Senior Vulnerability Management and Compliance Leadother related Employment listings at Geebo

Senior Vulnerability Management and Compliance Lead

Company Name:
ABA Search & Staffing, Inc.
Our client, a leading healthcare provider, is searching for a Senior Vulnerability Management and Compliance Lead to develop and oversee related programs with other business units. As the right hand to the CISO, the ideal candidate should thrive in leadership situations and feel confident in a complex distributed IT environment within a large enterprise. If you are a self-starter looking for an opportunity with high growth potential, this is the job for you!
Responsibilities
Design, implement and maintain compliance and vulnerability related programs.
Audit security operations of outside vendors for compliance with set standards.
Penetration testing: Organize yearly black and grey hat pen tests and supervise corrections of spotted vulnerabilities; conduct internal tests and integrate findings into SDLC process.
Create monthly reports on vulnerability findings and results.
Oversee Dell security operations, develop vulnerability reports, and manage all aspects of pen testing and application security programs.
Qualifications
5
years of experience in Information Security, ideally in vulnerability management
BA/BS in Computer Science or related field; MA/MS a bonus
CISSP, GIAC Certified Penetration Tester or GIAC Certified Ethical Hacker certifications nice to have
Strong knowledge in network defense technologies (TCP/IP, DHCP, DNS, monitoring tools, etc.), information security standards (ISO 17799/27002, etc.) and rules and regulations around data confidentiality (HIPPA, PCI, DSS, etc.).Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.