Home

Cyber Security - Information Security - Atlanta,GA Day 1 Onsite (5days working)-USC & GC candidate at Atlanta, Georgia, USA
Email: [email protected]
---------- Forwarded message ---------

From:
<[email protected]>

Date: Tue, Jun 11, 2024, 12:14 AM

Subject: Cyber Security - Information Security - Atlanta,GA Day 1 Onsite (5days working)-USC & GC candidate

To: Faisal Siddiqui <[email protected]>

Hi All,

Role name
Cyber Security - Information Security

Role Description:    1. Perform Threat Analysis & Create/Update the Threat

Modelling The Information Security Architect performs threat analyses

for complex technical designs and reports the results using standard

templates. The Information Security Architect creates the initial

Threat Modelling (with new applications/systems) or updates an existing

Threat Modelling (with upgraded applications/systems). The Information

Security Architect tracks critical and high findings and updates the

respective changes in the Threat Modelling.2. Derive Security

Requirements Given application or system descriptions, the Information

Security Architect derives security requirements that will match the

respective level of abstraction. 3. Review Design and Report Issues The

Information Security Architect reviews the design documents with respect

to o Fulfillment of security requirements o (Common) design errorso

Already known design shortcomings (are they fixed or not) The

Information Security Architect submits a written report that lists all

shortcomings and suggestions on how to fix them.4. Review Implementation

and Report Issues The Information Security Architect reviews the

implementation with respect to Fulfillment of security/design

requirements (Common) implementation errors, Already known

implementation shortcomings (e.g., from Code scan or Pen Testing, are

they fixed or not) The Information Security Architect submits a

written report that lists all shortcomings and suggestions on how to fix

them.5. Review Project Security Planning and Report Issue The

Information Security Architect reviews various project management

documents with respect to o plausibility of effort estimates for planned

security tasks,o plausibility of cost estimates for planned security

tasks,o overall plausibility of the timeline for security tasks,o the

overall progress of security, o completeness of planned security tasks o

security budget planning,o ordering status of mandatory security

services,o mandatory security-related tasks The Information Security

Architect submits a written report that lists. o all shortcomings,

together with suggestions on how to fix them,o all possible risks to

achieving project goals that relate to information security.6. Cyber

Security Incident Management Responsible for end-to-end cyber security

incident management process.7. Various Expert Consulting The

Information Security Architect will answer explicit questions on various

security-related subjects, e.g. on o Information Classification, o

Security aspects of project management, o Technical information

security, etc.o Cryptography,o Cloud Security,o TPRM Third-Party Risk

Managemento Vulnerability Review and Assessment,o Dev Sec-opso Security

Toolso Audit Support (External and Internal)8. Technical Security Tasks

Given the necessary input, the Information Security Architect will

perform complex tasks with a specific, well-described result. T

Competencies:    Cyber Security - Information Security

Experience (Years):    10 & Above

Essential Skills:    1. Perform Threat Analysis & Create/Update the Threat

Modelling The Information Security Architect performs threat analyses

for complex technical designs and reports the results using standard

templates. The Information Security Architect creates the initial

Threat Modelling (with new applications/systems) or updates an existing

Threat Modelling (with upgraded applications/systems). The Information

Security Architect tracks critical and high findings and updates the

respective changes in the Threat Modelling.2. Derive Security

Requirements Given application or system descriptions, the Information

Security Architect derives security requirements that will match the

respective level of abstraction. 3. Review Design and Report Issues The

Information Security Architect reviews the design documents with respect

to o Fulfillment of security requirements o (Common) design errorso

Already known design shortcomings (are they fixed or not) The

Information Security Architect submits a written report that lists all

shortcomings and suggestions on how to fix them.4. Review Implementation

and Report Issues The Information Security Architect reviews the

implementation with respect to Fulfillment of security/design

requirements (Common) implementation errors, Already known

implementation shortcomings (e.g., from Code scan or Pen Testing, are

they fixed or not) The Information Security Architect submits a

written report that lists all shortcomings and suggestions on how to fix

