Home

Hiring Hiring Immediate Security Analyst at Remote, Remote, USA
Email: [email protected]
Hello All,

Hope Your Doing Well,

Please find the job description,

Send me the suitable Resumes.

[email protected]

Position Name: CL - Security Analyst - Consultant

Position ID: 11156-1

Organization: Health & Environmental Control Department (DHEC)

Work Location: J04 - 2600 BULL ST

City & State: COLUMBIA, South Carolina

INTERVIEW PROCESS (who will conduct i/v, phone or in-person, how many rounds of i/vs)

An interview panel will conduct one initial round of in person, video, or phone conference interviews.  If no candidate is selected a second round of interviews will be conducted. Potential candidates, not initially selected, will not be disqualified until an offer is made and accepted.

SCOPE OF THE PROJECT:

DHEC actively strives to keep in compliance with PCI-DSS standards. The PCI compliance analyst will manage the PCI compliance initiative under the guidance of the Chief Information Security Officer and PCI project management DHEC actively strives to keep in compliance with PCI-DSS standards. The PCI compliance analyst will manage the agencies PCI compliance and other compliance related systems under the guidance of the Chief Information Security Officer and PCI project management team. This position will aim to maintain PCI compliance and lower the agencys overall risk profile. This position will work closely with the Security Operations Center (SOC), Server Hosting Team, and Application Teams to review vulnerability reports, investigate solutions, test solutions and their impacts to other environments, follow the agencys Change Management process, implement solutions, track and document remediation.

Candidates should be self-motivated, team-oriented, work under limited supervision, and respond to priority tasks as needed.

DAILY DUTIES / RESPONSIBILITIES:

The system engineer will be responsible for managing the discovery, analysis, tracking, and remediation of vulnerabilities across the agencys technology systems.

Responsibilities include:

Maintain and improve the vulnerability management process.

Develop solutions and automated methods to reduce manual and repetitive tasks.

Follow a mature change management process preparing change management requests and presenting requests to the change management board for approval.

Work closely with key stakeholder groups, including the SOC, to ensure appropriate levels of engagement and focus are maintained.

Plan and implement technical changes without unexpected disruption to the service and with minimal oversight.

Create, maintain, and review operational processes and support documentation.

Adheres to Information Technology application development standards and security requirements.

Prepare and maintain system documentation and architecture diagrams as assigned.

Ability to plan, organize, review, implement associated project milestones to completion.

Requires mastery technical and business knowledge in multiple disciplines/processes.

Create supporting project and system documentation.

Provide updates to the Project Team.

Assist with development of policies and procedures to conform and comply with agency standard cyber security policy design related to information risk management, designation of data as to criticality, confidentiality, and protection. (NIST 800-53, FISMA, SC InfoSec Requirements

The position will be utilized for 40 hours per week for the duration of this project. The selected candidate should be able to work flexible hours where it may be necessary for work to be completed outside traditional business hours.

The candidate will work closely with the CISO and PCI project team to identify, prioritize, and schedule changes to the agencys PCI environment to support PCI compliance. The candidate will work closely with customer and subject matter experts for the system design, migration to the new framework, and testing.

This will also include compliance to DHEC security policy/procedures as well as integrating systems when possible to streamline staff workflows, user security, and data correction.

Module support of the project.

DHEC will require that selected personnel sign the DHEC confidentially agreement and/or Business Associate (BA) agreement if applicable. All web services must be secure.

DHEC will not accept any offers including an up-lift charge. The rate paid per consultant must not exceed the maximum rate established for this position described in the State contract terms.

Contractors must be onsite during each week throughout the term of the contract.

Follow agency IT Standards, policies, and procedures to include documentation.

All source code (compiled and un-compiled) will become the sole property of the South Carolina Department of Health and Environmental Control. Any source code, data, product, or functionality resulting from this SOW or previously owned/developed by DHEC will remain the sole property of DHEC and is not to be incorporated into the core product of any vendor's application. Any modifications and interfaces developed under said contract will be not be used by the contractor for any independent project of the contractor or published or publicized by the contractor without written permission of DHEC.

DHEC has the final say on all programming choices.

Payment Schedule:

All timesheets shall be entered and approved in a timely manner per State contract terms. The State will not pay any extra costs (i.e. Travel, employee benefits, insurance, room and board, etc.) for temporary employees under this contract.

DHEC Support:

DHEC will provide:

All required information including formulas, data, and mechanisms to check output.

Staff to assist with any application or data questions.

Conference rooms and scheduling for any application demos.

Workstation and required software.

REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):

1. EXPERIENCE IN PROJECTS INVOLVING PCI/NIST SECURITY IMPLEMENTATIONS AND/OR AUDITS.

2. KNOWLEDGE OF INFORMATION TECHNOLOGY FIELD, BEST PRACTICES, ORGANIZATION AND OPERATIONS FAMILIARITY WITH VULNERABILITY MANAGEMENT REPORTS AND TOOLS (NESSUS, CLOVER SECURITY, ETC.)

3. KNOWLEDGE OF NETWORKING PROTOCOLS, INCLUDING TCP/IP, HTTP, NTP, DNS, MLLP, NDM

4. SECURITY - KNOWLEDGE IN NETWORKING, DATABASES, SYSTEMS AND WEB OPERATIONS

5. VULNERABILITY SCANNING

6. MICROSOFT ACTIVE DIRECTORY.

7. ITIL INCIDENT AND PROBLEM MANAGEMENT PROCESSES

8. NIST CONFIGURATION MANAGEMENT CONTROLS

9. EXPERIENCE WITH SECURITY AND DATA CLASSIFICATION RELATED TO CDC, HIPAA, AND CJIS

PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):

1. Experience network vulnerability scanning and penetration testing.

2. Knowledge of Information Security best practices.

3. Ability to establish positive working relationships with technical staff, customers and others involved in data-centric management.

4. Excellent written, oral, and interpersonal communication skills

5. Knowledge of Information Technology Field, best practices, organization, and operations

6. Experience with SolarWinds, Lansweeper, AD

7. Ability t

--

Keywords: business analyst active directory information technology Idaho South Carolina
[email protected]
View all
Thu Mar 21 22:36:00 UTC 2024

To remove this job post send "job_kill 1240616" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 0

Location: ,