Senior IT Security Architectother related Employment listings - Woodcliff Lake, NJ at Geebo

Senior IT Security Architect

Position Purpose You will enhance our security team accomplishments and competence by planning delivery of solutions; effectively engage and respond to technical and procedural requirements both within the InfoSec team, IT and Business groups.
Differentiating attributes You don' t look at Security as a tool or control, you have a holistic understanding to risk management and are conversant in balancing Business operations with enabling security solutions.
You have a clear and well-versed understanding of various IT functions and address risk by each layer to deliver comprehensive technology asset protection.
You don' t work but you have fun doing what you do, you are at your best when you take on complex problems and don' t forget to bring others along as you collaboratively learn & teach.
Major tasks & responsibilities Experience designing, implementing and supporting a wide range of security platform tools including - SEIM, IDS/IPS, Cloud & End point Security Content filtering Logical access controls, identity and access management Data loss prevention Firewalls, Unified Threat Management devices Application & Network Vulnerability scanners Directory Services, DNS, DHCP, TCP/IP Forensics software, security incident response.
Recommend and coordinate the application of fixes, patches, disaster recovery procedures in the event of a security breach Conduct risk assessments, penetration tests and diagnose Intranet & Internet intrusion attempts, and cyber-crime response Recommend security architecture considerations with analytical data and deliver security service to the recommendation.
Implement technical solutions to requirements supporting SSAE16, FISMA, ISO 27001 Provide support to external & Internal audits, penetration tests and vulnerability assessments Research emerging technologies in support of security enhancement and development efforts, analyze industry trends, assesses the impact of emerging security threats on the enterprise risk level Perform project leadership tasks on assigned security projects Identify security issues and risks, and develop mitigation plans.
Contribute as an active player to the continued development of enterprise-wide security strategy Develop and deliver security awareness and technology presentations, training.
Experience with open source security tools & models.
Qualifications/Requirements Bachelor' s Degree in Computer Science, Information Assurance or related field Three (3) years in a system administration (e.
g.
, Network, Windows) role preferred Five or more years' experience in Information security Experience in working with compliance and regulatory program requirements.
Experience analyzing network, event and security logs, and/or IDS alert logs.
Proven project management and organizational skills, specifically managing multiple concurrent projects Excellent analytical, problem solving and decision-making skills, applied with a solution-focused attitude Excellent written communication skills, demonstrating the ability to write with purpose, clarity, and accuracy Strong self-directed work habits, exhibiting initiative, drive, creativity, maturity, self-assurance and professionalism Excellent teamwork skills Enthusiastic and committed approach with a track record of building strong, trusted base relationships with colleagues and stakeholders at all levels Sound judgment and decision-making skills, with a ' hands on', problem solving approach, able to remain calm under pressure and take control of incidents Ability to quickly adapt to rapidly changing business needs and operational directives and deliver superior results.
Experience in implementing Security Platforms, Processes and Tools Professional Certification (any of the following with one required core Security Certification -- Ex:
CISSP) CISSP , CISA, CEH, CSSLP, CHFI, CCSP, GCIH, GCIA, PMP, ITIL v3, Six Sigma #RecruitPS Position Purpose You will enhance our security team accomplishments and competence by planning delivery of solutions; effectively engage and respond to technical and procedural requirements both within the InfoSec team, IT and Business groups.
Differentiating attributes You don' t look at Security as a tool or control, you have a holistic understanding to risk management and are conversant in balancing Business operations with enabling security solutions.
You have a clear and well-versed understanding of various IT functions and address risk by each layer to deliver comprehensive technology asset protection.
You don' t work but you have fun doing what you do, you are at your best when you take on complex problems and don' t forget to bring others along as you collaboratively learn & teach.
Major tasks & responsibilities Experience designing, implementing and supporting a wide range of security platform tools including - SEIM, IDS/IPS, Cloud & End point Security Content filtering Logical access controls, identity and access management Data loss prevention Firewalls, Unified Threat Management devices Application & Network Vulnerability scanners Directory Services, DNS, DHCP, TCP/IP Forensics software, security incident response.
Recommend and coordinate the application of fixes, patches, disaster recovery procedures in the event of a security breach Conduct risk assessments, penetration tests and diagnose Intranet & Internet intrusion attempts, and cyber-crime response Recommend security architecture considerations with analytical data and deliver security service to the recommendation.
Implement technical solutions to requirements supporting SSAE16, FISMA, ISO 27001 Provide support to external & Internal audits, penetration tests and vulnerability assessments Research emerging technologies in support of security enhancement and development efforts, analyze industry trends, assesses the impact of emerging security threats on the enterprise risk level Perform project leadership tasks on assigned security projects Identify security issues and risks, and develop mitigation plans.
Contribute as an active player to the continued development of enterprise-wide security strategy Develop and deliver security awareness and technology presentations, training.
Experience with open source security tools & models.
Qualifications/Requirements Bachelor' s Degree in Computer Science, Information Assurance or related field Three (3) years in a system administration (e.
g.
, Network, Windows) role preferred Five or more years' experience in Information security Experience in working with compliance and regulatory program requirements.
Experience analyzing network, event and security logs, and/or IDS alert logs.
Proven project management and organizational skills, specifically managing multiple concurrent projects Excellent analytical, problem solving and decision-making skills, applied with a solution-focused attitude Excellent written communication skills, demonstrating the ability to write with purpose, clarity, and accuracy Strong self-directed work habits, exhibiting initiative, drive, creativity, maturity, self-assurance and professionalism Excellent teamwork skills Enthusiastic and committed approach with a track record of building strong, trusted base relationships with colleagues and stakeholders at all levels Sound judgment and decision-making skills, with a ' hands on', problem solving approach, able to remain calm under pressure and take control of incidents Ability to quickly adapt to rapidly changing business needs and operational directives and deliver superior results.
Experience in implementing Security Platforms, Processes and Tools Professional Certification (any of the following with one required core Security Certification -- Ex:
CISSP) CISSP , CISA, CEH, CSSLP, CHFI, CCSP, GCIH, GCIA, PMP, ITIL v3, Six Sigma .
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.