Home  Post Resume Quick IT Job Search  Advanced IT Job Search 
Skip Navigation LinksHome » Job Details
CGS Technology Associates, LLC
  Company Profile
CGS is a leader in professional staffing and technology solutions. The qualities that established CGS in 1983 have contributed to its remarkable growth to date. The same dimensions of success that have served to define CGS in the past continue as the foundation for its future.
 
  Job Details 
Title: 

Security Risk Assessment Manager : Franklin Lakes, NJ

Posted On:  3/19/2017 2:18:54 AM
Designation: 

Security Risk Assessment Manager

Qualifications:  Bachelor Degree
Essential Skills: 
Not specified
Job Tenure:  No Preference/Any
Salary Offered:  DOE
Job Location:  Franklin Lakes, NJ United States

  Job Description
Looking for someone who is strong on the business side and can speak with all levels of management/partners/stakeholders…but also someone who has a deep understanding of the network/infrastructure side. Must also be strong on the network aspect of security. You will be working closely with the advisory practice leads. Looking at the IT architecture, how data is protected and stored. Work closely with Internal IT teams…Engineer team, Security Assessment Team. This person will be the one who will bridge the Business Practice to the Tech Team. Will be involved in Assessments and Deliverables. Will do security reports about those assessments. Work closely with Project Leads based on assessments. Must have a minimum of 10 years involved in the IT security space experience. Experience with Static Code analysis tool. Being able to look at code and security vulnerability. Able to talk to development team to fix code. Must know how Pen testing works and able to read a Pen test report. Risk and Impact. Make recommendations based on Pin Test. Broad IT Experience on both application side and infrastructure side. Able to sit with IT project Lead to understand technology solution. Make recommendations to how to secure solution across different platforms. Very high level responsibilities and requirements. Experience with securing the data from a network perspective. Strong IT security. Risk Management. Application Security. CISSP certified.
  Contact Information
Reference Name (If Any): 





 
Terms and Conditions | Privacy Policy | FAQ | Contact Us | Why?? | Link to us