Logo
Insight Global

IT Auditor

Insight Global, Providence, Rhode Island, us, 02912


1. Define Scope: Clearly outline the systems, processes, and data included in the audit.2. Risk Assessment: Identify potential risks to network security and EDI, such as unauthorized access, data breaches, system failures, and compliance violations.3. Control Identification: Determine the existing security controls in place to mitigate the identified risks.4. Control Testing: Design and execute tests to evaluate the effectiveness of the controls (e. g., reviewing configurations, analyzing logs, conducting vulnerability scans).5. Reporting: Document the audit findings, including any weaknesses or vulnerabilities discovered, and provide recommendations for improvement.6. Follow-Up: Track the implementation of the recommendations and conduct periodic re-assessments to ensure ongoing compliance.

We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal. com.

To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/ .Network security knowledge: Understanding of firewalls, intrusion detection/prevention systems (IDS/IPS), encryption protocols, and access controls.EDI expertise: Familiarity with EDI standards (e. g., X12, EDIFACT), communication protocols (e. g., AS2, FTP), and data mapping.Audit methodologies: Knowledge of risk assessment frameworks, control testing techniques, and audit reporting standards.Regulatory compliance: Awareness of relevant industry regulations (e. g., HIPAA, PCI DSS) that may impact network security and EDI.