Information Security Architect

From: Wils Bell (INFOSECat_private)
Date: Wed Jul 31 2002 - 11:09:25 PDT

  • Next message: Ben Weber: "(2) Information Security Scientist roles for Risk Assessments - O ne Junior, One Senior - Located in IL - Greythorn"

    
     ('binary' encoding is not supported, stored as-is)
    Our client, located in Florida is looking for a Full Time person
    to act as their Information Security Architect.
    
    Note: You "MUST" have a CISSP or GIAC to qualify for this job.
    
    Job Location: Florida
    
    Compensation: $100,000. +
    
    General Details: In addition to the job spec below, you really need a 
    strong background in Risk Assessment across many platforms and business 
    units. You will be responsible for setting the Information Security 
    Strategy that will be followed by the security team.
    
    Job Specs:
    
    
    Essential Duties And Responsibilities:			
     
    ·         Approves all application and system/network infrastructure 
    designs from a security perspective based upon established security 
    policies.
    ·         Advises the IT Security Sr Manager in developing/managing the 
    information security program, including policies, standards and 
    guidelines. 
    ·         Develops/manages the information classification process 
    ·         Develops/manages the information risk analysis, assessment and 
    acceptance processes. 
    ·         Promotes awareness of the information security program 
    throughout the organization via training activities. 
    ·         Advises business managers and technical personnel in the 
    implementation of the information security program in their respective 
    areas. 
    ·         Performs compliance activities to ensure the successful 
    implementation of the information security program 
    ·         Serves as a member of the technical advisory committee to 
    evaluate new technology resources for program compliance. 
    ·         Consults with business units regarding changing business and 
    technical plans to ensure that information security issues are addressed 
    early in a project's life and in the program. 
    ·         Consults with senior management in times of an information 
    security crisis to ensure that the crisis is managed properly both 
    internally and externally. 
    ·         Provids senior management with a regularly scheduled "State of 
    the Information Security Program" report. 
    ·         Advises senior management of changes in the technical, legal, 
    and regulatory arenas affecting information security and computer crime. 
     
     
    Additional Duties And Responsibilities: 
     
    ·         Performs other additional duties as assigned.
     
    Knowledge, Skills, and/or Abilities Required:   To perform this job 
    successfully, an individual must be able to perform each essential duty 
    satisfactorily. The requirements listed below are representative of the 
    knowledge, skill, and/or ability required.  Reasonable accommodations may 
    be made to enable individuals with disabilities to perform the essential 
    functions.
     
    ·         Possesses strong organizational and time management skills, 
    driving tasks to completion.
    ·         Able to work constructively under stress and pressure when 
    faced with high workloads and deadlines.
    ·         Knowledge and/or expertise in related area of responsibility.
    ·         Able to design and develop sophisticated models for related 
    area of responsibility.
    ·         Able to identify areas of risk/concern in area of 
    responsibility.
    ·         Able to identify needs and opportunities and develop action 
    plans to address.
    ·         Able to express ideas clearly and convey necessary information.
    ·         Possesses strong leadership skills with a willingness to lead, 
    create new ideas, and be assertive.
    ·         Able to assimilate research data from a variety of sources, 
    analyze, and recommend appropriate courses of action to take.
    ·         Able to avoid win/loss situations and ensure productive 
    resolutions of conflict.
    ·         Able to build solid, effective working relationships with 
    others.
    ·         Able to interact effectively with all levels of management.
    ·         Able to adjust readily to change and adapt as needed.
    ·         Able to quickly learn new systems and technology.
    ·         Able to provide courteous, timely service when addressing 
    customer questions and concerns.
    ·         Able to analyze and resolve complex issues and problems in a 
    sound and timely fashion.
     
    Educational/Previous Experience Recommendations:
     
     
     4 year degree plus 2 years relevant experience; or 2 years of college 
    (48 credit hours) plus 4 years relevant experience; or 8 or more years 
    relevant experience.
     
     
    Additional Experience:
    ·         Bachelor’s degree in Computer Science, Engineering, or related 
    discipline; or 8 – 12 years equivalent relevant experience acceptable.
    ·         5 to 7 years in the information security field, plus additional 
    background in IT coupled with good understanding of the enterprise 
    business and business processes; knowledge of business unit functions and 
    cross-group dependencies/relationships.
    ·         Information Security professional certification (GIAC or CISSP) 
    required.
    ·         Significant experience and knowledge in new computing 
    infrastructures and implementation of networked computing structures.
    ·         Previous experience in business process re-engineering or 
    process improvement, involving broad- based information systems, 
    utilizing tools and techniques to effect business change; business 
    systems analysis experience.
    ·         Two or more years of management experience in which one or more 
    of the following occurred:
    1.       demonstrated competency in strategic thinking and leadership 
    with strong abilities in relationship management
    2.       demonstrated competency in developing efficient and effective 
    solutions to diverse and complex business problems.
    ·         Familiarity with OS/390, NT, Unix systems as well as LAN/WAN 
    protocols and security
     
    
    If your skills match this job, please forward a word resume with daytime 
    Phone # to:
    
    Wils Bell
    Infosecat_private
    



    This archive was generated by hypermail 2b30 : Wed Jul 31 2002 - 12:42:11 PDT