Lead to guide the outsourcing support team to understand business requirement, and get agreement on the estimation and functional design, working as liaison between outsourcing support team and business user.
The candidate must possess a Bachelors Degree. Preferred degrees included Computer Science, Computer Engineering, Electrical Engineering, Information Technology, Information Systems, or an equivalent degree.
In this role, you will assist in the overall security of agency information systems. Responsible for operating and maintaining various security appliances such as network, web application, and email firewalls, intrusion protection, and network access control devices.
Assist in the development, implementation, and/or ongoing maturation of SCDHHS security and compliance initiatives; audit and assess internal agency systems as well as business partner, service provider, and vendor information system security controls.
In this role, the selected candidate will report to the Office of Information Assurance and operate as an experienced information assurance consultant to client leadership, business units, business partners, vendors, and other stakeholders.
In this role, the selected candidate must have experience should include well documented success in the performance of security focused processes and procedures supportive of a secure, compliant enterprise architecture.
The IA Analyst will report to the Office of Information Assurance and operate as an experienced information assurance consultant to SCDHHS leadership, business units, business partners, vendors, and other stakeholders.
In this role, you will be responsible for the overall design of the enterprise wide data/information architecture, which maps to the enterprise architecture and balances the need for access against security and performance requirements.
The Cyber Security Analyst 3 is responsible for the integration of the Cyber Security Program into management and work practices. The individual in this position performs analysis, assessments and reports on vulnerabilities that may be found in the Information Technology infrastructure. The Cyber Security Analyst 3 is also responsible for testing system compliance, investigate new technologies and document/present findings to mitigate risk.