In this role, the selected candidate will serve as Information Systems Security Officer (ISSO) for an Air Force client; assist with the Certification and Accreditation (C&A) of standalone computers and networks using government standards.
In this role, you will collect and analyze market research information from a variety of sources and produce syndicated and custom market research reports to enable informed customer/client decision making.
In this role, the selected candidate performs highly advanced (senior-level) managerial work assisting in the oversight of the daily operations and activities of the agencys statewide cybersecurity and information security service delivery.
In this role, you will be responsible to perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
In this role, you will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction and provide the technical support necessary to evolve/sustain Cyber infrastructure as well as data and processes.
The person in this role will be responsible for combining business perspective and understanding with IT and functional application experience in order to enhance processes. The IT Business Systems Analyst will provide hands-on support of applications and will assist in the implementation of effective solutions in order to meet growth requirements.
In this role, you will be responsible for
provides advice, guidance and assistance to managers and other users on technical issues focusing on Information Security risk and supports USAA development projects, departmental initiatives and other special projects. Assists in the determination of requirements and recommends system security configurations.
In this role, the selected candidate develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems.