IT Auditor with CISSP

Remote • Posted 4 hours ago • Updated 4 hours ago
Contract W2
Contract Corp To Corp
Contract Independent
No Travel Required
Remote
Depends on Experience
Company Branding Image
Fitment

Dice Job Match Score™

👤 Reviewing your profile...

Job Details

Skills

  • Auditing
  • CISSP
  • Continuous Improvement
  • Cloud Security
  • Cloud Computing
  • Disaster Recovery
  • HIPAA
  • Cyber Security
  • Incident Management
  • Identity Management
  • Information Technology
  • Network Security
  • PCI DSS
  • Information Security
  • Endpoint Protection
  • Management
  • Reporting
  • Regulatory Compliance
  • Risk Management
  • PMP
  • Risk Assessment
  • Vulnerability Management
  • Business Continuity Planning
  • SAP GRC
  • ROOT

Summary

Job Title:  IT Auditor with CISSP

Location:  Remote (Austin, TX)

Duration: 12+ months contract

Experience: 15+ Years

 

This position is Remote but candidate should be in Texas only.

We are seeking a highly motivated and talented individual to join our cybersecurity team at the as an IT Auditor. The IT Auditor is responsible for providing independent assurance over the organization’s information technology and cybersecurity control environment. The role supports risk management, regulatory compliance, and the overall effectiveness of cybersecurity governance.

 

Responsibilities may include, but are not limited to:

  • Plan, execute, and report on IT and cybersecurity audits to assess the effectiveness of security controls, risk management practices, and compliance with policies and regulations
  • Evaluate the design and operating effectiveness of cybersecurity controls across areas such as identity and access management, network security, endpoint protection, cloud security, and data protection
  • Conduct risk assessments and control testing aligned to recognized frameworks (e.g., NIST CSF, ISO 27001, CIS Controls, COBIT)
  • Assess compliance with applicable regulatory and contractual requirements (e.g., SOX, PCI DSS, HIPAA, GDPR, SOC reports, internal policies)
  • Review vulnerability management, incident response, disaster recovery, and business continuity processes to ensure preparedness and resilience
  • Collaborate closely with GRC, and business stakeholders to understand systems, processes, and compliance
  • Identify control gaps, root causes, and risk implications, and develop clear, actionable audit findings and recommendations
  • Track and validate remediation efforts to ensure timely and effective resolution of audit issues
  • Support third-party risk assessments, including reviews of vendor security controls and SOC reports
  • Stay current on evolving regulatory changes, and industry best practices to continuously enhance audit approaches
  • Contribute to the continuous improvement of audit methodologies, tools, and automation techniques
  • Prepare and present audit results to management and, when required, senior leadership or audit committees.

 

Minimum Requirements:

  • Plan, conduct, and document IT and cybersecurity audits in accordance with approved audit methodologies and professional standards.
  • Evaluate the design and operating effectiveness of information security controls across systems, networks, applications, cloud environments, and data platforms.
  • Assess cybersecurity risks and controls in alignment with recognized frameworks and standards
  • Perform testing to assess compliance with applicable laws, regulations, contractual obligations, and internal policies.
  • Review and assess processes related to identity and access management, vulnerability management, incident response, disaster recovery, and business continuity.
  • Identify control deficiencies, assess risk impact, and develop clear, well-supported audit findings and recommendations.
  • Prepare formal audit reports that communicate results, conclusions, and remediation requirements to management.
  • Monitor, track, and validate management remediation plans to ensure timely and effective resolution of audit issues.
  • Ability to resolve complex security issues in diverse and decentralized environments; to learn, communicate, and teach new information and security technologies; and to communicate effectively.
  • Conduct forensic investigations on cyberattacks to determine how they occurred and how they can be prevented in the future.
  • CISSP, PMP certifications 

 

Best Regards,

 

Ashish Singh

Truehire Staffing,

5900, Balcones Drive Suit 100, Austin, TX, 78731

Email ID:

 

 

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 91173234
  • Position Id: 8910487
  • Posted 4 hours ago

Company Info

About TrueHire Staffing LLC

Truehire is a leading provider of Recruitment Process Outsourcing (RPO) & Staffing services, supporting organizations across various industries and sizes. The company delivers customized hiring solutions designed to streamline recruitment operations and improve the quality of talent acquisition. At Truehire, the focus is on combining advanced technology with data-driven insights to achieve superior hiring outcomes. The team comprises experienced recruiters with strong domain expertise, enabling them to understand diverse client needs and deliver the right talent quickly and efficiently. One of Truehire core strengths is its ability to offer a seamless and consistent recruitment experience, regardless of client scale or geography. By working closely with clients, Truehire builds tailored recruitment strategies that align perfectly with their business goals and unique hiring requirements.

About_Company_One
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

It looks like there aren't any Similar Jobs for this job yet.

Search all similar jobs