Job ID: NC-530689 (99090404)
Security Architect with risk management, privacy/security policies, vulnerability assessment, CMS, compliance, mitigation, NIST/HIPAA/SSA/IRS Pub 1075, Nessus, NMAP, RFP review and healthcare/Medicaid Reform experience
Location: Raleigh NC (DHHS)
Duration: 12 months
Skill Required / Desired Amount of Experience
Risk Management – must be able to Identify gaps through risk management, and assist in the development of mitigation strategies. Required 7 Years
Experience updating privacy and security policies based on gaps found through an assessment process. Required 7 Years
Experience documenting vulnerability assessment results in a accurate, clear, actionable, and available way to appropriate personnel Required 7 Years
Must be able to review & assess MES systems throughout all phases of their life cycle in an effort to identify Privacy, Security Architecture Required 7 Years
Must be able to serve as a knowledge base for organizations as it relates to CMS and state compliance requirements & mitigation strategies. Required 7 Years
Experience Performing risk assessments based on NIST 800-53 Rev 4. HIPAA,SSA and IRS Pub 1075. Required 7 Years
Experience with network mapping and vulnerability scanning tools such as NESSUS and NMAP. Required 7 Years
Experience in reviewing RFP, RFQ, MOU and MOA for privacy and security architecture requirements Required 7 Years
NC DHHS – Privacy and Security Office (PSO) requiring services of an IT Security Architecture to assist and assess the Medicaid Enterprise System (Medicaid Reform) and review CMS requirements for the project. In addition this resource must also review the RFP, MOU and MOA for privacy, security and audit requirements.
This resource must identify the risks and assist in the development of mitigation strategies, and to establish the target security/infrastructure architecture.
Duties include, are not limited to:
* Author corresponding requirements, including definition of dependencies on infrastructure consolidation efforts.
* Define Security/Information Assurance requirements (and dependencies).
* Specify key architectural aspects of the architecture view, and identify other aspects that need definition.
* Research Best Practices for reuse, applying State IT Security and industry standards, and defining the transformation approach that transitions the current architecture to the target architecture.
The ideal candidate will have experience working with current and emerging information security technologies and development methodologies. Bachelor’s degree in computer science, management information systems, or related field preferred. Good analytical and creative problem solving skills, and relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, with a wide degree of creativity and latitude is expected.