Skip navigation
Unable to save this job. Please try again later.

{msg}

Email this Job to Yourself or a Friend

To begin the application process, please enter your email address.

Company Contact Info

  • Atlanta, GA
  • Tonja Sommers - Cybersecurity Staffing @ Redsky Consulting
  • Phone: 714-636-3087

Already have an account?

Sign in to apply with your saved resumes.

New to CareerBuilder?

Don't have an account? Continue as a guest!

Sorry, we cannot save or unsave this job right now.

Report this Job

Trust and Site Security Team.

Email Send Failed!

DLP Director / Cybersecurity

RED SKY Consulting • Atlanta, GA

Posted 7 days ago

Job Snapshot

Full-Time
Experience - At least 8 year(s)
Degree - 4 Year Degree
Healthcare - Health Services, Security
Executive, Information Technology
Relocation - Yes
11

Applicants

How Do You Compare to the Competition?

Get facts about other applicants with a CareerBuilder Account

Job Description

DLP Director - Executive Advisor – Data loss prevention – Cybersecurity

Contract For Hire position 1 Yr – Work from anywhere but then convert to FTE and move to Atlanta or Indianapolis

Bottom line – “In a nutshell"

  • Director level position - IT technical leader, leadership experience, less emphasis on people leadership and more on directing the technical work.  
  • Well versed in DLP technologies, how it fits into a large scale enterprise environment (Client has 70K end points).  
  • Needs help to drive and guide DLP in the organization from a holistic approach possessing a deep understanding of how DLP fits into an organization.  
  • Have the ability to handle the complete function and have accountability for the DLP program  

DLP Director - Executive Advisor – Data loss prevention – Cybersecurity

  • This position ensures and communicates that infrastructure and programs for Data Loss Prevention and File Integrity align with organizational goals and fulfill privacy and compliance requirements within a complex environment.
  • The role is responsible for top tier operational and technology consultation, program and technology strategies, vendor management, program governance focusing specifically on the evaluation of policies and processes monitoring sensitive data movement.
  • Providing metrics planning and analysis
  • Assisting in process management
  • Assisting with project management
  • Assisting with quality assurance
  • Assisting with requirements management
  • Providing high level support and maintenance
  • Reviewing and consulting on secure system design
  • Ensuring and reviewing appropriate testing practices
  • Driving problem management
  • Contributing to vendor performance management
  • Establishing and reenforcing healthy group dynamics, relationships and culture
  • Researching relevant trends and activities in healthcare, business, competition, and regulatory environments; recommending strategy adjustments
  • Deployment, configuration, and administration of the security infrastructure and application
  • Evaluating of Data Loss Prevention use cases across Data-in-Motion, Data-in-Use, and Data-at-Rest
  • Reviewing and consulting on engineering design functions and trouble resolution
  • Consulting on implementations and integration across multiple security technologies
  • Providing system and network architecture support for information and network security technologies
  • Providing technical support to business and technology associates in risk assessments and implementation of appropriate information security procedures, standards and technologies
  • Representing major upgrades and business system replacements to leadership
  • Driving changes and updates to strategy
  • Acting as a key contact for setting vendor strategy
  • Serving as a relationship and communication conduit between the Data Loss Prevention and File Integrity group and leadership, technical staff, security, IT, other enterprise organizations, vendors and industry peers.
  • Serving as a technical merger and aquisition lead
  • Providing clear and concise communications
  • Driving results
  • DLP Director - Executive Advisor – Data loss prevention – Cybersecurity

WE ARE ALSO HIRING FOR THIS SAME COMPANY A DLP "MANAGER" AND "ANALYST"

CONTACT: TONJA SOMMERS - 714-636-3087 [Click Here to Email Your Resumé]


Job Requirements

<><><><><><><><><><> 

RED SKY Career Opportunities at: http://redsky-consulting.com/career-portal/#/jobs 

<><><><><><><><><><> 

RED SKY Consulting Candidate and Client Referral Program!

2500

Do you know other IT professionals?

Turn those relationships into Moneiy (misspelled intentionally) & help friends get work

RED SKY Consulting is offering a fantastic opportunity for you to earn extra moneiy.  

If you refer to us a Manager of people or skilled professionals, we will link your name to that person for 18 months.

If we employ or place that individual or place people into that company thru that manager

then we will pay 2500!

<><><><><><><><><><> 

RED SKY Consulting Company Overview:

We are an IT and Cybersecurity staffing solutions, consulting, project management and management consulting company with thousands of resources across multiple IT and Cybersecurity skill sets. Our primary US locations are Chicago, Denver, Los Angeles, Cleveland, Atlanta, Minneapolis, New Jersey and we have organizational arms in other domestic cities along with offshore alliances in India and Ireland. RED SKY has a 10+ year history of providing great technology and Cybersecuirity talent. RED SKY has many clients including; 4 “Fortune 20" companies and over 40 “Fortune 500" companies within the manufacturing, financial services, health care, government, consumer services, insurance and several other industry verticals represented.

The RED SKY Foundation is being formed and will be providing fully funded college educations to underprivileged young adults in partnership with our clients starting 2018.

