Monday, 25 February 2013

wwwLathaHR.com Urg Req: Information Security at Chicago, IL

Note: If you have received this mail in error or prefer not to receive such emails in the future please visit this page, enter your email address and unsubscribe http://webmail.agilees.us/mailman/listinfo/list or else reply me back with REMOVE in subject line.

 

Hi,

Good Morning..!!

We have a very urgent Requirement with one of our clients for Information Security at Chicago, IL

Please reply me back with your consultant updated resume along with the contact details.

 

Role                 : Information Security

Duration          : 3 +months

Location          : Chicago, IL

 

Job Requirements
•             Significant knowledge of standards, security controls, information technology and information security.
•             Technical expertise in more of the following: network security, cyber security, server/OS security, cloud/virtualization security, security monitoring and identity and access management.
•             Excellent communication, documentation, prioritization and change management skills.
•             Strong skill set on current intrusion methods and prevention.
•             Ability to communicate technical info and ideas so others will understand.
•             Ability to apply varying leadership skills and traits that create solutions and results to unexpected situations.
•             Must have experience building and managing relationships with diverse stakeholders including senior-level technical and non-technical staff.
•             Must have strong consulting skills and advise on security matters
•             Must be capable of credibly communicating moderately complex technical concepts to both very technical and non-technical audiences
•             Should have broad knowledge of security policies and practices, including SoX compliance and FDA regulatory practices
•             Should have broad technical foundation and be able to understand network, operating system, database and application development design and support as necessary to be able to analyze issues and recommend solutions for the detection, remediation and prevention of security vulnerabilities.
•             Initiate various standards of information systems to comply with security systems.
•             Initiate and implement security policies, security specifications and certification methodologies.
•             Check and inspect computer systems periodically in accordance with security policies and procedures.
•             Investigate, evaluate and resolve policy violation issues
•             Create and initiate risk assessment methodology of network computer systems.
•             Ensure compliance of corporate security policies and regulations.



--

Thanks & Regards 

Sampath Rai

Agile Enterprise Solutions Inc

||"Ensuring Client's Success"||

Phone: 630-242-8896 Ext: 317
Fax: 630-206-2397
Email: || sampath_rai@aesinc.us.com ||www.aesinc.us.com

 

Note: If you have received this mail in error or prefer not to receive such emails in the future please visit this page, enter your email address and unsubscribe http://webmail.agilees.us/mailman/listinfo/list or else reply me back with REMOVE in subject line.

--
You received this message because you are subscribed to the Google Groups "IT JOBS in USA" group.
To unsubscribe from this group and stop receiving emails from it, send an email to it-jobs-in-usa+unsubscribe@googlegroups.com.
To post to this group, send email to it-jobs-in-usa@googlegroups.com.
Visit this group at http://groups.google.com/group/it-jobs-in-usa?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.
 
 

No comments:

Post a Comment