Sorry, this job is no longer accepting applications. See below for more jobs that match what you’re looking for!

Facilites Specialist

Expired Job

Kate Spade New York , NY 10007

Posted 4 months ago

Overview

Crisp color, graphic prints and playful sophistication are the hallmarks of kate spade new york. From handbags to clothing and dcor, our exuberant approach to the everyday encourages personal style with a dash of incandescent charm. We call it living colorfully.

As a member of the Tapestry family, we are part of a global house of brands that has unwavering optimism and is committed to being innovative and wholly inclusive.

Responsibilities

  • Execute all basic repair & maintenance , lighting issues, painting, wall paper, handyman activities, seasonal market prep, & punch list

  • Support office moves and space changes as directed by Dir of facilities and HR

  • Assist with organization & maintenance of all storage and closet spaces

  • Participate in the prep, execution and clean up of quarterly sample sales

  • Support and partner on all NY office event- prep & clean up, market, QBR, holiday or PR events, fashion shows

  • Provide back up support to Dir of facilities on common area maintenance

  • Provide back up support on all mailroom systems/shipping systems

  • Manage to a punch list as directed by Dir of Facility

Qualifications

  • 2+ years related experience

  • High School Diploma or higher

  • Or an equivalent combination of education and experience

kate spade new york is an equal opportunity and affirmative action employer and we pride ourselves on hiring and developing the best people. All employment decisions (including recruitment, hiring, promotion, compensation, transfer, training, discipline and termination) are based on the applicant's or employee's qualifications as they relate to the requirements of the position under consideration. These decisions are made without regard to age, sex, sexual orientation, gender identity, genetic characteristics, race, color, creed, religion, ethnicity, national origin, alienage, citizenship, disability, marital status, military status, pregnancy, or any other legally-recognized protected basis prohibited by applicable law. Visit kate spade new york at www.katespade.com.

#LI-KC1


See if you are a match!

See how well your resume matches up to this job - upload your resume now.

Find your dream job anywhere
with the LiveCareer app.
Download the
LiveCareer app and find
your dream job anywhere
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Sr Information Security Specialist (Applications AND Infrastructure)
New!

Intermedia Group, Inc.

