TWK_2166 Information Security Manager position with State of Texas | Remote in Texas State | Exp with NIST 800-37, NIST 800-53, MARS-E controls, POA&Ms must at Mars, Pennsylvania, USA |
Email: [email protected] |
Share profiles along with Job ID number S E K H A R @ TEKWINGS. COM Note: If this email is not relevant to you, sorry for your Inconvenience Share profiles before 05 APR, 2024 @ 3 PM CT Requirement details: Internal job ID:TWK_2166Information Security Manager State of Texas Austin, Texas 78751. Position will be 100% remote . However, this will require on-calls. Candidates must be within the Metro Area in Austin, TX or any surrounding cities due to the on-call schedules and/or will need to come in the headquarters as requested). Public Sector (State / Federal / Local Govt.) Client Experienced profiles only Local to Texas profiles Only Exp: 12+ Years must Job Description/Functions Level Description 8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected. Job Description Coordinate and execute security policies and controls, as well as assess vulnerabilities within a company. They are responsible for data and network security processing, security systems management, and security violation investigation. Additional job details and special considerations Supports the TIERS Learning Center and Operations by applying information security threat intelligence to identify and exploit vulnerabilities within different environments. On a daily basis you will perform analysis of on-prem and cloud security and monitor security operations including security architecture reviews. Our ideal candidate understands regulatory requirements, has in-depth knowledge of industry standards and trends, and is proficient with the latest cybersecurity software. SKILLS AND QUALIFICATIONS Years Required Experience 8 Required Responsible for implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up to date on the latest intelligence, including hackers methodologies, in order to anticipate breaches. 8 Required Responsible for ensuring all networks have adequate security to prevent unauthorized access. Also must ensure that all security systems are current with any software or hardware changes in the company. 8 Required Conduct application security assessments using off-the-shelf or internally developed tools. Also produce and deliver vulnerability and exploit information to clients in the form of a professional security assessment report. 8 Required Orchestrate calls to include, but not limited to project kick-off calls, notification of high/critical findings during the testing process, and close out calls to review test findings, evidence, process steps to reproduce, and remediation recommendations. 8 Required Perform proactive research to identify and understand new threats, vulnerabilities and exploits. Perform procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. 8 Required Extensive experience with working with and implementing NIST 800-37, NIST 800-53, MARS-E controls, POA&Ms, and developing Corrective Action Plans. 8 Required Prepare impact assessment reports that document security breaches and the extent of the damage caused by the breaches. Create standard operating procedure documents in adherence to security policies and standards. 8 Required Review violations of computer security procedures and discuss procedures with HHSC/TIERS Security team. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. 8 Required Skilled information technology professional with advanced experience developing and implementing IT policy, standards and procedures. 6 Preferred Ability to prepare concise written reports appropriate to the audience. Ability to communicate effectively verbally and in writing. 6 Preferred Experience working with Archer GRC, Dynatrace, Splunk, Imperva Web Application Firewall, Qualys and MS Office tools. 4 Preferred Conduct research to recommend security enhancements and purchases of new security tools. 3 Preferred Ability to training staff on network and information security procedures, processes and information safeguarding. -- Thanks & Regards Sekhar | Sr.IT Technical Recruiter Tekwings LLC Email : [email protected] / [email protected] New Mobile : +1 ( 214) - 628 - 2379 Hangouts: [email protected] / [email protected] LinkedIn Group: https://www.linkedin.com/groups/10421204/ LinkedIn: https://www.linkedin.com/in/sekhar-u-27b11a166/ Keywords: rlang information technology microsoft Connecticut Idaho Texas TWK_2166 Information Security Manager position with State of Texas | Remote in Texas State | Exp with NIST 800-37, NIST 800-53, MARS-E controls, POA&Ms must [email protected] |
[email protected] View all |
Mon Apr 01 18:36:00 UTC 2024 |