Our Risk Management Consultant provides cyber and information security expertise in the analysis, assessment, development, and evaluation of security control solutions to secure applications, cloud vendors, third-party providers and other relevant IT and business initiatives and processes.
Our Risk Management Consultant provides cyber and information security expertise in the analysis, assessment, development, and evaluation of security control solutions to secure applications, cloud vendors, third-party providers and other relevant IT and business initiatives and processes. As the lead or a partner on your Risk Assessment team we aim to mitigate cyber security risks.
We further establish technical infrastructure landscape, including development, test, production, recovery and add-on systems, in order to support development, testing, training and implementation of the application.
Implement production support procedures (e.g., administration, monitoring, problem resolution) in order to meet customer service levels.
Perform system and integration testing including the functionality, performance and fit to ensure that it meets the original requirements and works within the defined constraints.
Design data security or access control in order to develop appropriate access authorization.
Design, maintain, publish standards, policies or procedures for educational materials, tools or training exercises (e.g., delivery methods, content management, training exercise data, registration, sizing, printing) in order to provide consistency and customer awareness.
Function Specific Activities:
- Complete initial information risk assessments, security requirements analysis, design reviews, security testing oversight, and risk remediation planning and coordination for internally and externally hosted applications systems for our business functions.
- Coordinate internal and external communications, issue resolution, vendor relationships, testing plans, training plans, and successful transition to additional security teams.
- Assist with analysis and evaluation of cyber and information security solutions, including new technologies and new security architectures, security controls and procedures, and contracting documentation.
- Assist with analyzing changes in best practices as well as regulations including the Payment Card Standard (PCI), Privacy Legislation, SOX, SEC guidance etc. and provide the you with an appropriate plan of action.
We have worked with world class clients