PCI/DSS Security Analyst (CISSP/CRISC/CEH) with NIST, audit, Nessus, Clover Security, networking, Vulnerability Scanning, Penetration Testing, Active Directory, ITIL, Incident Management, CDC/HIPAA/CJIS, SolarWinds, LanSweep experience

Request ID: BL-9755-1 (910890309)

PCI/DSS Security Analyst (CISSP/CRISC/CEH) with NIST, audit, Nessus, Clover Security, networking, Vulnerability Scanning, Penetration Testing, Active Directory, ITIL, Incident Management, CDC/HIPAA/CJIS, SolarWinds, LanSweep experience

Location: Columbia SC
Duration: 12+ Months Hrs/Wk: 40.00
Comments: This is associated with supporting the agency PCI DSS compliance efforts.

REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
1. EXPERIENCE IN PROJECTS INVOLVING PCI/NIST SECURITY IMPLEMENTATIONS AND/OR AUDITS.
2. KNOWLEDGE OF INFORMATION TECHNOLOGY FIELD, BEST PRACTICES, ORGANIZATION AND OPERATIONSFAMILIARITY WITH VULNERABILITY MANAGEMENT REPORTS AND TOOLS (NESSUS, CLOVER SECURITY, ETC.)
3. KNOWLEDGE OF NETWORKING PROTOCOLS, INCLUDING TCP/IP, HTTP, NTP, DNS, MLLP, NDM
4. SECURITY – KNOWLEDGE IN NETWORKING, DATABASES, SYSTEMS AND WEB OPERATIONS
5. VULNERABILITY SCANNING
6. MICROSOFT ACTIVE DIRECTORY.
7. ITIL INCIDENT AND PROBLEM MANAGEMENT PROCESSES
8. NIST CONFIGURATION MANAGEMENT CONTROLS
9. EXPERIENCE WITH SECURITY AND DATA CLASSIFICATION RELATED TO CDC, HIPAA, AND CJIS

PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
1. Experience network vulnerability scanning and penetration testing.
2. Knowledge of Information Security best practices.
3. Ability to establish positive working relationships with technical staff, customers and others involved in data-centric management.
4. Excellent written, oral, and interpersonal communication skills
5. Knowledge of Information Technology Field, best practices, organization, and operations
6. Experience with SolarWinds, LanSweep, AD
7. Ability to integrate technical systems with agency goals and objectives.
8. Experience working with PCI environments
9. Security Certification (CISSP,CRISC, CEH)

REQUIRED EDUCATION:
Bachelor’s or Master’s Degree in a relevant field of work and/or equivalent work experience.

Experience
Education NIST Configuration Management Controls Yes 8 Advanced Currently Using 2 – 4 Years
Miscellaneous KNOWLEDGE OF INFORMATION TECHNOLOGY FIELD, BEST PRACTICES, ORGANIZATION AND OPERATIONS Yes 2 Expert Currently Using 4 – 6 Years
Network Security Experience in projects involving PCI/NIST security implementations and/or audits. Yes 1 Expert Currently Using 4 – 6 Years
Network Security Security – Knowledge in networking, databases, systems and Web operations Yes 4 Expert Currently Using 4 – 6 Years
Protocols Knowledge of networking protocols, including TCP/IP, HTTP, NTP, DNS, MLLP, NDM Yes 3 Expert Currently Using 4 – 6 Years
Specialties Experience with security and data classification related to CDC, HIPAA, and CJIS Yes 9 Expert Currently Using 4 – 6 Years
Specialties ITIL Incident and problem management processes Yes 7 Advanced Currently Using 2 – 4 Years
Specialties Microsoft Active Directory Yes 6 Advanced Currently Using 2 – 4 Years
Specialties Vulnerability Scanning Yes 5 Expert Currently Using 4 – 6 Years

Remote Work Availability: 0%

SCOPE OF THE PROJECT:
Client actively strives to keep in compliance with PCI-DSS standards. The PCI compliance analyst will manage the PCI compliance initiative under the guidance of the Chief Information Security Officer and PCI project management team. This position will aim to maintain PCI compliance and lower the agency’s risk profile in relation to the PCI environment. This position will work closely with the Security Operations Center (SOC), Server Hosting Team, and Application Teams to review vulnerability reports, investigate solutions, test solutions and their impacts to other environments, follow the agency’s Change Management process, implement solutions, track and document remediation.
Candidates should be self-motivated, team-oriented, work under limited supervision, and respond to priority tasks as needed.

DAILY DUTIES / RESPONSIBILITIES:
The system engineer will be responsible for managing the discovery, analysis, tracking, and remediation of vulnerabilities across the agency’s technology systems.
Responsibilities include:
• Maintain and improve the vulnerability management process.
• Develop solutions and automated methods to reduce manual and repetitive tasks.
• Follow a mature change management process – preparing change management requests and presenting requests to the change management board for approval.
• Work closely with key stakeholder groups, including the SOC, to ensure appropriate levels of engagement and focus are maintained.
• Plan and implement technical changes without unexpected disruption to the service and with minimal oversight.
• Create, maintain, and review operational processes and support documentation.
• Adheres to Information Technology application development standards and security requirements.
• Prepare and maintain system documentation and architecture diagrams as assigned.
• Ability to plan, organize, review, implement associated project milestones to completion.
• Requires mastery technical and business knowledge in multiple disciplines/processes.
• Create supporting project and system documentation.
• Provide updates to the Project Team.
• Assist with development of policies and procedures to conform and comply with agency standard cyber security policy design related to information risk management, designation of data as to criticality, confidentiality, and protection. (NIST 800-53, FISMA, SC InfoSec Requirements http://admin.sc.gov/technology/information-security/policies-and-procedures, etc.)
The position will be utilized for 40 hours per week for the duration of this project. The selected candidate should be able to work flexible hours where it may be necessary for work to be completed outside traditional business hours.
The candidate will work closely with the CISO and PCI project team to identify, prioritize, and schedule changes to the agency’s PCI environment to support PCI compliance. The candidate will work closely with customer and subject matter experts for the system design, migration to the new framework, and testing.

This will also include compliance to Client security policy/procedures as well as integrating systems when possible to streamline staff workflows, user security, and data correction.

Leave a Reply