Get C2C/W2 Jobs & hotlist update

GRC Consultant – C2C jobs urgent required

GRC Consultant

Erlanger, KY( 5 days onsite)

Contract


 

13+ candidate only

 

The Security and Compliance Analyst is responsible to perform the following duties

1       Review Projects and their technical design documents for Information security risks and advise on suitable controls and mitigations at early stages of the program

2       Fair understanding of Technology Landscape Applications Infrastructure Cloud and review

Clients information security and related threats and vulnerabilities legal and regulatory

requirements

3       Good Understanding on Security Standards like ISO 270012 SOX ITGC SOC1 or SOC2

DevSecOps OWASP top 10 Business Impact analysis ISO 22301 ISO 27005

4       Assess and classify all potential business and infrastructure information risks

5       Review and advise on information security risks of vendor offerings Newleveraging existing SAAS PAASIAAS services including integration with Client environment

6       Conduct risk assessment on Applications Network Systems according to Client policies applicable Standards legal regulatory requirements

7       Identify the risks in the Client Projects provide recommendations for remediation of identified risks

8       Translate Technical legal and Regulatory Compliance obligations into a cohesive collection of Security Controls and provides the respective stakeholders with the IRM requirements and its implementation methodologies

9       Identify or design the controls for implementation based on the outcome of Risk Assessment its remediation and residual risk

10   Ensure all the controls outlined for an applicationInfrastructure are designed effectively

11   Review Vulnerability Assessment and Penetration Test scan results and recommend the risks to be remediated

12   Review and approve the control design of supplier and their organization technical specifications against Client security control requirements

13   Ensure all the risks are documented classified and tracked with appropriate action as per the IRM standards

14   Work with Project Managers Business Analysts Architecture and Support Team to ensure Client Information Risk Management standards are being followed

15   Test the control effectiveness post implementation or deployment of controls and technologies

16   Conduct Security governance with Client stakeholders

Technology

1       Understanding of Cloud Security SAAS IAAS and PAAS and Onpremise infrastructure

2       Understanding of secure application development and support

3       Knowledge on Network Security Data Security Practices EndPoint Security Identity and

4       Access Management

5       Knowledge on Business Continuity Plan and Disaster Recovery

JD Keywords

Security Risk Assessment ISO 270012 SOX ITGC SOC1 or SOC2 DevSecOps OWASP

top 10 Security Risk Management Business Impact analysis Design Controls Data

Security Security Policy review Business Continuity Cloud Security Network Security

Identity and Access Management ISO 22301 ISO 27005 Control testing Control

assessment

 

Ajith Kumar

VBeyond Corporation || PARTNERING FOR GROWTH

Hillsborough, New Jersey, USA

Email ID: AjithG@Vbeyond.com


🔔 Get our daily C2C jobs / Hotlist notifications on WHATSAPP CHANNEL

About Author

JOHN KARY graduated from Princeton University in New Jersey and backed by over a decade, I am Digital marketing manager and voyage content writer with publishing and marketing excellency, I specialize in providing a wide range of writing services. My expertise encompasses creating engaging and informative blog posts and articles.
I am committed to delivering high-quality, impactful content that drives results. Let's work together to bring your content vision to life.

Leave a Reply

Your email address will not be published. Required fields are marked *