Participate in projects and initiatives working with IAM team members, architectural, development and engineering teams, service owners, and business stakeholders to provide enterprise IAM solutions that are scalable and adaptable with the ever changing business needs and industry demands.

More Uses of the ISO IEC 27001 Toolkit:

  • Develop, implement, and/or maintain procedures and automated processes to ensure the security of internally developed software and/or technology products.
  • Ensure products and systems comply with requirements and government information and cybersecurity standards through formal verification methods.
  • Be accountable for providing leadership and guidance on information security topics, advising and collaborating on security processes, business continuity, and disaster recovery plans.
  • Ensure compliance with regulatory requirements and assume primary responsibility for SOP updates, Tools instructions, and quality control or code development.
  • Manage multiple client projects at any given time, collaborating with Sales, Project Managers, Operations, and at times external organizations and End Clients.
  • Confirm you lead necessary IT compliance control monitoring and testing activities to determine effectiveness of the controls and ensure deficiencies are remediated.
  • Audit: research, install, administer, monitor, troubleshoot, document, and maintain enterprise databases to ensure maximum availability of mission critical systems and applications.
  • Provide a high level of technical expertise to support the delivery of project packages and the maintenance of existing complex system installations at client sites.
  • Be accountable for providing leadership and governance on compliance initiatives, specifically PCI DSS compliance, GDPR, CCPA and similar compliance requirements.
  • Be accountable for developing and maintaining information security policies, standards, guidelines and oversee the dissemination of security policies and practices.
  • Confirm your organization ensures the consistency and maintainability of existing applications by creating, maintaining, and enforcing standards/procedures for implementing technical solutions.
  • Lead projects and initiatives working with IAM team members, architectural, development and engineering teams, service owners, and business stakeholders to provide enterprise IAM solutions that are scalable and adaptable with the ever changing business needs and industry demands.
  • Lead the evaluation and implementation of emerging data access control technologies, information systems security issues, safeguards and techniques.
  • Maintain an IT compliance issue management tracking and resolution process to remediate, according to severity and potential impact to your organization.
  • Warrant that your organization identifies potential areas of compliance vulnerability and risk; develops/implements corrective action plans for resolution of problematic issues and provides general guidance on how to avoid or deal with similar situations in the future.
  • Ensure your organization provides significant input into the annual strategic planning and budget processes and identifies cost effective wargaming operations in a manner consistent with the strategic and budgetary requirements.
  • Confirm you lend expertise to the product design, development, and engineering teams to ensure development specifications, quality standards and testing requirements are appropriately documented.
  • Modify command language programs, network start up files, assign/reassign network device logically, analyze network performance, and recommend adjustments to a wide variety of complex network management functions.
  • Coordinate IT risk management projects with personnel from the IT organization, lines of business, and other internal departments and organizations.
  • Participate with the customer and internal technical teams in the strategic design process to translate compliance and regulatory requirements into controls, processes and systems.
  • Provide skill with malicious code reverse engineering to isolate, review, analyze, and reverse engineer potentially malicious programs recovered from compromised mobile devices.
  • Confirm you lead the information security function across your organization to ensure consistent and high quality information security management in support of the business goals.
  • Ensure that security is embedded in the project delivery process by providing the appropriate information security policies, practices and guidelines.
  • Evaluate project implementations, reporting on performance against goals and contract deliverables, and recommending further actions as appropriate.

 

Categories: Articles