Quantcast
Channel: Harvey Nash UK Job Listing
Viewing all articles
Browse latest Browse all 33439

Information Security Consultant

$
0
0
Information Security Consultant/ InfoSec Consultant/ CISSP InfoSec ConsultantCandidates must have a breadth of information security experience, technical and non-technical - CISSP certified must be technically sound with a background in infrastructure and application security. Able to operate and a high/summary level when dealing with C level individuals giving focused updates in a timely fashion, and able to explain in detail to business or technical language. Able to review technical security designs and make recommendations. Able to review a business proposal and make recommendations. Represent the function within project teams, being embedded in the team and providing the InfoSec expertise to the project from inception to closure. Comfortable challenging individuals and able to justify recommendations, and application of good InfoSec principles. The company is undergoing a period of transition and change - it is highly dynamic, and rewarding for those who embrace change. Preference is someone from a financial services background, or regulated background. The team is busy and hardworking with InfoSec, Business Continuity and Data Protection responsibilities This role is unique within the team, but shares some responsibilities with other team members to provide a degree of flexibility. Some travel may be required in the UK.Knowledgeable and experienced in working in ISO27001 & PCI-DSS environments. Knowledgeable about the relevant data security legislation and FSA regulation. Knowledgeable and experienced in the selection, definition, development and deployment of security controls for a wide range of technologies including security infrastructure, end user devices, databases, storage and applications architectures. Consultative and business facing position as well as Technical. Strong audit and analytical skills. Defining and establishing segregation of duties requirements. Project Management, change Management, policy and procedure writing and impact Assessments. Knowledgeable in the following technologies: Firewall and IDS Technologies LAN / WAN / MAN / WLAN Technologies Application Development Environments - SDLC Encryption / PKI Technology Microsoft Technologies Relational Databases SIEM Systems

Viewing all articles
Browse latest Browse all 33439

Trending Articles