Discussion:
Req - Technology Specialist - MI - 12 Months.
John pegasyssoft
2013-02-06 18:54:18 UTC
Permalink
*Hi,*

*This is John, - Recruitment and Resources from Pegasys Systems.*

We have an urgent requirement as follows:
* *

*Title: Technology Specialist*

*Location: Detroit, MI*

*Duration: 12 Months*

* *

*Technology Specialist*

With general guidance and coaching, participates in design, development and
implementation of specific new and emerging technologies, platforms and
services. Assists in the assessment of technical viability of new products
and technologies. Works with developers and infrastructure specialists to
pilot and evaluate new technologies. Participates in development of
business cases and obtaining approvals for capital expenditures. Familiar
with standard concepts, practices, and procedures within a particular
field. Significant creativity is required. Minimum 3-5 years related
experience preferred. Bachelor's degree in related field preferred.

As part of the Information Security Governance, Risk, and Performance (GRP)
team, this position will be responsible for the verification and audit of
Information Security controls, documentation, and issuance of management
reports on the design and effectiveness of controls across the enterprise.

*This role will primarily focus on the following areas of responsibility:*

Participate in the roll-out, education awareness, and evaluation of the
Information Security controls framework.
Provide guidance to Information Technology groups on behalf of Information
Security as it relates to control interpretation, applicability and
practice.
Participate in Information Security control baselines reviews to determine
necessary/applicable modifications.

*Specific activities include:*

Analyze and validate Information Security controls related to application,
infrastructure, process, and facility attestation questionnaires.
Create and provide reports related to Information Security control
activities and metrics.
Assist in the evaluation and modification of Information Security control
requirements.
Perform Information Security controls training and consulting across the
enterprise.
Assist in the creation and maintenance of internal process documentation.

*Requirements:*

Strong understanding of Information Security and the relationship between
threat, vulnerability and information value in the context of risk
management.
A good understanding of regulations and standards (HIPAA, HITECH and ISO)
and their impact on Information Security.
A strong understanding of Information Security or Information Technology
audit controls.
The ability to understand how project deliverables impact the ?big
picture?.
Demonstrated ability to work within a team in a cohesive and collaborative
manor.
Ability to work within tight deadlines.
Strong report and presentation writing skills.
Ability to present complex ideas and concepts to all levels of management.

*Education/Training:*

Bachelor s degree in Computer Science, Information Systems, or a related
field is preferred but not required.
Must have one of the following active certifications: CISA, CISM, CISSP
Other related certifications such as ITIL, PMP, SANS/GSEC, CIPP, CRISC,
CFE, CGEIT, CPA/CA are preferred, but not required.
Minimum of 2 years authoring or working with Information Security policies
and standards.
Minimum of 2 years designing, evaluating, and testing Information
Technology or Information Security controls.



*Consultant Need to provide the following details below:*


FULL LEGAL NAME (As it appears on the I-9 form):
LOCATION:
AVAILABLE:
EMAIL:
PHONE#
LAST 5 DIGITS OF SS#:
CONFIRM RATE:
WORK STATUS: (citizen, EAD, H1, etc.):
UPDATED RESUME
HAS BEEN IN THE US FOR AT LEAST 7 YEARS (YES OR NO):


Thanks,

*John|US IT Recruiter*

Pegasys Systems & Technologies, Inc

22260 Haggerty Road, Suite 215, Northville, MI 48167

Direct: 248-440-7363| Fax: 248-928-0344

***@pegasyssoft.com* *| www.pegasyssoft.com
MCALLISTER, MICHAEL CTR AETC AETC/A3IS
2013-02-06 20:33:47 UTC
Permalink
OK, this is getting annoying. Can we get this guy off the list?

Regards,

Mike McAllister
Principal Systems Engineer
Decypher
DSN: 487-3751
Commercial: (210) 652-3751
Cell: (512) 423-7447
Email: ***@us.af.mil


-----Original Message-----
From: ***@yahoogroups.com [mailto:***@yahoogroups.com] On Behalf Of John
pegasyssoft
Sent: Wednesday, February 06, 2013 12:54 PM
Subject: [toad] Req - Technology Specialist - MI - 12 Months.




Hi,

This is John, - Recruitment and Resources from Pegasys Systems.

