- Working with project & team managers and stakeholders to produce high quality and detailed identity and access management business requirements as they related to information security
- Develop and enforce policies for identity and access management (I&AM) team for claims based authentication
- Define the information security policy, standards and process/procedures as required for utilizing an identity management system including: role mining, attestation, account provisioning, cloud/federated access provisioning, and others.
- Develop security policies and procedures for Roles Based Access Controls in claims based architecture
- Develop security policies and procedures for claims based architecture for Active Directory and Sharepoint
- Actively participate in assessment, planning, architecture, and design activities
- Design, document, and implement security controls for Identity and Access Management
- BizTalk, UDDI, web services, and claims based authentication experience
- Design, document, and put security governance in place for external claims based authentication
jobs in america
Cyber Threat Analyst in NEWARK, Delaware
- TAC Information Security Analyst (Must be a US Citizen)
The Tier I Information Security Analyst is responsible for executing day-to-day tasks in the Security Operations Center 24×7. These tasks include: answering the NASS security support hotline, monitoring the NASS security support mailbox, creating tickets for client requests, monitoring and responding to Instant Messaging applications, and executing a variety of scripted actions on timed intervals. This position will also act as Tier I support for several endpoint services.
- Eyes on glass monitoring and resolution of security incidents within established customer Service Level Agreements.
- Perform daily operational ‘eyes on glass’ real-time monitoring and analysis of security events from multiple sources including but not limited to events from Security Information Monitoring tools, network and host based intrusion detection systems, firewall logs, system logs (Unix & Windows), mainframes, midrange, applications and databases.
- Monitors and analyzes attempted efforts to compromise security protocols.
- Identifies and investigates activities and conducts and provides analyses regarding results.
- Escalates issues to higher level associates.
- Reviews computer logs and messages to identify and report possible violations of security.
- Coordinates, documents, and reports on internal investigations of security violations.
- Interacts with customers to understand their security needs; assists in the development and implementation of procedures to accommodate them.
- Writes security status reports to provide system status, report potential and actual security violations and provide procedural recommendations.
- Bachelor’s degree or equivalent combination of education and experience in Information Security is required.
- Zero or more years of experience in information systems security.
- Experience working with operating systems.
- Experience working with domain structures and digital signatures.
- Experience working with computer desktop packages such as Microsoft Word, Excel, etc.
- Communication skills to interact with team members, management, and support personnel.
- Analytical and problem solving skills for design, creation and testing of security systems.
- Ability to work independently and as part of a team.
NCDOT – Info Security Specialist- 3C North Carolina
- Working with project & team managers and stakeholders to produce high quality and detailed identity and access management business requirements as they related to information security
- Develop and enforce policies for identity and access management (I&AM) team for claims based authentication
- Define the information security policy, standards and process/procedures as required for utilizing an identity management system including: role mining, attestation, account provisioning, cloud/federated access provisioning, and others.
- Develop security policies and procedures for Roles Based Access Controls in claims based architecture
- Develop security policies and procedures for claims based architecture for Active Directory and Sharepoint
- Actively participate in assessment, planning, architecture, and design activities
- Design, document, and implement security controls for Identity and Access Management
- BizTalk, UDDI, web services, and claims based authentication experience
- Design, document, and put security governance in place for external claims based authentication
Questions
|
Questions
|
Answers
|
Question 1
|
Absences greater than two weeks MUST be approved by CAI management in advance, and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you accept this requirement?
|
|
Question 2
|
All work must be completed on site. Do you accept this requirement?
|
|
Question 3
|
Please list candidate’s email address HERE that will be used when submitting E-RTR.
|
|
Question 4
|
Please indicate how soon this candidate is available to start work. Vendors are encouraged to submit candidates that are available for the duration of the assignment.
|
|
Question 5
|
Vendor must disclose to the agency if the candidate will be subcontracted at the time of submission. Do you accept this requirement?
|
|
Question 6
|
Vendor must notify the agency if any portion of the requirements listed in this task order are to be outsourced to other countries. Do you accept this requirement?
|
|
Question 7
|
This role is not new to the Department. There has been someone working in the role in the past. However, this is a new requirement for those services and it is open for competition.
|
IT jobs in usa
Information Technology (IT) jobs in the USA are very hot! As more and more business’ in developed countries go online, more and more jobs for IT become available. According to Wanted Analytics, China currently has the greatest demand for software engineers with the USA in second. The key to getting an IT job in America is specialization. Companies are looking for a specific skillset. According to an article on Fortune magazine, 3 of the top 10 career fields with the most job openings of 2014 were specialized IT jobs.

IT is very competitive but once you specialize in a certain aspect of IT (i.e. IT security engineer, IT network engineer, software engineer) your competition gets smaller. Remaining competitive means gaining experience, IT certifications and degrees. As the market for IT people has gotten more complex it has also become important to be diversified in your skills. If you are a software engineer it really helps to know other things like networking, security and maybe even program management.
Probably the most important thing to do if you are going for a job in Information Technology is to study the company or organization that you are going after. Often times employers are looking for something every specific. You may have the experience they are looking for so you should put that on your resume and make sure it is mentioned during the interview. You find that you are just shy of what they are looking for then you should learn what you can before you approaching them.
In the DoD, every IT professional is expected to have solid security experience or security certification even if they are not an expert in it.
IT is a huge growing market.