search
Home > Delaware jobs > Delaware computer/technical

Posted: Thursday, February 1, 2018 7:04 AM

Job DescriptionThe Information Security Specialist within Technology Risk Management & Information Security (TRM&IS) is responsible for ensuring technology controls are sufficiently protecting business risk, through the application of the Technology Risk & Control framework, and overseeing security standards, policies and procedures. This role will take the traditional vulnerability assessment and build upon it, acting as "red team" members to evaluate the security of TD's external networks, applications, sensitive internal systems, mobile device application and data coding standards. Our red team testers will need to go beyond the typical enumerating vulnerabilities through scanning, and need to look at actually exploiting issues noted in the scanning, or discovering issues not picked up in security scanning. The Information Security Specialist will, * Provide consultation and advice to partners on a broad range Technology Controls / Information Security programs / policies / standards and incidents for own specialized area; * Act as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors; * Provide support in the discipline of the Cybersecurity Assurance Program *Participate in the development of new cyber security assessment practice services *Simulates malicious tactics of a motivated adversary with the intent of achieving a specific goal or access *Conduct penetration testing for the red team which includes: *Network, System, Application, Mobile, traditional web and wireless penetration testing *Experience in exploiting web apps and web services security vulnerabilities including cross-site scripting, cross site request forgery, SQL injection, DoS attacks, XML/SOAP, and API attacks. *Writing exploit code for local testing *Hardware Hacking *Social Engineering * Contribute to the definition, development, and oversight of a global security management strategy and framework; * Ensure technology, processes, and governance are in place to monitor, detect, prevent, and react to both current and emerging technology / security threats against TDBG's business; * Develop on-going Technology Risk reporting, monitoring key trends and defining metrics to regularly measure control effectiveness for own area; * Work proactively with technology partners / stakeholders and service/platform owners to ensure all technology security components are integrated into the bank's overall Enterprise Architecture, and any control gaps are addressed; * Consult on Regulatory compliance requirements, reporting and questions; * Provide support and consulting in preparation for Audits and in composing management responses and appropriate remediation activities; * Participate in computer security incident responses relevant to business (or enterprise wide) and represent respective function and Enterprise position to the business, and business needs to incident response team. * Influence behavior to reduce risk and foster a strong technology risk management culture throughout the enterprise; * Define / develop / implement / manage standards, policies, procedures, and solutions that mitigate risk and maximize security, availability of service, efficiency and effectiveness;Job RequirementsWhat can you bring to TD? Share your credentials, but your relevant experience and knowledge can be just as likely to get our attention. Here are the minimum requirements for this position: University Degree. Information Security Certification / Accreditation (such as CISSP, CISM, or CISA) would be an asset. 7+ years of relevant experience. Expert knowledge of IT security and risk disciplines and practices. Advanced knowledge of of organization, technology controls, security and risk issues. Demonstrated ability to participate in complex, comprehensive or large projects and initiatives. Ability to serve as a lead expert resource in technology controls and information security for project teams, the business, organization and outside vendors. QualificationsPreferred Qualifications - Here are the preferred qualifications for this role: OSCP or OSCE very strongly preferred Experience with penetration testing highly desiredWireless, Network and TCP/IP skills along with Unix command, bash scripting, and / or python coding preferredA knowledge of adversarial activities in cyberspace with an understanding of intrusion set tactics, techniques, and procedures (TTP) with the ability to emulate these TTP to assess vulnerability and risk desiredFamiliarity with Advanced Persistent Threat (APT) activity; Offensive attack hacker mindset preferred

Source: http://www.juju.com/jad/00000000i55xgc?partnerid=af0e5911314cbc501beebaca7889739d&exported=True&hosted_timestamp=0042a345f27ac5dca2bac6ca323fed3c886bc38df6623f976381471972f0171e



• Post ID: 8618047 delaware
delaware.backpage.com is an interactive computer service that enables access by multiple users and should not be treated as the publisher or speaker of any information provided by another information content provider. © 2018 backpage.com