*Hi*

*Please go through the below position and if you feel comfortable, then
please send me your updated resume*



*Role : Information Security Analyst*

*Location: Midtown NYC*

*Duration: 12 months+*

*MOI: Phone and F2F*

*Responsibilities*

   - Develop strategy and approaches and implement the full life cycle of
   the Identity and Access Management (IAM) program as part of the Information
   Security services of the Client; access, plan, test, report and recommend
   appropriate remediation measures to ensure Information Security access
   management processes and standards are maintained
   - Assist in the development of the IAM security architecture, policies,
   principles and standards; ensure architecture meets best practices based on
   industry and organizational needs
   - Conduct IAM and Role Based Access Controls (RBAC) review for new
   applications and scheduled access validation of critical Fund
   applications;  partner with Information Technology (IT) and various
   business units to discuss access issues, explain access rights and manage
   process
   - Develop and maintain a privileged account management process
   - Maintain existing and manage the addition of applications to the Funds
   electronic identity management suite including Active Directory, MS
   Exchange and business applications.
   - Follow up on access management deficiencies identified in risk
   reviews, self-assessments, risk assessments, internal and external audits;
   ensure appropriate remediation measures are implemented
   - Perform additional duties and projects as assigned by management

 *Qualifications:*

   - Bachelor’s degree in Information Security or equivalent years of
   experience required
   - Minimum three (3) years identity and access management experience in
   Information Security or related discipline (i.e. Information Technology,
   Privacy, or Compliance) required
   - Certified Information Systems Security Professional (CISSP)
   certification required
   - Knowledge of identity access technologies and practices
   - Knowledge of Public Key Infrastructure (PKI) and certificate based
   authentication a plus
   - Experience in Oracle Identity Management (OIM), Oracle Role Manager
   (ORM), and other tools in the Oracle Identity Access Management Suite a plus
   - Demonstrated experience with risk management, access rights and/or
   identity management required
   - Knowledge of common information security management frameworks such
   as: International Standards Organization (ISO) 17799/27001, Information
   Technology Infrastructure Library (ITIL), Control Objectives for
   Information and Related Technology (CobiT) and National Institute of
   Standards and Technology (NIST) frameworks
   - Experience troubleshooting information security related problems and
   incidents; knowledge of security architecture including encryption,
   firewalls, VPN’s, anti-virus systems and vulnerability management preferred
   - Excellent troubleshooting and analytical thinking skills
   - Superb communication, interpersonal skills and collaborative skills a
   must
   - Self-directed, self-starter, and motivated with the ability to work
   with minimal supervision







[image: logo]

*Ankush Nirala* | Technical Recruiter | Apetan Consulting LLC

Tel: 201- 620- 9700* 112 | Mail: 72 Van Reipen Avenue # 255 Jersey City, NJ
07306 |

Corp.Office: 15 Union Avenue,  office # 6,  Rutherford, New Jersey 07070 |

ank...@apetan.com | G-talk: ankush...@gmail.com | www.apetan.com

*[image: https://s3.amazonaws.com/images.wisestamp.com/icons/facebook.png]*
<http://www.facebook.com/Apetanconsulting> *[image:
https://s3.amazonaws.com/images.wisestamp.com/icons/linkedin.png]*
<http://www.linkedin.com/company/apetan-consulting-llc?trk=top_nav_home>
*[image:
https://s3.amazonaws.com/images.wisestamp.com/icons/twitter.png]*
<http://twitter.com/ApetanLLC> [image: e verify]

*Disclaimer*: We respect your Online Privacy. This e-mail message,
including any attachments, is for the sole use of the intended recipient(s)
and may contain confidential and privileged information. Any unauthorized
review, use, disclosure or distribution is prohibited. If you are not the
intended recipient, please contact the sender by reply e-mail and destroy
all copies of the original message. If you are not interested in receiving
our e-mails then please reply with a "REMOVE" in the subject line at
rem...@apetan.com and mention all the e-mail addresses to be removed with
any e-mail addresses, which might be diverting the e mails to you. We are
sorry for the inconvenience.

Reply via email to