Information Systems Security Engineerother related Employment listings - Huntsville, AL at Geebo

Information Systems Security Engineer

Company OverviewGovCIO is a team of transformers-people who are passionate about transforming government I.T. We believe in making a difference by developing digital strategies and delivering the technology-related innovation governmental operations that improve the citizen experience every day.But we can't do it alone. We welcome and nurture an inclusive and diversified work culture. Because different backgrounds, experiences, abilities, and perspectives make us better decision-makers, problem solvers, and creators. We're changing the face of I.T. - from our diverse staff to the end-products we develop. And we're excited to expand our team. Are you ready to be a transformer? Responsibilities The contractor shall assist the government to build a cybersecurity engineering framework designed to complement and enhance the Security Assessment and Authorization (SAA) processThe contractor shall provide subject matter and industry expertise and assist our client with standards identificationThe contractor shall advise on and assist the government with Amazon Web Services (AWS) best practices implementationThe contractor shall assist with management of vendor relationships to ensure our client security posture goals are metThe contractor shall analyze computer networks, identify possible issues, and assist the government to design solutionsThe contractor shall gain a strong working knowledge of our client security architecture and policy to design systems that meet or exceed requirementsThe contractor shall communicate technical requirements to technical and non-technical personnel, partner with IT developers and project managers to represent security requirements, and leverage threat intelligence to assist the government in modifying designs and plans to counter such threatsThe contractor shall recommend security enhancements to our client managers, install and use firewalls and data encryption programs, review systems designs for flaws or risks, build and deploy security infrastructure and automate enterprise security operations, assist the government with internal build projects, develop technical content such as automation tools; reference architectures; and white papers, architect and develop customer applications for cloud optimization, provide software development subject matter expertise with respect cloud architecture, design patterns, and programming QualificationsBachelor's with 8
years (or commensurate experience)8
years of experience providing information assurance support for enterprise level IT projects.Demonstrated experience in application development and cybersecurity.Demonstrated experience implementing DevOps practices such as infrastructure as code, continuous integration, and automated deployment.10
years of an application programming and/or hands-on technical application architecture experience.5
years of experience in an IT security audit, assessment, compliance, risk management, or data privacy role.3
years of experience assessing/auditing customers on PCI DSS, ISO 27001, HIPAA, HITRUST, FedRAMP, FISMA or NIST/DoD frameworks.Certified Information Systems Security Professional (CISSP). Desired QualificationsBachelor's degree in Computer Science, Information Systems Management, Information Security or related discipline is preferred #zr
Salary Range:
$100K -- $150K
Minimum Qualification
IT SecurityEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.