67197: Columbus, OH – IT – AGE – Product Specialist 3/PS3

Job Title: Products Specialist 3/PS3 (Contract-to-Hire)
NFP Rate: $56.04
Interview: Onsite interviews required
Will close to submissions on: Wednesday 12/11 @ 10AM
This is a contract-to -hire opportunity The consultant could potentially convert to FTE @ Dept of Aging. The Dept of Aging is not able to sponsor H1 Visa Holders
Converting Salary Range would start @ 80,000
Please reach out to Andy Hovest with any questions: andyh@

30 % of Job Duties:  Manages assigned projects with activities and responsibilities involving organizations external to ODA: Provides deep technical privacy guidance, analysis, and feedback to business leaders, engineers, technical teams and operational teams. Helps develop, implement and manage internal control processes relating to privacy frameworks and offer privacy support to various departments. Partners with internal teams to ensure sensitive data has been identified and that standards and regulations are in place to adequately meet the needs and goals of the organization. Facilitates the use of a standard process to ensure that decisions concerning shared data are made in a transparent and appropriately inclusive manner.

30 % of Job Duties:  Writes, maintains and review Information Technology (IT) security policies to ensure compliance with ODA, State of Ohio, federal, regulatory or other oversight entities’ security requirements. Reviews policy and ODA’s directives to identify potential impacts to cyber implementations and makes recommendations for improvement or policy changes. Coordinates with lines of business to ensure technology policy compliments and aligns appropriately with other policy areas. Performs governance, risk management and compliance controls, processes and technology. Maintains an understanding of security-related IT controls and various testing methods utilized to discover the effectiveness of those controls.

20 % of Job Duties:  Develops, supports and integrates identity management and access control controls and processes. Assists in internal required security assessments, to include the potential creation of any necessary post-assessment deliverables. Identifies, collects and analyzes data required for various facets of the information security and risk management programs. Analyzes available data sources to identify trends and make recommendations to enhance network, system, operational and data security.

10 % of Job Duties:  Leads internal eDiscovery efforts including data collection, extraction, preservation and destruction.

10% of Job Duties: Performs other related duties as assigned which includes but is not limited to: • Gathers, interprets and applies information from a variety of sources to aid in software development duties; • Attends meeting, trainings, seminars and special events; • Maintains on-going job knowledge to remain current in software development responsibilities, trends, and techniques; • Attends and actively participates in work unit special projects or discussions; • Provides high quality customer service as per ODA policy 100-COM-03, Customer Service Standards, to internal & external customers.

 

Knowledge, Skills, and Ability

Knowledge of: (1) information systems including LAN/WAN architecture & principles, networking operation systems & protocols & network monitoring & capacity planning techniques; information systems analysis & design; high-level information systems languages, information systems & software development; (2) project management lifecycle and practices including planning, scope, quality, and implementation management (3) data security practices & implementation, common adversary tactics, techniques & procedures, data backup, types of backups & recovery concepts & tools, cryptology, encryption methodologies, incident response & handling methodologies, network traffic analysis methods, scripting language programs (e.g., Power Shell, WMI); (4) NIST, OWASP, and other common technology compliance frameworks Skill in: (5) identifying and implementing security controls for new or current computer systems (6) analyzing operational and technical processes/tools to identify potential vulnerabilities (7) developing risk management policies, processes and governance strategies Ability to: (8) define problems, collect data, establish facts & draw valid conclusions; (9) communicate both technical & non-technical matters; (10) maintain confidentiality of sensitive information.

 

 

Comments are closed.