In this role, you will be responsible for the preparation of manuals outlining regulations and establishing procedures for handling, storing, and maintenance of records and for granting personnel and visitors access to restricted records and materials.
The Service Asset Configuration Analyst focuses on the overall quality of the Configuration Management Database (CMDB) by ensuring configuration items and relationships are accurate and complete by policing process adherence and data quality against documented standards.
In this role, the selected candidate will be working within the threat management team and responsible for examining security events for context, relevance, criticality and their potential impact to the company.
Perform and manage Onsite Risk Assessments as per process documents Ensure vendor compliance to the business agreement, policies, procedures, & regulations along with ability to map controls and compliance requirements Review vendor supplied policies & procedures, internal/external assessment reports.
In this role, the selected candidate will assist with conducting Security Testing & Evaluation (ST&E) for enclave and system accreditations and provide corrective actions to resolve or mitigate vulnerabilities that are identified.
As an Information Security professional you will be a critical member of the IT Security team directly contributing to projects spanning multiple technical areas, including: cutting edge information security technologies, enterprise level architecture, security frameworks and security incident management.
In this role, the selected candidate will be responsible to understand the entirety of the threat landscape for a particular system and apply the right security technologies where they will be most effective. This includes external facing software and services as well as internal.
In this role, you will work directly with all interested parties to document functional and technical requirements that meet business needs, provide creative solutions, as well as conduct analysis and define business cases related to the implementation of new solutions.
In this role, you will utilizes highly technical and physical forensics to ensure that security policies, standards, and best business practices are followed in and around the company wide area network (wan). This includes; workstations, servers, mobile devices, anything that connects and accesses data in our internal and cloud infrastructure.
In this role, you will assist with conducting Security Testing & Evaluation (ST&E) for enclave and system accreditations and provide corrective actions to resolve or mitigate vulnerabilities that are identified.