CLIN 57 Information Assurance Engineer

$97.31 / Per Hour

Information Assurance Engineer on GSA STARS II Small Business IDIQ establishes and satisfies complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands. Supports customers at the highest levels in the development and implementation of doctrine and policies. Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.

SKU: CLIN057 Categories: , Tags: , ,

Information Assurance Engineer on GSA STARS II Small Business IDIQ focus on securing and protecting information systems by installing and operating firewalls, data encryption software, virus protection, and other security systems and applications that detect or prevent intrusions. They perform a variety of tasks to secure the organization’s technological infrastructure and information. Perform information security audits that can detect compatibility gaps in security structures and policies, enabling them to measure system security and evaluate the effectiveness of individual security systems. Have extensive knowledge of relational database theory, database administration, data modeling, data analysis, database design, repository creation, data architecture, data warehouse modeling, database management reporting, and so on. Proficient in database programming languages such as ORACLE, SQL, Postgre-SQL, Transact-SQL, SYBASE, MySQL, Microsoft SQL Server, SQL Server Integration Services (SSIS); and other relevant computer programming languages such as MySQL, jQuery, Oracle, Java Script, Angular, CSS, HTML 5, Apache, Node.js, Beans, Postgre, Python, C, C++; and high-level applications such as Server Reporting Services (SRS), Tableau, Pentaho, Matillion, and so on. Carry out simulated cyberattacks to provide additional insights into what actions the company should take to keep its network secure by identifying vulnerabilities and problems that may make systems vulnerable to security breaches. Have degrees in Computer Science, information technology and any other relevant certifications associated with the field. Possess strong understanding of business needs including planning, auditing and risk management. Stay abreast of the latest methods attackers use to infiltrate computer systems and IT security networks by researching new security technology to determine what can protect the organization most effectively and to ensure time-relevant information assurance services. Collaborate with other professionals and attend important cybersecurity conferences to hear direct accounts of other professionals who have experienced new types of attacks and the ways they overcame them. Involved in developing disaster recovery plans for different organizations, a procedure that IT personnel follow in an emergency. These plans include preventive measures such as copying and transmitting data regularly to an off-site location to allow the organization’s IT department to continue operating in case of emergencies, including plans to restore the proper operation of the IT department after a disaster. Establish and satisfy organization-wide security requirements based upon the analysis of user, policies, regulatory, and resource‚Äôs demands. Support end users at the highest levels in the development and implementation of information security policies and standards.

Brand

Cloud Computing Technologies

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.