and computer systems operations and development and define IT strategy Meet with managers to discuss system requirements, specifications, costs and timelines Hire and manage information systems personnel and contractors to design, develop, implement, operate and administer computer and telecommunications
Identify & develop new potential clients for IT. Meeting clients & giving presentation about our services. Follow up on regular basis.Send them proposal of our company. Negotiate the terms & conditions then close the deal and coordinate with team. Industry Strategy / Management Consulting
non-compliant items can be remediated or how their risk could be mitigated and provide recommendations.• Support Technical Information Security Officers in their work for remediating any non-compliant items.• Embracing new technologies, actively seeking out opportunities for improving efficiency
leadership and active collaboration with line of business information risk managers to provide high quality security solutions and services that are focused on improving the Firm's risk posture. IT Risk and Controls: Oversight and governance of IT Risk across the firm including IT Risk posture, IT Risk
and understand packet level data Intrusion detection and prevention and Network Security Products (IDS/IPS, firewalls, etc.) Host Security Products (HIPS, AV, scanners, etc.) Knowledge of cutting edge threats and technologies effecting Web Application vulnerabilities and recent internet threats Exposure
Install and use software, such as firewalls and data encryption programs, to protect sensitive information. Research the latest information technology (IT) security trends.Help plan and carry out an organization's way of handling security
for inducting new members of the team by putting them through the required familiarization and training programmes. Drive process improvements for simplification and standardization of information. Accountable for initiating Root Cause Analysis at the time of resolving any escalation received. Responsible Prior experience in handling a large team. Understanding of business drivers, processes and ...
5 years total work experience (lead) • 3+ years work experience in RSA Archer configuration and administration. • RSA Archer Admin certified • Security certifications, such as GSEC or CISSP, are a plus Inside this Business Group Intel's Information Technology Group (IT) designs, deploys
in Engineering or the equivalent experience • 7+ years total work experience (lead) • 5+ years work experience in RSA Archer configuration and administration. • RSA Archer Admin certified • Security certifications, such as GSEC or CISSP, are a plus Inside this Business Group Intel's Information Technology Group
interface standards Understand technical constraints with the development team. Stay updated on emerging technology and usability research. Create the best possible, consistent user experience Understand web analytics and best practices and create system usability guidelines, design guidelines, Possess
set up, have the appropriate administration ownership, approvals and are in compliance with firm-wide policy. The candidate will support the development and ongoing assessment of information security across JP Morgan Chase. The role supports both technology and the business in providing end to end
to Senior Management and technology Subject Matter Experts Team Management and Leadership activities Influencing without formal authority Exposure to Global Management Working to deadlines Specialize in an Information Security related function and participate in the Global development and rollout of related
and metrics management Understand and implement requirements from other relevant Citigroup policies, legal and regulatory requirements that impact IS and Technology Risk Management Develop a strong understanding of the underlying technical requirements of the IS policy, identification of compliance gaps
Prepares at least quarterly IS reports for senior management summarizing the risk posture for the business. • Interprets and translates the information security requirements of the business IS program into technical requirements. • Monitors changes in the risk profile of the highly critical systems ...