This position is a security solutions analyst, housed within the Office of Information Security, responsible for developing best practices, managing security solutions, and building data collection and analysis processes. Additionally, this position serves as the secondary for eDiscovery management processes and assists in the development of training and awareness content.
In this role, the selected candidate will work with business users on user requirements, develop functional requirements, systems definition (new and enhancements), prepare high level specifications for development groups, coordinate unit, system, and user acceptance testing and implementation planning and execution.
In this role, the selected candidate will collaborate with internal IT and Security staff to establish and enforce IT security best practices, information protection objectives, process improvements and effective IT security controls.
In this role, you will plans, coordinates, and executes highly complex audit programs audits by working with clients to identify risks, evaluate controls, and recommend improvements as well as executes on 3rd party audits( iso 27001, pci, ssae16, fisma) including preparation, scoping, evidence gathering, support of field work and audit closing.
The requested resources will develop and update project plans for the many technical and security related projects that support the operation and maintenance of the infrastructure for the client's Benefits Management System and associated systems
In this role, you will be responsible for developing and administering DODI 8510.01 and NIST 800-53 IA security controls assessments and analyzing the results of independent cybersecurity validation testing.
The Security Analyst, Staff position is responsible for coordination, oversight, execution and enhancement of consistent security practices for all information systems within the United States Antarctic Program (USAP). He/She will ensure effective information security controls are documented and delivered to safeguard USAP business operations, prevent unauthorized system access, and to protect sensitive information.
In this role, you will install new / rebuild existing servers and configure hardware, peripherals, services, settings, directories, storage, etc. in accordance with standards and projects/operational requirements