DAILY DUTIES / RESPONSIBILITIES:
The system engineer will be responsible for managing the discovery, analysis, tracking, and remediation of vulnerabilities across the agency’s technology systems.
Responsibilities include:
• Maintain and improve the vulnerability management process.
• Develop solutions and automated methods to reduce manual and repetitive tasks.
• Follow a mature change management process – preparing change management requests and presenting requests to the change management board for approval.
• Work closely with key stakeholder groups, including the SOC, to ensure appropriate levels of engagement and focus are maintained.
• Plan and implement technical changes without unexpected disruption to the service and with minimal oversight.
• Create, maintain, and review operational processes and support documentation.
• Adheres to Information Technology application development standards and security requirements.
• Prepare and maintain system documentation and architecture diagrams as assigned.
• Ability to plan, organize, review, implement associated project milestones to completion.
• Requires mastery technical and business knowledge in multiple disciplines/processes.
• Create supporting project and system documentation.
• Provide updates to the Project Team.
• Assist with development of policies and procedures to conform and comply with agency standard cyber security policy design related to information risk management, designation of data as to criticality, confidentiality, and protection. (NIST NA0-53, FISMA, SC InfoSec Requirements http://admin.sc.gov/technology/information-security/policies-and-procedures, etc.)
The position will be utilized for 40 hours per week for the duration of this project. The selected candidate should be able to work flexible hours where it may be necessary for work to be completed outside traditional business hours.
The candidate will work closely with the CISO and PCI project team to identify, prioritize, and schedule changes to the agency’s PCI environment to support PCI compliance. The candidate will work closely with customer and subject matter experts for the system design, migration to the new framework, and testing.
This will also include compliance to DHEC security policy/procedures as well as integrating systems when possible to streamline staff workflows, user security, and data correction.
Module support of the project.
• DHEC will require that selected personnel sign the DHEC confidentially agreement and/or Business Associate (BA) agreement if applicable. All web services must be secure.
• DHEC will not accept any offers including an “up-lift” charge. The rate paid per consultant must not exceed the maximum rate established for this position described in the State contract terms.
• Contractors must be onsite during each week throughout the term of the contract.
• Follow agency IT Standards, policies, and procedures to include documentation.
• All source code (compiled and un-compiled) will become the sole property of the South Carolina Department of Health and Environmental Control. Any source code, data, product, or functionality resulting from this SOW or previously owned/developed by DHEC will remain the sole property of DHEC and is not to be incorporated into the core product of any vendor's application. Any modifications and interfaces developed under said contract will be not be used by the contractor for any independent project of the contractor or published or publicized by the contractor without written permission of DHEC.
• DHEC has the final say on all programming choices.
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
1. EXPERIENCE IN PROJECTS INVOLVING PCI/NIST SECURITY IMPLEMENTATIONS AND/OR AUDITS.
2. KNOWLEDGE OF INFORMATION TECHNOLOGY FIELD, BEST PRACTICES, ORGANIZATION AND OPERATIONSFAMILIARITY WITH VULNERABILITY MANAGEMENT REPORTS AND TOOLS (NESSUS, CLOVER SECURITY, ETC.)
3. KNOWLEDGE OF NETWORKING PROTOCOLS, INCLUDING TCP/IP, HTTP, NTP, DNS, MLLP, NDM
4. SECURITY - KNOWLEDGE IN NETWORKING, DATABASES, SYSTEMS AND WEB OPERATIONS
5. VULNERABILITY SCANNING
6. MICROSOFT ACTIVE DIRECTORY.
7. ITIL INCIDENT AND PROBLEM MANAGEMENT PROCESSES
8. NIST CONFIGURATION MANAGEMENT CONTROLS
9. EXPERIENCE WITH SECURITY AND DATA CLASSIFICATION RELATED TO CDC, HIPAA, AND CJIS
PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
1. Experience network vulnerability scanning and penetration testing.
2. Knowledge of Information Security best practices.
3. Ability to establish positive working relationships with technical staff, customers and others involved in data-centric management.
4. Excellent written, oral, and interpersonal communication skills
5. Knowledge of Information Technology Field, best practices, organization, and operations
6. Experience with SolarWinds, LanSweeper, AD
7. Ability to integrate technical systems with agency goals and objectives.
8. Experience working with PCI environments
9. Security Certification (CISSP,CRISC, CEH)
REQUIRED EDUCATION:
Bachelor's or Master's Degree in a relevant field of work and/or equivalent work experience.
Additional Sills: PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):1. Experience network vulnerability scanning and penetration testing. 2. Knowledge of Information Security best practices. 3. Ability to establish positive working relationships with technical staff, customers and others involved in data-centric management.4. Excellent written, oral, and interpersonal communication skills5. Knowledge of Information Technology Field, best practices, organization, and operations 6. Experience with SolarWinds, LanSweep, AD7. Ability to integrate technical systems with agency goals and objectives.8. Experience working with PCI environments9. Security Certification (CISSP,CRISC, CEH)
Bachelor’s Degree