IT Cyber Security Consultant

Role:                     IT Cyber Security Consultant
Location:             Katy, TX
Emp Type:           Permanent Job
Interview:           Phone/Skype
 
Desired Experience Range          
8-10 Years (3-5 years in Security)
Must-Have Technical:
•                    3-5 years of Security experience 
•                    Working knowledge of PCI, SOX security requirements
•                    Experience with Cisco, Fortinet, Aruba, Microsoft and their network security technology capabilities.
•                    Knowledge of Pentest and VAPT is desired 
•                    Experience in a retail business 
•                    Demonstrated ability to anticipate, mitigate, and resolve conflicts across workgroups.
•                    Proven ability to meet deadlines and operating under tight time constraints with a strong sense of urgency.
•                    Excellent communications skills: verbal, written, negotiation and presentational. Must be able to communicate technical and project management concepts in business oriented terms.
•                    Excellent coaching, team building and group facilitation skills
•                    Demonstrated experience in making articulate and effective oral presentations to different audiences including senior level management.
•                    Excellent interpersonal skills including analytical, problem solving, organizational, issue resolution, and customer relationship management
•                    Demonstrated ability to negotiate and manage business partners and external vendors who have major delivery responsibilities for projects and operations.
 
Good-to-Have  
•                    CISSP, CEH, CISA, CSM certification is a plus               
 
Responsibility of / Expectations from the Role 
•                    Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure the integrity, confidentiality and availability of information owned, controlled or processed by the organization.
•                    Manage the enterprise's security organization, consisting of direct reports and indirect reports (such as individuals in business continuity and IT operations), including hiring, training, staff development, performance management and annual performance review.
•                    Develop, maintain and publish up-to-date security policies, standards and guidelines, and oversee training and dissemination of security policies and practices.
•                    Create, communicate and implement a risk-based process for vendor risk management, including assessment and treatment for risks that may result from partners, consultants and other service providers.
•                    Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users.
•                    Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders through the enterprise on identifying acceptable levels of residual risk.
•                    Provide periodic reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program.
•                    Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection.
•                    Develop and enhance an information security management framework
•                    Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls.
•                    Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures.
•                    Coordinate information security and risk management projects with resources from the IT organization and business unit teams.
•                    Ensure that security programs are in compliance with PCI, regulations and policies to minimize or eliminate risk and audit findings.
•                    Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company's reputation.
•                    Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security.

Want to apply later?

Type your email address below to receive a reminder

Apply to Job

ErrorRequired field
ErrorRequired field
ErrorRequired field
Error
Error
insert_drive_file
insert_drive_file