The IA Analyst will report to the Office of Information Assurance and operate as an experienced information assurance consultant to SCDHHS leadership, business units, business partners, vendors, and other stakeholders.
In this role, you will be responsible for operating and maintaining various security appliances such as network, web application, and email firewalls, intrusion protection, and network access control devices.
In this role, you will assist in the overall security of agency information systems. Responsible for operating and maintaining various security appliances such as network, web application, and email firewalls, intrusion protection, and network access control devices.
In this role, you will documents, monitors, reports, and manages the resolution of network issues. The selected candidate will also provide technical support to end users when cases are escalated from the helpdesk as a next tier network analyst specializing in network technologies.
In this role, the selected candidate will be part of the Infrastructure Protection Unit within the Information Technology Group; analyze packet captures, network configs, system logs, application code and scripts.
In this role, you will be supporting and managing an evolving IT infrastructure, computer operations of the production and staging systems. The selected candidate will be advise, investigating and evaluating the selection of solutions used by our customer.
The Information Analyst plans, creates, and maintains databases in support of departmental activities. Leads the planning, creation and maintenance of complex database(s) in support of department/Company activities.
In this role, the selected candidate will perform Enterprise Security Engineer duties. Back up for web filter, SiEM, IDS/IPS: This includes troubleshooting and resolving help desk tickets related to Firewall, IDS/IPS, Web filter, and SIEM and Endpoint Security Products including Virus Scan, HDLP.
The Cyber Security Analyst 3 is responsible for the integration of the Cyber Security Program into management and work practices. The individual in this position performs analysis, assessments and reports on vulnerabilities that may be found in the Information Technology infrastructure. The Cyber Security Analyst 3 is also responsible for testing system compliance, investigate new technologies and document/present findings to mitigate risk.
In this role, the selected candidate must have the ability to engage diverse audiences of varying technical and non-technical skill-levels to ensure effective alignment of technical requirements to business objectives.
In this role, you will assimilate and apply new job related information in a timely manner. (i.e.: Quickly gains knowledge, understanding or skill; applies knowledge or skill; quickly learns to apply new technology).
In this role, you will be responsible to create, update and maintain appropriate documentation including on-boarding processes and procedures, operational issue tracking and resolution reporting, ticket management and validation analysis checklists.