In this role, the selected candidate will be responsible for maintaining all security documentation, document, and maintain the process and procedures, incorporating applicable policies and ensuring the process meets the needs of the IT security strategy, thereby ensuring the process is fit for purpose.
Assists in the creation of comprehensive unit test plans and creates and executes test cases in line with test plans. Participates in design, coding, testing, implementation, and documentation of solutions.
In this role, the selected candidate performs expert level support and implementation and supporting EPIC Systems Beacon applications; supports business requirements and user needs for developing solutions.
Attend specification meeting with project team workers to determine scope and limitations of project; work closely with other team members, application developers, and business process owners throughout the organization.
In this role, the selected candidate directly assists operators in performing their duties (troubleshooting user-report terminal or printer malfunctions, operations exceptions, recovering from system problems, etc.)
The candidate will be challenged to apply defense-in-depth techniques, including both process and technical based, on a daily basis securing National Security Systems. All work will be performed on site in the Houston, TX Metro area with limited/occasional local travel as necessary.
Establishment and maintenance of reporting systems to monitor and track financial and resource variance on a project and portfolio level; partner with other IT organizations for the purposes of intake, prioritization, and sequencing of work.
The Incident Response Analyst would create appropriate documentation, processes, and response plans to identify security incidents, contain attacks, investigate intrusion vectors, eradicate infections, recover affected systems, disclose responsibly to stakeholders, and provide lessons learned to the enterprise.
Work closely with enterprise architects, other functional area architects and security specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements.