Friday 17 March 2017

[25506MSCRMCV] Looking for Information Security Architect in Shelton, CT - only locals

Hi,

Hope you are doing good,

 

This is Vijay from Avani Tech Solutions, this mail is regarding the job opportunity as a "Information Security Architect"

Please find the requirement details and let me know your interest. Thanks !!!

 

Job Title: Information Security Architect

Location: Shelton, CT

Duration: 6+ Months

 

Need Locals to attend in-person interview

 

Skills and Requirements:

·         Bachelor's  reuired, Master's degree preferred, in Computer Science, MIS, or related field of study.A minimum of 10 years in a Security Architect and/or Security Engineer role.

·         Excellent understanding of cloud security and experience with design and/or implementation of applications in the cloud; Understanding of cloud deployment models: Private Cloud, Public Cloud, Hybrid Cloud; Cloud service models: Infrastructure as a service (IaaS), Platform as a service (PaaS) and Software as a service (SaaS); implementation of relevant controls to ensure Confidentiality, Integrity and Availability of confidential data

·         Experience in disciplines such as audit, security, risk, privacy, IT governance, business continuity management, or compliance.

·         Experience and expertise in CIRT, CERT and/or SOC Teams.

·         Experience in the architecture, design and implementations of network security solutions in a multi-tiered web based environments and legacy systems.

·         Expertise in SDLC and application security and best practices.

·         Expertise in Data, Firewall, Network, virtualization, security and hardening, Active Directory, and Vulnerability Management, storage, network and other technologies associated with system security.

·         Expertise and hands-on experience with Vulnerability Management Solutions, DLP technology, SIEM and Centralized auditing and logging applications / tools.

·         Industry knowledge of PKI, Directory Services, Federation Services, Identity management and Edge Security

·         Experience with creating and implementing internal controls, risk assessments, business process and internal IT control testing.

·         Experience defining and implementing cloud security with solid understanding of best practices

·         Experience with security industry standards SAE 16 or ISO 27001/2.

·         CISSP, SSCP or CCSP Certifications a plus.

 

This job description in no way implies that the duties listed above are the only duties the employee is required to perform. The employee is expected to perform other tasks, responsibilities and training as dictated by their supervisors. This description is a general listing of the required activity, tasks and expectations of the position. Duties and responsibilities may change at any time with or without notice.

 

This position may require additional hours outside of the standard work schedule.  Responsibilities occasionally may require overtime, holiday, evening and/or weekend hours in order to meet deadlines or to accommodate customers.The employee will regularly be required to talk, hear, walk, use hands, kneel, crouch and lift up to 25 pounds.  Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

 

EDR is an equal opportunity/affirmative action employer. It is the policy of the Company to prohibit discrimination of any type and to afford equal employment opportunities to employees and applicants, without regard to race, color, religion, sex, national origin, age, disability, or veteran status.

 

Duties and Responsibilities:

·         Develop and execute on Information Security Roadmap that includes practices, policies, standards, documentation and risk assessment.

·         Establish, maintain and monitor a comprehensive information security program to ensure the integrity, confidentiality and availability of information owned, controlled or processed by the organization.

·         Drive information security projects and enhancements to adapt to existing, changing and emerging information security threats. Mitigate threats and risks as identified by risk assessments and audits.

·         Perform information security risk assessments and coordinate the performance of 3rd-party internal and external network and systems vulnerability assessments.

·         Develop, maintain and manage the incident response plan, lead incident responses and investigations of security breaches, and assist with disciplinary and legal matters associated with such breaches as necessary

·         Collaborate with Human Resources on information security awareness training programs for employees, contractors and approved system users.

·         Facilitate audits and examinations by regulatory agencies. Create risk mitigation plans for audit findings and track the plans to completion.

·         Lead strategic security planning with IT management, Risk Management and users across the organization.

·         Work directly with business units to facilitate IT risk analysis and risk management processes; identify acceptable levels of risk, and establish roles and responsibilities with regard to information classification and protection.

·         Maintain awareness of changing and emerging information security and cyber security threats, and provide subject matter expertise to executive management on a broad range of information security topics and standards.

·         Consult with senior engineers, data architects, and developers to ensure effective security is achieved across the SDLC.

·         Provide guidance and input to technical reviews of proposed projects, services and vendors.

·         Coordinate use of external resources involved in the information security program including, information security service providers, physical security service providers, and consultants.

·         Develop business-relevant metrics to measure the efficiency and effectiveness of the information security program, facilitate appropriate resource allocation and increase the maturity of the security program.

·         Oversee the management and monitoring of layered security controls such as firewalls, NAC, IDS/IPS, AV, DLP, SIEM, MFA and others.

·         Provide support and governance for enterprise security projects

·         Provide support and security-related information as needed to business unit stakeholders



--


Best Regards,

 

Vijay D | Technical Recruiter

687 Lee Road, Suite # 208, Rochester, NY 14606

Desk +1-(585) 250-1522 |  +1-(585) 285-4133
Email: vijay.d@avanitechsolutions.com 

    

Partnerships:

| Oracle Gold Partner | Microsoft Partner | PMI Global R.E.P.| E-Verify | Certified MBE |

India development center certified as:

| ISO 9001:2008 | ISO 27001:2005 | NASSCOM Member | 

 

Disclaimer:**** The information transmitted is intended only for the individual or entity to which it is addressed and contains material of Avani Technology Solutions Inc. which may be confidential or proprietary. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited. If you are not the intended recipient and have received this in error, please contact the sender and delete it. If you do not want to receive any further emails, please reply with "REMOVE" in the subject line.****

--
You received this message because you are subscribed to the Google Groups "CVMSCRM" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cvmscrm+unsubscribe@googlegroups.com.
To post to this group, send email to cvmscrm@googlegroups.com.
Visit this group at https://groups.google.com/group/cvmscrm.
For more options, visit https://groups.google.com/d/optout.

No comments:

Post a Comment