Current Job Opportunities

Name = Cheryl D Talent Advisor
URL to Apply/Get Details = http://jobs.corporate.ford.com/ShowJob/Id/1219337/Cyber-Security-and-Controls-Engineer/
Company =
Ford Motor Company
Email = ccoffe10@ford.com
Job Description:
This is a Cyber Security position within the IT organization. The successful candidate will be working with a global team to deliver process improvement including the modification, design and implementation of GRC processes.

Responsibilities:
Establish, develop and advise on the Statement of Applicability (SoA) Control Review Process to internal 2nd line defense personnel and project teams.
Support the implementation and ongoing cadence of the Common Control Library Governance process
Create and publish supporting documentation for new/updated processes.
Create and deliver audience specific training and communications for new/updated processes to IT and Business partners.
Support alignment with / transition to future Governance, Risk and Compliance (GRC) tool.
Work effectively with cross-functional and cross regional stakeholders with varying levels of business/technical skills.
Consider future security industry trends to set Ford security and controls strategy .
Serve as a functional mentor for security and controls process to the enterprise 2nd line of defense.
Collect sufficient quantitative and qualitative data to accurately describe the current state, desired state, and root cause(s) of gaps, with guidance from others.
Analyze the future needs of customers and the outcomes they desire, and translate these into novel product, service or process opportunities, leading to sustaining innovation.
Address potential business/financial impacts, inter-related systems and risks associated with new ideas and approaches.
Identify risks and issues across the multiple projects that form complex programs and large projects and support their mitigation.
Engage stakeholders to gain consensus on shared vision of project outcomes.
Anticipate up and down stream impacts and predicts/addresses obstacles.
Identify and assist in the resolution of conflicting business goals and systemic issues to enable business value realization.
Propose corrective actions to address management and governance problems within the program or project.
Job Requirements:

Basic Qualifications:
Bachelor degree
5+ years of experience working with control review processes
5+ years of experience working with ISO 27001/2 standards, Information Security policies, risks and controls
3+ years of experience in project management methods and framework

Preferred Qualifications:
Bachelor degree in Information Assurance/Security field
Understanding of Compliance and Regulatory requirements e.g. (S-Ox, HIPAA, GLBA etc.)
Knowledge of Application Development lifecycles
Excellent verbal and written communication
Self-Starter who can work in ambiguous situations and drive to a solution
Strong organizational skills; able to advance multiple work streams concurrently
Process Improvement mindset
Prior experience working on Governance, Risk and Compliance (GRC) tool would be a plus
Project management methods and framework
Able to function as a delivery lead for key program elements associated with the position

_________________________________________________________

Posted By:  
Cheryl Coffey
Email:   ccoffe10@ford.com
URL to Apply/Get Details = 6154979643
Company:  
Ford Motor Company

Job Description:
The In-Vehicle cyber security section is directly engaged with the entire end-to-end solution for Vehicle Security. The candidate selected for this position will play a key role in the development and delivery of secure, global connected vehicle applications and features and provide cybersecurity consulting services to active product projects.

Responsibilities

Serve as single point of contact and cyber security consultant for security experiments research projects and programs
Provide technical cyber security expertise for Ford's connected vehicle products, services and applications
Develop and continuously improve security specifications and policies for mobility and connected vehicle products and features
Actively participate in applying cyber security best practices to product development projects and programs
Support major product programs with additional cyber security needs as required

Basic Qualifications

Bachelor's Degree
2+ years of experience in a cyber security position with technical cyber security expertise and knowledge
2+ years of experience in a mobile application or cloud infrastructure engineering position


Preferred Qualifications:
Working knowledge of public key infrastructure (PKI) in medium to large environments to include key management, digital certificates and digital signatures
Working knowledge of identity and access management (IAM) in medium to large environments to include multifactor authentication and identity federation
Experience with cloud computing and security including Azure, AWS, Cloud Foundry or equivalent.
Familiarity with automotive network architecture, modules, and protocols (CAN etc.)
Strong communication and analytical skills
Ability to work independently, take ownership of project deliverables, go above and beyond the task at hand
Familiarity with Secure Coding practices, processes and methods
Work well in a small team and willing to work on any aspect of a project
Ability to develop and maintain technical documentation as required
Penetration testing and tools experience
Certifications such as CISSP, CEH or SANS GMOB/GPEN


The distance between imagination and creation. It can be measured in years of innovation, or in moments of brilliance. When you join the Ford team, you discover all the benefits, rewards and development opportunities youâ?Td expect from a diverse global leader. Youâ?Tll become part of a team that is already leading the way, with ingenious solutions and attainable products â?" and it is always ready to go further.

Candidates for positions with Ford Motor Company must be legally authorized to work in the United States on a permanent basis. Verification of employment eligibility will be required at the time of hire. Visa sponsorship is not available for this position.

Ford Motor Company is an equal opportunity employer committed to a culturally diverse workforce. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status.

Accenture Federal Services


Email resume to: m.sigot@accenturefederal.com
Location: Washington, DC
Recruitment efforts for these positions are on-going.

