SCOPE
Prepare Deliverables within the timeframe specified by the Contract and Functional Manager(s).
- Proactively monitor the environment to preemptively identify and counter cyber- attacks.
- Provide technical guidance on security matters to technology operational teams within the department and to the wider business.
- Investigate and respond to real-time alerts promptly and effectively.
- Conduct reviews of real-time and historical reports to identify security and compliance breaches.
- Stay abreast of new and emerging cyber threats by monitoring online security resources.
- Perform vulnerability assessments across departmental systems, processes, and applications.
- Manage systems owned by the Information Security Office.
- Coordinate with trusted security managed services, technical resources, and third- party vendors.
- Evaluate the potential value of new security technologies for adoption within the enterprise.
- Evaluate systems owned by the Information Security Office and make recommendations for process improvements.
- Provide technical guidance on Cybersecurity strategies and plans.
- Develop reports and presentations to convey security concepts, draft policies and procedures, and document and respond to incidents.
- Act as a mentor and technical trainer to Cybersecurity and operational staff.
- Prepare documentation that indicates all work completed complies with policies and procedures. Apprise management of the progress of technical solutions as directed by the Contract Manager or Functional Manager.
- Comply with Administrative Policies and Procedures by working directly with the Functional Manager throughout the contract term.
- Review required documentation evidencing the deliverable for completeness and correctness before submitting it to the Management team, Project Team, and Stakeholders. Obtain acceptance and approval of deliverables from the Contract Manager, Functional Manager, and appropriate Stakeholders.
PREFERENCE
Preference will be given to candidates with the following experience :
A bachelor's degree or higher in Cyber Security, Computer Science, or Information Technology. Professional certifications such as the Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC), Microsoft Certified Cybersecurity Architect, and the Microsoft Certified Azure Solutions Architect to name a few.A Certified Business Continuity Professional (CBCP) or similar certification.Three (3) or more years of relevant experience in security analysis or related roles.Proficiency in enterprise-class technologies including firewalls, routers, switches, wireless access points, VPNs, server operating systems, database applications such as Microsoft SQL and Oracle, and Unix.In-depth understanding of Microsoft's enterprise technology platforms which include Azure (IaaS, PaaS, and SaaS solutions), Entra ID / Azure AD, Active Directory, SQL Server, Windows server and desktop operating systems, GitHub Actions with advanced security, Microsoft Defender, and Microsoft Intune.Understanding of Oracle database applications and Oracle Solaris operating systems.Hands-on experience with leading technology vendors and products such as Palo Alto NGFW, Tenable Vulnerability Management, Microsoft Defender for endpoints and servers, ForeScout, and Azure Sentinel. Demonstrated proficiency in implementing and enforcing security and compliance frameworks such as the NIST CSF, PCI DSS, and ISO.Experience creating and maintaining incident response plans, security policies and procedures, internal risk assessments, and third-party supplier risk assessments.SKILLS
To accomplish the work outlined above, requires an experienced Security Analyst with the following skills and experiences listed below. This list is not exhaustive; nor are all skills required. Technical Skills, written and verbal communication, and experiences will be the basis for evaluation of responses.
Strong written and verbal communication skills with the ability to convey concepts to both technical and non-technical stakeholders.Extensive knowledge of cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management.Knowledge of project management methodology and experience or familiarity with defined program management approaches (for example, PMI, Prince II or Agile).Technical proficiency with security-related systems and applications, especially server operating systems, database applications, anti-malware, spam and phishing detection, endpoint protection, and continuous monitoring.Extensive knowledge and experience with vulnerability management.Experience and proficiency in developing, documenting and maintaining security procedures and reports.Knowledge of network infrastructure, including routers, switches, firewalls, and associated network protocols and concepts.Strong analytical and problem-solving skills to enable effective security incident and problem resolution.Ability to create incident response plans, presentations, diagrams, and documents detailing cybersecurity concepts, processes, and other pertinent information.Strong working knowledge and experience with Microsoft Office products such as Word, Excel, PowerPoint, SharePoint, Visio, and Project.Required Skills : Systems Analysis,Cloud,Network Security
Additional Skills : Security Administrator,Cyber Security Engineer,Security Analyst,Security EngineerThis is a high PRIORITY requisition. This is a PROACTIVE requisition