Lead to guide the outsourcing support team to understand business requirement, and get agreement on the estimation and functional design, working as liaison between outsourcing support team and business user.
Assist in the development, implementation, and/or ongoing maturation of SCDHHS security and compliance initiatives; audit and assess internal agency systems as well as business partner, service provider, and vendor information system security controls.
In this role, you will be responsible for the overall design of the enterprise wide data/information architecture, which maps to the enterprise architecture and balances the need for access against security and performance requirements.
The Information Security Engineer - Application Security role is an individual contributor role to support a global program to actively identify and exploit vulnerabilities across Equifax applications utilizing dynamic, manual, and static methodologies.
In this role, the selected candidate will lead new and recurring 3rd party security risk assessments, develop mitigation plans, and work with internal stakeholders to assign remediation tracking responsibility.
This candidate would be responsible for providing deployment and support of Oracle Identity Gateway (OIG, OIM) for the primary purpose of provisioning and deprovisioning accounts within Microsoft Active Directory.
The candidate must possess a Bachelors Degree. Preferred degrees included Computer Science, Computer Engineering, Electrical Engineering, Information Technology, Information Systems, or an equivalent degree.
In this role, the selected candidate will report to the Office of Information Assurance and operate as an experienced information assurance consultant to client leadership, business units, business partners, vendors, and other stakeholders.
The Cyber Security Analyst 3 is responsible for the integration of the Cyber Security Program into management and work practices. The individual in this position performs analysis, assessments and reports on vulnerabilities that may be found in the Information Technology infrastructure. The Cyber Security Analyst 3 is also responsible for testing system compliance, investigate new technologies and document/present findings to mitigate risk.
In this role, the selected candidate must have experience should include well documented success in the performance of security focused processes and procedures supportive of a secure, compliant enterprise architecture.