Security Specialist

  • Contract

Company Description

vTech can help you avoid the daunting task of writing and posting job offers, shifting through resumes and laboring through the lengthy interview process. Our Staffing solutions will allow you to elude those tasks and place topnotch, high-caliber professionals in the position you need to fill.

We use our expertise, knowledge, and global resources to deliver top-quality candidates and tailor our IT and Non-IT recruitment services to your needs. This allows us to deliver the required results in a timely manner that meets your schedule at a substantially reduced cost.

We pride ourselves for having one of the fastest growth rate and also the lowest turnover rates in the industry just 2.5 percent annually. We focus on the training and retaining qualified professionals with high personal and work ethics. With the help of our extensive database of internal candidates and CATS applicants tracking system, we can provide quality resources within the limited time frame.

We have also successfully placed hundreds of candidates in the areas related to Information Technology, Engineering, professional, Scientific & Clinical, etc. for both our commercial and government clients.

  1. Source: A recruiter sources candidates from various sources; the search starts from our proprietary database. Using advanced sourcing methods like social media, professional networking media, internal, and 3rd party job boards, we identify qualified candidates.
  2. Validate: A recruiter validates the candidates’ experience and skill sets against our client’s position.
  3. Initial Screening: Based on the position and the client’s work culture, the recruiter uses initial screening questions to determine the most suitable candidates.
  4. Submit: the recruiter will submit to the technical team qualified candidates who have passed the initial screening.
  5. Technical Screening: The technical team then prepares a matrix of the particular requirements and required experience for the position and using a list of questions and the results, re-validates the candidates’ technical skills.
  6. Background Check: Administrative personnel will provide a detailed background check, as required, per client agreement.
  7. On board: On successfully completing the above steps, the candidates are welcomed on board and assisted to ensure a smooth integration at the client’s location.

Job Description

Description:

  • Manage daily operations for Vulnerability Management Program
  • Creation and enhancement of Information Security Policies and Standards
  • Monitor, Track and Report on remediation related to audits and assessments
  • Security Awareness

In-depth knowledge of: enterprise security concepts, risks, and best practices; understand security product industry trends; security and compliance best practices; utilizing internal and industry security standards and best practices to determine security risks and strengths of information security

Ability to: plan and manage complex tasks independently and with other teams; communicate effectively with users/groups to determine and resolve security program related problems; communicate technical information to lay persons; interpret and follow established employment guidelines and policies; produce professional technical and non-technical documents

  • Manage daily operations for Vulnerability Management Program
  • Creation and enhancement of Information Security Policies and Standards
  • Analyze and process Security Policy and Standards Exceptions
  • Monitor, Track and Report on status of remediation related to audits and other assessments
  • Coordinate and participate in delivery of Security Awareness activities
  • Participate as needed for other areas within the Security Program
Skills Required:

Strong understanding and practical experience with industry standards and best practices such as ISO 27001, 27002, NIST and other frameworks

General network, systems administration, and practical security controls administration (IDS/IPS, Firewalls, SIEM, Proxies)

Certifications Desired: CISSP, CISA, CISM, CCNA (Degrees and other certs will be considered)

Strong technical and business writing ability

Ability to work independently, meet deliverables timely and with high quality as defined

Additional Information

All your information will be kept confidential according to EEO guidelines.