Job Description
Role and Responsibilities of the Resource Request Required
- Participate in the creation of the Cybersecurity Strategy , program objectives, and project plans.
- Assist in the design and implementation of enterprise Cybersecurity processes and services across multiple domains to ensure protection of county information and IT assets.
- Administer and maintain Cybersecurity technology platforms and services related to the enclave.
- Fulfill customer requests and perform daily security operations , including vulnerability scanning, remediations, incident monitoring, analysis, and response activities.
- Conduct analysis of Cybersecurity threats, vulnerabilities, and exposures , providing effective recommendations and remediation plans.
- Develop procedures, job aids, metrics, reports, and presentations to support Cybersecurity objectives.
- Participate as a member of the Cybersecurity Incident Response Team (CIRT) for investigation and response activities as required.
Scheduled Milestones and Deliverables Required
Advance the maturity level of Vulnerability Management and Remediation Processes .Integrate automation best practices to improve operational efficiency.Enhance Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) for vulnerabilities and incidents.Metrics to Be Utilized to Measure the Performance of this Resource Required
Successful completion of projects related to Vulnerability Management and Remediation Processes .Performance and uptime of Security Platforms (e.g., Incidents, Alerts, Tickets).Adherence to SOC and Compliance standards.Compliance with documented processes and procedures.Requirements
Project and Requirements Required
A Contractor is needed to support Cybersecurity Remediation Projects with a strong focus on Vulnerability Management , including vulnerability scanning, automation, remediation workflows, and tool integrations. The resource will assist in supporting vulnerability management operations, enhancing scan capabilities, and streamlining remediation processes across environments.
Requirements :
Minimum 2 years of hands-on experience with vulnerability scanning technologies such as Qualys, Tenable, or Rapid7 , with proven ability to translate scan results into prioritized, actionable remediation steps across enterprise environments.Ability to operationalize scan results into effective remediation workflows.Minimum 2 years of hands-on experience with Linux administration , including server navigation, configuration, and management.Familiarity with Microsoft Security Tools , including architecture and platform knowledge.Additional Skills :
Cyber Incident ResponseSIEM (Security Information and Event Management)Data Analysis and ReportingExperience :
Minimum five (5) years of progressive work experience in Information Security, Information Technology, Computer Science, or related fields.
Requirements
Requirements :
Minimum 2 years of hands-on experience with vulnerability scanning technologies such as Qualys, Tenable, or Rapid7, with proven ability to translate scan results into prioritized, actionable remediation steps across enterprise environments.Ability to operationalize scan results into effective remediation workflows.Minimum 2 years of hands-on experience with Linux administration, including server navigation, configuration, and management.Familiarity with Microsoft Security Tools, including architecture and platform knowledge. Additional Skills :Cyber Incident ResponseSIEM (Security Information and Event Management)Data Analysis and Reporting Experience : Minimum five (5) years of progressive work experience in Information Security, Information Technology, Computer Science, or related fields.