Job Title: IT Security Auditor
Location: Round Rock TX
Duration: long term
Job ID: 4CI 7211
Required Qualifications:
- Plan conduct and document IT and cybersecurity audits in accordance with approved audit methodologies and professional standards.
- Evaluate the design and operational effectiveness of information security controls across systems networks applications cloud environments and data platforms.
- Assess cybersecurity risks and controls in alignment with recognized security frameworks and industry standards.
- Perform compliance testing related to laws regulations contractual obligations and internal policies.
- Review and assess processes related to identity and access management vulnerability management incident response disaster recovery and business continuity.
- Identify security control deficiencies evaluate risk impact and develop clear audit findings and remediation recommendations.
- Prepare formal audit reports summarizing results conclusions and remediation requirements for
Job Title: IT Security Auditor Location: Round Rock TX Duration: long term Job ID: 4CI 7211 Required Qualifications: Plan conduct and document IT and cybersecurity audits in accordance with approved audit methodologies and professional standards. Evaluate the design and operational effectivenes...
Job Title: IT Security Auditor
Location: Round Rock TX
Duration: long term
Job ID: 4CI 7211
Required Qualifications:
- Plan conduct and document IT and cybersecurity audits in accordance with approved audit methodologies and professional standards.
- Evaluate the design and operational effectiveness of information security controls across systems networks applications cloud environments and data platforms.
- Assess cybersecurity risks and controls in alignment with recognized security frameworks and industry standards.
- Perform compliance testing related to laws regulations contractual obligations and internal policies.
- Review and assess processes related to identity and access management vulnerability management incident response disaster recovery and business continuity.
- Identify security control deficiencies evaluate risk impact and develop clear audit findings and remediation recommendations.
- Prepare formal audit reports summarizing results conclusions and remediation requirements for
View more
View less