Job Title: Information Security Risk Consultant (022614-DAVJIL-IO42-E-VIC)
Location: Washington, DC
Duration: long term
Work Authorization:1099/W2
Job Description:
5 year initiative to change Security Services 26 projects
i.e. Building Security Operations Center, Governance and Risk Tools, Identity and Access Mgmt.
Plan A Completed comprehensive Risk Assessment presented to management.
Type of projects process or technical:
1. Mostly leaning toward a lot of process building capabilities. Building a SOC, staffing, creating play books and SO.
2. Implementation of GRC Govern Risk and compliance tool, building workflows and integration w other compliance tools.
3. Developing Security Metrics KPI, abstract and reporting back to management.
4. Identity and access management tools and processes across the fund. - next fiscal year
Plan B 5 year 26 projects to be implemented over 5 years.
Contract duration: initial contract PO is April 30 2014 (end of their Fiscal year)
And then new PO for May 2014 to April 2015 New PO May 1 2015 to April 30 2016, etc.
5 year contract or longer.
As a contractor you will accumulate:
7 days of safe and sick leave after 90 days of working
10 paid holidays after 1000 hours of working
Looking for folks with newer technologies: Cloud computing, Virtual Machines, Identity and Access Management
INFORMATION RISK CONSULTANT
Under the general supervision of the Chief Information Security Officer and the Information Security Manager, the Information Risk Consultant will provide information risk management
and IT security expertise. The expertise will take the form of risk analysis, consultancy, policy, standards and best practice guidance, and process improvements. The candidate with be
required to work with project teams, service providers, and business units internal and external to the IT function. The candidate is expected to bring pragmatic risk management experience
allowing for the client to meet its present and emergent business needs but in compliance to security polices and standards and within risk appetite. The candidate is expected to advise and
influence technology and business personnel regarding the value and methods of safeguarding information, applications, systems, infrastructure, and activities to help ensure that technologies
function optimally; work practices are optimized so that the information risks are managed.
Specific responsibilities include:
- Delivers information security risk assessments (Certification and Accreditation) of projects, new technologies, external service providers, and IT changes.
- Guides staff and managers on the appropriate risk mitigation strategies.
- Effectively communicates requirements and trains staff and managers in IT divisions to identify and manage risks throughout the project lifecycle.
- Communicates and reports on risk metrics to IT management and governance groups.
- Maintain impartiality around IT systems to produce unbiased reports on information security risk.
- Conducts quality assurance reviews of security requirements and audit recommendations for the implementation of identified solutions.
- Manages the engagement process of external risk assessment providers and acts as a liaison with internal IT project teams and business units.
- Supports the ISO 27001 certification by promoting self-compliance to policies and standards by IT staff and managers.
- Keeps abreast of international information security codes of practice such as ISO 27001/27002, information security and privacy regulations and how these measures could affect information assets owned by, or administered on behalf of, the client.
- Assists with the development of the enterprise security architecture standards at the business, information, infrastructure, and application level.
- Provides subject matter expertise on enterprise security architecture and influences selection of tools and technologies to support the security architecture standards.
- As an advocate of information security, works closely and proactively with IT project team leaders, service providers, and business units to provide security-related technical solutions.
- Identifies opportunities to improve business practices or IT security-related processes.
- Analyzes, recommends and implements process improvements within the context of information security.
- Works closely with IT project teams to develop implementation plans for new security-related products and services.
- Coordinates the preparation and presentation of user technical support and training materials to ensure the efficient, effective and secure use of information and communications technology.
- Coordinates and supports the work of security governance.
- Prioritizes, monitors, and assesses compliance and audit recommendation results to ensure they are comprehensive, robust, and of high quality.
Experience should include:
- Minimum of 7 years working in the field of Information Risk Management and IT security within regulated industries.
- Having worked as or have experience of Information Risk Management at organizations with regulatory compliance requirements.
- Implementation of Vendor Risk Assessment frameworks.
- Demonstrated IT Security expertise in infrastructure areas, network, applications, and database system technologies including endpoints.
- Assisted and taken part in delivering Enterprise Security Architecture principles, service management concepts and experience with use of quality assurance tools and techniques.
- Delivered improvements in Application Security processes, and vulnerability minimization techniques.
- General infrastructure Vulnerability Management.
