IT Risk Support - IA&M & Cyber - 8612 Internet & Ecommerce - Columbus, OH at Geebo

IT Risk Support - IA&M & Cyber - 8612

Company Name:
UpStream Global Services
IT Risk Support - IA&M & Cyber
We have an immediate opportunity with a large F500 client in the Columbus, OH area.
Scope of Services and Work Product:
o Support Director of I&AM and broader I&AM team on current state assessments of the I&AM program and developing long term solutions for identified gaps.
o Participate in access control assessments for key systems and areas of technology.
o Provide access controls subject matter expertise as part of inter-organizational effort to define an access controls framework that connect high level policy to low level implementation.
o Provide I&AM subject matter expertise as part of writing prescriptive guidance for IT teams on access management issues not specifically addressed in formal policy and standards (related to but different from access control framework).
o Support Director of I&AM and broader I&AM team on documenting and formalizing operational processes.
o Advise on process improvements, documenting gaps and recommending specific solutions in line with industry best practices.
o Document the CCB Threat Intelligence program charter and define threat intelligence requirements including collection sources, data feeds, interaction with Corporate Threat intelligence teams and publication to IT and Business leaders
o Document the CCB Cyber Security requirements and asks for the Firmwide Cyber Program and Corporate Cyber Security functions. Document requirements for future application security, security testing, security monitoring and security architecture programs
o Document the CCB Cyber Security Incident Response Plan and requirements for Cyber Command Center 2.0. Document CCb cyber security procedures for major security inicdents including critical vulnerabilities, threats, events and control failures
o Cyber security architecture and engineering, including data protection, application security, encryption, and perimeter network defenses
o Cyber security operations, including malware prevention, insider threat, data leakage prevention, and privileged access monitoring
o Threat intelligence, vulnerability management, penetration testing and red team analysis in partnership with the overall firm wide cyber security program and line of business technology teams
o Document process opportunities across CCB IT Risk to drive positive change across the organization.
Roles and Skill Set Requirements:
IA&M:
oQuick startup and limited training
oSelf starter, proactive and good communication skills and management of offshore team
oCyber Security, including engineering, operations, or testing.
oIn-depth knowledge of data protection strategies, network and system vulnerabilities; security tool sets including security event management tools, vulnerability scanning tools, network and system forensic tools, or security analytics toolsets.
oExperience working in the financial services industry with knowledge of regulations such as GLBA, PCI, and SOX
Cyber:
o Strong understanding of I&AM practices, access controls in particular
o Experience assessing and developing operational procedures
o Experience working in a highly regulated and audited environment
o Extensive experience with client/server environments
o Knowledge of audit principles and associated compensating controls.
o Excellent oral and written communication skills
o Experience writing business and technical process documents
o Experience driving organizational change

For immediate consideration please contact:
Lisa
UpStream Global Services.
Reply to:
www.upstreamgs.comEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.