• Snapboard
  • Activity
  • Reports
  • Campaign
Welcome ,

Chat with the recruiter

...Minimize

Hey I'm Online! Leave me a message.
Let me know if you have any questions.

Refrigeration Maintenance Technician - Full Time - Alexandria, KY 41001

In United States

Save this job

Refrigeration Maintenance Technician - Full Time - Alexandria, KY 41001   

Click on the below icons to share this job to Linkedin, Twitter!

JOB TITLE:

Refrigeration Maintenance Technician - Full Time - Alexandria, KY 41001

JOB TYPE:

JOB SKILLS:

JOB LOCATION:

Alexandria United States

JOB DESCRIPTION:

Position: IT Security Analyst 

REQ ID: 103530

Client Name:  State of Michigan -  IT - DTMB - Agency Services - MDOT

Job Location:  Lansing, MI

Top Skills & Years of Experience:
• Experience in the IT industry analyzing and applying information security principles and practices - Required: 4 Years
• Experience reviewing IT systems/applications plus basic knowledge of networking components and various operating systems -- Required: 4 Years
• Experience analyzing the applicable NIST Special Publications 800-37 Revision 1, 800-53 Revision 3,4 or 5, and 800-53A Revision 1. -- Required: 2 Years

Interview Process: Virtual Interview via MS Teams video. Please use a laptop and be prepared so share a screen if asked.

Duration: 1 year with possible extension.

Remote or On-site: Candidates MUST be located in MI. (Local preferred) Will need to be onsite starting May 2nd for 2-day a week hybrid schedule. NO remote only options.

 

Position Description: IT Security Analyst II with the Department of Technology, Management, and Budget (DTMB) Agency Services supporting the Michigan Department of Transportation (MDOT).

Detailed Job Duties:

The IT Security Analyst is responsible for completing and maintaining system security plans (SSP) for new and existing systems. The system security plans are documented in the Governance, Risk, Compliance (GRC) tool. This requires close coordination with IT project teams, business and enterprise security representatives, and product owners, to establish and maintain processes and controls for security vulnerability remediation.

Responsibilities:

· Create system security plans (SSP) for new applications in alignment with the Secure Application Development Life Cycle (SADLC) and Michigan Security Accreditation Process (MiSAP). 

· Maintain SSPs for existing applications requiring authority to operate (ATO) and those facing software and/or hardware enhancements.

· Collaborate with business representatives to establish system registration.

· Identify security testing and system scanning requirements.

· Analyze risk assessments and provide mitigating actions and responses for technical controls.

· Continuously monitor plans of action and milestones (POAM) and corrective action plans (CAP) as they relate to the SSPs in collaboration with the MDOT Enterprise Information Management (EIM) office.

· Validate respective SSPs to ensure NIST control requirements are met.

· Author recommendations associated with your findings on how to improve the customer's security posture in accordance with SOM PSP & NIST controls.

· Assist team members and vendors with proper artifact collection to satisfy assessment requirements.

 

Skillsets Required:

· Experience in the IT industry analyzing and applying information security principles and practices Required: 4 Years

· Experience reviewing IT systems/applications plus basic knowledge of networking components and various operating systems Required: 4 Years

· Experience analyzing the applicable NIST Special Publications 800-37 Revision 1, 800-53 Revision 3,4 or 5, and 800-53A Revision 1. Required: 2 Years

· Experience with other Security Frameworks (ISO, PCI, NIST, COBIT, HIPAA/HITECH, etc.) and regulatory requirements is a plus Nice to have: 2 years

· CISSP, CISA, PMP and/or Security+ certification Nice to have

· Experience working with software vendors to implement security controls Nice to have

· Experience using Lockpath or similar GRC tool Nice to have

· Experience working independently and in a team environment

· Strong written and verbal communication skills including the ability to explain technical matters to a non-technical audience

· Ability to collaborate on multiple projects/efforts at a given time

· Flexibility to adjust quickly to multiple demands, shifting priorities, ambiguity, and rapid change

Position Details

POSTED:

Nov 28, 2022

EMPLOYMENT:

INDUSTRY:

SNAPRECRUIT ID:

S1651017619740660

LOCATION:

United States

CITY:

Alexandria

Job Origin:

OORWIN_ORGANIC_FEED

A job sourcing event
In Dallas Fort Worth
Aug 19, 2017 9am-6pm
All job seekers welcome!

Refrigeration Maintenance Technician - Full Time - Alexandria, KY 41001    Apply

Click on the below icons to share this job to Linkedin, Twitter!

