Home       |     Overview      |     Candidate Login      |     Post Resume       |     Contact us
 
  
     
     
Search Jobs
     
Keywords,Title,Skills,Company  Location,City,State,Zip  
  Advanced Search
     
NIST TCPIP DNS SMTP Web Services API REST Software Development Lifecycle CISSP ISS
 
Requirement id 114977
Job title Manager
Job location in Austin, TX
Skills required Identify And Access Management, Information Technology Security, Computer Information System, NIST TCPIP DNS SMTP Web Services API RES
Open Date 11-Mar-2021
Close Date
Job type Not specified
Duration 5 Months
Compensation DOE
Status requirement ---
Job interview type ---
   Email Recruiter: coolsoft
Job Description Manager: Identify And Access Management, Information Technology Security, Computer Information System, NIST TCPIP DNS SMTP Web Services API RES

Bid URL:

Note: Total estimated hours per Candidate shall not exceed 856 hours.

Submission Deadline: 3/16/2021 5:00 PM CT
Start Date: 4/1/2021
End Date: 8/31/2021

Client: Office of the Attorney General of Texas (OAG)

Description:

Office of the Attorney General of Texas requires the services of 1 Information Security Manager 2, hereafter referred to as Candidate(s), who meets the general qualifications of Information Security Manager 2, Security and the specifications outlined in this document for the Office of the Attorney General of Texas.

All work products resulting from the project shall be considered "works made for hire" and are the property of the Office of the Attorney General of Texas and may include pre-selection requirements that potential Vendors (and their Candidates) submit to and satisfy criminal background checks as authorized by Texas law. Office of the Attorney General of Texas will pay no fees for interviews or discussions, which occur during the process of selecting a Candidate(s).


The Information Security Manager serves as a liaison between IT architects and information security teams and also coordinates with information system owners and common control providers on the allocation of security controls as system-specific, hybrid, or common controls. In addition, the Candidate, in close coordination with information security officers, advise authorizing officials, the chief information officer, senior IT and security staff, on a range of security-related issues including establishing information system boundaries, assessing the severity of weaknesses and deficiencies in the information system, plans of action and milestones, risk mitigation approaches, security alerts, and potential adverse effects of identified vulnerabilities.

The ideal candidate would have experience in the following areas:
• Design, build and implement enterprise-class security systems for a production environment
• Align standards, frameworks and security with overall business and technology strategy
• Identify and communicate current and emerging security threats
• Design security architecture elements to mitigate threats as they emerge
• Create solutions that balance business requirements with information and cyber security requirements
• Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
• Define and prioritize essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event.
• Define appropriate levels of system availability based on critical system functions and ensure that system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration.
• Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data.
• Document and address organizations information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle.
• Employ secure configuration management processes.
• Ensure that acquired or developed system(s) and architecture(s) are consistent with organizations cybersecurity architecture guidelines.
• Identify and prioritize critical business functions in collaboration with organizational stakeholders.
• Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
• Provide advice on project costs, design concepts, or design c
 
Call 502-379-4456 Ext 100 for more details. Please provide Requirement id: 114977 while calling.
 
Other jobs in TX: Austin (21), Dallas (32), Fort Worth (30), Ft Worth (1), Grand Prairie (1), Houston (12), Hunstville (2), Huntsville (1), Irving (3), Plano (4), San Antonio (9), Woodlands (1),
 
 Identify And Access Management job openings in other states
Jobs List

Desktop Support IV -111389-SP
Create date: 09-Nov-2022
Start date : 12/19/2022

End Date : 06/30/2023

Submission deadline :11/16/22 @ 4:00PM CST

Client Info :ETF

Note :

* Interview Process: MS Teams with Video & Audio on, 1-2 rounds

* Duration: 6/30/23, likely to extend

* Onsite or Remote: Must be local to WI or willing to r.... (This job is for - job Jobs in WI Madison Consultant - (in Madison, WI))

IAM Analyst - 52533
Create date: 11-Sep-2019
Candidate must be our W2 Employee

We should submit only GC, GC EAD, L2 EAD, H4 EAD and Citizens.



Description:

Required Experience

SailPoint IIQ Administration
Check critical tasks are completing
Authoritative Identity aggregations
Account Agg.... (This job is for - Troubleshoot Eclipse Jobs in LA NewOrleans Analyst - (in NEW ORLEANS, LA))
 
 
(Manager: Identify And Access Management, Information Technology Security, Computer Information System, NIST TCPIP DNS SMTP Web Services API RES in Austin, TX)
     
Search Jobs
     
Keywords,Title,Skills,Company  Location,City,State,Zip  
  Advanced Search
     

    About Us     Services    Privacy policy    Legal     Contact us