VSP - IT Security Analyst 4

Overview

Full Time
Part Time
Accepts corp to corp applications
Contract - W2
Contract - Independent

Skills

VSP
Information Security
Cyber Security
System Security
Acquisition
SANS
Security Operations
Incident Management
Identity Management
Risk Management
IT Operations
Software Development Methodology
Oracle Linux
Software Configuration
Change Management
Servers
Interfaces
Endpoint Protection
Management
Auditing
Regulatory Compliance
Security Controls
Network
Documentation
NIST 800-53
Criminal Justice
Information Security Management
Software Development
Vulnerability Management
Authentication
Programming Languages
Java
C++
C#
SQL
HTML
Cascading Style Sheets
COBOL
Nessus
Qualys
Web Application Security
Testing
Burp Suite
Fortify
IBM Security AppScan
Scripting
VBScript
JavaScript
Windows PowerShell
Python
IT Security
Risk Assessment
CISM
Cisco Certifications
CISSP
Certified Ethical Hacker
CompTIA
Penetration Testing
Security+
Offshoring
Screening
Technical Direction

Job Details

Engagement Type
Contract
Short Description
Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle.
Max Vendor Rate 89.63

3 days - on site - 2 days - remote

Complete Description

DO NOT SUBMIT CANDIDATES THAT WERE SUBMITTED TO 760300.



Notes from the manager:

For this position we are really looking for someone who is strong in Security Operations (Vulnerability Management, Penetration Testing, Incident Response, Identity Access Management, etc.). A few of the candidates were strong in Risk Management (Risk Assessment, Data Classification, Audits, etc.) but we already have those skills on our team. The remaining candidates mostly struggled to answer basic technical questions relating to security and seemed to mostly come from more IT Operations backgrounds. We are looking for an experienced person as this is not an entry level opening.

General things to consider when screening:

  1. Experience with vulnerability management is key for this position.
  2. Experience with application penetration is key for this position.
  3. Experience with Dev SecOps/Secure Software Development Lifecycle (Secure SDLC/SSDLC)/Secure by Design is key for this position.
  4. Scripting and automation experience is highly desired for this position.
  5. Interpersonal skills and being able to talk with and manage stakeholders are key for this position.


Analyze the security impact of application, configuration, and infrastructure changes to ensure compliance with the security standard as part of the change management lifecycle.

Assess the configurations of applications, servers, and network devices for compliance with the security standard.

Analyze and document how the implementation of new system or new interfaces between systems impacts the security posture of the current environment.

Assess and document the security impact and risks of newly discovered vulnerabilities in the environment.

Coordinate resolution of application and infrastructure security vulnerabilities with System Owners, IT, and vendors. Track resolution of vulnerabilities and provide regular updates to management.

Coordinate resolution of endpoint security vulnerabilities with users and provide regular updates to management.

  • Respond to, and investigate, security incidents and provide thorough post-event analyses.
  • Perform internal application penetration testing, document findings, and recommend improvements to improve the organization s security posture.
  • Complete annual password security audits and coordinate completion of agency wide user access audits in compliance with the security standard.

Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and documentappropriately.

  • Create and maintain desk procedures and process documentation for all responsibilities.

Required/Desired Skills
SkillRequired/DesiredAmountof Experience
NIST 800-53 rev 5 and/or Criminal Justice Information System (CJIS) specifications for an information security management system. Required5Years
Software development lifecycle, vulnerability management processes, role-based authentication methodologies, etc.Required5Years
Familiarity with programming languages such as Python, Java, JavaScript, C++, C#, SQL, HTML, CSS, and/or COBOL.Required5Years
Expertise in using automated vulnerability scanners like Nessus, Qualys, Retina, and/or Tenable.Required5Years
Familiarity with web application security testing tools like Burp Suite, Fortify, and/or AppScan.Required5Years
Basic scripting skills (e.g. WDL, VBScript, JavaScript, PowerShell, Python) for automationRequired5Years
IT security or risk assessment certifications are advantageous (CISM, CCSP, CISSP, CEH, CompTIA Pentest+ and/or CompTIA Security+)Required5Years
Questions
Description
Question 1Commonwealth of Virginia security policies prohibit the use of offshore IT contractors. Do you attest to the fact that your candidate will physically reside within the US for the duration of the assignment?
Question 2Please list candidate's email address.
Question 3If selected the role requires the candidate to work on site in a hybrid capacity. Does your candidate agree to this arrangement?
Question 4 If Selected this role requires the candidate to interview in person. Does your candidate agree to this arrangement?
Question 5In what City and State is your Candidate located?
Question 6When screening your candidate, please confirm with them that they were not submitted to 760300. If they were they will not be considered.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.