Develop standards, policies and procedures in the IT area in cooperation with IT staff and internal audit. Establish and document security related policies and procedures. Follow up and monitoring of Security aspects. Ongoing review of systems journals and logs including reporting of summarized information. Govern change management and conduct routine reviews of modifications through auditing tools. Access: Develop appropriate access standards. Set, promote and enforce policies, procedures and rules for remote access. Ensure proper authority to facilities. Communication: Develop methods of on-going auditing of IP transactions (internet and non-internet related). Participate in developing efficient communication with the company business partners for transmissions and on-line transactions. Business Continuation: Overall responsibility for Business Recovery Plan with IT. Coordination of Business Recovery matters for all operational areas. =================== Alta Associates, Inc. is the number one recruiting firm specializing in Information Security. Our diverse client base and extensive industry contacts have produced hundreds of placements in: Security Architecture, Cryptography, Electronic Commerce, Security Engineering and Security Administration. If you consider yourself an expert in any area of computer security, contact us for an evaluation of your credentials and career options. If you're hiring a security expert, utilize our ability to search a vast network of qualified executives. Provide us with your specifications and we'll assist you in building a top notch security team. Visit our website: www.altaassociates.com Phone: (908) 806-8442 Fax: (908) 806-8443
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:17:54 PDT