Responsible for deploying and maintaining the information technology security hardware and software systems to protect company data from being compromised. Collaborates with the Human Resources and Legal Departments to coordinate data preservation and examination for internal investigations and/or litigation.
Provides direction as well as develops and leads technical risk assessments across all information technology applications and systems to identify and assist in mitigating security related issues for the organization’s computing environment.
Leads critical computer forensic activities for the identification and confirmation of employee misconduct as directed by Human Resources.
Leads system vulnerability audits and penetration tests against Windows and Linux systems to identify security configuration concerns and provide risk mitigation recommendations.
Leads application security vulnerability audits and penetration testing to include conducting security code reviews of internally developed software applications.
Leads response activities concerning network intrusions by identifying the source of the intrusion and the attack vector. Develops and implements a remediation plan. Serves as the technical conduit with Infrastructure to ensure the remediation plan is in place and is effective.
Researches, develops and deploys the company’s security information management system to perform event correlation across all critical systems.
Researches current hacker tactics in order to architect systems or processes to counteract threats to the company’s computing environment. Presents technical information and makes risk mitigation recommendations to senior management.
Works closely with the Legal Department and outside counsel to provide guidance on computer forensics activities concerning electronic discovery.
Responsible for providing testimony for current litigation involving electronic discovery and all IT matters.
Provides guidance, leadership, and training to the Information Risk Management team.
Responsible for maintaining current knowledge in the best practices and technological developments concerning information technology risk management.
Associate’s Degree required.
5-10 years of experience in Information Systems with a minimum of 2 years in Information Security or Risk Management.
Must be willing/able to provide 24 x 7 On-call rotation Support 365 days a week.
Information Risk Security Consultant
Philadelphia, PA - security, information security, preservation,...
Active Directory SME
Philadelphia, PA - directory, skype, active directory,...
Philadelphia, PA - paralegal, litigation, trial, legal, court...
Account Executive - Entry Level Sales - Leads Management - Full Time
Philadelphia, PA - it, process, executive, communication, sales,...
Be your own boss work warm leads plus
Philadelphia, PA - mortgage protection, final expense, agents, leads,...
IT Systems & Information Security Manager
Philadelphia, PA - mm, sap, fi, recruiters, information security,...
Senior UX/UI Designer
Philadelphia, PA - designer, ux, ui, oracle, design, visual, java,...