Accenture Position #1:
Be part of our security practice with a focus on Implementing Identity and Access Management (I&AM) Solutions.  We are looking to hire someone who can lead and participate in activities related to I&AM solutions.  Activities will vary by client assignment, but may include design and architecture responsibilities for I&AM solutions as well as supporting changes and upgrading existing I&AM systems.
Specific responsibilities will vary but may include:
Design, implement, configure, troubleshoot and tune Oracle I&AM products like OIM, OID, OAM, OIF, OEG, FORGEROCK Suite, etc.
Administers the Oracle Identity Management Suite.
Identifies cross-team issues, and communicates them to the appropriate leads.
Validates that the Security solutions and Security architecture designs utilize the security components appropriately to meet Enterprise needs.
Provides functional or technical delivery of Identity and Access Management (IdAM) solutions to clients as an individual contributor or team collaborator based on guidance/direction from team leadership.

Basic Qualifications:
Bachelor's Degree in Computer Science, Information Technology, or other Analytical/technical field
7 years application integration experience
1 year of experience working with the Oracle Identity and Access Management Suite or FORGERROCK Suite
3 years total of IDM packages
1 year Active Directory (AD) and Lightweight Directory Access Protocol (LDAP)
Preferred Skills:
FICAM, PIV, PIV-I design and implementation experience.

An active security clearance or the ability to obtain one may be required for this role.

Candidates who are currently employed by a client of Accenture or an affiliated Accentrue business may not be eligible for consideration.

Applicants for employment in the U.S. must possess work authorization which does not require now or in the future sponsorship by the employer for a visa.

Accenture is a federal contractor, an EEO and Affirmative Action Employer of Females/Minorities/Veterans/Individuals with Disabilities.

Accenture Position #2
Design, implement, configure, troubleshoot and tuen Oracle I&AM products like OIM, OID, OAM, OIF, OEG, FORGEROCK Suite, etc.
Administers the Oracle Identify Managemetn Suite.
Identifies cross-team issues, and communicate them to the appropriate leads.
Validate sthe Security solutions and Security architecture designs utilize the security components appropriately to meet Enterprise needs.
Provide functional or technical delivery of Identify and Access Management (IdAM) solutions to clients as an individual contributor or team collaborator based on guidance/direction from team leadership.

Basic Qualifications:
Bachelor's Degreee in Computer Science, Information Technology, or other Analytical/technical field.
3 plus years of strong experienc ein design and architecture of IAM Solutions.
2 plus years of experience with deployment and management of J2EE Applications, n-tier web applications, databases.
2 plus years of experience with at least one fo the following IdAM products: Oracle OAM/IDM, OEM, IBM Tivoli Identity Manager or Access Manager, CA Site Minder/Identify Manager, PingFederate etc.
2 plus years of experience with one or more directories such as: IBM Security Directory Server, Oracle directory services, Novell eDirectory, CA directory.
Experience in one or more of the following areas:  Single Sign On, Identify Fedration, Resource Provisioning, Physical Access Control Systems (PACS), Logical Access Control systems and Enterprise Directory Architecture and Design including directory schema, namespace and replication topology experience.
Experience with SAML V2, reverse proxies, directory synchronization, role based authentication, identity reconciliation, levels of assurance, LDAP and Identify and Access Governance concepts.

An active security clearance or the ability to obtain one may be required for this role.

Candidates who are currently employed by a client of Accenture or an affiliated Accenture business may not be eligible for consideration.

Applicants for employment in the U.S. must possess work authorization which does not require now or inteh future sponsorship by the employer for a visa.

Accenture is a federal contractor, an EEO and Affirmative action Employer of Females/Minorities/Veterans/Individuals with Disabilities.


Rochester Institute of Technology

The Department of Computing Security at the Rochester Institute of Technology (www.rit.edu) invites applications for one Visiting Lecturer position beginning August 16, 2017. The successful candidate will be able to teach a range of courses covering basic and advanced topics in computer science and computing security. This may include: introduction to computer science (including programming in Java and Python); fundamentals of computing security, cryptography, systems and network security, etc.

This is a one-year Visiting Lecturer appointment with the possibility of extension.

Required Minimum Qualifications

  • *Completion of M.S. in a computing related field
  • *Academic specialization or industrial experience in computing or security management
  • *Ability to teach courses across computing security and introductory computer science curriculum
  • *Ability to contribute to curriculum and course development in computing security
  • *Strong commitment to undergraduate computing security education
  • *Strong written and oral communication skills
  • *Ability to contribute in meaningful ways to the collegeā?Ts continuing commitment to cultural diversity, pluralism, and individual differences

Review of applications will begin April 30, 2017, and will continue until filled.
Click here for more Information


Kforce Staffing Job Search


Hire Strategy Job Search


Kelly Services Job Search


True Staffing Job Search


Idealist Job Search


Robert Half Job Search


The Lasalle Network Job Search

X
X
X
X
X
X
X
X
X
X
X
X
X
X
X

Post Job Opportunities

Job Opportunities

Use the form below to post an employment opportunity. Upon admin review, the employment opportunity will be posted.