CLIN 59 Information Assurance Systems Network Specialist

$89.49 / Per Hour

Information Assurance Systems Network Specialist on GSA STARS II Small Business IDIQ installs, configures and maintains organization’s operating systems. Analyzes and resolves problems associated with server hardware, NT, applications software. Detects, diagnoses, and reports NT related problems on both NT server and NT desktop systems. Performs a wide variety of tasks in software/hardware maintenance and operational support of NT Server systems.

SKU: CLIN059 Categories: , Tags: , ,

Information Assurance Systems Network Specialist on GSA STARS II Small Business IDIQ protect the health and confidentiality of sensitive information stored on digital devices. They act proactively to protect computer networks and systems and investigate information security violations. May work with e-commerce companies, computer system design service providers, financial institutions, insurance companies, as well as telecommunications companies. Monitor computer systems and networks for security threats or unauthorized access. Work to identify vulnerable devices and security risks and undertake security measures to counter threats. Develop and test software deployment tools, firewalls, and intrusion detection systems to protect information systems. Have degrees in Information Technology, computer science or any other certification in related fields. Have extensive knowledge of relational database theory, database administration, data modeling, data analysis, database design, repository creation, data architecture, data warehouse modeling, database management reporting, and so on. Proficient in database programming languages such as ORACLE, SQL, Postgre-SQL, Transact-SQL, SYBASE, MySQL, Microsoft SQL Server, SQL Server Integration Services (SSIS); and other relevant computer programming languages such as MySQL, jQuery, Oracle, Java Script, Angular, CSS, HTML 5, Apache, Node.js, Beans, Postgre, Python, C, C++; and high-level applications such as Server Reporting Services (SRS), Tableau, Pentaho, Matillion, and so on. Possess knowledge and understanding of information technology principles, methods, systems, and security policies to manage any information security program. Formulate, implement, and enforce information security policies and standards in line with the organization’s needs. Develop information security system architectures and ensure that they function optimally; identify and report security violations; and carry out information security system vulnerability tests to mitigate unwanted security breaches. Work proactively to ensure the integrity and privacy of the organization’s information system through encrypted programs, firewalls, and well-designed disaster recovery architecture. Stay abreast of the latest methods attackers use to infiltrate computer systems and IT security networks by researching new security technology to determine what can protect the organization most effectively and to ensure time-relevant information assurance services.

Brand

Cloud Computing Technologies

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.