Evaluate IS for compliance in accordance with RMF 800-53 Controls and Special Directives. Record and/or prepare artifacts associated with the audit to ensure a repository for all system RMF documentation is kept current.
In this role, the selected candidate must have an experience in Windows Office (Work, Excel, etc.) required; experience in UNIX/Linux OS and/or Cisco IOS preferred; experience responding to information security related incidents in an operations environment.
In this role, the selected candidate will perform the deployment, integration and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise's security documents specifically.
In this role, the selected candidate will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
In this role, you will lead the Information Security Team with the design and implementation of security and architectures, to ensure the appropriate security guidelines, policies and procedures are in place to adequately address threats and vulnerabilities.
This individual will participate in a team of network security professionals in a 24x7 Enterprise IT Security Operations organization. He/She will be part of the enterprise infrastructure of the Network Security team, such as implementation of firewall rules and VPN administration.
In this role, the selected candidate will experience providing crisis management triage; experience working in fast paced environments, and ability manage workload even during times of stress or escalated activity.
In this role, the selected candidate will identify opportunities and executes plans to improve workflow and understands, quantifies business impacts of those improvements for communication to management.
The Information Security Analyst performs three core functions for TEKsystems (TEK). The first is the identification, investigation and resolution of data security incidents that are caused at our clients by our consultants (these are usually carried out through abusing access rights, theft of data and mishandling physical devices.)
The IT Security Analyst supports operations of enterprise security through policy, architecture, training processes, selection and implementation of appropriate security solutions, vulnerability audits and assessments.
In this role, the selected candidate will pursue continuing education to grow and maintain knowledge of best practices, compliance requirements, and threats and trends in the information security, translating into operational action items, policies, procedures, standards and guidelines as part of the IT Security team.