• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

OIT – Help Desk Support I ( 1 position ) Denver CO

February 15, 2016 by Bruce Brown Leave a Comment

Identity and Access Management Analyst
The Governor’s Office of Information Technology Identity and Access Management (IAM) work unit is responsible for how users within an organization are given an identity – and how it is protected, including saving critical applications, data and systems from unauthorized access while managing the identities and access rights of people both inside and outside the organization. The IAM analyst will be responsible for creating accounts in the Electronic Death Registration system. The analyst will work closely with Manager of IAM, CDPHE Program Area, IAM team and Customers.
This project serves to expand capacity in the Identity & Access Management team with the Governor’s Office of Information Technology to provide access credentials to Electronic Death Registration (EDR) system users. The Office of the State Controller has implemented the new system to increase efficiency and decrease delays for individuals awaiting issuance of death certificates.
In addition to those responsibilities listed above, the IAM analyst may be required to:
●    Review each registration packet received from the Office of the State Controller to determine user group assigned to applicant
●     Enter applicant data into the credentialing system to generate unique system access credentials
●    Issue complete credentials (set of user ID, Password, and PIN) to user through contact information documented in the applicant packet
●    If credentials cannot be verified or issued after two attempts to contact applicant, contractor shall document the issue or problem preventing completion of the process and maintain a list of users with unresolved/outstanding applications
Cooperative agreement:
This position facilitates identity and access management. The position is liable for ensuring that customer requests for security access is completed in a timely manner, provides second level technical support to the project team, end users and OIT functional groups. This position will perform ticket management and participate in project meetings. It is the responsibility of the IAM analyst to manage Identity and access within CA Service Desk, Customer Portal (EEM), Active Directory and Google.
Qualifications: 
The Identity and Access Management unit is responsible for provisioning support which includes ticket management, customer service, and knowledge of least privilege methodology with security rights, permissions and groups, experience with Active Directory, CA Service Desk, and Google. Due to the importance of this position, it is expected that a person supporting IAM has basic troubleshooting skills with networking and computer systems, can multitask, work in a fast paced environment while providing excellent customer service.
Terms and Conditions:
 As a condition of employment you may be required to submit to additional background checks and/or screenings during the course of your employment with OIT.
CYBER SECURITY
Contract staff is required to observe the Colorado Cyber Security Policies, as published and updated by the Office of Cyber Security. These policies provide guidelines concerning vendor security controls and vendor reporting and monitoring. Please reference P
Thanks & Best Regards
Nancy Sahni
22nd Century Staffing, Inc
Minorities  Woman own Company
Sr.Technical Recruiter
nancys@22ndstaffing.com
Position Title:                                                                    OIT – Help Desk Support I ( 1 position )
Position Id:                                                                         PO 2016-9259
Agency:                                                                                State of Colorado – OIT
Duration:                                                                             4.5 Months
Work Location:                                                                 4300 Cherry Creek Dr. S. Denver , Colorado  80246
Interview Type:                                                                In person Preferred
Citizenship mandate:                                                     US citizen preferred      

Filed Under: cyberspace workforce, Information Assurance Jobs, risk jobs Tagged With: colorado, denver, Governor’s Office of Information Technology, IAM, Identity and Access Management

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Social connect:

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: Plan of Action and Milestone
  • Start with These IT Certifications (Part 1)
  • How to Tailor Security Controls in NIST 800
  • #cybersecurityjobs are recession proof
  • What IT Certifications for Information Security (part 2) (8140)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce IA implement implementation info assurance information assurance information security ISSO IT it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in