Epicareer Might not Working Properly
Learn More

VSP - IT Security Analyst 4

  • Full Time, onsite
  • Cyber Resource Provider LLC
  • On Site, United States of America
Salary undisclosed

Checking job availability...

Original
Simplified
Engagement Type

Contract

Short Description

Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle.



3 days - on site - 2 days - remote

Complete Description

Analyze the securityimpact of application, configuration, and infrastructure changes to ensurecompliance with the security standard as part of the change managementlifecycle.

Assess theconfigurations of applications, servers, and network devices for compliancewith the security standard.

Analyze and document how the implementation ofa new system or new interfaces between systems impacts the security posture ofthe current environment.

Assess and document the security impact andrisks of newly discovered vulnerabilities in the environment.

Coordinate resolution of application andinfrastructure security vulnerabilities with System Owners, IT, and vendors.Track resolution of vulnerabilities and provide regular updates to management.

Coordinate resolution of endpoint security vulnerabilities with users and provide regular updates to management.

  • Respond to, and investigate, security incidents and provide thorough post-event analyses.
  • Perform internal application penetration testing, document findings, and recommend improvements to improve the organization's security posture.
  • Complete annual password security audits and coordinate completion of agency wide user access audits in compliance with the security standard.

Determine the protection needs (i.e., securitycontrols) for the information system(s) and network(s) and documentappropriately.

  • Create and maintain desk procedures and process documentation for all responsibilities.

Required/Desired Skills

Skill Required/Desired Amount of Experience
NIST 800-53 rev 5 and/or Criminal Justice Information System (CJIS) specifications for an information security management system. Required 5 Years
Software development lifecycle, vulnerability management processes, role-based authentication methodologies, etc. Required 5 Years
Familiarity with programming languages such as Python, Java, JavaScript, C++, C#, SQL, HTML, CSS, and/or COBOL. Required 5 Years
Expertise in using automated vulnerability scanners like Nessus, Qualys, Retina, and/or Tenable. Required 5 Years
Familiarity with web application security testing tools like Burp Suite, Fortify, and/or AppScan. Required 5 Years
Basic scripting skills (e.g. WDL, VBScript, JavaScript, PowerShell, Python) for automation Required 5 Years
IT security or risk assessment certifications are advantageous (CISM, CCSP, CISSP, CEH, CompTIA Pentest+ and/or CompTIA Security+) Required 5 Years
Questions

Description
Question 1 Commonwealth of Virginia security policies prohibit the use of offshore IT contractors. Do you attest to the fact that your candidate will physically reside within the US for the duration of the assignment?
Question 2 Please list candidate's email address.
Question 3 If selected the role requires the candidate to work on site in a hybrid capacity. Does your candidate agree to this arrangement?
Question 4 If Selected this role requires the candidate to interview in person. Does your candidate agree to this arrangement?
Question 5 In what City and State is your Candidate located?
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job
Engagement Type

Contract

Short Description

Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle.



3 days - on site - 2 days - remote

Complete Description

Analyze the securityimpact of application, configuration, and infrastructure changes to ensurecompliance with the security standard as part of the change managementlifecycle.

Assess theconfigurations of applications, servers, and network devices for compliancewith the security standard.

Analyze and document how the implementation ofa new system or new interfaces between systems impacts the security posture ofthe current environment.

Assess and document the security impact andrisks of newly discovered vulnerabilities in the environment.

Coordinate resolution of application andinfrastructure security vulnerabilities with System Owners, IT, and vendors.Track resolution of vulnerabilities and provide regular updates to management.

Coordinate resolution of endpoint security vulnerabilities with users and provide regular updates to management.

  • Respond to, and investigate, security incidents and provide thorough post-event analyses.
  • Perform internal application penetration testing, document findings, and recommend improvements to improve the organization's security posture.
  • Complete annual password security audits and coordinate completion of agency wide user access audits in compliance with the security standard.

Determine the protection needs (i.e., securitycontrols) for the information system(s) and network(s) and documentappropriately.

  • Create and maintain desk procedures and process documentation for all responsibilities.

Required/Desired Skills

Skill Required/Desired Amount of Experience
NIST 800-53 rev 5 and/or Criminal Justice Information System (CJIS) specifications for an information security management system. Required 5 Years
Software development lifecycle, vulnerability management processes, role-based authentication methodologies, etc. Required 5 Years
Familiarity with programming languages such as Python, Java, JavaScript, C++, C#, SQL, HTML, CSS, and/or COBOL. Required 5 Years
Expertise in using automated vulnerability scanners like Nessus, Qualys, Retina, and/or Tenable. Required 5 Years
Familiarity with web application security testing tools like Burp Suite, Fortify, and/or AppScan. Required 5 Years
Basic scripting skills (e.g. WDL, VBScript, JavaScript, PowerShell, Python) for automation Required 5 Years
IT security or risk assessment certifications are advantageous (CISM, CCSP, CISSP, CEH, CompTIA Pentest+ and/or CompTIA Security+) Required 5 Years
Questions

Description
Question 1 Commonwealth of Virginia security policies prohibit the use of offshore IT contractors. Do you attest to the fact that your candidate will physically reside within the US for the duration of the assignment?
Question 2 Please list candidate's email address.
Question 3 If selected the role requires the candidate to work on site in a hybrid capacity. Does your candidate agree to this arrangement?
Question 4 If Selected this role requires the candidate to interview in person. Does your candidate agree to this arrangement?
Question 5 In what City and State is your Candidate located?
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job