John pegasyssoft
2013-02-06 18:54:18 UTC
*Hi,*
*This is John, - Recruitment and Resources from Pegasys Systems.*
We have an urgent requirement as follows:
* *
*Title: Technology Specialist*
*Location: Detroit, MI*
*Duration: 12 Months*
* *
*Technology Specialist*
With general guidance and coaching, participates in design, development and
implementation of specific new and emerging technologies, platforms and
services. Assists in the assessment of technical viability of new products
and technologies. Works with developers and infrastructure specialists to
pilot and evaluate new technologies. Participates in development of
business cases and obtaining approvals for capital expenditures. Familiar
with standard concepts, practices, and procedures within a particular
field. Significant creativity is required. Minimum 3-5 years related
experience preferred. Bachelor's degree in related field preferred.
As part of the Information Security Governance, Risk, and Performance (GRP)
team, this position will be responsible for the verification and audit of
Information Security controls, documentation, and issuance of management
reports on the design and effectiveness of controls across the enterprise.
*This role will primarily focus on the following areas of responsibility:*
Participate in the roll-out, education awareness, and evaluation of the
Information Security controls framework.
Provide guidance to Information Technology groups on behalf of Information
Security as it relates to control interpretation, applicability and
practice.
Participate in Information Security control baselines reviews to determine
necessary/applicable modifications.
*Specific activities include:*
Analyze and validate Information Security controls related to application,
infrastructure, process, and facility attestation questionnaires.
Create and provide reports related to Information Security control
activities and metrics.
Assist in the evaluation and modification of Information Security control
requirements.
Perform Information Security controls training and consulting across the
enterprise.
Assist in the creation and maintenance of internal process documentation.
*Requirements:*
Strong understanding of Information Security and the relationship between
threat, vulnerability and information value in the context of risk
management.
A good understanding of regulations and standards (HIPAA, HITECH and ISO)
and their impact on Information Security.
A strong understanding of Information Security or Information Technology
audit controls.
The ability to understand how project deliverables impact the ?big
picture?.
Demonstrated ability to work within a team in a cohesive and collaborative
manor.
Ability to work within tight deadlines.
Strong report and presentation writing skills.
Ability to present complex ideas and concepts to all levels of management.
*Education/Training:*
Bachelor s degree in Computer Science, Information Systems, or a related
field is preferred but not required.
Must have one of the following active certifications: CISA, CISM, CISSP
Other related certifications such as ITIL, PMP, SANS/GSEC, CIPP, CRISC,
CFE, CGEIT, CPA/CA are preferred, but not required.
Minimum of 2 years authoring or working with Information Security policies
and standards.
Minimum of 2 years designing, evaluating, and testing Information
Technology or Information Security controls.
*Consultant Need to provide the following details below:*
FULL LEGAL NAME (As it appears on the I-9 form):
LOCATION:
AVAILABLE:
EMAIL:
PHONE#
LAST 5 DIGITS OF SS#:
CONFIRM RATE:
WORK STATUS: (citizen, EAD, H1, etc.):
UPDATED RESUME
HAS BEEN IN THE US FOR AT LEAST 7 YEARS (YES OR NO):
Thanks,
*John|US IT Recruiter*
Pegasys Systems & Technologies, Inc
22260 Haggerty Road, Suite 215, Northville, MI 48167
Direct: 248-440-7363| Fax: 248-928-0344
***@pegasyssoft.com* *| www.pegasyssoft.com
*This is John, - Recruitment and Resources from Pegasys Systems.*
We have an urgent requirement as follows:
* *
*Title: Technology Specialist*
*Location: Detroit, MI*
*Duration: 12 Months*
* *
*Technology Specialist*
With general guidance and coaching, participates in design, development and
implementation of specific new and emerging technologies, platforms and
services. Assists in the assessment of technical viability of new products
and technologies. Works with developers and infrastructure specialists to
pilot and evaluate new technologies. Participates in development of
business cases and obtaining approvals for capital expenditures. Familiar
with standard concepts, practices, and procedures within a particular
field. Significant creativity is required. Minimum 3-5 years related
experience preferred. Bachelor's degree in related field preferred.
As part of the Information Security Governance, Risk, and Performance (GRP)
team, this position will be responsible for the verification and audit of
Information Security controls, documentation, and issuance of management
reports on the design and effectiveness of controls across the enterprise.
*This role will primarily focus on the following areas of responsibility:*
Participate in the roll-out, education awareness, and evaluation of the
Information Security controls framework.
Provide guidance to Information Technology groups on behalf of Information
Security as it relates to control interpretation, applicability and
practice.
Participate in Information Security control baselines reviews to determine
necessary/applicable modifications.
*Specific activities include:*
Analyze and validate Information Security controls related to application,
infrastructure, process, and facility attestation questionnaires.
Create and provide reports related to Information Security control
activities and metrics.
Assist in the evaluation and modification of Information Security control
requirements.
Perform Information Security controls training and consulting across the
enterprise.
Assist in the creation and maintenance of internal process documentation.
*Requirements:*
Strong understanding of Information Security and the relationship between
threat, vulnerability and information value in the context of risk
management.
A good understanding of regulations and standards (HIPAA, HITECH and ISO)
and their impact on Information Security.
A strong understanding of Information Security or Information Technology
audit controls.
The ability to understand how project deliverables impact the ?big
picture?.
Demonstrated ability to work within a team in a cohesive and collaborative
manor.
Ability to work within tight deadlines.
Strong report and presentation writing skills.
Ability to present complex ideas and concepts to all levels of management.
*Education/Training:*
Bachelor s degree in Computer Science, Information Systems, or a related
field is preferred but not required.
Must have one of the following active certifications: CISA, CISM, CISSP
Other related certifications such as ITIL, PMP, SANS/GSEC, CIPP, CRISC,
CFE, CGEIT, CPA/CA are preferred, but not required.
Minimum of 2 years authoring or working with Information Security policies
and standards.
Minimum of 2 years designing, evaluating, and testing Information
Technology or Information Security controls.
*Consultant Need to provide the following details below:*
FULL LEGAL NAME (As it appears on the I-9 form):
LOCATION:
AVAILABLE:
EMAIL:
PHONE#
LAST 5 DIGITS OF SS#:
CONFIRM RATE:
WORK STATUS: (citizen, EAD, H1, etc.):
UPDATED RESUME
HAS BEEN IN THE US FOR AT LEAST 7 YEARS (YES OR NO):
Thanks,
*John|US IT Recruiter*
Pegasys Systems & Technologies, Inc
22260 Haggerty Road, Suite 215, Northville, MI 48167
Direct: 248-440-7363| Fax: 248-928-0344
***@pegasyssoft.com* *| www.pegasyssoft.com