Job Description
We have an Opportunity for an Info Security Analyst-Senior for the IN Department of Child Services Indianapolis IN in Indianapolis IN. I am forwarding the JD for your reference. Kindly review it and let me know if you would be interested in this opportunity.
LOCAL CANDIDATES ONLY.
JD:
IN-DCS-Info Security Analyst-Senior (709682)
Rate/Compensation: $49 on W2 hourly (No benefits) or $83,900K plus benefits
Location: Onsite500 North Meridian Street
Indianapolis IN 46204
Interview Mode: Webcam
The resource will work in the Department of Child Services,Child Support Bureau (CSB) IT Office for the child support systems-Indiana Support Enforcement Tracking System (!SETS) and the future Indiana Verification and Enforcement of Support (INvest) system
Selected resource works as a Security Analyst and performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction and typically reports to the Information Security Manager or higher-level staff.
The essential functions of this role are as follows:
• Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement;
• Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment.
• Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits.
• Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53).
• Develops Standard Operating Procedures (SOP) for implementing security polices;
• Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems;
• Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data;
• Develops and implements procedures for use of information security management software;
• Proposes information security software enhancements;
• Performs periodic audits to assure security policies and standards are being followed and are effective.
• Develops recommendations for enhancements and generates reports where necessary;
• Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security;
• Mentors and provides guidance to new or other staff as needed;
• Performs related duties as assigned.
• Assist on other task as assigned.
Thorough knowledge of information security management tools, policies, and standards of information security procedures;
• Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy;
• Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation;
• Familiarity with domain structures, user authentication, and digital signatures;
• Ability to develop and maintain information security standards;
• Ability to understand and apply complex computer logic to work;
• Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management;
• Experience in assessing security needs of teams and assist in their security training.
• Ability to communicate effectively both orally and in writing;
• Ability to be a team member as well as a team leader depending on the situation;
• Degree in information security or technology preferred;
• Security certification preferred (e.g. CISSP).
• Network Admin experience preferred.
Supervisory Responsibilities/Direct Reports:
This role does not provide direct supervision to direct reports.
Required / Desired Skills
Skill
Required / Desired
Amount
of Experience
Thorough knowledge of information security management tools, policies, and standards of information security practicesRequired1Years
Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediationRequired1Years
Familiarity with domain structures and user authenticationRequired1Years
Ability to develop and maintain information security standards;Required1Years
To be effectively with wide range of information technologists,including systems administrators, technical support, application development, end usersRequired1Years
Experience in assessing security needs of teams and assist in their security trainingRequired1Years
Ability to understand and apply complex computer logic to workRequired
Ability to communicate effectively both orally and in writingRequired
Ability to be a team member as well as a team leader depending on the situationRequired
Degree in information security or technologyHighly desired
Security certification (e.g. CISSP, CRISC)Desired
Network Admin experience preferredDesired
Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacyDesired
Familiarity with digital signaturesDesired
Questions
Description
Question 1Absences greater than two weeks MUST be approved by CAI management in advance, and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you accept this requirement?
Question 2Please list candidate's email address.
Question 3Please list the city and state where candidate currently resides.
Question 5Flexible on work schedule, Monday to Friday ( Start Time 7:30 AM - 8:00 AM and End Time 4:30 PM - 5:00 PM )
Question 6Resource will be required to work onsite full-time in IN. Please confirm the resource understands this requirement.
Question 7Selected resource will be required to pass a Fingerprint background check. Please confirm the resource understands this requirement.
Question 8This position has no overtime requirements. Please confirm the resource understands this requirement.
Thanks & Regards.
Niketa Ganju
Ph/Cell: 908 256 4984