Job Description :
Hi
My Name is Vasavi; I am a resource professional with Synkriom Inc. I have a Fulltime Job opportunity for IT Security Consultant, Katy, TX.If interested please feel free to reach me for further discussion. Please do share your updated resume at .

Role: IT Security Consultant
Location: Katy, TX
Duration: : Full Time
Desired Competencies (Technical/Behavioral Competency):-
Must-Have Technical:-
3-5 years of Security experience
Working knowledge of PCI, SOX security requirements
Experience with Cisco, Fortinet, Aruba, Microsoft and their network security technology capabilities.
Knowledge of Pentest and VAPT is desired
Experience in a retail business
Demonstrated ability to anticipate, mitigate, and resolve conflicts across workgroups.
Proven ability to meet deadlines and operating under tight time constraints with a strong sense of urgency.
Excellent communications skills: verbal, written, negotiation and presentational. Must be able to communicate technical and project management concepts in business
Oriented terms:-
Excellent coaching, team building and group facilitation skills
Demonstrated experience in making articulate and effective oral presentations to different audiences including senior level management.
Excellent interpersonal skills including analytical, problem solving, organizational, issue resolution, and customer relationship management
Demonstrated ability to negotiate and manage business partners and external vendors who have major delivery responsibilities for projects and operations.
Good-to-Have:-
CISSP, CEH, CISA, CSM certification is a plus
Responsibility of / Expectations from the Role:-
Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure the integrity, confidentiality and availability of information owned, controlled or processed by the organization.
Manage the enterprise''s security organization, consisting of direct reports and indirect reports (such as individuals in business continuity and IT operations), including hiring, training, staff development, performance management and annual performance review.
Develop, maintain and publish up-to-date security policies, standards and guidelines, and oversee training and dissemination of security policies and practices.
Create, communicate and implement a risk-based process for vendor risk management, including assessment and treatment for risks that may result from partners, consultants and other service providers.
Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users.
Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders through the enterprise on identifying acceptable levels of residual risk.
Provide periodic reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program.
Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection.
Develop and enhance an information security management framework
Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls.
Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures.
Coordinate information security and risk management projects with resources from the IT organization and business unit teams.
Ensure that security programs are in compliance with PCI, regulations and policies to minimize or eliminate risk and audit findings.
Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company''s reputation.
Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security.