In this role, the selected candidate will perform assigned engagement activities as directed, seek assistance as needed; implement the security assessment approach, enumerating and documenting security weaknesses in the clients environment.
In this role, the selected candidate will participate in technical design sessions, working with technical resources, to provide insight during solution development; identify and communicate project risks and recommend solutions.
In this role, the selected candidate will implement processes to document and monitor the network portfolio using a risk based approach; lead new and recurring network security risk assessments, develop mitigation plans, and work with internal stakeholders to assign remediation tracking responsibility.
The selected candidate will work closely with Business units and BTS partners to create, identify, and evaluate deliverables such as business requirements document, use cases, business process models, user manuals, test plans and test results.
In this role, the selected candidate will provide training and support to IT personnel regarding Information Security best practices, industry or regulatory issues, and Information Security technologies.
In this role, the selected candidate will perform constant monitoring and awareness of key developments in the area of systems, web application, and client application security in order to provide direction of security trends, and anticipate emerging standards and best practices.
In this role, the selected candidate will assist in the review, development, testing and implementation of security plans, products and control techniques; coordinate the reporting data security incidents.
In this role, you will monitor departmental IT resources and identify security violations, determine new or improved security requirements, and develop information security procedures to limit security exposures.
In this role, the selected candidate will develop and implement security standards, procedures, and guidelines for multiple platforms and diverse environment (e.g. client server, distributed, mainframe, etc.).
In this role, the selected candidate should have good understanding and extensive hands-on experience on various security technologies for e.g. Firewalls, VPN's, IDS/IPS, end point security solutions (AV, HIPS, Hard Disk Encryption), strong Authentication products (RSA SecurID), Security Event Monitoring/Management solution/Log Management Solution, Content Security Gateways (Cisco Ironport Web/Mail Security Gateways), TACACS/AAA solutions.
In this role, the selected candidate will provide initial assessment of categorization and prioritization for reported Incidents and Service Requests and provides initial support, targeting a higher level of first contact resolution.
The role is a for a CACS system administrator/analyst. This role will interface with internal business operations customers in order to support Collections strategies. The role will require creativity, analytical thinking, problem solving, and the ability to work under pressure while managing multiple responsibilities.
In this role, the selected candidate will participate in internal and external meetings relating to projects; provides summaries of meeting to appropriate person(s) and makes recommendations as appropriate.