4+ years long term government contract ,NEED SUBMISSIONS FOR Virtual Security Officer, Jackson, MS at Jackson, Alabama, USA |
Email: [email protected] |
From: Bhavani, nukasanigroup inc [email protected] Reply to: [email protected] Dear Partner, Good Morning , Greetings from Nukasani group Inc !, We have below urgent 4+ years long term contract for State of Mississippi, immediately available for ** Virtual Security Officer, Jackson, MS** interviews, could you please review the below role, if you are available, could you please send me updated word resume, and below candidate submission format details AND Skill Matrix, immediately. If you are not available, any referrals would be greatly appreciated. Interviews are in progress, urgent response is appreciated. Looking forward for your immediate response and working with you. **Candidate Submission Format - needed from you** Full Legal Name Personal Cell No ( Not google phone number) Email Id Skype Id Interview Availability Availability to start, if selected Current Location Open to Relocate Work Authorization Total Relevant Experience Education./ Year of graduation University Name, Location Country of Birth Contractor Type Home Zip Code Job Tittle: Virtual Security Officer Location : Jackson, MS Long Term **Rate: Best competitive rate on C2C or W2 hourly** **Note:** Position is intended fully remote, vendor should propose a fully loaded rate to account for the possibiliy of any unanticipated onsite visits. **Technical Skill Matrix Required from You** **Technical Skill** **Number of Years of Experience** xperience utilizing and implementing security, privacy, network, and data ===========> years center best practice )Experience in IT security roles working with encryption of data in transit and ===========> years center best practice at rest, preferably using multiple encryptions methodologies Experience with privacy and security ===========> years technologies and methodologies Experience facilitating and responding to security audits, specifically MARS-E and ===========> years management of POAM resolution Experience ensuring that systems are in compliance with federal IT security ===========> years regulations (HIPAA, NIST, MARS-E, etc.) and remediating deficiencies Experience with disaster recovery and failover methodologies while adhering to security requirements (1 yr)Project management experience including ===========> years reporting project status, project milestones , project achievements, andproject risks verbally and in writing to senior leadership Verifiable experience developing and ===========> years giving presentations Experience facilitating a variety of different types of project meetings with various ===========> years stakeholders at multiple levels throughout the agency and its business partners **Required Skills/Experience** in IT security roles on Information Technology projects (5 yrs)Experience in IT security roles working with hosted infrastructure/data centers with multiple vendors (4 yrs)Experience utilizing and implementing security, privacy, network, and data center best practices (2 yrs)Experience in IT security roles working with encryption of data in transit and at rest, preferably using multiple encryptionsmethodologies (2 yrs)Experience with privacy and security technologies and methodologies (2 yrs)Experience facilitating and responding to security audits, specifically MARS-E and management of POAM resolution (3yrs)Experience ensuring that systems are in compliance with federal IT security regulations (HIPAA, NIST, MARS-E, etc.)and remediating deficiencies (3 yrs)Experience with disaster recovery and failover methodologies while adhering to security requirements (1 yr)Project management experience including reporting project status, project milestones, project achievements, andproject risks verbally and in writing to senior leadership (5 yrs)Verifiable experience developing and giving presentations (2 yrs)Experience facilitating a variety of different types of project meetings with various stakeholders at multiple levelsthroughout the agency and its business partners (2 yrs) **Preferred Skills Experience** in enforcing the HIPAA Breach Notification Rule, including preparation of a formal response for any HIPAABreach (Documented experience required (any)Experience securing PHI/PII data in accordance with Health Insurance Portability and Accountability Act (HIPAA)regulations (5 yrs)IT security and data privacy experience in a healthcare environment (2 yrs)Additional consideration may be given for security and network certifications. Vendor must specify and provide proof ofthe certification(s). Examples included but are not limited to: Certified Information Privacy Professional (CIPP),Certified Information Systems Security Professional (CISSP), etc. (Documented experience required(any)Experience with Health Information Exchange (HIE) deployments, interfaces, and HIE interoperability projects utilizingestablished industry best practices and standards (2 yrs)Experience documenting requirements and validating the security components of deliverables, RFP evaluation asneeded, etc. (2 yrs) **Position Description and Job Skill Set** Typical Projects:-Assessing HIPAA incidents for potential breaches.-Performing risk assessments.-Reviewing and modifying security policies.-Performing regular security vulnerability scans on the DOM enterprise.-Managing and updating the status of risk mitigations and remediations.-Reviewing and providing security subject matter expertise to DOMs third party contracts and other deliverabledocuments to ensure that adequate security controls are in place to protect DOMs data.-Managing all audits involving technology and security matters, including facilitating, gathering and supplingdocumentation.-Subject matter expert in the procurement of various security products including but not limited to: Governance, riskmanagement and compliance (GRC) solution, managed security services (MSS) including: Threat Management,Vulnerability Threat and Risk Management IDS/IPS, and firewalls management.-Management and administration of GRC and MSS.Complexity of Work:-Very complex to understand, apply, and keep up with security controls and requirements, including but not limited toNIST 800-53, 45 CFR regulations, Minimum Acceptable Risk Standards for Exchanges (MARS-E 2.0).4-Work requires competency with security issues and the ability to understand how hackers access multiple operatingsystems and different types of computer hardware and software as well as multiple architectures (on premise, hybrid,and cloud-based).-Ability to use tools and diagnostics to evaluate the security threats to DOMs network.-Typical Team Size: While the security function at DOM for now only consists of this one position, DOM plans toprocure Managed Security Services for tasks that the Security Officer recommends outsourcing. Additionally, theSecurity Officer is expected to assess DOMs environment and current security posture and make recommendations foradditional staff or services deemed necessary to fulfill federal and state regulatory requirements for security. TheSecurity Officer will work collaboratively with the Privacy Officer, the iTECH Help Desk and Network Teams, and otherDOM staff as necessary to fulfill the requirements of this position. Thanks regards Bhavani |Technical recruitment| Nukasani Group | 1001 E Chicago Ave, Unit B 111, Naperville IL 60540. Email: bhavaniatnukasanigroupusa.com| Direct: |630-454-0067| People, Process, Technology Integrator. An E-Verified Company. Submission Required Urgently Keywords: information technology |
[email protected] View all |
Wed Dec 28 17:09:00 UTC 2022 |