: Security Systems Analyst ||Hybrid ||6 months || Public SectorExperience is required at Austin, Texas, USA |
Email: [email protected] |
http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=2202707&uid= From: mansi verma, TEK Inspirations LLC [email protected] Reply to: [email protected] Hello, Hope you are doing well. Please find below requirement and let me know your confirmation for this role. Must-Have: Public Sector IF A CANDIDATE DOES NOT HAVE PUBLIC SECTOR, DON'T SEND Client Department Experience (Health/Human Services) Read Below For Residency requirements Please use the JOB NUMBER when submitting. Mandatory form where Required means Required, and the more years for Preferred, the interest level increases. Follow keyword-search criteria. We count on you for keywords in the resume! Client uses AI and keywords are checked. We need to find the Best Candidates! Thank you. Security Systems Analyst. If you have an exclusive candidate that meets/exceeds these requirements, please let me know and Ill get the forms to you for completion. Here are the details. JOB TITLE: Security Systems Analyst LOCATION: Austin, TX ( Hybrid - On Site and Telework. Program will only allow candidates who are within the City of Austin or the surrounding cities. (LOCALS ONLY).) 50 miles from Austinn JOB DESCRIPTION/MINIMUM REQUIREMENTS: Supports TIERS Operations, AWS Cloud Migration and TIERS Cloud Migration's Authority to Connect project by applying information security threat intelligence to identify and exploit vulnerabilities within different environments. On a daily basis you will perform analysis of on-prem and cloud security and operations related to security. Our ideal candidate has experience working in a large operations and development environments and is knowledgeable about custodian artifacts that are regulatory requirements. In this role you will assist IT operations and development teams to meet industry standards, and be proficient with the latest cybersecurity software. On a daily basis interacts with all aspects of IT responsible for the management of DevSecOps. Requires knowledge of infrastructure in IT operations including understanding of databases and system administration. This position may be required to come to the office once a week or more. Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. | Years | Required/Preferred | Experience | 8 | Required | Coordinates and executes security policies and controls, as well as assess vulnerabilities within the company. | 8 | Required | Experience with data and network security processing, security systems management, and security violation investigation. | 8 | Required | On a daily basis performs analysis of on-prem and cloud security operations and works with DevSecOps teams with delivery of security related activities including audits, documentation, and reporting. | 8 | Required | Understands regulatory requirements, has in-depth knowledge of industry standards and trends, and is proficient with the latest cybersecurity software. Works with DevSecOps and custodians. | 8 | Required | Experience with managing various projects and ability to plan and oversees all aspects of the projects. | 8 | Required | Strong ability to identify problems/issues, analyze and evaluate alternatives and recommend/implement effective solutions. | 8 | Required | Orchestrate calls to include, but not limited to project kick-off calls, notification of high/critical findings during the testing process, and close out calls to review test findings, evidence, process steps to reproduce, and remediation recommendations. | 8 | Required | Experience implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up to date on the latest intelligence, including hackers methodologies, in order to anticipate breaches. | 8 | Required | Extensive experience with working with and implementing NIST 800-37, NIST 800-53, MARS-E controls, POA&Ms, and developing Corrective Action Plans. | 8 | Required | Review violations of computer security procedures and discuss procedures with HHSC/TIERS Security team. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. | 8 | Required | Experience with Security web application firewalls. | 8 | Required | Experience with managing conflict and resolving issues at managerial levels. | 8 | Required | Experience with reviewing and coordinating audit responses, evidence gathering, and plan of actions. Experience collaborating with IT departments to coordinate audit responses. | 5 | Preferred | Skilled information technology professional with advanced experience developing and implementing IT policy, standards and procedures. | 4 | Preferred | Experience in delivering technical training in cloud- based technology is a plus. | 4 | Preferred | Experience providing Windows and Linux operating system and application support. | 4 | Preferred | Experience with information security risk assessments. | 4 | Preferred | Experience with security governance and documentation and security plan documents. | 4 | Preferred | In-depth knowledge of AWS Cloud Security preferred. | 4 | Preferred | In depth knowledge and hand on experience on AWS Cloud Security preferred or experience with other Cloud service providers. | 3 | Preferred | Experience ITIL - ticketing using Remedy and ServiceNow. | 3 | Preferred | Ability to training staff on network and information security procedures, processes and information safeguarding. | 3 | Preferred | Experience working with Archer GRC, Dynatrace, Splunk, Imperva Web Application Firewall, Qualys and MS Office tools. | MANDATORY FORM PLEASE READ THE BELOW AGAIN AND FOLLOW THE INSTRUCTIONS! This form is essential and must be completed before submitting to client. Please read and follow all client instructions AND WATCH YOUR SUBMISSIONS FOR TYPOS. We find it unfortunate that many folks just dont read everything and get deleted in the submission process since there are errors. These are CLIENT INSTRUCTIONS, not ours. Please, the form must be complete and accurate. We had an instance where a personal reference did NOT list a phone number. Fortunately, we have a strong relationship with the HR folks in Texas and if not, the entire resume would have been put in the trash and NEVER REVIEWED. Don't let that disqualify the individual and remove all your hard work! Read carefully and follow every requirement. The requirement must be met or exceeded or HR/Texas will not accept. These are client rules, not our rules Please.... - Three references with valid Phone Numbers - All docs in Word - Each requirement must be met or exceeded. With Preferred, there is some flexibility, but less than the number of years for a Preferred means less hourly rate and may decrease interest in the candidate. Also, local, state, or Federal experience should get an interview. Where possible: - Public-sector experience has become more important. This becomes stronger when the Texas position relates directly to the previous public-sector experience. For example, if Texas has an opening in Motor Vehicles, your candidate with Motor Vehicle experience in say Michigan is a huge plus to be selected for an interview. Even better if the candidate has Texas experience. Thanks, and Regards, Mansi Verma Technical Recruiter TEK Inspirations LLC | 13573 Tabasco Cat Trail, Frisco, TX 75035 . E: - [email protected] Keywords: artificial intelligence information technology microsoft Texas : Security Systems Analyst ||Hybrid ||6 months || Public SectorExperience is required [email protected] http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=2202707&uid= |
[email protected] View All |
04:38 AM 25-Feb-25 |