Information Security Manager Position - Greythorn

From: Ben Weber (ben.weberat_private)
Date: Tue Feb 12 2002 - 17:27:01 PST

  • Next message: Rob Needham: "Federal Sales Director - Washington, D.C."

    Seattle, WA                            -$95,000
    Information Security Manager
    
    The Information Security Manager will be directly involved with
    foundation activities for security planning, security technology, and
    security practice implementation. 
    You will be establishing standards for the security infrastructure.  You
    will identify and implement common security technologies across company
    related to logging, reporting, monitoring and detection  Champion
    security best practices tailored for (clients) environment. Coach/mentor
    system administration teams in security administration best practices
    that are practical, cost effective and meet security policy. Perform as
    technical lead for implementing selected security technologies.
    Technologies include, but not limited to, security monitoring/reporting,
    intrusion detection, secure id, fire walls, proxies, encryption,
    vulnerability scanning. Provide quality assurance on security
    infrastructure design and implementation. Divisional teams will take
    responsibility for implementation of security standards, technologies,
    and practices. This position will have a coordinating role on audit and
    quality assurance. Monitor security across the network and for key
    systems. Report potential security breaches to security teams and
    security steering committee. Lead forensic investigations during
    security incidents that may occur. Assist in the establishment and
    upgrading of standard security operating procedures, technical
    documentation, and training security operations. Keep current on
    security technologies and as part of a continuous improvement process.
    Monitor security sites (such as securityfocus, cert.org, sans.org,
    incidents.org, etc) for updates on vulnerabilities, new security
    technology and best practices. Participate in security conferences Black
    Hat, Defcon, etc. Participate in departmental meetings to review
    performance metrics, raise issues, solve problems, and implement
    improvements in process, tools, and working relationships. Keep the
    General Manager of Information Systems and the Security Steering
    Committee informed on a routine basis of assignments and projects to
    ensure on time and quality delivery. 
    The ability to work effectively and manage project teams (who are not
    direct reports) is vital to success in this position. 
    Education requirement for this position: Four year degree in Computer
    Science, Math, or related fields of study.   This right candidate for
    this role must be able to interact with Sys Engineering level
    intimately, but also being able to be a strategy shaper. Needs strong
    Internet B2C background.  
    Please contact the following for more detail.  Thank you for your time.
    
    Regards,
     
    Ben Weber
    Manager, Information Security Recruitment Practice
    Greythorn
    Phone:  + 1 425 635 0300
    mailto:ben.weberat_private
    http://www.greythorn.com/
    
    London  Sydney  Melbourne  Seattle
    
    ************************************************************************
    **********
    
    This is email is confidential and intended only for the stated
    addressee(s).
    If you receive this in error, please inform us immediately and delete it
    and
    all copies from your system. Any unauthorized disclosure, use, or
    dissemination, either whole or partial, is prohibited. Any views or
    opinions
    contained in this email are those of the author and are not necessarily
    endorsed by Greythorn, and the company cannot be held responsible for
    any
    misuse. This email and its attachments are believed to be free of any
    virus,
    or defect, but it is the responsibility of the recipient to ensure this.
    Greythorn do not accept responsibility or liability for any loss or
    damage
    arising in any way from its receipt or use or for any errors or
    omissions in
    its contents which may arise as a result of its transmission.  This
    email is
    covered by Greythorn's Terms and Conditions of Business, a copy of which
    can be viewed on our website, or on request.
    
    ************************************************************************
    ***********
    
     <<Ben Weber (E-mail).vcf>> 
    
    
    



    This archive was generated by hypermail 2b30 : Wed Feb 13 2002 - 15:39:45 PST