5+ years IT security experience, 2+ years administering IT security controls, Experience in security incident response.
Key responsabilities:
Maintain system inventory and perform risk assessments
Develop risk mitigation strategies and implement them
Coordinate with stakeholders for assessments and actions
Implement information security policies and ensure compliance
Monitor progress and ensure compliance with regulations
Report This Job
Help us maintain the quality of our job listings. If you find any issues with this job post, please let us know.
Select the reason you're reporting this job:
Navitas Partners LLC is a diversity led business, headquartered in NJ, as a dynamic IT professional services and workforce solutions company. We believe creating the best solutions in human resource services means always going above and beyond - and people are our most important asset. Our “DNA”
invokes core values of knowing, trusting and serving our relationships. The better we know our clients and candidates, the better our relationship, and the better we match the needs and exceed expectations. We want our client’s experience with us to reflect a transparent, professional and driven relationship.
At Navitas Partners we strive for Excellence in People, and grow with you to become a true extension of your HR specific business requirements, while remaining sensitive to your price & business needs.
Certified Diversity Employer: SBE • WOSB • WBE • MBE • NMSDC
NAICS: 541511, 541512, 541513, 541519, 54164, 518210, 811212, 561320
https://form.jotform.com/223145471243247
The UCI Division of Finance and Administration (DFA) needs help with the the implementation of its information security management program. This role will work closely with the Unit Information Security Architect. This role involves understanding the Unit's information security strategy and significantly contributing to the development, maintenance, and implementation of a comprehensive UC System-Wide information security program (IS-3) and the UCI Information Security Standard (ISS) to protect information systems. The successful candidate will manage substantial work within the overall security program, demonstrating project management skills, gathering business requirements, creating supporting plans, and coordinating all aspects of their work for on-time delivery or escalating issues to management as needed.
1. Maintaining Inventory of Information Systems: Keep an updated inventory of all unit information systems.
2. Conducting Risk Assessments: Perform risk assessments of information systems on a priority basis according to existing controls in the unit information security policy.
3. Developing Risk Mitigation Strategies: Maintain a risk log from the security risk assessments. Develop and implement risk mitigation strategies and actions on a priority basis.
4. Coordinating with Stakeholders: Plan and monitor interactions with a broad group of stakeholders for conducting risk assessments and implementing mitigation actions. Provide regular status reports on program progress and follow up with related issues and impediments.
5. Project Management: Demonstrate critical project management skills. Gather business requirements, create supporting plans, and coordinate all aspects of work for on-time delivery. Escalate issues to management as needed.
6. Implementing Information Security Policies: Implement UCI Information security policies and ensure adherence to them.
7. Applying Advanced IT Security Concepts: Apply advanced IT security concepts, governmental regulations, and organizational policies to handle complex IT security issues.
8. Incident Response and Analysis: Respond to and appropriately escalate complex IT security incidents. Collect, examine, analyze, and report to management on the causes, effects, and implications of security incidents.
9. Ensuring Compliance with Regulations and Policies: Ensure compliance with industry practices, governmental regulations, and campus/medical center/Office of the President policies and procedures.
10. Monitoring and Ensuring Progress in Complex Environments: Organize and manage tasks effectively. Monitor and ensure progress in complex environments, demonstrating competency in recommending methods and techniques to obtain results.
Experience Skillset Required: Bo flexibility: • 5+ years of IT security or information security experience with a proven ability to engage with Senior Management and regulators • 2+ years of experience in administering IT security controls in an organization • 2+ years of experience with security incident response in a SOC or Security Operations role. Must have:
2+ years of experience with networking security technologies to include but not limited Experience in defining Information Security strategies and integrating security technologies into corporate frameworks Preferred experience:
• Knowledge of technical infrastructure, networks, databases and systems in relation to IT Security and IT Risk
• Experience with implementing and/or supporting the processes for the following security technologies are preferred:
• Logging and monitoring: SIEM and Cloud Access Security Broker (CASB)
• Endpoint security: EDR, AntiVirus, DLP and host compliance
• Network security: NDR, IPS/IDS, traditional 5 tuple firewalls, next-gen firewalls, cloud security group, User Behavioral Analysts (UBA)
• Data Protection: encryption/decryption, HSM, KMS, DLP
• Azure/AWS cloud services and infrastructure • IS-3
Required profile
Experience
Level of experience:Senior (5-10 years)
Spoken language(s):
English
Check out the description to know which languages are mandatory.