Cloud Migration & Cybersecurity - innovitusa
Austin, TX
About the Job
DESCRIPTION :
Client requires the services of Systems Analyst 3, hereafter referred to as Candidate(s), who meets the general qualifications of Systems Analyst 3, Applications/Software Development and the specifications outlined in this document for the client .
All work products resulting from the project shall be considered "works made for hire" and are the property of the client and may include pre-selection requirements that potential Vendors (and their Candidates) submit to and satisfy criminal background checks as authorized by Texas law. Client will pay no fees for interviews or discussions, which occur during the process of selecting a Candidate(s).
Infrastructure and Operations Support. Supports the TIERS Cloud Migration by providing system administration, security, and infrastructure support. Will perform analysis of on-prem and cloud security and monitor security operations including security architecture reviews. Our ideal candidate understands regulatory requirements, has in-depth knowledge of industry standards and trends, and is proficient with the latest cybersecurity software.
CANDIDATE SKILLS AND QUALIFICATIONS
- Strong ability to identify problems/issues, analyze and evaluate alternatives and recommend/implement effective solutions – Required-8-Years.
- Experience providing Windows and Linux operating system and application support– Required-8-Years
- High level knowledge and experience of network facilities and data processing techniques, of computer hardware and software, of network operating system and security software, and of performance monitoring and capacity management tools – Required-8-Years
- Orchestrate calls to include, but not limited to project kick-off calls, notification of high/critical findings during the testing process, and close out calls to review test findings, evidence, process steps to reproduce, and remediation recommendations – Required-8-Years.
- Ability to prepare concise written reports appropriate to the audience. Ability to communicate effectively verbally and in writing. – Required-8-Years
- Responsible for implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up to date on the latest intelligence, including hackers' methodologies, in order to anticipate breaches – Required-8-Years
- Responsible for ensuring all networks have adequate security to prevent unauthorized access. Also must ensure that all security systems are current with any software or hardware changes in the company – Required-8-Years
- Perform proactive research to identify and understand new threats, vulnerabilities and exploits. Perform procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction – Required-8-Years
- Extensive experience with working with and implementing NIST 800-37, NIST 800-53, MARS-E controls, POA&Ms, and developing Corrective Action Plans – Required-8-Years
- Review violations of computer security procedures and discuss procedures with HHSC/TIERS Security team. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes – Required-8-Years
- Experience providing Oracle, MSSQL, and Postgres database support – Required-8-Years
- Experience working with Archer GRC, Dynatrace, Splunk, Imperva Web Application Firewall, Qualys and MS Office tools–Preferred-5-Years
- Ability to training staff on network and information security procedures, processes and information safeguarding –Preferred-5-Years
- Experience with ITIL methodology-ticketing using Remedy and ServiceNow –Preferred-5-Years