Job Description :
Support ongoing compliance activities by researching and evaluating security policies and practices, industry standards and regulations.
Recommend system and procedural changes in an effort to avoid security breaches.
Assist in the development of system security plans and the delivery of a vulnerability management program.

II. WORKER SKILLS AND QUALIFICATIONS

Minimum Requirements:
Years Skills/Experience
7 Oversees and/or performs the design and deployment of security infrastructure and program activities; the implementation of information system security plans with agency personnel and outside vendors.
7 Develops and/or coordinates the development of agency policies for encryption of data transmissions and the erection of firewalls to conceal information as it is being transmitted and to eliminate tainted digital transfers. Develops, recommends, and implements plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
7 Advises management and users regarding security procedures. Confers with users to discuss issues such as computer data access needs, security violations, and programming changes.
7 Performs and reviews technical risk assessments and reviews of new and existing applications and systems, including data center physical security and environment.
7 Modifies and monitors computer files to incorporate new software and virus protection systems, correct errors, or change individual access status. Monitors, evaluates, and maintains systems and procedures to protect data systems and databases from unauthorized users.
7 Regulates and reviews access to computer data files and prevents unauthorized modification, destruction, or disclosure of information. Researches, evaluates, and recommends systems and procedures for the prevention, detection, containment, and correction of data security breaches.
7 Trains users and promotes security awareness to ensure system security and to improve server and network efficiency.
5 Manages the work of project security analysts and other project team members.
5 Leads cross-functional project reams, including but not limited to: providing guidance, making assignments, and monitoring project progress to ensure timely completion of tasks.
5 Identifies, tracks, and resolves project problems and issues; ensures appropriate staff are involved in the decision-making and that issues are escalated to project owners, stakeholders, and executive management, as appropriate; and documents and communicates issues and their resolutions to project team and project leadership.
             

Similar Jobs you may be interested in ..