<p style="text-align:start"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif"><span style="text-align:justify">Position: </span>IT Security Analyst </font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif"><span style="text-align:justify"><span style="color:black">REQ ID: </span></span>103530</font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-bottom:11px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><span style="line-height:13.91px"><font face="verdana, sans-serif"><span style="text-align:justify">Client Name: <span style="line-height:12.1267px"><span style="color:black"><span style="background-image:initial"><span style="background-position:initial"><span style="background-size:initial"><span style="background-repeat:initial"><span style="background-origin:initial"><span style="background-clip:initial"> State of Michigan - </span></span></span></span></span></span></span></span></span> IT - DTMB - Agency Services - MDOT</font></span></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-bottom:11px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><span style="line-height:13.91px"><font face="verdana, sans-serif"><span style="text-align:justify">Job Location: </span> Lansing, MI</font></span></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-bottom:11px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><span style="line-height:13.91px"><font face="verdana, sans-serif"><b>Top Skills & Years of Experience:</b><br /> • Experience in the IT industry analyzing and applying information security principles and practices - Required: 4 Years<br /> • Experience reviewing IT systems/applications plus basic knowledge of networking components and various operating systems -- Required: 4 Years<br /> • Experience analyzing the applicable NIST Special Publications 800-37 Revision 1, 800-53 Revision 3,4 or 5, and 800-53A Revision 1. -- Required: 2 Years</font></span></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-bottom:11px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><span style="line-height:13.91px"><font face="verdana, sans-serif"><b>Interview Process:</b> Virtual Interview via MS Teams video. Please use a laptop and be prepared so share a screen if asked.</font></span></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-bottom:11px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><span style="line-height:13.91px"><font face="verdana, sans-serif"><b>Duration: </b>1 year with possible extension.</font></span></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-bottom:11px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><span style="line-height:13.91px"><font face="verdana, sans-serif"><b>Remote or On-site:</b> Candidates MUST be located in MI. (Local preferred) Will need to be onsite starting May 2nd for 2-day a week hybrid schedule. NO remote only options.</font></span></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-bottom:11px"> </p> <p style="text-align:start; margin-bottom:11px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><span style="line-height:13.91px"><font face="verdana, sans-serif"><b><u><span lang="EN-US" style="line-height:13.91px">Position Description:</span></u></b><span lang="EN-US" style="line-height:13.91px"> IT Security Analyst II with the Department of Technology, Management, and Budget (DTMB) Agency Services supporting the Michigan Department of Transportation (MDOT).</span></font></span></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-bottom:11px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><span style="line-height:13.91px"><b><u><span lang="EN-US" style="line-height:13.91px"><font face="verdana, sans-serif">Detailed Job Duties:</font></span></u></b></span></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-bottom:11px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><span style="line-height:13.91px"><span lang="EN-US" style="line-height:13.91px"><font face="verdana, sans-serif">The IT Security Analyst is responsible for completing and maintaining system security plans (SSP) for new and existing systems. The system security plans are documented in the Governance, Risk, Compliance (GRC) tool. This requires close coordination with IT project teams, business and enterprise security representatives, and product owners, to establish and maintain processes and controls for security vulnerability remediation.</font></span></span></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-bottom:11px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><span style="line-height:13.91px"><font face="verdana, sans-serif"><b><u><span lang="EN-US" style="line-height:13.91px">Responsibilities:</span></u></b></font></span></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:24px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif"><a name="m_6940878194636560177__Hlk510093952" style="color:#222222"></a>· Create system security plans (SSP) for new applications in alignment with the Secure Application Development Life Cycle (SADLC) and Michigan Security Accreditation Process (MiSAP). </font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:24px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Maintain SSPs for existing applications requiring authority to operate (ATO) and those facing software and/or hardware enhancements.</font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:24px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Collaborate with business representatives to establish system registration.</font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:24px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Identify security testing and system scanning requirements.</font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:24px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Analyze risk assessments and provide mitigating actions and responses for technical controls.</font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:24px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Continuously monitor plans of action and milestones (POAM) and corrective action plans (CAP) as they relate to the SSPs in collaboration with the MDOT Enterprise Information Management (EIM) office.</font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:24px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Validate respective SSPs to ensure NIST control requirements are met.</font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:24px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Author recommendations associated with your findings on how to improve the customer's security posture in accordance with SOM PSP & NIST controls.</font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:24px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Assist team members and vendors with proper artifact collection to satisfy assessment requirements.</font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-bottom:11px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><span style="line-height:13.91px"><u><span lang="EN-US" style="line-height:13.91px"><span style="text-decoration-line:none"><font face="verdana, sans-serif"> </font></span></span></u></span></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-bottom:11px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><span style="line-height:13.91px"><b><u><span lang="EN-US" style="line-height:13.91px"><font face="verdana, sans-serif">Skillsets Required:</font></span></u></b></span></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:48px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Experience in the IT industry analyzing and applying information security principles and practices <b><span style="background:lime">Required: 4 Years</span></b></font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:48px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Experience reviewing IT systems/applications plus basic knowledge of networking components and various operating systems <b><span style="background:lime">Required: 4</span></b><span style="background:lime"> <b>Years</b></span></font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:48px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Experience analyzing the applicable NIST Special Publications 800-37 Revision 1, 800-53 Revision 3,4 or 5, and 800-53A Revision 1. <b><span style="background:lime">Required: 2</span></b><span style="background:lime"> <b>Years</b></span></font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:48px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Experience with other Security Frameworks (ISO, PCI, NIST, COBIT, HIPAA/HITECH, etc.) and regulatory requirements is a plus <span style="background:lime">Nice to have: 2 years</span></font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:48px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· CISSP, CISA, PMP and/or Security+ certification <span style="background:lime">Nice to have</span></font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:48px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Experience working with software vendors to implement security controls <span style="background:lime">Nice to have</span></font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:48px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Experience using Lockpath or similar GRC tool <span style="background:lime">Nice to have</span></font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:48px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Experience working independently and in a team environment</font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:48px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Strong written and verbal communication skills including the ability to explain technical matters to a non-technical audience</font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:48px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Ability to collaborate on multiple projects/efforts at a given time</font></span></span></span></span></span></span></span></span></span></span></span></p> <p style="text-align:start; margin-left:48px"><span style="font-size:small"><span style="color:#222222"><span style="font-family:Arial, Helvetica, sans-serif"><span style="font-style:normal"><span style="font-variant-ligatures:normal"><span style="font-weight:400"><span style="white-space:normal"><span style="background-color:#ffffff"><span style="text-decoration-thickness:initial"><span style="text-decoration-style:initial"><span style="text-decoration-color:initial"><font face="verdana, sans-serif">· Flexibility to adjust quickly to multiple demands, shifting priorities, ambiguity, and rapid change</font></span></span></span></span></span></span></span></span></span></span></span></p>


Please wait..!!