Cyber Security Information Security Professional

Overview

On Site
$60 - $70
Contract - W2
Contract - 12 Month(s)

Skills

CISO
CISSP
CISM
DOD
Articulates
assessments
compliance audits
cyber security
firmware
information systems
risk assessments
CISO and CxO

Job Details

Hi,

Hope you are doing well.

Please find below full job description, let me know if you would be interested.

Title: Location: Groton, CT
Description:

Required: CISSP, CISM, DOD background and knowledge with vendors, and suppliers. Interfacing with CISO and CxO levels

Job Description:

** Must be able to be on-site daily, at either New London and Groton CT. This requires on-site, DOD security Clearence a plus, and must be able to obtain a Federal Clearance if required.

Key Responsibilities:

  • Acts as the first line manager for CISO's Office
  • Responsible for the identification, tracking and management of enterprise risks. This includes performing risk assessments and measuring the success and effectiveness of mitigation efforts.
  • Identifies, evaluates, tests and implements appropriate security products, tools, and systems to establish and ensure a secure infrastructure.
  • Articulates security policies, guidelines and standards to customers and developers.
  • Evaluates, tests, recommends, develops, coordinates, monitors and maintains information systems (IS) and cyber security policies, procedures and systems, including access management for hardware, firmware and software.
  • Ensures that IS and cyber security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS and cyber security.
  • Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security.
  • Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents.
  • Implements IS and cyber security policies and takes measures against intrusion, frauds, attacks or leaks.
  • Provides leadership to managers; may also provide leadership to supervisors and/or professional staff.
  • Has accountability for the performance and results of multiple related units.
  • Develops departmental plans, including business, production, operational and/or organizational priorities.
  • Controls resources and policy formation in area of responsibility.
  • Decisions are guided by resource availability and functional objectives.

Thanks& Regards,

Mul Chand from DCM Infotech Ltd