We have an urgent requirement as follows:



Title: Technology Specialist

Location: Detroit, MI

Duration: 12 Months



Technology Specialist

With general guidance and coaching, participates in design, development and
implementation of specific new and emerging technologies, platforms and
services. Assists in the assessment of technical viability of new products
and technologies. Works with developers and infrastructure specialists to
pilot and evaluate new technologies. Participates in development of
business cases and obtaining approvals for capital expenditures. Familiar
with standard concepts, practices, and procedures within a particular field.
Significant creativity is required. Minimum 3-5 years related experience
preferred. Bachelor's degree in related field preferred.

As part of the Information Security Governance, Risk, and Performance (GRP)
team, this position will be responsible for the verification and audit of
Information Security controls, documentation, and issuance of management
reports on the design and effectiveness of controls across the enterprise.

This role will primarily focus on the following areas of responsibility:

Participate in the roll-out, education awareness, and evaluation of the
Information Security controls framework.
Provide guidance to Information Technology groups on behalf of Information
Security as it relates to control interpretation, applicability and
practice.
Participate in Information Security control baselines reviews to determine
necessary/applicable modifications.

Specific activities include:

Analyze and validate Information Security controls related to application,
infrastructure, process, and facility attestation questionnaires.
Create and provide reports related to Information Security control
activities and metrics.
Assist in the evaluation and modification of Information Security control
requirements.
Perform Information Security controls training and consulting across the
enterprise.
Assist in the creation and maintenance of internal process documentation.

Requirements:

Strong understanding of Information Security and the relationship between
threat, vulnerability and information value in the context of risk
management.
A good understanding of regulations and standards (HIPAA, HITECH and ISO)
and their impact on Information Security.
A strong understanding of Information Security or Information Technology
audit controls.
The ability to understand how project deliverables impact the ?big picture?.

Demonstrated ability to work within a team in a cohesive and collaborative
manor.
Ability to work within tight deadlines.
Strong report and presentation writing skills.
Ability to present complex ideas and concepts to all levels of management.

Education/Training:

Bachelor s degree in Computer Science, Information Systems, or a related
field is preferred but not required.
Must have one of the following active certifications: CISA, CISM, CISSP
Other related certifications such as ITIL, PMP, SANS/GSEC, CIPP, CRISC, CFE,
CGEIT, CPA/CA are preferred, but not required.
Minimum of 2 years authoring or working with Information Security policies
and standards.
Minimum of 2 years designing, evaluating, and testing Information Technology
or Information Security controls.



Consultant Need to provide the following details below:


FULL LEGAL NAME (As it appears on the I-9 form):
LOCATION:
AVAILABLE:
EMAIL:
PHONE#
LAST 5 DIGITS OF SS#:
CONFIRM RATE:
WORK STATUS: (citizen, EAD, H1, etc.):
UPDATED RESUME
HAS BEEN IN THE US FOR AT LEAST 7 YEARS (YES OR NO):




Thanks,

John|US IT Recruiter

Pegasys Systems & Technologies, Inc

22260 Haggerty Road, Suite 215, Northville, MI 48167

Direct: 248-440-7363| Fax: 248-928-0344

***@pegasyssoft.com <mailto:***@pegasyssoft.com> | www.pegasyssoft.com
<http://www.pegasyssoft.com/>
Gregory Liss
2013-02-06 20:39:47 UTC
Permalink
He's been moderated.

-----Original Message-----
From: ***@yahoogroups.com [mailto:***@yahoogroups.com] On Behalf Of MCALLISTER, MICHAEL CTR AETC AETC/A3IS
Sent: Wednesday, February 06, 2013 3:34 PM
To: ***@yahoogroups.com
Subject: RE: [toad] Req - Technology Specialist - MI - 12 Months.

OK, this is getting annoying. Can we get this guy off the list?

Regards,

Mike McAllister
Principal Systems Engineer
Decypher
DSN: 487-3751
Commercial: (210) 652-3751
Cell: (512) 423-7447
Email: ***@us.af.mil


-----Original Message-----
From: ***@yahoogroups.com [mailto:***@yahoogroups.com] On Behalf Of John
pegasyssoft
Sent: Wednesday, February 06, 2013 12:54 PM
Subject: [toad] Req - Technology Specialist - MI - 12 Months.




Hi,

This is John, - Recruitment and Resources from Pegasys Systems.

