In this role, the selected candidate will create ATO POA&M entries for items (such as patches) that will take additional time to research to prevent potential negative effects by testing changes to the environment prior to implementation.
In this role, you will lead cross function Policy Council for establishing policies and standards necessary to ensure the security of information system assets and to protect them from intentional or inadvertent access, disclosure, or destruction in accordance with industry standards such as HIPAA, Sarbanes-Oxley, SAS70, DIACAP, and PCI.
The individual will be responsible for a variety of deliverables related to compliance activities, including access management, proactive access usage reviews, financial and general risk profile activities, performance analytics, and general risk management/reporting.
In this role, the selected candidate must have deep knowledge of current technologies including Open Source, J2EE (JSP, Servlet, JSP, etc.), web application development, web services (REST/SOAP/XML), Rich Internet Applications, messaging infrastructures and databases.
The IT Business Analysts (BA) will analyze and synthesize information provided by multiple IT and business stakeholders at varying levels and is responsible for eliciting the actual needs of the business.
In this role, you will perform basic vulnerability scans using vendor utility tools. Monitors security audit and intrusion detection system logs for system and network anomalies. Investigates and/or escalates security violations, attempts to gain unauthorized access, virus infections that may affect the network or other event affecting security. Documents and reports event(s).
In this role, you will be responsible to interpret, monitor, and assess the companys security systems and related projects for potential risks, violations, and adherence to the corporate Information Protection Program.
The candidate will provide project oversight and ensure integration of security requirements in accordance with agency certification and accreditation processes, and technical security engineering required to support the Agencys transition to enterprise services.
In this role, the selected candidate will enforce security policies and procedures by administering and monitoring security profiles; review security violation reports and investigates possible security exceptions; update, maintain and document security controls.