Security Analyst

From: Ben Weber (Ben.Weberat_private)
Date: Fri Jul 13 2001 - 16:17:48 PDT

  • Next message: Anton J Aylward, CISSP: "RE: advice please"

    Solid logistical company with a very flat corporate structure...
    
    
    SENIOR IT SECURITY ANALYST          WI             -$85,000
    
    This position is primarily responsible for designing, implementing and
    maintaining my clients security policy; centrally managing the
    administration effort across multiple hardware and software platforms. This
    individual must effectively communicate with all departments to build an
    understanding and embracing attitude towards a security environment, which
    positions my client for future growth.
    
    RESPONSIBILITIES
    
    ·Develop and implement a corporate Security Policy for logical (content)
    data Integrity that aligns with the business goals and protects corporate
    data assets.
    
    ·Build and foster a Security Administration attitude which focuses on high
    internal cooperation, 100% customer satisfaction, and zero-defects.
    
    ·Develop a Security Administration role, which is properly placed within the
    organization and effectively, utilized.
    
    ·Develop, train and retain a highly motivated Security Administration team,
    leveraging the existing Administrative Assistants and Help Desk where
    appropriate.
    
    ·Develop and implement a security environment that supports internal and
    external customer requirements.
    
    ·Automate existing security procedures to streamline processes, eliminate
    errors, and improve service to Customers.
    
    ·Develop, implement and administer a security policy, which protects logical
    (content) data at the application level.
    
    ·Establish and administer a standard security philosophy across MVS, UNIX,
    PC, File Server and LAN/WAN Network hardware and software platforms.
    
    ·Build and maintain a secure logical (content) data environment which allows
    for periodic external audits; resulting in the classification of (clients)
    as a "closed" security shop.
    
    ·Develop a regularly scheduled security reporting system that identifies
    "abuses" and documents the current security environment.
    
    ·Evaluate and recommend third-party security software packages and/or
    develop in-house software, which assists in attaining the corporate security
    goals.
    
    ·Prepare, distribute and explain written security policies, procedures,
    guidelines, and standards.
    
    EXPERIENCE AND SKILL REQUIREMENTS
    
    ·A four-year degree in computer science or related field, or the equivalent
    work experience
    
    ·A minimum of 5 - 7 years of experience as a Security Administrator or
    Security Analyst, emphasis on the development and implementation of security
    policies, procedures, experience with security administration across
    multiple operating systems (OS/390, Sun Solaris, Netware, NT).
    
    ·Experience managing and leading Security projects, including defining
    requirements, developing project plans, and delivering results
    
    ·Experience with RACF, or equivalent, Internet firewalls, UNIX security
    (Checkpoint), Internet security is required.
    
    ·A working knowledge of OS/390, TSO/E, CLISTS, JCL, and SAS is desired and a
    working knowledge of LAN, File Server, PC, UNIX, TCP/IP, Lawson, LDAP, and
    VPN environments would be a plus.
    
    Thank you and please contact:
    
    Ben Weber
    Senior Recruitment Consultant
    Information Security Practice
    Greythorn Inc
    425 635 0300
    ben.weberat_private
    www.greythorn.com
    
      -- -- -- -- -- -- -- -- -- -- ---
    
    This e-mail may contain privileged and/or confidential information and is
    for the intended recipients only.  In the event that you receive this e-mail
    in error you should delete it from all locations on your computer/network
    and contact Greythorn immediately on + 1 425 635 0300.  As e-mail is an
    electronic form of communication the data may have been subject to
    corruption or unauthorized use and as such any views or opinions contained
    in this e-mail are not necessarily the views of Greythorn Inc and the
    company cannot be held responsible for any misuse.
    



    This archive was generated by hypermail 2b30 : Fri Jul 13 2001 - 16:58:16 PDT