The candidate will provide project oversight and ensure integration of security requirements in accordance with agency certification and accreditation processes, and technical security engineering required to support the Agencys transition to enterprise services.
In this role, the selected candidate must have deep knowledge of current technologies including Open Source, J2EE (JSP, Servlet, JSP, etc.), web application development, web services (REST/SOAP/XML), Rich Internet Applications, messaging infrastructures and databases.
In this role, you will perform basic vulnerability scans using vendor utility tools. Monitors security audit and intrusion detection system logs for system and network anomalies. Investigates and/or escalates security violations, attempts to gain unauthorized access, virus infections that may affect the network or other event affecting security. Documents and reports event(s).
In this role, you will provide Information Security expertise and guidance to business group leaders and IT owners to evaluate and articulate application security requirements; identify potential security risk factors and business impact.
In this role, you will research, evaluate, and assess emerging cyber threats to digital assets. The selected candidate will identify security risks, threats and vulnerabilities in networks, systems, and applications.
In this role, the selected candidate will enforce security policies and procedures by administering and monitoring security profiles; review security violation reports and investigates possible security exceptions; update, maintain and document security controls.
In this role, you will be responsible to participates in projects and assists in the execution of project plans to help ensure compliance with security policy and standards. Develops, executes, or coordinates security projects, including deployment and operation of firewalls, intrusion detection and prevention systems and flow analysis tools.
In this role, you will be responsible to partner with key business functions, internal IT staff and external auditors to ensure that the SOX compliance program and key controls for IT processes and procedures are in place and monitored across the organization.