• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

colorado

Operation Technician network technician job centurylink I

April 5, 2020 by cyberaware2 Leave a Comment

Signup for free at http://convocourses.com

the job:
Job Title: Operations Technician
Location: Littleton, CO
Duration: 12 Months (potential to extend or hire FTE)
Direct Client: #CenturyLink

#operationstechnician

Additional Notes:
-12-month contract with potential to extend or hire FTE
-Top Skills: #CCNA, #Juniper, #JNCIA certifications or pending certifications
-Seeking candidates who are eager & willing to learn
-Network experience preferred
-Interview: Phone; potential face-to-face
-Type of Position: Contract – to – Perm

Job Description:
Works on relatively straightforward installation and/or maintenance assignments on network switching equipment.
Technician for customer/company network systems installation and/or maintenance activities.
Monitors network operations and resolves routine network monitoring problems.
Monitors network performance; conducts routine monitoring equipment installation and maintenance activities; resolves routine trouble tickets.

Minimum Qualifications:
Associate degree or equivalent education and relevant experience.
Minimum 3 yrs related experience in specific area or equivalent.
May require technical certification.

If you are interested, qualified, available, planning to make a change, or know of a friend who might have the required qualifications and interest, please call me ASAP at (732) 210-9291 even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you.

Also, please take a few minutes to answer some of the questions below as they will help me qualify your candidature

Full Legal Name as in Driving License/ Passport:
Preferred email ID:
Day/ Evening phone numbers:
Current Location:
Work Authorization:
Earliest availability for Phone/ On-Site interview:
Hourly Rate:
Earliest possible start date:
Two Professional References:

Also, be aware that our client conducts an extensive background checks on candidates who are extended offers of employment.

Sincerely yours,
Akash Barot
Associate Technical Recruiter
eTeam Inc.
abarot@eteaminc.com
(732) 210-9291

Filed Under: DIARMF Jobs, risk jobs Tagged With: ccna, colorado, IT job, jncia, Juniper, littleton, network job, network technician, operation technician

Data Security Analyst State of Colorado denver RMF NIST JOB

February 1, 2020 by cyberaware2 Leave a Comment

check out the course:
http://convocourses.com

Check out the job:
Job Details:
Job title: Data Security Analyst (0000076025)
Location: Denver, #Colorado(80203)
Estimated Duration: 01/13/2020 – 09/30/2020

Job Description:
Reports to the Director of Security Risk and Compliance or Delegate to perform activities for the oversight of the risk and compliance program.
Perform activities to reduce vulnerabilities for the overall enterprise risk management program.
Performs duties to facilitate confidentiality, integrity, and availability of systems to protect data from unauthorized users.
May require a bachelor’s degree in area of specialty and at least 5 years or more of risk management, experience working in a complex environment, and assessment of internal controls.
Has knowledge of commonly-used concepts, practices, and procedures in accordance with the #NIST #RMF (risk management framework).
The specialized individual must have previous experience with implementing an enterprise risk management (ERM) framework and applicable certifications such as CISSP, CISA, or CISM.
In addition, experience working with a Governance Risk and Compliance tool is highly desired, but not a must-have.
This individual should be a self-starter, able to provide consultative advice and able to work autonomously.

Thanks,
Have a wonderful day!!
Maddy |Technical Recruiter | Email: v.madhuri@softpath.net
Direct: 678 783 7352| Ext. 522 | Softpath System LLC | 3985 Steve Reynolds Blvd | Bldg C Norcross GA 30093 www.softpath.net
Linkedin: https://www.linkedin.com/in/maddy-johnson-270220136/

Filed Under: information system compliance, IT Security Jobs Tagged With: CISSP, colorado, denver, enterprise risk management (ERM), nist, risk managment framework, rmf, state

Network consultant #littleton #colorado

April 25, 2019 by cyberaware2 Leave a Comment

Check out my course:
http://securitycompliance.thinkific.com

****************************************************
Job Title: Network Consultant

Location: Littleton, CO

Job Type:Fulltime(GC/Citizen/GC-EAD)

Role and Responsibilities:
* Technical and Business Discussions with Enterprise Customers Team to understand the requirements and take their view on the target architecture
* Prepare summary view of existing network
* Understand existing LAN/WAN Architecture of Enterprise including Point to Point, MPLS Links, Internet Links, Cloud Connectivity, Redundancy, QoS, Security
* Understand the Application Traffic Pattern
* EOS/EOL Device Assessment
* Next Generation Technology Adoption Possibilities such as SD-WAN, Virtualisation, VNFs and Wireless LAN
* Prepare a business case for SD-WAN and other technology adoptions including financial, technical and operational benefits
* Designs to cover Next Generation technologies in SD-WAN, LAN, Wireless LAN, Security, Branch in a Box

