Dear Associates,



This is Suman Bakshi (Sam) from Source Chip,Inc. Need strong consultants
for below Role in CA.

*Submit Resume with Best Possible Rate.*



Position - Security Analyst



The following requisition has been assigned:



Contract -Long Term

 TITLE:       Security Analyst

 LOCATION:        Torrance, CA, United States

 # of Openings:   2

Hourly Rate-Market





Requisition Details:



Responsibilities

-------------------

Pivotal team member in developing a compliance framework including controls
development, test scripts, conducting assessments, reporting evaluations
performed, and providing metrics on the progress made Works with business
units and with other risk functions to identify security requirements,
using methods that may include risk and business impact assessments.

Components of this activity include but are not limited to:

Business system analysis, Communication, facilitation and consensus building

Assists in the coordination and completion of information
securityoperations documentation

Works with information security leadership to develop strategies and plans
to enforce security requirements and address identified risks

Reports to management concerning residual risk, vulnerabilities and other
security exposures, including misuse assets and noncompliance

Plays an advisory role in application development or acquisition projects
to assess security requirements and controls and to ensure that security
controls are implemented as planned

Collaborates on critical IT projects to ensure that security controls are
implemented as planned

Works with IT throughout the project life cycle as directed by management

Works with IT department and members of the information security team to
identify, select and implement technical controls

Develops security processes and procedures, and supports service-level
agreements (SLAB) to ensure that security controls are managed and
maintained

Address security administration on a normal and exception-based processing
of security authorization requests

Researches new compliance requirements, works with other team members to
incorporate existing process to reduce risk exposure

Daily Tasks Performed :

Developing a single control framework to streamline the audit process into
a Singular audit.

Documenting controls and test procedures surrounding privacy and financial
audit assessments

Reforming independent assessments of various IT systems based on the newly
defined control framework,

Work with various business unit managers, application teams, and team
managers to obtain testing evidence and execute lest scripts.

Formally document test results and communicate findings to management and
auditee/group/team.

Assisting with remediation activities as identified within the assessment

Actively reporting on progress and keeping management informed of the
current status.

Review processes and Identify areas where efficiency can be gained.

Assist with risk mitigation strategies and framework development as needed.

Assist in other areas of the department and organization as needed based on
management direction.



Musts :

---------

Bachelor's degree in Information Systems or equivalent work experience in
IS auditing, governance, compliance

Business Experience :

3 to 5 years of combined IT and security work experience with a broad range
of exposure to systems analysis, applications development, database design

and administration; one to two years of experience with information security

Wants :

In-depth  knowledge  and  understanding  of  information risk concepts and
principles, as a means of relating business needs to security controls

Knowledge of an experience in developing and documenting security controls
and test plans/scripts.

Experience with SOX 404, HIPPA, GLBA, PCI, foreign and domestic privacy
laws.

Experience with common Information security management frameworks, such as
[International Organization for Standardization (ISO) 2700x and the ITIL,

COBIT and National Institute of Standards and Technology (NIST) frameworks.

Knowledge of the fundamentals of project management

In-depth knowledge of risk assessment methods and technologies.

Proficiency in performing risk, business impact, control and vulnerability
assessments.

Strong understanding of business applications, including ERP and financial
systems,

Excellent technical knowledge of mainstream operating systems [for example,
Microsoft Windows and Oracle Solaris) and a wide range of security
technologies, such as network security appliances, identity end access
management (IAM) system, anti-malware solutions, automated policy
compliance tools, and desktop security tools.

Knowledge   of   network   infrastructure.  including  routers.  switches.
firewalls, and the associated network protocols and concepts.

Experience  In  developing, documenting and maintaining security policies,
processes, procedures and standards. Audit, compliance or governance
experience is required.



*Regards,*

*Suman Bakshi- SAM *

*SourceChip, Inc *

*Email - s...@sourcechip.net <s...@sourcechip.net>  *

*Phone -732-917-4895 *

-- 
You received this message because you are subscribed to the Google Groups "SAP 
or Oracle Financials" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-or-oracle-financials+unsubscr...@googlegroups.com.
To post to this group, send email to sap-or-oracle-financials@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-or-oracle-financials.
For more options, visit https://groups.google.com/d/optout.

Reply via email to