Tuesday, 8 November 2022

cyber security Admin-Austin TX

0 comments

Hello,


Greetings from Sprucetech!

We are looking for consultants for the below opening. Please share the best profile with rate and contact


Client: Texas Health and Human Services Commission

Position: Security Administrator

Location: Austin, Texas 78744

Duration: 12 Months



I.  DESCRIPTION OF SERVICES



Texas Department of Public Safety requires the services of 1 Security Administrator 1, hereafter referred to as Candidate(s), who meets the general qualifications of Security Administrator 1, Security and the specifications outlined in this document for the Texas Department of Public Safety.


All work products resulting from the project shall be considered "works made for hire" and are the property of the Texas Department of Public Safety and may include pre-selection requirements that potential Vendors (and their Candidates) submit to and satisfy criminal background checks as authorized by Texas law. Texas Department of Public Safety will pay no fees for interviews or discussions, which occur during the process of selecting a Candidate(s).


The Department of Information Resources (DIR) requires the services of a Systems Analyst hereafter referred to as Worker, who meets the general qualification of systems analyst and the specifications outlined in this document for Texas Department of Public Safety.     

 

1.    Perform cybersecurity incident detection, analysis, and prevention; forensic analysis of information systems and portable devices and forensic recovery of data using assessment tools.

2.    Monitor and analyze cybersecurity alerts from cybersecurity tools, network devices, and information systems; and monitors network traffic and flow for analysis.

3.    Monitor and maintain cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use. 

4.    Monitor and maintain systems and procedures to protect data systems and databases from unauthorized use or access.

5.    Research and analyze cybersecurity threat indicators and their behaviors, and recommend threat mitigation strategies.

6.    Monitor and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems.

7.    Evaluate network and system security configuration for best practices.

8.    Assist in recommending plans to safeguard computer configurations and data files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.

9.    Assist in planning and deploying manual and/or automated security capabilities.

10.  Assist in developing information technology disaster recovery and business continuity planning.

11.  Research, evaluate, and recommend systems and procedures for the prevention, detection, containment, and correction of data security breaches.

12.  Assist the agency in encrypting data transmissions and erecting firewalls to conceal confidential information as it is being transmitted and to eliminate tainted digital transfers.

13.  Advise management and users regarding security procedures.

14.  Performs other duties as assigned.


CANDIDATE SKILLS AND QUALIFICATIONS

  • Experience in systems analysis and design work.
  • Ability to analyze systems and proc
  • Skill in solving problems; scheduling, testing, installing, and implementing programs; and troubleshooting computer systemsedures, to write and revise standards and procedures, and to communicate effectively
  • Knowledge of the limitations and capabilities of computer systems, the techniques used in the design of non-automated systems, info technology equip, applicable programming languages, computer hardware and software, computer operating systems
  • writing program code, and automated mapping.
  • Experience preparing charts, diagrams, tables, and flowcharts to assist in problem analysis and submitting recommendations for solution.
  • Experience working in an IT technical operations or development environment with the creation and management of highly detailed actions, tasks, and schedules.
  • Experience supporting, planning and implementing contingency plans, recovery guides or disaster recovery documentation for information technology systems


Regards,Rajesh, Sr.Recruiter

`

 1149 Bloomfield Ave. Clifton, NJ 07012

 O: 518-288-5293 | F: 201.338.6260

 rkanchi@sprucetech.com |sprucetech.com

No comments:

Post a Comment