Job Details
Position: | IT Security Manager (Ref: 14260) |
---|---|
Location: | Atlanta, GA 30345 United States |
Duration: | 9 Months 12 Days - Contract |
Openings: | 1 |
Deadline: | 09/29/2023 |
Pay Rate: | Login |
Description:
***Hybrid***Local to Metro Atlanta
***Tax Clearance Letter required
***Copy of certifications are required
We are looking for a skilled cybersecurity IT Security Manager with relevant technical experience. As the Information Technology Security Manager, the selected candidate will perform technically and lead the hands-on technical team in managing IT security tools, automation, compliance standards, development, and delivery of best practices for security architecture and system design to ensure information and cybersecurity of all systems across the enterprise.
You will have the opportunity to learn and grow, both personally and professionally through our training and development programs. While your path in the Office of Information Security will be unique in protecting the assets, your journey will help the Department achieve our goal of becoming the most efficient and accessible system in the country.
Primary Duties & Job Responsibilities:
• Implement processes and methods for auditing and addressing non-compliance with information security standards, facilitates migration of non-compliant environments to compliant environments.
• Conduct studies within and outside the organization to ensure compliance with standards and currency with industry standards norm.
• Manages and participates in the planning and implementation of security administration for all IT projects.
• Be responsible for the evaluation and selection of security applications and systems.
• Make recommendations and assist in the implementation of changes to work methods and procedures to make them more effective or to strengthen security measures.
• Manage and direct subordinate supervisors and information security analysts and large scope of responsibility.
• Complete task designed to ensure security of the systems and information assets through confidentiality, integrity & availability.
• Implement confidentiality measures that protect against unauthorized access, modification, or destruction and helps to develop IT security policies and standards to support the security objectives.
• Develop and enforce the organization's security policies and procedures, security awareness program, the information security portion of the business continuity and disaster recovery plans, and all industry and government compliance issues.
• Work with end users to determine the needs of individual divisions and offices within the department.
• Conduct Risk Management analysis to identify areas of risk and develop security measures to prevent loss and assist in the Mitigations of those risks.
• Participate in training, self-study, and statewide initiatives on security standards and best practices to serve as a valuable go-to security subject matter expert.
• Actively monitor the infrastructure and systems for security threats. Actively manage various security programs/platforms, monitors the use of data files, and regulates access to safeguard information in those computer files.
• Work with business owners, IT managers, Staff, and vendors to provide timely and efficient IT coordination of security services to meet business needs.
• Create reports on status of information security programs and projects and communicate reports to the CISO, senior management and the leadership teams.
• Develop, deliver, and maintain security standards, system security plans, best security and operations practices, architecture, and systems. Implement IT system security plans, projects, and other initiatives.
• Share directly with the InfoSec Team on matters concerning the security status & posture.
• Assists in Information Security Investigations, Threat Assessments and Mitigations
• Assists with numerous Information Security tools and programs.
Qualifications:
• Bachelor’s degree in computer science or information technology
• 5 years or more of relevant professional experience in Information and Cybersecurity
• 3 years in a specific field of IT Security,
• 1 year of which must include management experience.
• Hands on working experience with at least two or more of these security technologies (e.g., Vulnerability Management, Penetration Testing, Email Security, EDR, MFA, SIEM, IPS, Firewalls)
• Possess one or more current industry certifications relevant to the job e.g., Security+, CASP, CISSP, CISM, C-RISC, CISA, SANS certifications, or equivalent experience.
• Experience with security tools and technology such as, i.e., FireEye (Trellix), Tenable.io, Nessus, Splunk, SolarWinds, Varonis, GRC tools, CrowdStrike Falcon, and LogRhythm
• Knowledge & experience with cloud technologies: Amazon Web Services (AWS), to include WatchGuard, Guard Duty, Identity & Access Management (IAM), Microsoft Azure.
• CloudTrail, CloudWatch, Audit Manager
• Technical knowledge in endpoint security, VPC, VPN, Firewall, network monitoring, intrusion detection, web server security, and wireless security
• Practical experience in systems administration, vulnerability management, endpoint management, and email security operations and management
• Excellent analytical and critical thinking skills to identify possible threats.
• Familiarity with IRS Publication 1075, NIST SP 800-53 Privacy Controls, NIST SP 800-63 Digital Identity Guidelines, NIST SP 800-88 Guidelines for Media Sanitization, NIST SP 800-18 System Security Plans (SSP), NIST SP 800-52, FIPS-140, NIST SP 800-61, NIST SP 800-83, other NIST SP Guidelines, etc., knowledge of NIST Frameworks, FISMA, CIS Controls, and the Criminal Justice Information Services Policy
• Progressive experience in information technology, incident response & incident reporting, technical support, cybersecurity, cryptography, and knowledge of data encryption techniques
• Ability to work independently and prioritize multiple projects in a highly dynamic environment.
• Excellent communication and teamwork skills and demonstrated across a broad group of technical and non-technical stakeholders.
• Assist with Office of Information Security Risk Assessments, System Security Plans, and other reports required by the IRS Office of Safeguards, state audits, and other third-party assessors.
• Skills and knowledge in the areas of computer programming, software development, and computer network security
• Knowledge and experience in Policies and procedures development, revision, and management.
Required / Desired Skills
- Bachelor's degree in information technology, computer science, information assurance, or a related field from an accredited college or university (Required 4 Years)
- Professional experience in Information and Cybersecurity (Required 5 Years)
- Experience in a specific field of IT Security (Required 3 Years)
- Management experience. (Required 1 Years)
- Experience with these security technologies (e.g., Vulnerability Management, Penetration Testing, Email Security, EDR, MFA, SIEM, IPS, Firewalls) (Required 3 Years)
- Security+, CASP, CISSP, CISM, C-RISC, CISA, SANS certifications (Copy Required) (Required 1 Years)
- FireEye (Trellix), Tenable.io, Nessus, Splunk, SolarWinds, Varonis, GRC tools, CrowdStrike Falcon, and LogRhythm (Required 2 Years)
- Amazon Web Services (AWS), to include WatchGuard, Guard Duty, Identity & Access Management (IAM), Microsoft Azure. CloudTrail, CloudWatch, Audit Man (Required 2 Years)
- Technical knowledge in endpoint security, VPC, VPN, Firewall, network monitoring, intrusion detection, web server security, and wireless security (Required 2 Years)
- Experience in systems administration, vulnerability management, endpoint management, and email security operations and management (Required 2 Years)
- Excellent analytical and critical thinking skills to identify possible threats (Required 2 Years)
- Knowledge of NIST Frameworks, FISMA, CIS Controls, and the Criminal Justice Information Services Policy (Highly Desired 1 Years)
- Experience in incident response & incident reporting, technical support, cybersecurity, cryptography, and knowledge of data encryption techniques (Highly Desired 1 Years)
- Skills and knowledge in the areas of computer programming, software development, and computer network security (Highly Desired 1 Years)
- Knowledge and experience in Policies and procedures development, revision and management (Highly Desired 1 Years)
copyright @ www.ProfessionalTechIntegration.com.2011 All rights reserved