Unfortunately, this job posting is expired.
Don't worry, we can still help! Below, please find related information to help you with your job search.
Some similar recruitments
It Security Specialist Jobs
Recruited by U.S. Courts 9 months ago Address , New Haven $58,808 - $105,032 a year
It Security Analyst Jobs
Recruited by Worthington Industries 9 months ago Address , Columbus, 43085, Oh
Analyst, It Security Response Technology
Recruited by Lincoln Financial 9 months ago Address , Radnor, Pa $90,000 - $175,000 a year
It Security Analyst Jobs
Recruited by InterEx Group 9 months ago Address Columbus, Ohio Metropolitan Area, United States
It Director Jobs
Recruited by Joyce/Dayton Corp. 10 months ago Address Dayton, OH, United States
It Security Analyst Jobs
Recruited by Stefanini North America and APAC 10 months ago Address Youngstown, OH, United States
Executive It Director - 46730
Recruited by State of Tennessee 11 months ago Address , Nashville, 37243, Tn From $9,617 a month
Director, It Operations Jobs
Recruited by Revance 11 months ago Address , Nashville, Tn
Director, It - Four Seasons Yachts
Recruited by Four Seasons 11 months ago Address , Miami, Fl
It Auditor- 46574 Jobs
Recruited by State of Tennessee 11 months ago Address , Nashville, 37243, Tn
Senior It Security Engineer
Recruited by The Ohio State University 11 months ago Address , Columbus, 43210, Oh $92,000 - $123,000 a year
It Consultant Jobs
Recruited by TRA'BIAN ENTERPRISES 11 months ago Address , Columbus, Oh
Director It Jobs
Recruited by DHL 11 months ago Address , Westerville, 43082, Oh
It Security Analyst / Network Security
Recruited by TRA'BIAN ENTERPRISES 11 months ago Address , Columbus, Oh
It Security Analyst Jobs
Recruited by Bob's Discount Furniture 1 year ago Address , Manchester, 06042, Ct $77,000 - $111,000 a year
Senior It Auditor Jobs
Recruited by Munich Re America Services 1 year ago Address , Cincinnati, Oh
Information Security Auditor Jobs
Recruited by Reynolds and Reynolds 1 year ago Address , Dayton, 45430, Oh

It Security Specialist Jobs

Company

Talent Group

Address Columbus, OH, United States
Employment type CONTRACTOR
Salary
Category Staffing and Recruiting
Expires 2023-09-14
Posted at 8 months ago
Job Description

Complete Description:

  • Perform application updates to Security applications and devices.
  • Incident response.
  • Develops IT security standards, policies and procedures to implement security practices.
  • Act as a technical information security reviewer of performance reports, system status, operating procedures manual and other documents produced.
  • Implements security improvements by assessing current situation, evaluating trends anticipating requirements.
  • Specializes in information and network security.
  • Knowledge of current and emerging threats/threat vectors.
  • Assess risk of proposed changes to infrastructure, code, and connectivity.
  • Analyzes security risks, and plans controls.
  • Installs new security software.
  • May assist with the selection, installation of automated tools that enforce or monitor the compliance with information security policies, standards, procedures, and similar information security requirements.
  • Determine security violations and inefficiencies by conducting periodic audits.
  • Broad understanding of Information Security as a field, including experience evaluating and implementing security policies and practices.
  • Monitors computer networks for security violations.
  • Knowledge of security framework (NIST SP 800-53, ISO 27001, NERC, etc.).
  • Recommends security changes to executive team.
  • Monitors compliance with security policies and procedures.
  • Coordinates implementation of security controls and implements controls.
  • Communicate effectively with both technical and non-technical individuals at all levels of the organization.
  • Conducts penetration testing to find vulnerabilities.
  • Prepares reports on security breaches.
  • Provides users and management with technical support on matters related to access control.
  • Knowledge in vulnerability assessments, intrusion prevention and detection, access control and authorization, policy enforcement, design of secure infrastructure, protocol analysis, and firewall rulesets.
  • Teaches peers about security procedures.