Role : Cybersecurity Contractor
Location : HERMITAGE, TN(Remote) Role is remote but prefer someone located in Hermitage.
14+ years experience required
As a Cybersecurity Contractor, you will support the project team by ensuring the security and integrity of information systems and data.Conduct security assessments and vulnerability analyses to identify potential risks.Implement and maintain cybersecurity measures, including firewalls, encryption, and intrusion detection systems.Monitor and respond to security incidents and breaches, providing timely resolution.Develop and update security policies, procedures, and documentation to ensure compliance with industry standards.Collaborate with stakeholders to ensure cybersecurity best practices are integrated into all aspects of the project.
This role supports the programs of ITS (Information Technology Services) Cyber Security, Risk & Compliance (CSRC) which includes, risk management, compliance management, third party risk assessments, and security awareness. This position is specifically responsible for understanding and assessing security, confidentiality/privacy, and operational risks related to solutions of third party providers. Assessments and controls include those relevant to laws, regulations, and industry security standards. Security awareness and training activities will also be a component of this position.
Conduct information security assessments of third party vendors to determine their ability to protect confidential data.
Enhance risk/vulnerability assessment programs and questionnaires to aid in the identification and mitigation of security risks.
Identify and document information security vulnerabilities and risks in the information technology environment.
Evaluate identified vulnerabilities and risks, working with business owners, risk management, and vendor representatives
Identify tasks necessary to remediate identified vendor risks and vulnerabilities; negotiate dates for remediation to be complete
Track progress on remediation of identified risks and vulnerabilities and provide appropriate reporting to constituents
Monitor appropriate sources for newly identified vulnerabilities, evaluate the risk such vulnerabilities pose to the organization's information and systems, and advise management of appropriate measures to eliminate or reduce the organization's risk or exposure to such vulnerabilities.
Monitor appropriate industry sources to maintain awareness of new security tools and techniques and research those tools and techniques that have the potential to improve the organization's ability to protect its information and infrastructure.
Maintain expertise in identifying security risks in the hardware, software, and systems used by the organization.
Participate in appropriate opportunities for continuing education, seminars, participation in field-related professional organizations, and so on to remain current on developments in the information security profession.
Ensure that identified risks are managed in accordance with the Risk Management program.