Network Security Analyst
Indigo Beam ·Austin, TXClosing in
Term:Full timePart timeWork:OnsiteRemote
Type:Contract
Work involves planning, implementing, and monitoring security measures using the NIST Risk Management Framework and Texas security frameworks for information systems and infrastructures. Works under minimal supervision, with extensive latitude for the use of initiative and independent judgment.
DUTIES
The essential duties for this contract include
• Develops and refines the Secure System Development Lifecycle (SDLC) processes
• Coordinates the implementation of system security plans with agency personnel and outside vendors.
• Confers with users to discuss issues such as account permission and data access needs, security violations, and programming changes.
• Advises management and users regarding security configurations and procedures.
• Develops and recommends plans to safeguard information systems from accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
• Participates in the development of information technology disaster recovery and business continuity planning.
• Performs and reviews technical risk assessments and reviews of new and existing applications and systems, including data center physical security and environment.
• Researches, evaluates, and recommends systems and procedures for the prevention, detection, containment, and correction of data security breaches.
• Performs related work as assigned.
The essential duties for this contract include
• Develops and refines the Secure System Development Lifecycle (SDLC) processes
• Coordinates the implementation of system security plans with agency personnel and outside vendors.
• Confers with users to discuss issues such as account permission and data access needs, security violations, and programming changes.
• Advises management and users regarding security configurations and procedures.
• Develops and recommends plans to safeguard information systems from accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
• Participates in the development of information technology disaster recovery and business continuity planning.
• Performs and reviews technical risk assessments and reviews of new and existing applications and systems, including data center physical security and environment.
• Researches, evaluates, and recommends systems and procedures for the prevention, detection, containment, and correction of data security breaches.
• Performs related work as assigned.