Cybersecurity Engineer Remote, but need to go to office on scheduled meetings. at Remote, Remote, USA |
Email: [email protected] |
Hey Check this urgent role PV Note: PREVIOUS YEAR STATE CLIENT EXPERIENCE IS MANDATORY. Ex-state client experience is a plus. Candidates must have to fill out a Job Form which includes three references ,skill matrix and RTR. Note: Please submit candidates having 10+ years of experience. End Client: The Texas Workforce Commission (TWC) Job Title: Cybersecurity Engineer Location: 101 E. 15th Street, Austin, Texas 78778 The Position is Remote, but need to go to office on scheduled meetings. Visa: USC, GC, GCEAD, H4 USC Native are first preferred. Linked In must be one year old. Job Description: The Worker(s) will provide the following services: Perform advanced (senior level) cybersecurity analysis work essential for TWC Information Technology (IT) to fulfill its mission of service to people who live in Texas. Work involves protecting cybersecurity cloud assets and delivering cybersecurity threat assessment, cyber intelligence, software security, and vulnerability assessment services. Collaborate with mixed-matrixed or multi-discipline teams across the agency in cybersecurity-related decision- making, providing guidance and oversight in the implementation of improvements. Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data. Document and address organization's information security, cybersecurity cloud architecture, and systems security engineering requirements throughout the acquisition life cycle. Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity cloud architecture guidelines. Identify and prioritize critical business functions in collaboration with organizational stakeholders by performing security reviews, identifying gaps in security architecture, and developing security risk management plans and system security plans. Evaluate cloud security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents. Monitor IT security related websites, newsgroups, organizations and publications. Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document them appropriately. Work under minimal supervision, with extensive latitude for the use of initiative and independent judgment. Work may involve occasional travel to other locations/work sites to perform TWC services. After hours support may be required to respond to security incidents. Perform other duties as assigned to maintain operations. Candidate Skills and Qualifications: Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) willnot be considered for this opportunity. Years (leave no blanks)YearsSkills/ExperienceVendor Comment (as applicable) 4Graduation from an accredited four-year college or university with major coursework in cybersecurity, information technology security, computer engineering, computer information systems, computer science, management information systems or a related field. Full-time qualifying work experience may be substituted for each year of the required education (one year = 30 semester hours). 6Experience in cybersecurity analysis, or information security analysis 5Experience in security and/or enterprise architecture development, implementation, and management 6Experience in conducting security risk assessments and/or audits of policies, standards, procedures, and technical environments within state and federal statutes, regulations, and standards relating to information security and computer crime 5Excellent communication and presentation skills with the ability to articulate technical issues to all levels 5 Strong consultative, analytical and problem-solving skills Preferred: YearsSkills/ExperienceVendor Comment (as applicable) 4Skill in applying and incorporating information technologies into proposed solutions 4Skill in translating operational requirements into protection needs (i.e., security controls) and to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). 4Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes 4Skill in applying network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth); to identify critical infrastructure systems with information communication technology that were designed without system security considerations 2Texas Workforce Commission experience Thanks and Regards, Anurag Singh Sr. Technical Recruiter TEK Inspirations Pvt. Ltd. | Email: [email protected] LinkedIn: https://www.linkedin.com/in/anurag-singh-3401ba277/ Disclaimar: This communication, along with any documents, files or attachments, is intended only for the use of the addressee and may contain confidential information. If you are not the intended recipient, you are hereby notified that any dissemination, distribution or copying of any information contained in or attached to this communication is strictly prohibited, To remove your email address permanently from future mailings, please send REMOVE to [email protected]. Keywords: information technology golang green card Cybersecurity Engineer Remote, but need to go to office on scheduled meetings. [email protected] |
[email protected] View All |
01:58 AM 21-Feb-25 |