GRC - Proficient working knowledge within the following risk domains/technologies:
Information Security technologies, Database and application security, Network Architecture, Database /Application /Network Layer Secure Protocols, Physical and Environmental Security, mobile & cloud security concepts.
Familiarity with commonly used tools or methods to evaluate controls adequacy such as data flow diagrams, network diagrams, application or network pen tests, static/dynamic scans, etc. highly desirable, firewall rules reviews.
Must have IT Risk Management/Audit industry certification (such as CISSP, CISA,CRISC, etc.) highly desirable.
Experience with vendor risk assessments, IT Audit / Assessment experience
Hands on experience with SIG, PCI implementation, usage of Archer, Metrisctream preferable
Strong oral & written communication.
Governance, Risk, Compliance, Information Security, Database Security, Network Security, Cloud Security, Vendor Risk Assessment, Cissp, Cisa, Crisc, , Crisis Communications Training, Risk Management, It Audit
Information Security Technologies, Database And Application Security, Network Architecture, Database /application /network Layer Secure Protocols, Physical And Environmental Security, Mobile & Cloud Security Concepts.
Looking for Any Graduate / Post Graduate graduates profile.