Position: Data Analyst (Ref: 755)
Location: Chester, VA 23836
Duration: 1 Months 28 Days - Contract
Openings: 10
Pay Rate: $50.00/hr
Description:
NOTE:
We plan to hire 8-10 resources for this position
Candidates for this position should have 4 or more years of IT and/or IT Auditing experience and be able to pass a background security check. The individual should be knowledgeable of general IT network infrastructure and security. The individual should be able to classify data as to its sensitivity to Confidentiality, Integrity and Availability. Candidates must have knowledge of the elements that constitute PII (personally identifiable information), personal health information, sensitive financial information and credit card information. The candidate should be familiar with risk management techniques and practices. The candidate should also be knowledgeable of the use and application of commonly used IT security controls, such as encryption, authentication techniques, logging, contingency planning, etc.
The hours for these positions will be from 8 to 5, Monday through Friday. Candidates must have their own transportation as most work will be in the field, at different locations. Most locations are in the central Virginia area, but there are other locations across the state that will require longer day trips and in some cases short overnight stays. The positions will be managed by IT Security personnel, but the individual will need to be able to work independently and be able to follow the guidelines and instructions that are given.
Required / Desired Skills
• Knowledge and experience in IT security practices, risk management and data classification skills. (Required 4 Years)
• Knowledge of IT security assessment (Required 4 Years)
• Knowledge of IT Auditing (Required 2 Years)
• General IT network infrastructure and security (Required 4 Years)
• Able to classify data as to its sensitivity to Confidentiality, Integrity and Availability (Required 2 Years)
• Knowledge of the elements that constitute PII (personally identifiable information) (Required 2 Years)
• Use and application of commonly used IT security controls, such as encryption, authentication techniques, logging, contingency planning (Required 4 Years)
Location: Chester, VA 23836
Duration: 1 Months 28 Days - Contract
Openings: 10
Pay Rate: $50.00/hr
Description:
NOTE:
We plan to hire 8-10 resources for this position
Candidates for this position should have 4 or more years of IT and/or IT Auditing experience and be able to pass a background security check. The individual should be knowledgeable of general IT network infrastructure and security. The individual should be able to classify data as to its sensitivity to Confidentiality, Integrity and Availability. Candidates must have knowledge of the elements that constitute PII (personally identifiable information), personal health information, sensitive financial information and credit card information. The candidate should be familiar with risk management techniques and practices. The candidate should also be knowledgeable of the use and application of commonly used IT security controls, such as encryption, authentication techniques, logging, contingency planning, etc.
The hours for these positions will be from 8 to 5, Monday through Friday. Candidates must have their own transportation as most work will be in the field, at different locations. Most locations are in the central Virginia area, but there are other locations across the state that will require longer day trips and in some cases short overnight stays. The positions will be managed by IT Security personnel, but the individual will need to be able to work independently and be able to follow the guidelines and instructions that are given.
Required / Desired Skills
• Knowledge and experience in IT security practices, risk management and data classification skills. (Required 4 Years)
• Knowledge of IT security assessment (Required 4 Years)
• Knowledge of IT Auditing (Required 2 Years)
• General IT network infrastructure and security (Required 4 Years)
• Able to classify data as to its sensitivity to Confidentiality, Integrity and Availability (Required 2 Years)
• Knowledge of the elements that constitute PII (personally identifiable information) (Required 2 Years)
• Use and application of commonly used IT security controls, such as encryption, authentication techniques, logging, contingency planning (Required 4 Years)