, systems, operations, and business

stakeholders to ensure technical and functional requirements are securely

implemented; maintains application security infrastructures to ensure
access

controls meet established policies and business requirements.
Monitors, analyzes, and interprets system logs for events and incidents

reflective of unauthorized access or operational irregularities and

escalates for action as appropriate; coordinates and/or participates in
risk

assessment activities and/or analyzes the output of audits to produce

recommendations of acceptable risk.
Researches, analyzes, maintains documents, recommends, and implements

specific software and security applications and solutions.
Perform scans of network attached systems to ensure compliance with
policies

and configuration documents.
Correlates network based events with system events and performs analysis to

determine the extent of exposure.
Responsible for the design, deployment, and management of Intrusion

Detection and Intrusion Prevention System sensors (IDS/IPS), security event

collection, and reporting software.  Monitor attack patterns and

vulnerabilities in order to develop effective detection signatures.
Coordinates, performs, and documents the results of penetration tests and

vulnerability assessments against servers, appliances, and applications.
Creates policies, procedures, standards, and guidelines used to secure

assets against unauthorized or accidental modification, destruction, or

disclosure.
Investigates and recommends appropriate corrective actions for information

security events and incidents; performs procedures required for forensics

data recovery and the handling of digital evidence.
Evaluates data systems security, researches attempted breaches of data

security and remediate security weaknesses.
Conducts on the job security training; develops materials for both
technical

and non-technical computer users.
Collaborate with Chief Information Security Officer and Technical audit

functions.
Performs other duties as assigned.

*SUPERVISORY RESPONSIBILITIES:*
None.

COMPLEXITY:
Intermediate professional role combining technical, operational and

analytical skills.
Develops security solutions for medium to highly complex assignments.
 Works

on multiple projects as a team member and leads systems and network related

security efforts.

*KNOWLEDGE & SKILLS REQUIRED*:

Bachelor Degree in Computer Science, Information Systems, or other related

information technology field.
CISSP, GIAC, OR CISM needed
3 to 5 years of combined IT and security work experience with a broad

exposure to infrastructure/network and multi-platform environments;
requires

knowledge of security issues, techniques and implications across all

existing computer platforms.
Knowledge of information security frameworks and governance standards; (ISO

27000 series, NIST SP 800 series).
Knowledge of audit frameworks such as COSO, COBIT or other.
Knowledge of federal and regulatory compliance standards; GLBA (FFIEC

Guidelines), PCI-DSS, HIPAA, SOX, and SAS70).
Familiarity with redundancy, high-availability, and scalability approaches

and technology
Knowledge of UNIX and Microsoft Server & Windows operating systems and

Microsoft SQL or Oracle database concepts.
Knowledge of LAN, WAN, and wireless communication concepts and monitoring;

DNS, TCP/IP, SMTP, HTTP, SSL, SSH, web services and encryption
technologies.
Experience in banking, financial services or insurance industry coupled
with

knowledge of information security compliance and regulatory requirements.


PLEASE SUBMIT ALL CVS WITH BELOW DETAILS-

Name:
Rate:
Tel:
E.mail:
Visa Staus:
Availibility:
Current Location City &State:
Ready to relocate ?:
Ready for Face to Face? :
Updated CV


-- 

*Regards,*******

** **

*Suman Guha Bakshi-Sam *

Harrier Infotech USA Inc****

Office: 732 637 0815

Fax:732-626-8888****

[email protected]

[email protected]

2 King Arthur Court, Suite#11,****

North Brunswick, NJ 08902****


*

*

-- 
You received this message because you are subscribed to the Google Groups "SAP 
BASIS" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/sap-basis?hl=en.

Reply via email to