Security Analys

Apply for this position Please mention DailyRemote when applying
timePosted 4 days ago location United States salarySalary undisclosed
Before you apply - make sure the job is legit.

Attempting to apply for jobs might take you off this site to a different website not owned by us. Any consequence as a result for attempting to apply for jobs is strictly at your own risk and we assume no liability.

Job Description

SCOPE OF THE PROJECT The consultant will be responsible for the clientrsquos Information Systems and Data. Client seeks an expert Senior ISSO to oversee (and actively participate in) the day-to-day security and compliance requirements of complex information system operating environments. A successful Senior ISSO will lead the establishment, implementation andor enhancement of Information Systems Security and Compliance efforts based on standards and Regulatory Guidance such as FISMA, NIST, CMS MARS-E, HIPAA, etc.) DAILY DUTIES RESPONSIBILITIES The Senior ISSO will report to the Director as an experienced IA consultant to project leadership, business units, business partners and vendors. Security Program Experience Leadership experience with CMS MARS-E or other FISMA Risk Management Framework (RMF) compliant programs is strongly desired and will be given the highest weight. Experience should include well documented success in the development and maintenance of System Security Plans, Privacy Impact Assessments, Interconnection Security Agreements, Computer Matching Agreements, and related interviews and auditassessment activities to complete and verify these and other RMFAssessment and Authorization (AA) tasks and artifacts. Experience with development and integration of RMFAA tasks and artifacts in RMF type roles such as Information System Security Officer, Information Security Architect, Security Control Assessor, etc... into the System Development Life Cycle (SDLC) is ideal. Experience in security as related to Cloud services and vendor management is considered desirable for this position. Technical Knowledge Hands on experience with any or all of the following technologies would be considered a desirable for this position 1. RSA Archer 2. Enterprise NoSQL Database 3. IBM System 390zSeries 4. Linux and Windows servers 5. Network Firewalls, Intrusion Prevention Systems (IPS) , Switching and Routing Infrastructure 6. Security Information and Event Management (SIEM) solutions 7. Identity and Access Management (IAM) solutions General Duties and Responsibilities 1. Perform detailed architectural reviews and risk analysis of security related requests in order to make sound decision making recommendations, such as a. Network Design and Information Flow b. System and Data Access Models c. Review Firewall Rule Requests (Ports, Protocols and Services) d. Baseline Configuration Management Deviation Requests e. Vulnerability Management 2. Champion the design, development, implementation andor ongoing maturation of security and compliance efforts. 3. Audit and Assess internal agency systems as well as business partnerservice provider information system security controls. 4. Utilize Microsoft Office software suite, System Center Service Manager (Ticketing system), RSA Archer eGRC system, Bizagi, Atlassian and other products to document and report on information gathered during Audit and Assessment activities or other system efforts. 5. Perform security and compliance reviews of Contracts, Business Associate Agreements, Data UsageSharing Agreements and other type documents and artifacts. 6. Serve as primary point of contact for third-party audits andor assessments of agency and business partner systems 7. Collaborate with agency leadership, business partners and other partiesstakeholders to provide recommendations for security and compliance risk mitigation efforts. Required KnowledgeSkills 1. Must have a strong working knowledge of FISMA, NIST, CMS MARS-E and HIPAA Security and Privacy. 2. 5+ years of experience in I.T. working with andor auditing IBM System 390zSeries, Windows, Linux, Databases (Relational and Non-Relational), Networking Infrastructure and Web-based Applications. 3. Prior experience working within a FISMA compliant program. 4. Prior experience in working with any eGRC systems. 5. Prior Health Information Technology experience. 6. ISC(2), ISACA, SANS GIAC andor other Information Security Certification is required. 7. Ability to work independently and as a member of a team. 8. Ability to collaborate and coordinate with multiple teams and vendors. 9. Ability to multitask and prioritize tasks effectively in order to meet deadlines. 10. Experience and training with eGRC solutions. 11. Ability to engage diverse audiences of varying technical and non-technical skill-levels to ensure effective alignment of technical requirements to business objectives. 12. Ability to collaborate and coordinate efforts amongst multiple teams and vendors in fulfillment of clientrsquos initiatives. 13. Ability to multitask and prioritize tasks effectively in order to meet deadlines in a results-oriented environment. 14. Must have intermediate to advanced skills in Microsoft Office products (Word, Excel, PowerPoint, Visio) to include working with templates and style guidelines for branding consistency. 15. Keen attention to detail while maintaining the ability to see the big picture. 16. Ability to absorb, retain and communicate complex processes. 17. Ability to accept changes and constructive criticism and remain flexible in dealing with leadership and teams of varying technical and business knowledge. REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE) 1. 5+ years of experience in I.T. working with andor auditing IBM System 390zSeries, Windows, Linux, Databases (Relational and Non-Relational), Networking Infrastructure and Web-based Applications. 2. Prior experience working within a FISMA compliant program. 3. Prior experience in working with any eGRC systems. 4. Prior Health Information Technology experience. PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE) 1. Prior ITIL experience in the area of Information Security Management. REQUIRED EDUCATIONCERTIFICATIONS 1. ISC(2), ISACA, SANS GIAC andor other Information Security Certification is required. PREFERRED EDUCATIONCERTIFICATIONS 1. BS degree in computer science or similar discipline. INTERVIEW PROCESS (phone, video or in-person, how many rounds of ivrsquos, etc) In-person or video for initial interview. Phone may be used for secondary interview(s)