Pages

Tuesday, 23 February 2016

Cyber Security Consultant required for client in San Francisco, California LOCALS MUST

Job Title : Cyber Security Consultant 
Order Type : Contract 
Number of Openings : 1 
Term : 12 months 
Pay Rate : $73/hr on c2c
City : San Francisco, California 

Advertising Information :
Must be local to San Fran

JOB DESCRIPTION REGARDING ISO 27001 & CYBER SECURITY CANDIDATE
  
·         Must have good cybersecurity domain knowledge, but doesn’t necessarily need to be a CISSP (preferred)
·         Ability to interpret 2700x requirements and conformance criteria
·         Ability to lead and manage the work of others to produce the needed results
·         Having some auditor/assessor training is a plus
·         Tool and platform specific knowledge
·         Must be detail oriented (for recording results)
·         Sys Admin skills to do necessary configuration checks, as directed
·         Knowledge on Asset Management
·         To carry out health check against ISO 27001 best practices.
·         Craft 27001 policies around customer’s security environment ( approx. . 50 )
·         Audit of current IT Infrastructure as per below:
·         Overall
o    Number of locations ( data center, data closet, data service operation/any place (where there is an asset )
o    Number of personnel served ( internal customers / external customers )
·         Describe the network architecture  & add to existing topologies.
·         How many of each do you have in the estate( actively managing ) ? discuss reliability  & accuracy of the cmdb & whether the asset management has been refreshed recently.
·         Assist Customer with configuration and asset management.
o    Servers (by flavor)
§  Virtual
§  Physical
o    Firewalls/Access Points
o    Switches
o    Routers
o    Appliances (by usage/category): security / storage / applications
o    Storage
§  Types/tiers
§  Sizes
o    etc.
·         Asset management program
o    Refresh policy
o    How are assets tracked? frequency of refresh
·         External data services (describe and document each)webex, telecom, data pipes/sources, bandwidth, ,,...the usage of the topology.
o    How many do you utilize?
§  Inbound?
§  Outbound?
§  Both?
o    What are they for?
·         Specialized tools and services (describe and document)
o    Asset management ( other tools used by Finance for depreciation, etc., etc.
o    Access control ( IT)
o    Physical security
o    Security management tools
o    Backup and restore
o    Cryptography
o    Voice/Video

o    Other

With Warm Regards
PAWAN,
Genuineit LLC Certified Women Owned Business
Making IT Happen…
 Ph: 832-476-0504