Job Detail
Oversee the management of iSeries security operations ensuring that committed service levels are met efficiently and effectively. You must have excellent communication skills, both verbal and written, be detail oriented, and have strong analytical / problem solving skills able to work in a team environment and independently.
Responsibilities:• Provide ongoing analysis of current and future hardware/software requirements to ensure compliance with all security related regulations and standards such as Visa / MasterCard PCI requirements.
• Design, implement, and update technical security controls requirements models and methodologies supporting enterprise information security policy and standards.
• Oversee the management of network security operations; ensure committed service levels are met efficiently and effectively.
• Implement network security controls; and provide architecture and infrastructure guidance.
• Conduct security gap analysis and provide recommendations to resolve gaps in security. Serve as a subject matter expert in IBM iSeries O/S security with knowledge of architecture, design, and implementation of security controls.
• Ensure operational procedures are organized to standards, followed rigorously, operational issues are resolved quickly.
• Collaborate with information services functional groups to coordinate applications needs as it pertains to security. Interface and develop strong working relationships with vendors and suppliers.
• Stay current on security industry best practices.
• Mentor other IT personnel in System I Security Best Practices.
Basic Qualifications• Bachelor’s degree.
• 5-7 years experience working with IBM iSeries Security provisioning to include:
o Experience with Visa / MasterCard PCI standards and audits.
o Serving as a security subject matter expert in iSeries security best practices.
o Experience executing process to evaluate the security architecture and design of existing and proposed information technology systems against the enterprise technical security control requirements model.
o Background in conducting security gap analysis, iSeries risk assessments, and vulnerability testing in large enterprise environments.
o In depth, hands-on security experience in as many as possible: Network ACLs, Juniper Firewalls, VPN, SSL, networking protocols (TCP, IP, UDP, SNMP, Radius, etc), proxies, network appliances, Network IDS, Network IPS, Wireless network security.
o In depth understanding of technical security controls in relation to network security: Authentication, Authorization, Access Control, Audit, and Cryptography.
Debra Mayek952-841-9510 ext. 2debra@involveit.comContact UsSubmit Resume