Ensign is hiring !
Roles & Responsibility:Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement, to identify any weak points that might make information systems vulnerable to attack
Develop and manage security strategies, develop policies that encourage secure working and protect data
Implement, document and drive the adoption of framework, processes and procedures in accordance with security strategies to deliver desired security objectives
Take ownership of the security and compliance function of the project
Communicate information security goals and new programs effectively
Oversee information security audits performed by organization or third-party personnel
Lead team members for security operations
Serve as a focal point of contact for the information security team and the customer or organization
Implement and oversee technological upgrades, improvements and major changes to the information security environment
Conduct information security awareness training to personnel
Coordinate staff when responding to security incidents
Investigate and resolve security incidents
Review security and breach report
Report to customer or organization management on security status
The ideal candidate should possess:Proven understanding of information security risk assessment and risk management procedures and methodologies.
Ability to correlate enterprise risk with appropriate administrative, physical and technical security controls.
Strong understanding and knowledge of security principles, standards, and processes, such as authentication and access control, infrastructure hardening, network traffic analysis, endpoint security, platform architecture, application security, encryption and key management, cloud security, etc.).
Working knowledge of UNIX and Windows operating systems.
Excellent verbal and written communication skills.
* Professional certifications such as CISM, CISSP, CRISC or CISA would be an advantage
MNCJobz.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.