Job Id: NC-617828 (910690124)
Security Analyst with vulnerability assessment, NIST, HIPAA, IRS Pub 1075, NESSUS and NMAP experience
Location – Raleigh NC (NCDHHS)
Duration: 12+ Months
Interview- Either Webcam Interview or In Person
Need 3 References
Risk Management – must be able to Identify gaps through risk management, and assist in the development of mitigation strategies. Required 7 Years
Experience updating privacy and security policies based on gaps found through an assessment process. Required 7 Years
Discover, evaluate, assess, systems, networks, and components through the use of vulnerability scanning and risk assessment method. Required 7 Years
Experience documenting vulnerability assessment results in a accurate, clear, actionable, and available way to appropriate personnel Required 7 Years
Must be able to review & assess projects and systems throughout all phases of their life cycle in an effort to identify Privacy org needs Required 7 Years
Must be able to serve as a knowledge base for organizations as it relates to compliance requirements and mitigation strategies. Required 7 Years
Experience Performing risk assessments based on NIST 800-53 Rev 4. ISO-27001, HIPAA, and IRS Pub 1075. Required 7 Years
Experience with network mapping and vulnerability scanning tools such as NESSUS and NMAP. Required 7 Years
Experience leading a technical team and assist the technical team Required 7 Years.
NC DHHS – Privacy and Security Office (PSO) requiring services of an IT Security Lead to aid county offices in the identification of gaps through risk management, and assist in the development of mitigation strategies.
NC DHHS – Privacy and Security Office (PSO) requiring services of an IT Security Team Lead to lead/ manage county assessment team to aid county offices in the identification of gaps through risk management, and assist in the development of mitigation strategies, and to establish the target security/infrastructure architecture.
Duties include, are not limited to:
* Lead a security specialist team for risk management.
* Author corresponding requirements, including definition of dependencies on infrastructure consolidation efforts.
* Define Security/Information Assurance requirements (and dependencies).
* Specify key architectural aspects of the architecture view, and identify other aspects that need definition.
* Research Best Practices for reuse, applying State IT Security and industry standards, and defining the transformation approach that transitions the current architecture to the target architecture.
The ideal candidate will have experience working with current and emerging information security technologies and development methodologies. Bachelor’s degree in computer science, management information systems, or related field preferred. Good analytical and creative problem solving skills, and relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, with a wide degree of creativity and latitude is expected.