Posted Today

VIEW JOBS 12/19/2018 12:00:00 AM 2019-03-19T00:00 <span style="font-size:14px;"><span style="font-family:times new roman,times,serif;"> <br /> <strong>TITLE</strong>: Sr. Information Security Specialist<br /> <strong>LOCATION</strong>: Midtown Manhattan<br /> <strong>CLIENT</strong>: Fortune 100 Media Company<br /> <strong>TYPE</strong>: FTE - Full Time Salaried Employment (SALARY plus bonus with SUPERB Benefits)</span></span><br /> <br /> <br /> <span style="font-size:14px;"><span style="font-family:times new roman,times,serif;"><strong>ROLE DESCRIPTION</strong></span></span> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Our client is looking for a well-rounded Information Security Professional with experience in security operations, application development security, infrastructure security, security risk assessments, audits, compliance, governance, and high-level risk management.</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">The candidate will use identify vulnerabilities (using tools like Qualys, Nessus, etc) and interface with the Development Team to implement changes in the development process / coding to address application level security issues.</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Its a small team in a large multi billion dollar organization, and would require a candidate be a mix of both HANDS ON as well as Strategic / Policy / Project Management focused.</span></span></li> </ul> <span style="font-size:14px;"> <span style="font-family:times new roman,times,serif;">This is a great opportunity for growth as they deploy new tools. The client's corporate culture is NOT one of a silo of infosec teams. You'll be involved in a variety of projects, so breadth of experience is a great attribute for a successful candidate.<br />  <br /> <strong>DUTIES & RESPONSIBILITIES</strong><br /> The position will be a mix of strategic / project management and hands-on technical duties. </span></span> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Familiar with translating a policy document and improving it (baseline on mobile device management and then adding some specific things to sharpen it where appropriate)</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Comfortable working both as an individual contributor as well as able to build partnerships and trust throughout the organization leveraging your industry infosec skills and knowledge</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">You'll be involved in security architecture design, administration, and support for ongoing IT and Web initiatives</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Conduct security risk assessment and remediation for business processes, enterprise infrastructure and applications</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Develop and facilitate deployment of information security governance documents: policies, frameworks, programs, procedures, and audits</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Define, develop, and implement security models for Intellectual Rights Management, data confidentiality classification</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Proactively monitor security threats and vulnerabilities; event management and logging, identify and prevent potential intrusions using SIEM, DLP, IPS/IDS, other tools; advanced malware/Threat analysis and protection</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Plan and execute security related projects, deploying new security solutions and best practices, providing guidance to company’s engineering and QA teams</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Establish, monitor, evaluate and report key security performance and risk assessment indicators to provide management with accurate evaluation of the enterprise security state and the information security program effectiveness</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Compliance assessment and reviews; alignment of security controls for business processes and applications with applicable regulatory governing documents like SOX, PCI, COPA, Safe Harbor, ISO 27001, OWASP </span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Develop and maintain User Security Awareness program; organize and provide security training to employees, contractors, interns</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Monitor and study relevant media and specialized vendor resources, provide assessment and recommendations to address emerging threats, vulnerabilities</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Site Security Assessment of corporate premises, third parties, cloud services</span></span></li> </ul> <span style="font-size:14px;"> <span style="font-family:times new roman,times,serif;"> <br /> <strong>TECHNICAL SKILLS REQUIRED</strong></span></span> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Experience with TCP/IP, vulnerability management, pen testing, etc.</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Knowledge of network security, TCP/IP, DNS, DMZ, Firewalls, Application Firewalls (Web, XML, Database), best practice design and deployment; hardening hardware/software, secure VPN and FTP, Forward and reverse proxies</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Experience with Integration with Business, Information, Technology architectures</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Familiarity with security aspects for N-tiered application architecture and web-based applications</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Knowledge of authentication, authorization, data confidentiality, non-repudiation, integrity, audit logging</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Experience in organizing and leading projects with managed security service providers</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Assess and manage Third Party Security  </span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Incident response and digital forensics experience</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Windows and Linux security models, basic administration and audit</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Linux and Windows scripting, command line utilities (Shell, Visual Basic, Perl, Python, awk)</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Knowledge of security policies and best practices; developing governance documents, certificate management</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Experience with Identity access management (IAM) and role based user access control, end point security </span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Knowledge of password management and SSO implementation</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Virtualized, cloud, mobile environments, MDM</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Browser security concepts (e.g. Tokens), risks (e.g. XSS); configuring SSL/TLS, PKI servers</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Hardening J2EE, Tomcat, Web servers (IIS, Apache)</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Application Security specifics development and custom codes - PHP, ASP, Java, C# platforms</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Databases (Oracle, MS SQL) – audits, data encryption at rest and in transit</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Vulnerability assessments and IT auditing</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">LDAP (Oracle Sun One preferred), Active Directory, including administration and design of custom LDAP schemas</span></span></li> </ul> <span style="font-size:14px;"> <span style="font-family:times new roman,times,serif;"> <br /> <strong>QUALIFICATIONS</strong></span></span> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Knowledge of McAfee ePO, Nessus and Symantec tools preferred (equivalent experience with other tools may be considered)</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Must be able to interface with the Development Team to implement changes in the development process / coding to address application level security issues.</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">The manager is seeking a candidate who is able to work both hands on and at a high (strategic) level</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Strong executive presence skills required</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">Must have strong prioritization skills, able to work on multiple complex projects at the same time (3-4) </span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:times new roman,times,serif;">One of Major InfoSec Certifications (CISSP, CISM, SANS) would be preferred but not required.</span></span></li> </ul> <span style="font-size:14px;"> <span style="font-family:times new roman,times,serif;"> <br /> <strong>INTERESTED APPLICANTS</strong><br /> If you are interested in pursuing this opportunity, please respond back and include the following:<br />  <br /> • Full MS WORD Resume<br /> • Current and required compensation<br /> • Current contact information<br /> • Availability<br />  <br /> Upon receipt, one of our managers will contact you to discuss the position in full detail.<br />  <br />  <br /> <strong>Jason Denmark</strong><br /> <strong>INTERMEDIA GROUP, INC.</strong><br /> <strong>131 Varick Street</strong><br /> <strong>New York, NY 10013</strong><br /> <strong>Voice: 212-248-0100</strong><br /> <strong>Email:</strong> <a href="mailto:jdenmark@intermediagroup.com">jdenmark@intermediagroup.com</a></span></span> Intermedia Group, Inc. New York City NY

Facilites Specialist

Expired Job

Kate Spade