Hi *Professional*,


Hope you are doing well.

Below is the job description.

Please revert if interested with your updated resume at
*shikha.srivast...@nityo.com
<shikha.srivast...@nityo.com>*



*Job title*: *Information Security Manager*

*Location**: Charlotte, NC (Locals only)*

*Interview** Mode: Face to Face*

*Duration*– *3 month contract to hire*



*USC or GC Only*



*Summary: *

The Manager of Information Security reports to the Director of Technology
Services and is accountable for the implementation and oversight of
strategies and programs designed to reduce and mitigate information
security risk across the company. The role will establish and lead an
enterprise-wide information security and assurance function, ensuring that
confidentiality, integrity, and availability requirements of information
systems and assets are identified and managed appropriately.





*Responsibilities:*

This person will provide councel on IT risk through collaboration with key
stakeholders such as VP/CIO, IT Management, Director of Risk Management,
Internal Control Services, and the Audit Committee of the Board of
Directors.  Ensure that all IT and information security programs and
policies are in alignment/compliance with applicable privacy and identity
theft laws and other regulations such as SOX, HIPAA, and PCI.  Coordinate
internal self audit programs to ensure compliance.  Coordinate IT
activities for ICS and external audits.  Coordinate ISS response to audit
findings, including remediation activity.

   - Coordinate ISS self-testing activities, including regular penetration
   testing, to ensure compliance with policies.
   - Operate Identity Management and Access Management programs including
   leadership of a team to fulfill access requests.
   - Operate an effective information security awareness training program
   for the entire enterprise.
   - Operate threat protection strategy to include a wide range of
   strategies such as firewalls, patching, anti-virus, log monitoring, data
   backup, disaster recovery, etc.
   - Implement and operate a data classification protocol including
   encryption strategies and other scanning protection strategies for data
   loss prevention.
   - Establish intrusion detection and incident response processes for
   proactive reaction to significant information security breaches.
   - Ensure that strategic information security and risk guidance is
   provided to third-party suppliers in accordance with internal frameworks,
   and ensure compliance with required controls.
   - Create process to identify and communicate application risk with
   business partners so that informed decisions can be made.
   - Perform special projects and other duties as assigned









*Thanks and Regards*

*Shikha Srivastava*
Technical Recruiter

*Nityo Infotech Corp.*
*Phone:* 609.378.1231
*E-mail:*shikha.srivast...@nityo.com
*Hangout:* shikha.recruite...@gmail.com
http://www.nityo.com
<http://www.google.com/url?q=http%3A%2F%2Fwww.nityo.com&sa=D&sntz=1&usg=AFQjCNHvo7qn2_uix4OQI5J9H1ojsdcpDw>

-- 
You received this message because you are subscribed to the Google Groups "SAP 
BASIS" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-basis+unsubscr...@googlegroups.com.
To post to this group, send email to sap-basis@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-basis.
For more options, visit https://groups.google.com/d/optout.

Reply via email to