Home  Post Resume Quick IT Job Search  Advanced IT Job Search 
Skip Navigation LinksHome » Job Details
Babich & Associates of Denver
  Company Profile
As the Denver partner of Babich & Associates, we provide services primarily to businesses and professionals located in the wonderful state of Colorado. Before forming a strategic partnership with Babich & Associates, we were Techpunch. Techpunch was founded in 2002 as a software development company, and gradually morphed into a software consulting firm with a focus on technical staffing. We partnered with Babich & Associates in August of 2006 to provide a level of service only available from a firm that has been consistently exceeding performance standards for over half a century.

We specialize in software and information technology positions and professionals, including engineers, testers and technical managers.

 
  Job Details 
Title: 

INFORMATION TECHNOLOGY SECURITY MANAGER : Richardson,TX

Posted On:  1/4/2019 1:37:24 AM
Designation: 

INFORMATION TECHNOLOGY SECURITY MANAGER

No. of vacancies:  4
Qualifications:  BS degree in Computer Science, Information Systems, related field
Essential Skills: 
Not specified
Minimum Total Experience:  5
Job Tenure:  Full-time Only
Salary Offered:  DOE
Job Location:  Richardson TX United States

  Job Description
Responsibilities

* Design, develop and implement information security architecture in a large enterprise environment
* Develop, implement, monitor and enhance data security policies, procedures and standards
* Test and evaluate new technologies that will enhance the security of the enterprise
* Partner with business units and various groups within both our client company and it's parent company to define secure technology solutions
* Performs information security risk assessments and serves as the internal auditor for information security processes including risk identification, risk mitigation, and documentation
* Work with data owners, IT staff, compliance and legal to classify all data and maintain appropriate access restrictions
* Participate in the testing and development of the organizations disaster recovery plan on an annual basis to ensure data and information security practices are maintained
* Initiates, facilitates and promotes activities to foster information security awareness within the organization by developing and/or deploy Education and Awareness Programs
* Direct and provide hardening guidance in operating system, databases and application security for the following platforms and applications: Windows 2003/2008, Unix, Linux, Oracle ERP, Peoplesoft HRMS and Payroll, BaaN5, Oracle/MS SQL Server, MS Sharepoint, .Net, etc
* Leads incident response team and facilitate incident management and response across all platforms and generate management reports.
* Monitors advancements in information security technologies, and changes in the industry that affect information security
* Leads forensic/security investigations under the direction of legal and human resource departments
* Conduct vulnerability assessments (network, server, databases, application, etc) and drive remediation
* Define and validate system security requirements. Implement secure systems / standards using ISO 27001 and ISO 17799 / 27002
* Audit and monitor IT Security Best Practices including: Firewall/Network Design, Anti-Virus Strategy, Platform Maintenance, Intrusion Detection Monitoring, System access ID and logon procedures and policies, file transfer protocols, procedure and practices, and identify and manage remediation efforts on vulnerabilities.

Requirements

* BS degree in Computer Science, Information Systems, related field
* 8 or more years IT experience with 3 to 5 years in IT security
* Highly desirable to hold one or more of the following certifications: (CISSP) – Certified Information Systems Security Professional, (CISM) – Certified Information Security Manager, (CISA) – Certified Information Systems Auditor
* Extensive experience in Security Architecture, Policies and Standards, Risk Management, Incident Response, eDiscovery, Vendor evaluation (SaaS, etc), Data Discovery and Classification
* In-depth understanding of information security as well as understanding of government security requirements (DoD)
* Experience in Unix, Windows, Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN methods and intranet/Internet security environments including; firewalls, intrusion detection, incident response, policy writing, patch management, vulnerability testing, log management, operating system hardening, regulatory compliance, data discovery and data classification.
* Experience with industry standards such as ISO 27001, ISO 17799 / 27002 and PCI DSS
* Excellent analytical, written, oral communication and presentation skills
* Excellent organizational and time management skills with a focus on delivery, responsiveness, ownership and accountability
* Strong organizational and project management skills and ability to manage several initiatives at one time
* Ability to manage stress under difficult situations while dealing with issues and project deadlines.
* Strong interpersonal, communication, and client-facing skills. Ability to understand and communicate technical concepts to a business audience
* This person must be extremely hands-on as he/she will be the "go to" person for solution development and problem resolution

Skills

* Advanced knowledge of major package applications software
* Strong written and verbal communication skills including ability to develop presentations and present to management.
* Strong knowledge and understanding of business principles, practices and procedures
* Demonstrated problem solving and negotiation skills
* Strong project management skills and experience
* Applies functional expertise and fundamental business knowledge to contribute to the strategic direction of the function and supported client groups
* May need to seek guidance on highly complex issues

  Contact Information
Reference Name (If Any): 





 
Terms and Conditions | Privacy Policy | FAQ | Contact Us | Why?? | Link to us