Hi *Professional*,
Hope you are doing well. Below is the job description. Please revert if interested with your updated resume at *shikha.srivast...@nityo.com <shikha.srivast...@nityo.com>* *Job title*: *Information Security Manager* *Location**: Charlotte, NC (Locals only)* *Interview** Mode: Face to Face* *Duration*– *3 month contract to hire* *USC or GC Only* *Summary: * The Manager of Information Security reports to the Director of Technology Services and is accountable for the implementation and oversight of strategies and programs designed to reduce and mitigate information security risk across the company. The role will establish and lead an enterprise-wide information security and assurance function, ensuring that confidentiality, integrity, and availability requirements of information systems and assets are identified and managed appropriately. *Responsibilities:* This person will provide councel on IT risk through collaboration with key stakeholders such as VP/CIO, IT Management, Director of Risk Management, Internal Control Services, and the Audit Committee of the Board of Directors. Ensure that all IT and information security programs and policies are in alignment/compliance with applicable privacy and identity theft laws and other regulations such as SOX, HIPAA, and PCI. Coordinate internal self audit programs to ensure compliance. Coordinate IT activities for ICS and external audits. Coordinate ISS response to audit findings, including remediation activity. - Coordinate ISS self-testing activities, including regular penetration testing, to ensure compliance with policies. - Operate Identity Management and Access Management programs including leadership of a team to fulfill access requests. - Operate an effective information security awareness training program for the entire enterprise. - Operate threat protection strategy to include a wide range of strategies such as firewalls, patching, anti-virus, log monitoring, data backup, disaster recovery, etc. - Implement and operate a data classification protocol including encryption strategies and other scanning protection strategies for data loss prevention. - Establish intrusion detection and incident response processes for proactive reaction to significant information security breaches. - Ensure that strategic information security and risk guidance is provided to third-party suppliers in accordance with internal frameworks, and ensure compliance with required controls. - Create process to identify and communicate application risk with business partners so that informed decisions can be made. - Perform special projects and other duties as assigned *Thanks and Regards* *Shikha Srivastava* Technical Recruiter *Nityo Infotech Corp.* *Phone:* 609.378.1231 *E-mail:*shikha.srivast...@nityo.com *Hangout:* shikha.recruite...@gmail.com http://www.nityo.com <http://www.google.com/url?q=http%3A%2F%2Fwww.nityo.com&sa=D&sntz=1&usg=AFQjCNHvo7qn2_uix4OQI5J9H1ojsdcpDw> -- You received this message because you are subscribed to the Google Groups "SAP BASIS" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-basis+unsubscr...@googlegroups.com. To post to this group, send email to sap-basis@googlegroups.com. Visit this group at https://groups.google.com/group/sap-basis. For more options, visit https://groups.google.com/d/optout.