Skills:
Seasoned Networking Professional with broader and deeper technology coverage:
* Experience in Network Design, Implementation and troubleshooting
* Knowledge of Routing Protocols and Hardware Platforms to include BGP, OSPF, EIGRP, TCP/IP, IP Routing on Cisco & Juniper
* Advanced knowledge of all Ethernet/LAN Technologies
* Security and Security-related systems including Firewall/IPS/IDS from Multiple Vendors such as Palo Alto, Cisco, Juniper, Citrix

Secondary Skill

* Exposure to MPLS Networks would be a Plus
* Any exposure to SD-WAN architecture, implementation, troubleshooting would be a Plus
* Valid Cisco/Juniper Certifications will have added advantage”

Filed Under: DIARMF Jobs, IT Security Jobs, risk jobs Tagged With: Cisco, colorado, EOS/EOL, GC, GC-EAD, Juniper, LAN, littleton, MPLS, network, Qos, WAN

Systems Analyst – Senior Highlands Ranch, CO

February 16, 2016 by Bruce Brown Leave a Comment

updated resumeaditistaffing.com or call to 425 457 7934
                                                                                          
Title –  Systems Analyst – Senior
Location – Highlands Ranch, CO
Duration of assignment and possible extensions: 1 year. May be some potential to extend or convert.

Must have skills
• Bachelor’s degree in engineering, computer science or a related field OR related certification is required. • 5-8+ years information security experience (ID & Access Mgt) • Working knowledge of Oracle Identity Management suites (OIM) • Strong knowledge of the UNIX/Linux systems administration, Unix Enterprise Directory, and Privileged access management tools (e.g. Unix Privileged Manager, Random Password Manager, etc.). • Scripting in UNIX • Familiar with security concepts such as PKI, SSL, and encryption • Manage access controls for Visa key information resources residing on multiple platforms, with a focus area in UNIX, Linux and databases (MS SQL, ORACLE, DB2). • MUST be able to work onsite in Denver

Nice to have skills
Post graduate degree a plus • CISSP, CISA, CISM and other comparative information security certifications are preferred • Development experience a plus (Java, C#, VBScript, Perl and Shell script, etc.) • Proficiency in Microsoft Office Applications, experience developing applications in Excel VBA.

Roles and responsibilities
• Manage access controls for Visa key information resources residing on multiple platforms • Needs to be familiar and comfortable to use local commands, scripts and tools to perform job tasks. • See JD for more
Preference on industry background or previous companies worked for?

Description
Position Summary
The ideal candidate for position will be a proactive and self-motivated professional who will work with other team members to manage access controls for Visa key information resources residing on multiple platforms, with a focus area in UNIX, Linux and databases (MS SQL, ORACLE, DB2). The successful candidate should be familiar and comfortable to use local commands, scripts and tools that will be used to perform job tasks.

Qualifications
• Bachelor’s degree in engineering, computer science or a related field is required. Post graduate degree a plus
• 5+ years information security experience required
• Strong knowledge of the UNIX/Linux systems administration, Unix Enterprise Directory, and Privileged access management tools (e.g. Unix Privileged Manager, Random Password Manager, etc.). This includes good analytical and troubleshooting skills on all platforms and tools supported.
• Working knowledge of Oracle Identity Management suites
• In-depth and proven knowledge in building automated solutions using various coding languages will be an added advantage (Java, C#, VBScript, Perl and Shell script, etc.)
• Proficiency in Microsoft Office Applications, experience developing applications in Excel VBA.
• Ability to gather and document business requirements and implement solutions to address them

Filed Under: Risk Management For DoD IT Tagged With: colorado, DB2, highland ranch, Linux, MS SQL, Oracle, PKI, SSL, unix

