Job Description

Ref No.:18-09022
Location: Raleigh, North Carolina
Short Description:

NC DHHS - Privacy and Security Office (PSO) requiring services of an IT Security Specialist to aid county offices in the identification of gaps through risk management, and assist in the development of mitigation strategies.

Complete Description:

NC DHHS - Privacy and Security Office (PSO) requiring services of an IT Security Specialist to aid county offices in the identification of gaps through risk management, and assist in the development of mitigation strategies, and to establish the target security/infrastructure architecture.

Duties include, are not limited to:
* Author corresponding requirements, including definition of dependencies on infrastructure consolidation efforts.
* Define Security/Information Assurance requirements (and dependencies).
* Specify key architectural aspects of the architecture view, and identify other aspects that need definition.
* Research Best Practices for reuse, applying State IT Security and industry standards, and defining the transformation approach that transitions the current architecture to the target architecture.

The ideal candidate will have experience working with current and emerging information security technologies and development methodologies. Bachelor's degree in computer science, management information systems, or related field preferred. Good analytical and creative problem solving skills, and relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, with a wide degree of creativity and latitude is expected.

Skills:
SkillsRequired Minimum Experience Candidate ExperienceLast Used
Risk Management - must be able to Identify gaps through risk management, and assist in the development of mitigation strategies.Required7 Years
Experience updating privacy and security policies based on gaps found through an assessment process.Required7 Years
Client, evaluate, assess, systems, networks, and components through the use of vulnerability scanning and risk assessment method.Required7 Years
Experience documenting vulnerability assessment results in a accurate, clear, actionable, and available way to appropriate personnelRequired7 Years
Must be able to review & assess projects and systems throughout all phases of their life cycle in an effort to identify Privacy org needsRequired7 Years
Must be able to serve as a knowledge base for organizations as it relates to compliance requirements and mitigation strategies.Required7 Years
Experience Performing risk assessments based on NIST 800-53 Rev 4. ISO-27001, HIPAA, and IRS Pub 1075.Required7 Years
Experience with network mapping and vulnerability scanning tools such as NESSUS and NMAP.Required7 Years


QuestionsQuestionsAnswers
Question 1Absences greater than two weeks MUST be approved by CAI management in advance, and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you accept this requirement?
Question 2All work must be completed on site. Do you accept this requirement?
Question 3Please list candidate's email address HERE that will be used when submitting E-RTR.
Question 4Please indicate how soon this candidate is available to start work. Vendors are encouraged to submit candidates that are available for the duration of the assignment.
Question 5Vendor must disclose to the agency if the candidate will be subcontracted at the time of submission. Do you accept this requirement?
Question 6Vendor must notify the agency if any portion of the requirements listed in this task order are to be outsourced to other countries. Do you accept this requirement?
QuestionsQuestionsAnswers
Question 1Absences greater than two weeks MUST be approved by CAI management in advance, and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you accept this requirement?
Question 2All work must be completed on site. Do you accept this requirement?
Question 3Please list candidate's email address HERE that will be used when submitting E-RTR.
Question 4Please indicate how soon this candidate is available to start work. Vendors are encouraged to submit candidates that are available for the duration of the assignment.
Question 5Vendor must disclose to the agency if the candidate will be subcontracted at the time of submission. Do you accept this requirement?
Question 6Vendor must notify the agency if any portion of the requirements listed in this task order are to be outsourced to other countries. Do you accept this requirement?

Application Instructions

Please click on the link below to apply for this position. A new window will open and direct you to apply at our corporate careers page. We look forward to hearing from you!

Apply Online