<><><><><><><><><><> 

DLP Director - Executive Advisor – Data loss prevention – Cybersecurity

Keys: Data loss prevention, Cissp, Cissp, Director, DLP, Data loss prevention, IT Security Operations Center Manager, Security Analysts, DLP, Data loss prevention, Security Operations Center, Security Operations Center (SOC) analysts, SOC, security best practices, security event trends, incident response resolution,  information security issues, DLP, Data loss prevention, SOC Wiki, incident response plans, PCI, SOX, HIPAA, security event, incident management, risk management, log management, security monitoring and security incident/event management, Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned, security best practices, CISSP, GIAC GCIA, GCIH, CEH, Offensive Security, Ciso, Chief information security officer, CISO, CASB, Senior Associate, Data Protection Analyst, Data Protection Analyst Senior Associate, Data Protection and Privacy Manager, Data Protection and Privacy Manager, Information Security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, CASB, CASB, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Data Protection and Privacy Manager, Data Protection and Privacy Manager, Director,IT Security Operations Center Manager, Security Analysts, Security Operations Center, Security Operations Center (SOC) analysts, SOC, security best practices, security event trends, incident response resolution,  information security issues, SOC Wiki, incident response plans, PCI, SOX, HIPAA, security event, incident management, risk management, log management, security monitoring and security incident/event management, Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned, security best practices, CISSP, GIAC GCIA, GCIH, CEH, Offensive Security, Ciso, Chief information security officer, CISO, Information Security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Data Protection and Privacy Manager, Data Protection and Privacy Manager, Information Security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Data Protection and Privacy Manager, Director,IT Security Operations Center Manager, Security Analysts, Security Operations Center, Security Operations Center (SOC) analysts, SOC, security best practices, security event trends, incident response resolution,  information security issues, SOC Wiki, incident response plans, PCI, SOX, HIPAA, security event, incident management, risk management, log management, security monitoring and security incident/event management, Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned, security best practices, CISSP, GIAC GCIA, GCIH, CEH, Offensive Security, Ciso, Chief information security officer, CISO, Data Protection and Privacy Manager, Information Security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Data Protection and Privacy Manager, Data Protection and Privacy Manager, Information Security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Data Protection and Privacy Manager, Data Protection and Privacy Manager, Information Security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, CASB, CASB, Cyber security, Cybersecurity, Data Protection and Privacy Manager, Data Protection and Privacy Manager, Information Security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, Cyber security, Cybersecurity, ecurity engineer, security engineer, Splunk, Tanium, Maltego, Cyber Threat Analyst, Python, Splunk, Tanium, Maltego,  Cyber Threat Analyst, Python, Splunk, Tanium, Maltego,  Cyber Threat Analyst, Python, Splunk, Tanium, Maltego,  Cyber Threat Analyst, Python, Splunk, Tanium, Maltego,  Cyber Threat Analyst, Python, Splunk, Tanium, Maltego,  Cyber Threat Analyst, Python, || Splunk, Tanium, Maltego,  Cyber Threat Analyst, Python, Cybersecurity, cyber security, analyst, cybersecurity analyst, database systems, web servers, application servers, firewalls, routers, load balancers, switches, middleware, C, C++, C#, Java, MS PowerPoint, Excel, Word, risk, medical devices, Cryptography, Encryption protocols,  implementations, Windows, AIX, Linux, infrastructure,  NIST Cybersecurity Framework, COBIT, ISO 80001, Cybersecurity, cyber security, analyst, cybersecurity analyst, database systems, web servers, application servers, firewalls, routers, load balancers, switches, middleware, C, C++, C#, Java, MS PowerPoint, Excel, Word, risk, medical devices, Cryptography, Encryption protocols,  implementations, Windows, AIX, Linux, infrastructure,  NIST Cybersecurity Framework, COBIT, ISO 80001, Cybersecurity, cyber security, analyst, cybersecurity analyst, database systems, web servers, application servers, firewalls, routers, load balancers, switches, middleware, C, C++, C#, Java, MS PowerPoint, Excel, Word, risk, medical devices, Cryptography, Encryption protocols, Senior Associate, Data Protection Analyst, Data Protection Analyst Senior Associate, implementations, Windows, AIX, Linux, infrastructure,  NIST Cybersecurity Framework, COBIT, ISO 80001, Cybersecurity, cyber security, analyst, cybersecurity analyst, database systems, web servers, application servers, firewalls, routers, load balancers, switches, middleware, C, C++, C#, Java, MS PowerPoint, Excel, Word, risk, medical devices, Cryptography, Encryption protocols,  implementations, Windows, AIX, Linux, infrastructure,  NIST Cybersecurity Framework, COBIT, ISO 8000 || Cybersecurity, cyber security, analyst, cybersecurity analyst, database systems, web servers, application servers, firewalls, routers, load balancers, switches, middleware, C, C++, C#, Java, MS PowerPoint, Excel, Word, risk, medical devices, Cryptography, Encryption protocols,  implementations, Windows, AIX, Linux, infrastructure,  NIST Cybersecurity Framework, COBIT, ISO 80001, Cybersecurity, cyber security, analyst, cybersecurity analyst, database systems, web servers, application servers, firewalls, routers, load balancers, switches, middleware, C, C++, C#, Java, MS PowerPoint, Excel, Word, risk, medical devices, Cryptography, Encryption protocols,  implementations, Windows, AIX, Linux, infrastructure,  NIST Cybersecurity Framework, COBIT, ISO 80001, Cybersecurity, cyber security, analyst, cybersecurity analyst, database systems, web servers, application servers, firewalls, routers, load balancers, switches, middleware,Senior Associate, Data Protection Analyst, Data Protection Analyst Senior Associate



Help us improve CareerBuilder by providing feedback about this job: Report this Job.
CAREERBUILDER TIP
For your privacy and protection, when applying to a job online, never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction. Learn more.
By applying to a job using CareerBuilder you are agreeing to comply with and be subject to the CareerBuilder Terms and Conditions for use of our website. To use our website, you must agree with the Terms and Conditions and both meet and comply with their provisions.