user avatar

Security SME Position

Dunhill Professional Search

Nov 5
Public Trust
Unspecified
Unspecified
Bethesda, MD (On-Site/Office)

Job Details

Manages the creation of cyber-intelligence tools / methods and oversees the research and analysis of cyber security risks. Manages the design and development of acceptance criteria for cyber security architecture.

• Manages the resolution of cyber security issues related to architectures, firewalls, electronic data traffic, and network access.

• Develops, publishes and enforces company information security standards and guidelines encompassing data and intellectual security.

• Manages the development of appropriate electronic and hard copy reports and records, including new or revised electronic or hard copy documentation. Makes internal and external presentations as needed.

• Overall responsibility for leading the program, department, or functional area as designated. Oversees, directs, and mentors subordinate staff; communicates job expectations and enforces organizational policies, procedures and core values; responsible for recruiting staff, approving timecards, and conducting performance reviews and disciplinary measures.

• Participates with the client in the strategic design process to translate security and business requirements in to technical designs.

• Builds and maintains working relationships with team members, vendors, client, and other departments involved in the project.

• Manages a team of cyber security analysts. Supervisory responsibilities include: hiring, firing, and performance management.

• Responsible for ensuring all laws, regulations, and other applicable obligations are observed wherever and whenever business is conducted on behalf of the Company. Responsible for ensuring work is accomplished in a safe manner in accordance with established operating procedures and practices.

• Represents the company as a knowledgeable resource on data security. Acts as primary contact for data security systems and processes.

Minimum Qualifications

• Bachelor's Degree in Information Assurance, Computer Science, or related field.

• 6-8 years of experience with 2-5 years of management experience

Other Job Specific Skills

• Must have experience writing policy, performing vulnerability testing and operating system hardening along with demonstrated leadership skills including organizing, planning, scheduling and coordinating workloads to meet established deadlines.

• Familiarity with security industry standards (ISO 17799, NIST 800 series, etc.)

• Experience with internal controls, risk assessments, business process and internal IT control testing or operational auditing.

• Demonstrated ability to write business and technical reports and to participate in presentations.

• Possess a thorough understanding of technical interface requirements and processes.

• Strong interpersonal skills to effectively interface with all levels of employees, management and outside representatives.

• Ability to resolve complex and diverse technical and management issues.

• Must demonstrate a detailed and comprehensive knowledge and understanding of data security principles, theories, regulations and practices.

#CJPOST

Job Requirements:

  • Assess security systems by monitoring security environment
  • Perform security risk assessments to determine level of security services
  • Transform security specifications into cost-effective information security solutions
  • Implement security best practice controls for SAP security solution, interface security, communication security
  • Maintain enterprise security risk management program
  • Lead and facilitate detailed system security vulnerability assessments
  • Facilitate control system security risk assessments
  • Improving application security or on mobile device and mobile application security
  • Resolving security and compliance issues
  • Resolve security incidents and recommend enhancements to improve security
  • Interpret security policy and standards
  • Implement and support information security solutions
  • Formulating security policies and procedures
  • Conducting system security and vulnerability analyzes and risk assessments
  • Assist in investigation of network/infrastructure/application security alerts from managed security service provider and in-house security tools
  • Delivering end-user security training
  • Help lead security to protect network infrastructure
  • Lead client-related information security audits
  • Providing oversight of security projects
  • Enhance clients' security posture
group id: 10238000

Match Score

Powered by IntelliSearchâ„¢
image match score
Create an account or Login to see how closely you match to this job!