• Esolutions
  • $99,373.33 -158,550.00/year*
  • Methuen , MA
  • Information Technology
  • Full-Time


Loading some great jobs for you...




Job Description

:

Works with business units and with other risk functions to identify security requirements, using methods that may include risk and business impact assessments. Components of this activity include but are not limited to: Business system analysis

& Communication, facilitation and consensus building.

Assists in the coordination and completion of information security operations documentation.

Works with information security leadership to develop strategies and plans to enforce security requirements and address identified risks.

Reports to management concerning residual risk, vulnerabilities and other security exposures, including misuse of information assets and noncompliance.

Plays an advisory role in application development or acquisition projects to assess security requirements and controls and to ensure that security controls are implemented as planned.

Collaborates on critical IT projects to ensure that security issues are addressed throughout the project life cycle.

Works with IT department and members of the information security team to identify, select and implement technical controls.

Develops security processes and procedures, and supports service-level agreements (SLAs) to ensure that security controls are managed and maintained.

Advises security administrators on normal and exception-based processing of security authorization requests.

Researches, evaluates and recommends information-security-related hardware and software, including developing business cases for security investments.

Academic/Experience/Competency :

Bachelor's degree in information systems or equivalent work experience.

Desirable : Security Certification

In-depth knowledge and understanding of information risk concepts and principles, as a means of relating business needs to security controls.

Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project plans.

Experience with common information security management frameworks, such as [International Organization for Standardization (ISO) 2700x and the ITIL, COBIT and National Institute of Standards and Technology (NIST)] frameworks.

Knowledge of the fundamentals of project management, and experience with creating and managing project plans, including budgeting and resource allocation.

In-depth knowledge of risk assessment methods and technologies.

Proficiency in performing risk, business impact, control and vulnerability assessments.

Strong understanding of business applications, including ERP and financial systems.

Excellent technical knowledge of mainstream operating systems [for example, Microsoft Windows and Oracle Solaris] and a wide range of security technologies, such as network security appliances, identity and access management (IAM) systems, anti-malware solutions, automated policy compliance tools, and desktop security tools.

Experience in developing, documenting and maintaining security policies, processes, procedures and standards.

Knowledge of network infrastructure, including routers, switches, firewalls, and the associated network protocols and concepts.

Audit, compliance or governance experience is preferred.

Business Experience :

5 to 7 years of combined IT and security work experience with a broad range of exposure to systems analysis, applications development, database design and administration; one to two years of experience with information security

Daily Tasks Performed :

Maintain in-depth knowledge of company strategic business plans.

Provide security architectural expertise, direction, and assistance to systems analysts, systems engineers, software development teams, and other systems and security architects.

Create and maintain the enterprise security architecture strategy and roadmap.

Ensure that proposed and existing security architectures are aligned with organizational goals and objectives.

Document Client s existing security architecture and technology portfolio; make recommendations for improvements and/or alternatives.

Create and maintain the enterprise security architecture documents (policies, standards, baselines, guidelines and procedures).

Promote security architecture process, outcomes, and results to the organization and senior leadership.

Lead programs to develop, maintain, and govern the security architecture across the organization.

Define, explain, and advocate security technology strategy.

Collaborate with IT leaders and project managers to ensure progress towards security architecture alignment with project goals and requirements.

Participate in enterprise architecture governance process to influence projects to align to enterprise security architecture standards, as well as to identify when it is necessary to modify the enterprise security architecture.

Direct and conduct research on emerging security technologies in support of systems development efforts, and recommend security technologies that will increase enterprise security.

Unique Skill Set Desired :

IT Security Architecture Domains: Identify & Access Management; Network Protection; Data Protection; Application Protection.

Thanks & Regards,

Tushar Chaudhary

Sr. Technical Recruiter

Tel: 408-###-#### (office) 805-###-#### (cell)

email : ...@e-solutionsinc.com

Gtalk : tushar.ramy

LinkedIn :

www.e-solutionsinc.com

e-Solutions Inc. is a 15 year old company having 15 Global Offices across 5 Nations and with more than 1000+ IT & Software professionals. Working on cutting edge technologies, we are serving 100+ Fortune2000 companies globally.

Disclaimer: E-Solutions Inc. provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. We especially invite women, minorities, veterans, and individuals with disabilities to apply. EEO/AA/M/F/Vet/Disability.



Associated topics: cybersecurity, identity, identity access management, information security, malicious, protect, security officer, threat, violation, vulnerability

* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.

Launch your career - Upload your resume now!

Upload your resume

Loading some great jobs for you...