Full-Time

Information Security Specialist

Ask IT Consulting

Ask IT Consulting

No salary listed

Trenton, NJ, USA

In Person

Category
IT & Security (1)
Required Skills
Risk Management
Cryptography
Requirements
  • Five plus years of relevant experience
  • A four-year college degree or equivalent technical study
  • Prior experience with Websense version 7.8
  • Prior experience with Enterprise Policy Orchestrator version 4.6
  • Prior experience with McAfee Email Gateway version 7.6
  • Prior experience with AirWatch version 8.0.6.0
Responsibilities
  • Develop and document information security policies and standards
  • Plan, coordinate, and implement security measures for information systems
  • Define, develop and implement information security and risk management policies, procedures and best practices to comply with industry standards
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs
  • Monitor use of data files and regulate access to safeguard information in computer files
  • Document and maintain a repository with version control of all policies, procedures and best practices
  • Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
  • Monitor use of data files and safeguard computer files against authorized access and unauthorized access
  • Modify computer security files to incorporate new software, correct errors or access changes
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers
  • Identify and track issues, risks and action items
  • Document information security policies, standards, and procedures spanning and encompassing the range of topics such as organization security, asset identification and classification, personal security, communications and operations management, access control, system development and maintenance, business continuity management, and compliance
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency
Ask IT Consulting

Ask IT Consulting

View

Company Size

N/A

Company Stage

N/A

Total Funding

N/A

Headquarters

N/A

Founded

N/A