Epicareer Might not Working Properly
Learn More

Information Security Analyst

Salary undisclosed

Apply on

Availability Status

This job is expected to be in high demand and may close soon. We’ll remove this job ad once it's closed.


Original
Simplified

Our government client is looking for an experienced Information Security Analyst on a hybrid 12+ months renewable contract role in Indianapolis, IN.

Position: Information Security Analyst

About the Job:
Resource will work as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organizations IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases. This position will also participate in all federal and state audits against the agency technology systems. Employee works in an Information Technology Division of a State Agency, under the guidance of the Security Manager.
The essential functions of this role are as follows:
Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement;
Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment.
Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits.
Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53).
Develops Standard Operating Procedures (SOP) for implementing security polices;
Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems;
Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data;
Develops and implements procedures for use of information security management software;
Proposes information security software enhancements;
Performs periodic audits to assure security policies and standards are being followed and are effective.
Develops recommendations for enhancements and generates reports where necessary;
Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security;
Mentors and provides guidance to new or other staff as needed;
Performs related duties as assigned.
Assist on other task as assigned.
Thorough knowledge of information security management tools, policies, and standards of information security procedures;
Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy;
Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation;
Familiarity with domain structures, user authentication, and digital signatures;
Ability to develop and maintain information security standards;
Ability to understand and apply complex computer logic to work;
Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management;
Experience in assessing security needs of teams and assist in their security training.
Ability to communicate effectively both orally and in writing;
Ability to be a team member as well as a team leader depending on the situation;
Degree in information security or technology preferred;
Security certification preferred (e.g. CISSP).
Network Admin experience preferred.
Supervisory Responsibilities/Direct Reports:
This role does not provide direct supervision to direct reports.
Required/Desired Skills and Experience:

  • 3 years of to be effectively with wide range of information technologists, including systems administrators, technical support, application development, end users Required
  • 1 years of Network Admin experience Required
  • 1 years of Security certification (e.g. CISSP, CRISC) Required
  • 1 years of Ability to develop and maintain information security standards Required
  • 1 years of Ability to understand and apply complex computer logic to work Required
  • 1 years of Degree in information security or technology Required
  • Familiar with cybersecurity security framework (e.g. NIST, ISO, SOC 2, CIS, Cobit, etc.) Required
  • Computer security compliance and auditing experience Required
  • IRS, SSA computer security compliance and audit experience Required
  • HIPAA experience Required

About Vector:
Vector Consulting, Inc., (Headquartered in Atlanta) is an IT Talent Acquisition Solutions firm committed to delivering results. Since our founding in 1990, we have been partnering with our customers, understanding their business, and developing solutions with a commitment to quality, reliability, and value. Our continuing growth has been and continues to be built around successful relationships that are based on our organization's operating philosophy and commitment to ** People, Partnerships, Purpose and Performance - THE VECTOR WAY

Celebrating 30 years of service.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job