Job Description :

Hope you are doing well.

Please respond me if you are comfortable for this position ASAP.

Position: Security Architecture Consultant

Location Carrollton, Tx Or Fort Mill, SC Remote

Duration : Contract

JD:

  • Demonstrate understanding of the following standards: ISO 27001/27002, COBIT, ITIL, NIST
  • Demonstrate understanding of regulatory requirements: PCI-DSS, HIPAA/HiTech, SOX and GDPR
  • Define security requirements by evaluating business strategies, corporate policies, standards and technology best practices
  • Evaluate and implement security controls as related to all solutions (Legacy and Cloud based services including SaaS, PaaS, IaaS)
  • Understand layered security model, network security zones and data flows with each solution
  • Understand application of security controls: Authentication and Authorization, Encryption, Access Control, Logging and Monitoring, etc.
  • Understand Web Application Vulnerability Detection, OWASP Top 10 and SANS CWE/25
  • Review solution and software architecture designs to assess risk to data assets
  • Demonstrate deep analytical and problem-solving skills across breadth of technologies
  • Facilitate static code analysis, dynamic and/or manual security testing utilizing established process and tools
  • Provide consulting services and security support to internal business and technical customers
  • Review circumstances surrounding security gaps and providing recommendations on corrective actions and define risk to the business information assets
  • Validate implementation and test effectiveness of control techniques
  • Communicate effectively both orally and in writing
  • Articulate security risk and business impact as it relates to security requirements
  • Demonstrate strong consultative skills and professionalism
  • Interface effectively with technical and non-technical leaders
  • Practice good interpersonal and stakeholder management skills
  • Understand Information Security as it relates to the business and other areas of IT; understands direct impacts and risks.
  • Maintain in-depth knowledge of security issues, techniques and implications across all existing computer platforms.
  • Understand current trends in cybersecurity threat
  • Evaluate reported breaches for relevancy to client's business
  • Pay attention to details and record keeping
  • Prioritize work load, track milestone dates and consistently meet deadlines
  • Practice strong organizational skills with work queue

Roles & Responsibilities :

  • Work directly with Business POC's and independently perform development, testing, implementation and documentation
  • Effectively communicate technical issues and resolve problems at all levels
  • Create technical specifications and process flows for new or modified systems and processes based on Business needs.
  • Recommend changes to ensure continuous business process optimization.
  • Support day to day application incident and Support requests.

Team player.

Behavior Characteristics :

  • Internally motivated.
  • Takes ownership and accountability for own work.
  • Pushes self for results on commitments/deadlines.
  • Maintains open, transparent dialogue.
  • Provides accurate and timely information.
  • Copes with change, strong problem solver and cooperative.
  • Fast learner on applications and internal processes.
  • Team Player

NOTE: AS WE ARE WORKING REMOTELY THERE MIGHT BE CONNECTION ISSUES IN TELEPHONE LINES, PLEASE COMMUNICATE THROUGH EMAIL FOR QUICK RESPONSE.

With ,

Sachin Sharma

eye

             

Similar Jobs you may be interested in ..