OIT – Help Desk Support I ( 1 position ) Denver CO

February 15, 2016 by Bruce Brown Leave a Comment

Identity and Access Management Analyst
The Governor’s Office of Information Technology Identity and Access Management (IAM) work unit is responsible for how users within an organization are given an identity – and how it is protected, including saving critical applications, data and systems from unauthorized access while managing the identities and access rights of people both inside and outside the organization. The IAM analyst will be responsible for creating accounts in the Electronic Death Registration system. The analyst will work closely with Manager of IAM, CDPHE Program Area, IAM team and Customers.
This project serves to expand capacity in the Identity & Access Management team with the Governor’s Office of Information Technology to provide access credentials to Electronic Death Registration (EDR) system users. The Office of the State Controller has implemented the new system to increase efficiency and decrease delays for individuals awaiting issuance of death certificates.
In addition to those responsibilities listed above, the IAM analyst may be required to:
●    Review each registration packet received from the Office of the State Controller to determine user group assigned to applicant
●     Enter applicant data into the credentialing system to generate unique system access credentials
●    Issue complete credentials (set of user ID, Password, and PIN) to user through contact information documented in the applicant packet
●    If credentials cannot be verified or issued after two attempts to contact applicant, contractor shall document the issue or problem preventing completion of the process and maintain a list of users with unresolved/outstanding applications
Cooperative agreement:
This position facilitates identity and access management. The position is liable for ensuring that customer requests for security access is completed in a timely manner, provides second level technical support to the project team, end users and OIT functional groups. This position will perform ticket management and participate in project meetings. It is the responsibility of the IAM analyst to manage Identity and access within CA Service Desk, Customer Portal (EEM), Active Directory and Google.
Qualifications: 
The Identity and Access Management unit is responsible for provisioning support which includes ticket management, customer service, and knowledge of least privilege methodology with security rights, permissions and groups, experience with Active Directory, CA Service Desk, and Google. Due to the importance of this position, it is expected that a person supporting IAM has basic troubleshooting skills with networking and computer systems, can multitask, work in a fast paced environment while providing excellent customer service.
Terms and Conditions:
 As a condition of employment you may be required to submit to additional background checks and/or screenings during the course of your employment with OIT.
CYBER SECURITY
Contract staff is required to observe the Colorado Cyber Security Policies, as published and updated by the Office of Cyber Security. These policies provide guidelines concerning vendor security controls and vendor reporting and monitoring. Please reference P
Thanks & Best Regards
Nancy Sahni
22nd Century Staffing, Inc
Minorities  Woman own Company
Sr.Technical Recruiter
nancys@22ndstaffing.com
Position Title:                                                                    OIT – Help Desk Support I ( 1 position )
Position Id:                                                                         PO 2016-9259
Agency:                                                                                State of Colorado – OIT
Duration:                                                                             4.5 Months
Work Location:                                                                 4300 Cherry Creek Dr. S. Denver , Colorado  80246
Interview Type:                                                                In person Preferred
Citizenship mandate:                                                     US citizen preferred      

Filed Under: cyberspace workforce, Information Assurance Jobs, risk jobs Tagged With: colorado, denver, Governor’s Office of Information Technology, IAM, Identity and Access Management

System Administrator in Town of Nederland CO

February 11, 2016 by Bruce Brown Leave a Comment

 

Job Details-
Position Title 
System Administrator
Position ID 
2016-01
Client                         
Town of Nederland
Duration                                            
1 Year+ extendable
Work Location                                                          
Town of Nederland, CO, 80466
Interview Type:  Phone/ In-Person
In-Person (Submitted candidates should be local only)
DESCRIPTION:
Mandatory Skills:
  1. Must possess BS degree in Computer Science, Computer Engineering or related discipline
  2. Minimum 5-7 years of experience in Systems Administration and IT
  3. Experience and expertise in Microsoft Windows Server 2012, and related technologies such as backup systems, virus protection, desktop operating systems
  4. Experience in planning, design and installation/upgrade of network systems
  5. Experience in troubleshooting PC hardware and peripherals
  6. Experience in managing Windows desktops, laptops, and printers
  7. Experience in Windows Server and Linux operating systems
  8. Experience in asset inventory and renewals for all hardware and software
  9. Experience in software/ hardware-related policies and procedures
  10. Experience in system enhancement and install software & hardware

Filed Under: Risk Management For DoD IT Tagged With: colorado, cyber, jobs, Nederland, System Administrator, work

  • Go to page 1
  • Go to page 2
  • Go to Next Page »

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: Plan of Action and Milestone
  • Start with These IT Certifications (Part 1)
  • How to Tailor Security Controls in NIST 800
  • #cybersecurityjobs are recession proof
  • What IT Certifications for Information Security (part 2) (8140)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce IA implement implementation info assurance information assurance information security ISSO IT it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in