IT Security Consultant (ISO27001, BS25999)

IT Security Consultant (ISO27001, BS25999)
We are currently looking for an experienced consultant to provide on and off-
site consultancy and support to clients in developing and implementing
information security management processes and procedures.
The successful candidate will be required to identify client requirements,
conduct management and technical assessment of compliance and risk, and
work with clients to develop and apply information security processes and
controls to meet the needs of the client, including achieving compliance
and/or certification Information Security standards such as ISO27001, PCI and
BS25999.
RESPONSIBILITIES
* Working as project lead with clients on Information Security projects
* Liaising with client management at all levels, presenting results and co-
ordinating client work and requirements
* Conducting compliance & risk assessments
* Conducting and documenting audits of client compliance to industry
standards
* Documenting project plans, action plans, presentations and project results
for clients
* Define & produce client policies, procedures, processes & other
documentation as required
* Support further business opportunities in future projects
REQUIREMENTS
* Excellent communication and presentation skills at all levels
* Excellent written and documentation skills
* A good understanding and background in IT technologies and practices

* Experience in ISO27001
* Business Continuity
* Ability to work with a degree of independence on client projects with clients
* Good knowledge of Information Security across a range of business as well
as technologies
* Proven experience in building and maintaining exceptional relationships
with Clients
* Good team interaction and interpersonal skills
* Willingness to travel

2 comments:

Anonymous said...

Very informative blog, thanks for sharing....ISO 27001 Consultancy bangalore

ISO 27001 Certification said...

The first step is acquiring ISO 27001 Certification is the groundwork assessment of the information security management system. This casual evaluation collects information about the class of the security of the system. However, the auditors can asses any information security policies, risk treatment policy, and other documents concerning information security and how it is operated.

Post a Comment