What are the responsibilities and job description for the Security Analyst - Consultant position at CCS Global Tech?
Job Details
CCS Global Tech is a rapidly growing Information Technology company with a diverse portfolio of technology products and services and a large network of industry partnerships. With over 22 years of being a successful business with a global talent pool and presence, CCS is a certified Microsoft Gold Partner and specializes in delivering expert Microsoft based solutions for technical and business needs. We have been recognized by Inc. 500 Magazine as one of the fastest growing small companies in the Unites States.
we are a Tier 1 vendor for the City and County of San Francisco for Cloud Services, Staffing Services and Training Services. For this multi-year opportunity with a diverse set of needs to address, we are currently focusing on establishing partnerships with individuals as well as companies who can help us enhance our overall service portfolio, cut lead times, and ultimately help us deliver successfully. We currently hold sizable Government accounts in the San Francisco bay area including City and County of San Francisco, San Mateo County, and Santa Clara County.
We take great pride in our global reach and local influence. Your experience alongside our highly skilled and talented internal team who guide you along the way, offers key insights into what helps you stand out in a competitive job market.
If you are a partner company, please submit resumes with contact information of your own W2 Consultants only. Submitted consultants are expected to have excellent communication skills.
Roles/Responsibilities:
- Perform detailed architectural reviews and risk analysis of security related requests in order to make sound decision making recommendations, such as:
- Network Design and Information Flow
- System and Data Access Models
- Review Firewall Rule Requests (Ports, Protocols, and Services)
- Baseline Configuration Management Deviation Requests
- Vulnerability Management
- Champion the design, development, implementation, and/or ongoing maturation of SCDHHS security and compliance efforts.
- Audit and assess internal agency systems as well as business partner/service provider information system security controls.
- Utilize Microsoft Office software suite, System Center Service Manager (Ticketing system), Archer eGRC system, Bizagi, Atlassian and other products to document and report on information gathered during Audit and Assessment activities or other OCS efforts.
- Perform security and compliance reviews of Contracts, Business Associate Agreements, Data Usage/Sharing Agreements, and other types of documents and artifacts.
- Serve as primary point of contact for third-party audits and/or assessments of agency and business partner systems
- Collaborate with agency leadership, business partners, and other parties/ stakeholders to provide recommendations for security and compliance riskmitigation efforts.
Mandatory Skill:
- Must have a strong working knowledge of FISMA, NIST, CMS MARS-E and HIPAA Security and Privacy.
- 5 years of experience in IT working with and/or auditing IBM System 390/zSeries, Windows, Linux, Databases (Relational and Non-Relational), Networking Infrastructure, and Web-based Applications.
- Prior experience working within a FISMA compliant program.
- Prior experience in working with any eGRC systems.
- Prior Health Information Technology experience.
- ISC(2), ISACA, SANS GIAC and/or other Information Security Certification is required.
- Ability to work independently and as a member of a team.
- Ability to collaborate and coordinate with multiple teams and vendors.
- Ability to multitask and prioritize tasks effectively in order to meet deadlines.
- Experience and training with eGRC solutions.
- Ability to engage diverse audiences of varying technical and non-technical skill- levels to ensure effective alignment of technical requirements to business objectives.
- Ability to collaborate and coordinate efforts amongst multiple teams and vendors in fulfilment of SCDHHS OCS initiatives.
- Ability to multitask and prioritize tasks effectively in order to meet deadlines in a results-oriented environment.
- Must have intermediate to advanced skills in Microsoft Office products (Word, Excel, PowerPoint, Visio) to include working with templates and style guidelines for branding consistency.
- Keen attention to detail while maintaining the ability to see the big picture.
- Ability to absorb, retain and communicate complex processes.
- Ability to accept changes and constructive criticism and remain flexible in dealing with leadership and teams of varying technical and business knowledge.
Desirable Skills:
- BS degree in computer science or similar discipline or 10 years of experience in the field or a in a related area.
- Prior ITIL experience in the area of Information Security Management.
- Leadership experience with CMS MARS-E, ARC-AMPE, or other FISMA Risk Management Framework (RMF) compliant programs is strongly desired and will be given the highest weight. Experience should include well documented success in the development and maintenance of System Security Plans (SSPs), Privacy Impact Assessments (PIAs), Interconnection Security Agreements (ISAs), Computer Matching Agreements (CMAs), and related interviews and audit/assessment activities to complete and verify these and other RMF/Assessment and Authorization (A&A) tasks andartifacts.
- Experience with development and integration of RMF/A&A tasks and artifacts in RMF type roles such as; ISSO, Information Security Architect, Security Control Assessor, etc., into the System Development Life Cycle (SDLC) is ideal.
- Experience in security as related to Cloud services and vendor management is considered desirable for this position.
- Hands on experience with any or all the following technologies would be considered desirable for this position:
- Archer (eGRC)
- Enterprise NoSQL Database
- IBM System 390/zSeries
- Linux and Windows servers
- Network Firewalls, Intrusion Prevention Systems (IPS), Switching and Routing
- Infrastructure
- Security Information and Event Management (SIEM) solutions
- Identity and Access Management (IAM) solutions
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.