CLIN 56 Information Assurance Development Engineer

$102.26 / Per Hour

Information Assurance Development Engineer on GSA STARS II Small Business IDIQ analyzes and defines security requirement for computer systems which may include mainframes, workstations, and personal computers. Designs, develops, engineers, and implements solutions that meet security requirements. Provides integration and implementation of the computer system security solution.

SKU: CLIN056 Categories: , Tags: , ,

Information Assurance Development Engineer on GSA STARS II Small Business IDIQ work as a team of information security professionals who protect enterprise data. They design security systems that guarantee data confidentiality, integrity and authorized accessibility. They work to keep private information out of unauthorized hands, protect them from incorrect alterations or destruction, and make them available to authorized users in a timely and reliable manner. They ensure safety, quality and retrieval of these data. Have bachelor’s degrees in Computer Science, Information Technology or any other certifications in relevant fields. Have extensive knowledge of relational database theory, database administration, data modeling, data analysis, database design, repository creation, data architecture, data warehouse modeling, database management reporting, and so on. Proficient in database programming languages such as ORACLE, SQL, Postgre-SQL, Transact-SQL, SYBASE, MySQL, Microsoft SQL Server, SQL Server Integration Services (SSIS); and other relevant computer programming languages such as MySQL, jQuery, Oracle, Java Script, Angular, CSS, HTML 5, Apache, Node.js, Beans, Postgre, Python, C, C++; and high-level applications such as Server Reporting Services (SRS), Tableau, Pentaho, Matillion, and so on. Have experience in providing engineering support for information system security to the Technical and Program Staff Accreditation Authority. Experienced in creating and implementing system security certification packages for DoD or IC clients. Establish security processes, practices and principles for SCI-connected systems. Have knowledge and understanding of the procedures for reporting a security breach of classified systems and are able to effectively communicate technical and safety issues. Work to secure and protect the information system by installing and managing firewalls and other security structures that detect or prevent intrusions. Develop and implement plans to protect the most important data stored in different computer files through the development and design of secured information systems. Provide technical security recommendations by interacting with the organization’s security team members, management, and clients using reports gotten from risk factor assessments and the organization’s security need assessment.

Brand

Cloud Computing Technologies

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.