Related Links

Wednesday, September 21, 2011

New job MASTER INFORMATION SECURITY RISK MANAGEMENT - FULL TIME - CHICAGO

LinkedIn Following

  • Group: Job Openings, Job Leads and Job Connections!
  • Subject: MASTER INFORMATION SECURITY RISK MANAGEMENT - FULL TIME - CHICAGO

Chaz Bantle (chaz.bantle@greythorn.com) posted a job: MASTER INFORMATION SECURITY RISK MANAGEMENT - FULL TIME - CHICAGO

"Currently seeking a new challenging position? Where you are continuously overseeing all aspects of technical security control solutions? Greythorn has a client who is need of your expertise. Greythorn is an international recruitment firm with teams dedicated to specific IT verticals. My client in Chicago is currently seeking a IT Security Risk Management expert to contribute to an ever growing organization. The full job description is listed below: RESPONSIBILITIES: This position is responsible for designing, implementing, and continuously updating technical security control solutions supporting enterprise information security policies and standards; conducting gap analysis; providing recommendations to resolve gaps in security; and providing architecture and infrastructure guidance. JOB REQUIREMENTS: 1) Bachelor Degree in Computer Science, with 5 years IT security experience OR 9 years total experience. 2) Experience in technical security control architecture and design, information security solutions engineering, security technology implementation, and security service delivery. 3) Experience in complex enterprise architecture lock-downs. 4) Knowledge of and familiarity with industry laws and regulations mandating information security and information risk management requirements (HIPAA, Sarbanes-Oxley, GLB). PREFERRED JOB REQUIREMENTS: 1) Experience in a managed healthcare, other insurance environment, or financial institution 2) Working level to expert level knowledge in the following: fundamental cryptographic concepts, application of cryptographic technology to address business and security problems, encryption related operational processes, including certificate lifecycle management, key management, and key distribution; cryptographic technologies, including but not limited to PGP, AES, DES, XML encryption and signatures, TLS/SSL, Certificate Authority; 3) Advanced understanding of fundamental information security concepts, including authentication, authorization, access control, and auditing. 4) Ability to translate legal and regulatory requirements into specific action plans for development of cryptographic technologies. Please apply to this ad or contact Chaz Bantle at chaz.bantle@Greythorn.com for further details. Keywords: information security risk management design implement technical control policy standards gap analysis architecture infrastructure solution engineering lock downs cryptographic encryption PGP AES DES XML signature TLS SSL certificate authority"

Don't want to get activity notifications: Change your following people settings »

Learn more about following people's activity

LinkedIn values your privacy. At no time has LinkedIn made your email address available to any other LinkedIn user without your permission. ©2011, LinkedIn Corporation.

No comments:

Post a Comment