CLIN 62 Information Security Business Analyst

$100.17 / Per Hour

Information Security Business Analyst on GSA STARS II Small Business IDIQ determines enterprise information security standards. Develops and implements information security standards and procedures. Ensures that all information systems are functional and secure.

SKU: CLIN062 Categories: , Tags: , ,

Information Security Business Analyst on GSA STARS II Small Business IDIQ design and implement security measure in a bid to protect an organization’s network from cyber-attacks. There are experts in setting and maintaining security standards. Monitor the organization’s network for security breaches and document, evaluate, and analyze information threats with the goal of devising plausible means of curbing them. Have degree in Computer Science, Information Systems, Information Technology, Software Engineering, Business analysis or Business studies or other related fields. Have extensive knowledge of relational database theory, database administration, data modeling, data analysis, database design, repository creation, data architecture, data warehouse modeling, database management reporting, and so on. Proficient in database programming languages such as ORACLE, SQL, Postgre-SQL, Transact-SQL, SYBASE, MySQL, Microsoft SQL Server, SQL Server Integration Services (SSIS); and other relevant computer programming languages such as MySQL, jQuery, Oracle, Java Script, Angular, CSS, HTML 5, Apache, Node.js, Beans, Postgre, Python, C, C++; and high-level applications such as Server Reporting Services (SRS), Tableau, Pentaho, Matillion, and so on. Able to identify loop holes in the organization’s network and recommend strategies to mitigate these vulnerabilities. Possess vast knowledge and understanding of network firewalls, proxies, antivirus, and IDPS concepts. Install effective security software and educate end users on how to use these measures. Perform penetration tests to determine whether or not a information network system have been compromised and determine the extent of the damage caused by these actions. Fix all security vulnerabilities and damages that have been discovered in the network system to maintain a high-security standard that facilitates safe dissemination of information and data within the internal and external environments of the organization. Collaborate with all employees, organization-wide, in analyzing the organization’s data and in determining their information system requirements with respect to project objectives, providing necessary recommendations.

Brand

Cloud Computing Technologies

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.