image
  • Snapboard
  • Activity
  • Reports
  • Campaign
Welcome ,
loadingbar
Loading, Please wait..!!

It Security Analyst Hybrid

  • ... Posted on: Sep 19, 2024
  • ... GSK Solutions
  • ... West Lafayette, Indiana
  • ... Salary: Not Available
  • ... CTC

It Security Analyst Hybrid   

Job Title :

It Security Analyst Hybrid

Job Type :

CTC

Job Location :

West Lafayette Indiana United States

Remote :

No

Jobcon Logo Job Description :

Job Title: IT Security Analyst (Hybrid)
Location: West Lafayette, IN
Duration: 12+ Months
Job Type: 1099 / Contract W2
Rate: $43/hr. on 1099

Interview Type: Webcam
Client: State of Indiana

Note: Local Candidates are Required for this position

Job Description:

Resource will works as Information Security Analyst responsible for auditing and monitoring systems containing confidential information.

Resource will works as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases. This position will also participate in all federal and state audits against DCS technology systems. Employee works in an Information Technology Division of a State Agency, the Department of Child Services(DCS-IT) under the guidance of the Security Manager.


The essential functions of this role are as follows:

Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement;

Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment.

Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits.

Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53).

Develops Standard Operating Procedures (SOP) for implementing security polices;

Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems;

Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data;

Develops and implements procedures for use of information security management software;

Proposes information security software enhancements;

Performs periodic audits to assure security policies and standards are being followed and are effective.

Develops recommendations for enhancements and generates reports where necessary;

Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security;

Mentors and provides guidance to new or other staff as needed;

Performs related duties as assigned.

Assist on other task as assigned.

Thorough knowledge of information security management tools, policies, and standards of information security procedures;

Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy;

Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation;

Familiarity with domain structures, user authentication, and digital signatures;

Ability to develop and maintain information security standards;

Ability to understand and apply complex computer logic to work;

Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management;

Experience in assessing security needs of teams and assist in their security training.

Ability to communicate effectively both orally and in writing;

Ability to be a team member as well as a team leader depending on the situation;

Degree in information security or technology preferred;

Security certification preferred (e.g. CISSP).

Network Admin experience preferred.

Skill Matrix

Skill

Required /Desired

Amount

of Experience

To be effectively with wide range of information technologists,including systems administrators, technical support, application development, end users

Required

3

Years

Network Admin experience

Required

1

Years

Security certification (e.g. CISSP, CRISC)

Required

1

Years

Ability to develop and maintain information security standards;

Required

1

Years

Ability to understand and apply complex computer logic to work

Required

1

Years

Degree in information security or technology

Required

1

Years

Familiar with cybersecurity security framework (e.g. NIST, ISO, SOC 2, CIS, Cobit, etc.)

Required

0

Computer security compliance and auditing experience

Required

0

IRS, SSA computer security compliance and audit experience

Required

0

HIPAA experience

Required

0


Recruiter Details:

Recruiter Name: Susheel at gsksolutions dot com

Contact Number: Eight three two-Nine nine zero-Two four two seven

About GSK Solutions Inc:

GSK Solutions Inc is a leading information technology (IT) Services Company that specializes in providing complete consulting solutions and staff augmentation to its clients. We provide on-time, on-budget, and quality service to our clients and consistently meet their expectations. We are known for our superior execution on a sustained basis.

GSK has been in the business of providing both commercial and custom product development services, including, Information Security, Software Development, Consulting and IT Audit. GSK implements highly critical and time-sensitive projects for their Fortune 500 clients located across the country.

Jobcon Logo Position Details

Posted:

Sep 19, 2024

Employment:

CTC

Salary:

Not Available

Snaprecruit ID:

SD-CIE-3f5f1bbb1e9db8beb9e1e2e5cea55b041573db220fbd7592359d581434f175bf

City:

West Lafayette

Job Origin:

CIEPAL_ORGANIC_FEED

Share this job:

  • linkedin

Jobcon Logo
A job sourcing event
In Dallas Fort Worth
Aug 19, 2017 9am-6pm
All job seekers welcome!

It Security Analyst Hybrid    Apply

Click on the below icons to share this job to Linkedin, Twitter!

Job Title: IT Security Analyst (Hybrid)
Location: West Lafayette, IN
Duration: 12+ Months
Job Type: 1099 / Contract W2
Rate: $43/hr. on 1099

Interview Type: Webcam
Client: State of Indiana

Note: Local Candidates are Required for this position

Job Description:

Resource will works as Information Security Analyst responsible for auditing and monitoring systems containing confidential information.

Resource will works as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases. This position will also participate in all federal and state audits against DCS technology systems. Employee works in an Information Technology Division of a State Agency, the Department of Child Services(DCS-IT) under the guidance of the Security Manager.


The essential functions of this role are as follows:

Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement;

Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment.

Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits.

Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53).

Develops Standard Operating Procedures (SOP) for implementing security polices;

Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems;

Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data;

Develops and implements procedures for use of information security management software;

Proposes information security software enhancements;

Performs periodic audits to assure security policies and standards are being followed and are effective.

Develops recommendations for enhancements and generates reports where necessary;

Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security;

Mentors and provides guidance to new or other staff as needed;

Performs related duties as assigned.

Assist on other task as assigned.

Thorough knowledge of information security management tools, policies, and standards of information security procedures;

Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy;

Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation;

Familiarity with domain structures, user authentication, and digital signatures;

Ability to develop and maintain information security standards;

Ability to understand and apply complex computer logic to work;

Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management;

Experience in assessing security needs of teams and assist in their security training.

Ability to communicate effectively both orally and in writing;

Ability to be a team member as well as a team leader depending on the situation;

Degree in information security or technology preferred;

Security certification preferred (e.g. CISSP).

Network Admin experience preferred.

Skill Matrix

Skill

Required /Desired

Amount

of Experience

To be effectively with wide range of information technologists,including systems administrators, technical support, application development, end users

Required

3

Years

Network Admin experience

Required

1

Years

Security certification (e.g. CISSP, CRISC)

Required

1

Years

Ability to develop and maintain information security standards;

Required

1

Years

Ability to understand and apply complex computer logic to work

Required

1

Years

Degree in information security or technology

Required

1

Years

Familiar with cybersecurity security framework (e.g. NIST, ISO, SOC 2, CIS, Cobit, etc.)

Required

0

Computer security compliance and auditing experience

Required

0

IRS, SSA computer security compliance and audit experience

Required

0

HIPAA experience

Required

0


Recruiter Details:

Recruiter Name: Susheel at gsksolutions dot com

Contact Number: Eight three two-Nine nine zero-Two four two seven

About GSK Solutions Inc:

GSK Solutions Inc is a leading information technology (IT) Services Company that specializes in providing complete consulting solutions and staff augmentation to its clients. We provide on-time, on-budget, and quality service to our clients and consistently meet their expectations. We are known for our superior execution on a sustained basis.

GSK has been in the business of providing both commercial and custom product development services, including, Information Security, Software Development, Consulting and IT Audit. GSK implements highly critical and time-sensitive projects for their Fortune 500 clients located across the country.

Loading
Please wait..!!