- Incident response process.
- Application of project management and systems development methodologies, and managing IT administrative and capital development project budgets.
- Delivery of Security awareness initiatives.
- Knowledge of administrative rules and regulations, processes, and technology capabilities.
Skills:
- Familiarity with a broad range of technologies supplemented by in-depth knowledge in specific areas of relevance.
- Ability to quickly grasp how new technologies work and how they might be applied to achieve business goals.
- Analytical skills that enable synthesis of inputs from many sources, and allow for strategic thinking and tactical implementation.
- Interpersonal skills that create openness and trust among colleagues.
- Facilitation and conflict management skills that enable effective working relationships.
- Spoken and written communications that are compelling, convincing and reassuring, and skills to articulate complex technical ideas to non-technical stakeholders.
- Pragmatic security expert with an inherent ability to balance security demands with business reality.
- Excellent relationship management skills.
- Ability to multi-task.
- Ability to think laterally and to have input to / propose detailed, complex solutions to technical issues.
Technical knowledge:
Information Risk and IT Security:
- Assisting in the delivery of an IT Security Strategy and Architecture.
- Developing and presenting IT security awareness training.
- Delivery of Information Security Risk and architecture assessments including consulting on threat modeling, appropriate tiering of N tier applications, placement, and infrastructure controls to protect application components.
- Able to consult and review the implementation of authentication (SSO, LDAP, AD), authorization (fine grained and course grained), and cryptography (PKI, SSL, kerberos, crypto algorithms) mechanisms within applications.
- Experience with Identity and Access management suite integration, Web services (SAML, WS-Federation and WS-Security), and SOA security.
- Defining the policies, standards, and guidelines for Information Security activities including Application and Infrastructure Security Vulnerability management and ensuring Application Security is integrated into SDLC.
- Ability to consult and deliver standards and guidelines on the hardening of application and infrastructure components, tools and techniques to ensure the security of application and infrastructure components such as LINUX/Windows servers, Web servers (IIS, Apache, tomcat), app servers, Databases (Oracle and MS SQL), endpoints (MAC, Windows, Apple IOS, Blackberry etc), ArcSight, and Web Application Firewalls.
- Manage and review the output of Application and Infrastructure Security assessments conducted by external security services firms. Defining process and procedures for using External security service providers including scoping, management of services, remediation tracking, and exception management.
- Ability to perform and consult on whitebox and blackbox application security assessments.
- Familiarity with code to the level of being able to conduct source code analysis for applications developed in languages: C#, .NET, JAVA. Experience using manual penetration assessment techniques as well as commercial/open-source secure application development tools/products, such as Fortify, WebInspect, Core Impact, Appscan (includes ability to identify false positives from output of automated tools).
- Knowledge of OWASP, WASC, SANS, CVE, and CVSS (Threat & Vulnerability classification).
General Security:
- ISO 27001: knowledge, implementation, and management
- Risk management concepts and principals - including assessment, prioritization, delivery of treatment plans, tracking, reporting, and metrics (accreditation and certification). Experience with NIST-SP800-30, ISO/IEC 27005, OCTAVE, COSO, COBIT.
- Embedding security into processes such as SDLC, Project Lifecycle, ITIL, etc.
- Security policy and standards creation
- Security training & awareness
- Basic project management and consultancy skills
- CERT - Incident Response
- Infrastructure security (perimeter, network, application, operating system, mobile device)
- Knowledge of security solutions, latest threats, and countermeasures
- SharePoint
- Knowledge of information risk/security frameworks
Certifications:
- CISSP (minimum)
- CISA
- GIAC, GSSP-NET, GWAPT, GPEN
- CISM
- ISO Lead Auditor
Education:
- Advanced degree in Information Security and minimum 4 years experience in regulated industries working as an information
risk manager or as an IT security specialist; or Bachelors degree in Information Security and minimum 8 years experience in regulated industries
working as an information risk manager or IT security specialist; or Advanced university degree in computer science, engineering, mathematics, business
or related field of study plus a minimum of 10 years of relevant experience in regulated industries working as an information risk manager or IT security specialist.
Please mention the job Title in the subject line:
" Information Security Risk Consultant"Please rush your resumes to mail to: careers@iormyx.com<mail to: careers@iormyx.com>
No comments:
Post a Comment