CLIN 25 Data Security Analyst Senior

$112.23 / Per Hour

Data Security Analyst Senior on GSA STARS II Small Business IDIQ under general direction, performs all procedures necessary to ensure the safety of information systems and to protect systems from intentional or inadvertent access or destruction. Interfaces with user community to understand their security needs and implements procedures to accommodate them. Ensures that user community understands and adheres to necessary procedures to maintain security. May require familiarity with domain structures, user authentication, and digital signatures. Conducts accurate evaluation of the level of security required. May require understanding of firewall theory and configuration. Must be able to weigh business needs against security concerns and articulate issues to management.

SKU: CLIN025 Categories: , Tags: , ,

Data Security Analyst Senior on GSA STARS II Small Business IDIQ ensure that information stored on an organization’s computers or networks does not leak to unwanted parties or unknowingly modified; and establishes and maintains an organization’s security systems. They perform vulnerability assessments within the IT network, communication systems, software applications, and vendor management program using IT security tools and methodologies. Identify risk reduction opportunities, document treatment options for accepting or mitigating risk scenarios, facilitate and monitor the performance of risk treatment tasks, and maintain oversight of information technology and vendors regarding the security protection of their data security systems and applications. Have degrees in cyber security, computer science or any other related field. Proficient in database programming languages such as ORACLE, SQL, Postgre-SQL, Transact-SQL, SYBASE, MySQL, Microsoft SQL Server, SQL Server Integration Services (SSIS); and other relevant computer programming languages such as MySQL, jQuery, Oracle, Java Script, Angular, CSS, HTML 5, Apache, Node.js, Beans, Postgre, Python, C, C++, and so on. Expert and experienced in IT infrastructure, IT security, information security policies and procedures, data analysis, security testing and auditing, cybersecurity, security intrusion detection, security risk management, security maintenance, and so on. Analyze information security hardware and software infrastructure, as well as security system records, security tools, and data. Facilitate communications up, down, and across all levels of the organization. Create, modify, and update intrusion detection systems (IDS) and undertake SIEM management. Frequently reports to Data Security Administration Manager in managing all IT security and IT risks across the organization. Carry out internal and external audits; develop policies, procedures and standards that meet current data security needs; as well as regulatory requirements such as SOX, PCI and/or FFIEC guidelines. Monitor the installation of safety measures and run programs and upgrade security systems. Facilitate the IT risk security training curriculum and work as project manager or lead in IT security projects to promote awareness of applicable regulatory standards, primary risks and industry best practices. Conduct cyber and technical threat analysis and perform security monitoring through host-based forensics and timely and relevant security reports.

Brand

Cloud Computing Technologies

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.