Information Security Specialist

Ask IT consultingTrenton, NJ
1d

About The Position

The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.

Requirements

  • 5 plus years of relevant experience
  • Prior experience in the following are essential for the role: Websense 7.8 E policy Orchestrator 4.6 Mc Afee email gateway (MEG) 7.6 Airwatch 8.0.6.0

Nice To Haves

  • 4 year college degree or equivalent technical study

Responsibilities

  • Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. Monitor use of data files and regulate access to safeguard information in computer files.
  • Document and maintain a repository with version control of all policies, procedures and best practices
  • Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
  • Monitor use of data files and safeguard computer files against authorized access and unauthorized access
  • Modify computer security files to incorporate new software, correct errors or access changes
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Identify and track issues, risks and action items.
  • Document information security policies, standards, and procedures spanning and encompassing the range of topics such as organization security, asset ID and classification, personal security, communications and operations management, access control, system development and maintenance, business continuity management, and compliance.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service