Quantcast
Channel: Harvey Nash Ireland Job Listing
Viewing all articles
Browse latest Browse all 8334

Senior Consultant, Information Security

$
0
0
Overview
* Responsible for definition and implementation of security requirements and standards for the security aspects of major projects.
* Responsible for providing 3rd level technical support related to the whole security infrastructure.
* Conducting real time 24x7 monitoring of hacking attempts and other malicious or suspicious activity.
* Conduct internal investigations related to computer security, including computer forensics.
* Are you interested in working in a fast paced, challenging technical environment?

Role
* Apply knowledge of security principles, theories, and concepts, knowledge of business/function and development life cycle.
* Work closely with developers and evaluate business requests to determine feasibility; work with Software Engineers to define alternatives and recommend optimal solutions to meet security and regulatory requirements in the design of new/enhanced systems.
* Ensure established security policies and standards are observed by consulting with Business Owners on projects.
* Coordinate and document project/release level testing of new security software.

All About You
* Expert in Information Security practice
* Expert knowledge of security architecture of web based networks and environment
* Technical security experience in Cryptography
* Requires advanced knowledge of security protocols and standards, experience with software and security architectures.
* Technical experience with Java
* Experience in security design and technology assessment
* Security design and implementation of web based security architecture for secure on-line transactions
* Technical experience with security practices of Intranet and Extranet
* Working knowledge of application layer firewalls, NetScaler, and Checkpoint Firewall NG.
* Working knowledge of DES encryption, Digital Certificates, SSL, VPN, IPSec, development of DMZ's and other security tools and processes such as eTrust Access Control, ESM, and IDS/IPS.
* Working knowledge and technical security experience with UNIX, Linux, Solaris, and AIX

Viewing all articles
Browse latest Browse all 8334

Trending Articles