Hi,
I hope this email finds you well.
My name is Swati, and I am a Technical Recruiter from Triunity Software Inc. I came across your profile and wanted to reach out regarding a IT Security Analyst 3, role with one of our clients. Please let me know if you are available in the job market and interested in this role (see job description below) - if so, we can connect and speak further.
I would need your updated resume to proceed and can give you a call as soon as I have it.
Job Title: IT Security Analyst 3
Duration: 12+ Months
Client location - 1401 E Broad Street, Richmond, VA (Hybrid 3 days a week onsite)
Interview Type - In Person Only
Job Description -
This position reports to the Governance & Compliance Manager in the IT Division. The IT Security Analyst supports the VDOT Information Security mission by implementing results-oriented strategic approaches, plans, programs, and procedures.
The Client is seeking to fill the Information Technology (IT) Security Analyst position. This position reports to the Governance & Compliance Manager in the IT Division.
The Client is seeking to fill the Information Technology (IT) Security Analyst position. This position reports to the Governance & Compliance Manager in the IT Division.
The IT Security Analyst supports the Information Security mission by implementing results-oriented strategic approaches, plans, programs, and procedures. This position will focus on security analysis for our procurement teams. They will ensure that Commonwealth of Virginia Information Security Policies and Standards are followed by the Agency. The broad areas of responsibility for this position include identity and access management, System and services acquisition review, IT risk management, business continuity and IT disaster recovery planning, security awareness education and training, security vulnerability management and security incident management.
Responsibilities:
·Documents processes and script narratives/executive summaries.
·Create Business focused documentation for circulation among readers with various technical understanding.
·Share insight of Information security and IT procurement approaches and implementation methodologies
·Research and provide written guidance on alignment with security policies/standards.
·Perform tasks related to Security Compliance and Control Evaluation, Risk analysis, and procurement recommendations.
·Research and provide written guidance on alignment with security policies/standards.
·Perform tasks related to Security Compliance and Control Evaluation, Risk analysis, and procurement recommendations.
·Collaborate with Business areas and cross- functional Procurement Analysts or Enterprise Architects to fully understand business needs and provide strategic consultation on security and risk-averse acquisition.
·Partner with architects, other technical team members to develop roadmaps and strategies to support agency KPIs
·Consult with teams as needed on initiatives and provide tactical direction as well as provide considerations on legacy solutions as they are replaced.
Qualifications:
·Comprehensive knowledge of Information Security principles; including information security trends, emerging technologies, best-practices, controls, models, architecture, etc.
·Practical experience with identity and access management, services and software acquisition or procurement, IT risk management, business continuity and IT disaster recovery planning, security awareness education and training, security vulnerability management, and security incident management.
·Familiarity with the Commonwealth of Virginia’s Information Security Standards and/or the National Institute of Standards and Technology Publication 800-53.
·Able to communicate effectively in writing and orally, exercise judgment, interpret laws and policies, and maintain effective working relationships with a wide variety of individuals in both the public and private sectors.
·Able to communicate effectively in writing and orally, exercise judgment, interpret laws and policies, and maintain effective working relationships with a wide variety of individuals in both the public and private sectors.
·Experience in monitoring IT environments for compliance with information security architecture policies and standards.
·Ability to provide input and security direction for future designs, information security capabilities, and strategic technology alternatives.
·Excellent written and oral communication and presentation skills (possessing the ability to break down complex technical terms into everyday language).
·Demonstrated ability to work with broad cross-section of personnel including all levels of management and external entities (such as other agencies), consultants and service providers to explain security measures and collaborate and disseminate security related information in partnership with the Office of Information Security.
·Work experience in a fast-paced environment and acquire new skills/knowledge to meet customer needs.
Required / Desired Skills Required /Desired Amount of Experience
Knowledge and application of security best practices Required Proficient/SME
Experience in Security review/risk analysis Required Proficient/SME
·Excellent written and oral communication and presentation skills (possessing the ability to break down complex technical terms into everyday language).
·Demonstrated ability to work with broad cross-section of personnel including all levels of management and external entities (such as other agencies), consultants and service providers to explain security measures and collaborate and disseminate security related information in partnership with the Office of Information Security.
·Work experience in a fast-paced environment and acquire new skills/knowledge to meet customer needs.
Required / Desired Skills Required /Desired Amount of Experience
Knowledge and application of security best practices Required Proficient/SME
Experience in Security review/risk analysis Required Proficient/SME
Knowledge of IT Procurement Required Proficient
Experience in business writing and presenting Required Proficient
Educational or Career Experience in Cybersecurity, Government technology implementation, IT Governance or related field(s). Required Proficient/SME
Skills Matrix -
Educational or Career Experience in Cybersecurity, Government technology implementation, IT Governance or related field(s). Required Proficient/SME
Skills Matrix -
Knowledge and application of security best practices.
Experience in Security review/risk analysis.
Educational or Career Experience in Cybersecurity, Government technology implementation, IT. Governance or related field(s).
Knowledge of IT Procurement.
Experience in business writing and presenting.
Questionnaires -
Question 1: Commonwealth of Virginia security policies prohibit the use of offshore IT contractors. Do you attest to the fact that your candidate will physically reside within the US for the duration of the assignment?
Question 2: Please list the candidate's email address.
Question 2: Please list the candidate's email address.
Thanks & Regards
Swati Sahu| Talent Acquisition Specialist | Triunity Software Inc.
Email: swati@triunitysoft.com
LinkedIn Id: https://www.linkedin.com/in/swati-sahu-a26969b7/
A: 200 Middlesex Essex Turnpike , Suite #100, Edison NJ 08830
Flexible work from home options available.
Compensation: $60.00 - $63.00 per hour
About Us
Triunity is a Product Development, Staff Augmentation, and Consulting Services company providing solutions and services in North America. We provide IT services and technology solutions to various business verticals like Healthcare, Pharma, Banking, Finance, etc. Our goal is to develop a long-term partnership with businesses and help them get a competitive advantage by providing IT infrastructure and software platforms.
Lead by experts in the IT industry with a proven record of delivering software solutions, consulting, and staffing services, we have expertise in fulfilling client needs in terms of customized business solutions as well as IT consulting. At Triunity, we always try to bring the right mix of skills, technologies, and experts together which helps our clients to stay ahead in the competition. Our goal is to make our clients empower with cutting-edge technologies and take care of all their IT needs so they can focus more on their core business.
Triunity Culture
Our core value is our people and our teams . We believe the real mantra of success is like minded people with right mix of technical and analytical skills. Our strength lies in bringing right set of people and delivering work as a team. Be it expert or intern Triunity always always value its own people and give them platform to excel in their career.
At Triunity you can expect
- Challenging & Friendly
- Work on new edge technologies & tools
- Work with industry experts
- Solving complex client problems and delivering solutions
- Working on projects lasting from six months to several years
Careers & Growth Model
At Triunity people are motivated by the complexity and challenges they face when working on client projects . We always motivate our people to keep learning new technologies and also give them platform where they can get chance to show their technical and analytical skills . We help our people in adding latest technologies ,tools, methodologies and certifications to their resume by arranging trainings , seminars and knowledge sharing sessions.
(if you already have a resume on Indeed)