Logo
Robert Half

Robert Half is hiring: IT Security Specialist in Cincinnati

Robert Half, Cincinnati, OH, US

Save Job

Job Description

Job Description
We are looking for an experienced IT Security Specialist to join our team in Cincinnati, Ohio. In this long-term contract role, you will play a key part in safeguarding organizational data and systems while ensuring compliance with security standards. This position offers the opportunity to work on critical cybersecurity initiatives and contribute to maintaining a secure technological environment.

Responsibilities:
• Implement and oversee data privacy measures to protect sensitive organizational information.
• Develop and enforce database security protocols to ensure the integrity and confidentiality of stored data.
• Monitor and respond to cybersecurity threats, conducting regular assessments to identify vulnerabilities.
• Establish and maintain cyber governance frameworks to adhere to industry regulations and best practices.
• Manage and secure computer files and digital assets against unauthorized access and potential breaches.
• Collaborate with cross-functional teams to design and execute security strategies and solutions.
• Provide training and awareness programs to educate employees about cybersecurity risks and practices.
• Conduct audits and generate reports to evaluate the effectiveness of security measures.
• Research and stay updated on emerging threats and technologies to proactively address security challenges.• Proven experience in data privacy and database security management.
• Strong knowledge of cybersecurity principles and threat mitigation strategies.
• Familiarity with cyber governance standards and compliance requirements.
• Proficiency in managing computer files and securing digital assets.
• Ability to conduct risk assessments and implement effective security controls.
• Excellent problem-solving skills and attention to detail.
• Strong communication skills to collaborate with teams and present findings.
• Relevant certifications such as CISSP, CISM, or similar are preferred.