Robert Half Technology in now hiring a Information Security Manager for a client in the Atlanta, GA area.
If interested, please apply and email your resume to .
The INFORMATION SECURITY MANAGER performs two core functions for the enterprise. The first is the day-to-day operations of the in-place security solutions (directly or indirectly) to ensure the secure operation of the in-house computer systems, servers, and network connections. This person will also analyze and resolve security breaches and vulnerability issues in a timely and accurate fashion, and conduct user activity audits where required.
The second is the involvement in the design implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines and procedures as well as assisting in vulnerability audits and assessments. The INFORMATION SECURITY MANAGER is expected to be fully aware of the enterprise rsquo;s security goals as established by its stated policies, procedures and guidelines and to actively work towards upholding those goals.
Formal Education amp; Certification
College diploma or university degree in the field of computer science and/or 5 years equivalent work experience.
One or more of the following certifications is preferred:
GIAC Information Security Fundamentals
Microsoft Certified Systems Administrator: Security
(ISC) 2 SCCP
(ISC) 2 CISSP
(ISC) 2 ISSAP
Knowledge amp; Experience
7- 10 years of relevant and progressive experience in an enterprise IT organization with 5-7 years rsquo; experience in Information Security
Deep understanding of information security risk controls and a thorough knowledge of IT processes and controls
Strong analytical and problem-solving skills; ability to quickly execute on strategic decisions to drive organizational results
Experience in designing and delivering employee security awareness training programs.
Experience with Information and Access Management platforms and best practices (Active Directory, OKTA, etc.)
Experience in developing Business Continuity Plans and Disaster Recovery Plans.
Hands-on knowledge of firewalls, intrusion detection systems, anti-virus software, data encryption, and other industry-standard techniques and practices
In-depth technical knowledge of network, PC, and platform operating systems.
Working technical knowledge of various mobile technologies and securing said technologies
Familiarity with Cloud computing.
Knowledge of applicable practices and laws relating to data privacy and protection.
Ability to conduct research into IT security issues and products as required.
Anti-Virus, CISSP, Disaster Recovery, Encryption, Manager, Management, PC, Research, Security, Systems Administrator
Robert Half Technology