Founded in 1982, Contract Professionals is the premier technical staffing company supporting a wide range of technical and non-technical disciplines for major and emerging industries. We provide courteous, high-quality service on a timely basis, for a fair price, while maintaining the highest personal and professional ethics and standards. Our teams are well qualified, responsive, respectful, and proud to represent Contract Professionals in your workforce. With us, you’ll get honesty and integrity, along with a disciplined approach that ensures quality outcomes.
We are an ISO 9001 certified company. In 1997, Contract Professionals implemented a documented Quality System to the International Standard ISO 9002 and upgraded to ISO 9001 in 2008. We focus on people, teamwork, technology, and your business needs to achieve operational excellence. We operate integrated state-of-the-art technology systems, which makes Contract Professionals one of the most efficient and progressive firms in the industry, enhancing our ability to serve both clients and contract employees.
Learn More about Contract Professionals
Visit Our Website
Security Architect (CISSP required)
Enterprise Security Solutions & Engineering: Responsible for ensuring security is incorporated in and represented on the strategy, design, implementation, operations and strategic initiatives corporate wide. Lead security and GRC analysis and posture for strategic solutions/devices such as Mobile, WiFi, remote management, data integrity for the Company.
Network Security: Determines network security requirements by evaluating business strategies and requirements; researching information security standards; conducting network security and vulnerability analyses and risk assessments; identifying integration issues; preparing cost estimates. Plans security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards.
Systems/Servers: Architect, design, communicate, and deliver innovative end-to-end Information Security and Compliance Solutions. Engage with leading customers and strategic partners to identify and define solution requirements. Leverage extensive knowledge of industry practices, software solutions, and methodologies to make technical recommendations on complex problem resolution, coupled with an approach that utilizes repeatable, efficient processes and best practices. Provide direct on-site technical leadership as a subject matter expert on high-profile projects. Lead team in driving and delivering customer solutions.
Hosting Security: Determines systems security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; identifying integration issues; preparing cost estimates. Plans security systems by evaluating system security technologies; developing requirements for Linux, Windows & Unix platforms and related security and network devices; designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards.
Application Security: This role serves as the primary information security interface and knowledge support to assigned development groups and project teams. This person collaborates with business representatives, systems development and other technology groups for establishing business security requirements, functional security requirements, security solution options and implementation plans. The holder of this position will ensure corporate policies and standards relevant to applications are consistent with successful implementation in the corporate environment. Application development and deployment processes maintain compliance to internal and external regulations, security policies, standards, and procedures, including but not limited to PCI, SOX, GLBA.
Working knowledge and experience of relevant standards, regulations, or legislative instruments, including: