Related Links

Thursday, September 8, 2011

New job SECURITY ARCHITECT - FULL TIME - CONNECTICUT

LinkedIn Following

  • Group: Job Openings, Job Leads and Job Connections!
  • Subject: SECURITY ARCHITECT - FULL TIME - CONNECTICUT

Chaz Bantle (chaz.bantle@greythorn.com) posted a job: SECURITY ARCHITECT - FULL TIME - CONNECTICUT

"Are you interested in advancing your career within the Information Security space? Do you have a passionate interest in security; specifically, the opportunity to influence change and ensure security risks are controlled? Greythorn has a client who is in need of your expertise. Greythorn is an international recruitment firm with teams dedicated to specific IT verticals. My client in Connecticut is currently looking for an Information Security Architect to assist with the ever changing technology environment. The full job description is outlined below: CORE SECURITY ARCHITECT Job Details: Full time information security opportunity with one of the World's leading hedge funds. Relocation to Connecticut is required and relocation assistance is provided. POSITION SUMMARY: The client is experiencing an unprecedented rate of technology change. Large parts of the technology infrastructure are undergoing substantial changes to replace older legacy systems with new, cutting edge technology. However, with changes come risks - that the new technology will be insecure or not implemented correctly. But with risk comes opportunity - major infrastructure changes are a great time to enhance overall security. Currently, the client has major projects underway in server and workstation virtualization, multi factor authentication, vulnerability management, and remote access etc. The Architect will dive into these projects with a goal to ensure the new technology is secure. They are not going to be called upon to create new security initiatives. More importantly they are being asked to: assess the risks of new technology, ensure security requirements are identified, and oversee project teams ensuring they are properly implementing security into new plans. Required Skills • Seek out security risks in project designs • 3+ Years of security experience focusing in security assessments/testing • Explain the “why” behind security controls and recommendations (communication of logic) • Broad knowledge security infrastructure, information security, & application security; experience with all stages of project lifecycle • Strong knowledge of industry standard security practices, emerging threats, and risk management. • While we are not looking for specific tool expertise, we are largely a Windows environment so we expect familiarity with Windows security issues, controls, and tools Culture fit • Does not accept badness. He / She needs to be paranoid and constantly sniffing out badness, and to scream loudly and clearly about the badness and risks that he/she sees. • Needs to be comfortable in a good argument / have thick skin and a strong will • Has no trouble holding people accountable (needs to be a standard bearer, and call people out when they violate policies, etc.) • Relentless about getting to the truth. Values • Passion for quality design and execution – an intense hatred for badness and real zeal to see things done well (not perfectly) • Strong sense of ownership – willing to do whatever it takes to achieve results • Open to giving and receiving direct criticism in an environment where people are encouraged to challenge and criticize management of all levels. Abilities • Able to assess project designs to identify security problems • Probing – able to relentlessly ask the right questions to find problems and get to root causes • Synthesis – able to quickly perceive the most important things after observing complexity • Ability to remain goal focused on securing Bridgewater • “Seeing the movie” – able to look at the current state and understand what needs to be done in order to reach the vision. If you are interested in pursuing this position then please contact Chaz Bantle at chaz.bantle@greythorn.com"

Don't want to get activity notifications: Change your following people settings »

Learn more about following people's activity

LinkedIn values your privacy. At no time has LinkedIn made your email address available to any other LinkedIn user without your permission. ©2011, LinkedIn Corporation.

No comments:

Post a Comment