We have an urgent requirement as follows:



Title: Technology Specialist

Location: Detroit, MI

Duration: 12 Months



Technology Specialist

With general guidance and coaching, participates in design, development and
implementation of specific new and emerging technologies, platforms and
services. Assists in the assessment of technical viability of new products
and technologies. Works with developers and infrastructure specialists to
pilot and evaluate new technologies. Participates in development of
business cases and obtaining approvals for capital expenditures. Familiar
with standard concepts, practices, and procedures within a particular field.
Significant creativity is required. Minimum 3-5 years related experience
preferred. Bachelor's degree in related field preferred.

As part of the Information Security Governance, Risk, and Performance (GRP)
team, this position will be responsible for the verification and audit of
Information Security controls, documentation, and issuance of management
reports on the design and effectiveness of controls across the enterprise.

This role will primarily focus on the following areas of responsibility:

Participate in the roll-out, education awareness, and evaluation of the
Information Security controls framework.
Provide guidance to Information Technology groups on behalf of Information
Security as it relates to control interpretation, applicability and
practice.
Participate in Information Security control baselines reviews to determine
necessary/applicable modifications.

Specific activities include:

Analyze and validate Information Security controls related to application,
infrastructure, process, and facility attestation questionnaires.
Create and provide reports related to Information Security control
activities and metrics.
Assist in the evaluation and modification of Information Security control
requirements.
Perform Information Security controls training and consulting across the
enterprise.
Assist in the creation and maintenance of internal process documentation.

Requirements:

Strong understanding of Information Security and the relationship between
threat, vulnerability and information value in the context of risk
management.
A good understanding of regulations and standards (HIPAA, HITECH and ISO)
and their impact on Information Security.
A strong understanding of Information Security or Information Technology
audit controls.
The ability to understand how project deliverables impact the ?big picture?.

Demonstrated ability to work within a team in a cohesive and collaborative
manor.
Ability to work within tight deadlines.
Strong report and presentation writing skills.
Ability to present complex ideas and concepts to all levels of management.

Education/Training:

Bachelor s degree in Computer Science, Information Systems, or a related
field is preferred but not required.
Must have one of the following active certifications: CISA, CISM, CISSP
Other related certifications such as ITIL, PMP, SANS/GSEC, CIPP, CRISC, CFE,
CGEIT, CPA/CA are preferred, but not required.
Minimum of 2 years authoring or working with Information Security policies
and standards.
Minimum of 2 years designing, evaluating, and testing Information Technology
or Information Security controls.



Consultant Need to provide the following details below:


FULL LEGAL NAME (As it appears on the I-9 form):
LOCATION:
AVAILABLE:
EMAIL:
PHONE#
LAST 5 DIGITS OF SS#:
CONFIRM RATE:
WORK STATUS: (citizen, EAD, H1, etc.):
UPDATED RESUME
HAS BEEN IN THE US FOR AT LEAST 7 YEARS (YES OR NO):




Thanks,

John|US IT Recruiter

Pegasys Systems & Technologies, Inc

22260 Haggerty Road, Suite 215, Northville, MI 48167

Direct: 248-440-7363| Fax: 248-928-0344

***@pegasyssoft.com <mailto:***@pegasyssoft.com> | www.pegasyssoft.com
<http://www.pegasyssoft.com/>






------------------------------------

Yahoo! Groups Links

<*> To visit your group on the web, go to:
http://groups.yahoo.com/group/toad/

<*> Your email settings:
Individual Email | Traditional

<*> To change settings online go to:
http://groups.yahoo.com/group/toad/join
(Yahoo! ID required)

<*> To change settings via email:
toad-***@yahoogroups.com
toad-***@yahoogroups.com

<*> To unsubscribe from this group, send an email to:
toad-***@yahoogroups.com

<*> Your use of Yahoo! Groups is subject to:
http://docs.yahoo.com/info/terms/

Joseph
2013-02-06 20:35:30 UTC
Permalink
Post by John pegasyssoft
*Hi,*
*This is John, - Recruitment and Resources from Pegasys Systems.*
Can a moderator ban this guy?



------------------------------------

Yahoo! Groups Links

<*> To visit your group on the web, go to:
http://groups.yahoo.com/group/toad/

<*> Your email settings:
Individual Email | Traditional

<*> To change settings online go to:
http://groups.yahoo.com/group/toad/join
(Yahoo! ID required)

<*> To change settings via email:
toad-***@yahoogroups.com
toad-***@yahoogroups.com

<*> To unsubscribe from this group, send an email to:
toad-***@yahoogroups.com

<*> Your use of Yahoo! Groups is subject to:
http://docs.yahoo.com/info/terms/
Loading...