Evaluate IS for compliance in accordance with RMF 800-53 Controls and Special Directives. Record and/or prepare artifacts associated with the audit to ensure a repository for all system RMF documentation is kept current.
In this role, the selected candidate will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
In this role, the selected candidate will manage assigned projects in designated area of responsibility by prioritizing tasks and adhering to deadlines to meet department objectives and individual performance metrics.
The Information Security Analyst performs three core functions for TEKsystems (TEK). The first is the identification, investigation and resolution of data security incidents that are caused at our clients by our consultants (these are usually carried out through abusing access rights, theft of data and mishandling physical devices.)
In this role, the selected candidate will build and enhance individual development and skill-set by seeking educational opportunities, participating in available training and researching innovative technology and methodologies to provide strong departmental support.
In this role, the selected candidate will perform the deployment, integration and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise's security documents specifically.