Our Risk Management Consultant provides cyber and information security expertise in the analysis, assessment, development, and evaluation of security control solutions to secure applications, cloud vendors, third-party providers and other relevant IT and business initiatives and processes.
Our Risk Management Consultant provides cyber and information security expertise in the analysis, assessment, development, and evaluation of security control solutions to secure applications, cloud vendors, third-party providers and other relevant IT and business initiatives and processes. As the lead or a partner on your Risk Assessment team we aim to mitigate cyber security risks.
Implement production support procedures (e.g., administration, monitoring, problem resolution) in order to meet customer service levels.
Perform myriad of Cyber Security Services to include, Cyber Security Program Assessment, Penetration Testing, Network Analytics, Forensic Investing/Audits, Threat Monitoring, Remediation, and Policy Development.
Design data security or access control in order to develop appropriate access authorization.
Perform system and integration testing including the functionality, performance and fit to ensure that it meets the original requirements and works within the defined constraints.
Design, maintain, publish standards, policies or procedures for educational materials, tools or training exercises (e.g., delivery methods, content management, training exercise data, registration, sizing, printing) in order to provide consistency and customer awareness.
Function Specific Activities:
- Complete initial information risk assessments, security requirements analysis, design reviews, security testing oversight, and risk remediation planning and coordination for internally and externally hosted applications systems for our business functions.
- Coordinate internal and external communications, issue resolution, vendor relationships, testing plans, training plans, and successful transition to additional security teams.
- Assist with analysis and evaluation of cyber and information security solutions, including new technologies and new security architectures, security controls and procedures, and contracting documentation.
- Assist with analyzing changes in best practices as well as regulations including the Payment Card Standard (PCI), Privacy Legislation, SOX, SEC guidance etc. and provide the you with an appropriate plan of action.
We have worked with world class clients