them.5. Review Project Security Planning and Report Issue The

Information Security Architect reviews various project management

documents with respect to o plausibility of effort estimates for planned

security tasks,o plausibility of cost estimates for planned security

tasks,o overall plausibility of the timeline for security tasks,o the

overall progress of security, o completeness of planned security tasks o

security budget planning,o ordering status of mandatory security

services,o mandatory security-related tasks The Information Security

Architect submits a written report that lists. o all shortcomings,

together with suggestions on how to fix them,o all possible risks to

achieving project goals that relate to information security.6. Cyber

Security Incident Management Responsible for end-to-end cyber security

incident management process.7. Various Expert Consulting The

Information Security Architect will answer explicit questions on various

security-related subjects, e.g. on o Information Classification, o

Security aspects of project management, o Technical information

security, etc.o Cryptography,o Cloud Security,o TPRM Third-Party Risk

Managemento Vulnerability Review and Assessment,o Dev Sec-opso Security

Toolso Audit Support (External and Internal)8. Technical Security Tasks

Given the necessary input, the Information Security Architect will

perform complex tasks with a specific, well-described result. T

Desirable Skills:    1. Perform Threat Analysis & Create/Update the Threat

Modelling The Information Security Architect performs threat analyses

for complex technical designs and reports the results using standard

templates. The Information Security Architect creates the initial

Threat Modelling (with new applications/systems) or updates an existing

Threat Modelling (with upgraded applications/systems). The Information

Security Architect tracks critical and high findings and updates the

respective changes in the Threat Modelling.2. Derive Security

Requirements Given application or system descriptions, the Information

Security Architect derives security requirements that will match the

respective level of abstraction. 3. Review Design and Report Issues The

Information Security Architect reviews the design documents with respect

to o Fulfillment of security requirements o (Common) design errorso

Already known design shortcomings (are they fixed or not) The

Information Security Architect submits a written report that lists all

shortcomings and suggestions on how to fix them.4. Review Implementation

and Report Issues The Information Security Architect reviews the

implementation with respect to Fulfillment of security/design

requirements (Common) implementation errors, Already known

implementation shortcomings (e.g., from Code scan or Pen Testing, are

they fixed or not) The Information Security Architect submits a

written report that lists all shortcomings and suggestions on how to fix

them.5. Review Project Security Planning and Report Issue The

Information Security Architect reviews various project management

documents with respect to o plausibility of effort estimates for planned

security tasks,o plausibility of cost estimates for planned security

tasks,o overall plausibility of the timeline for security tasks,o the

overall progress of security, o completeness of planned security tasks o

security budget planning,o ordering status of mandatory security

services,o mandatory security-related tasks The Information Security

Architect submits a written report that lists. o all shortcomings,

together with suggestions on how to fix them,o all possible risks to

achieving project goals that relate to information security.6. Cyber

Security Incident Management Responsible for end-to-end cyber security

incident management process.7. Various Expert Consulting The

Information Security Architect will answer explicit questions on various

security-related subjects, e.g. on o Information Classification, o

Security aspects of project management, o Technical information

security, etc.o Cryptography,o Cloud Security,o TPRM Third-Party Risk

Managemento Vulnerability Review and Assessment,o Dev Sec-opso Security

Toolso Audit Support (External and Internal)8. Technical Security Tasks

Given the necessary input, the Information Security Architect will

perform complex tasks with a specific, well-described result. T

Country:    United States

Branch | City | Location:     Atlanta,GA

Thanks &  Regards

Mohd Faisal 

[email protected]

www.signinsol.com

To follow and receive more updates please
Click Here

.

--

Keywords: access management information technology green card Georgia Maryland
Cyber Security - Information Security - Atlanta,GA Day 1 Onsite (5days working)-USC & GC candidate
[email protected]
[email protected]
View all
Tue Jun 11 00:15:00 UTC 2024

To remove this job post send "job_kill 1467967" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 96

Location: Atlanta, Georgia