Logo
Sistema Technologies, Inc.

Systems Analyst

Sistema Technologies, Inc., Austin, Texas, us, 78716


Austin, TX Systems Analyst

- Solicitation#

529501214 Texas Health and Human Services Commission (HHSC)

Supports TIERS Operations, AWS Cloud Migration and TIERS Cloud Migration's Authority to Connect project by applying information security threat intelligence to identify and exploit vulnerabilities within different environments. On a daily basis you will perform analysis of on-prem and cloud security and monitor security operations including security architecture reviews. Our ideal candidate understands regulatory requirements, has in-depth knowledge of industry standards and trends, and is proficient with the latest cybersecurity software. On a daily basis interacts with all aspects of IT responsible for the management of DevSecOps. Position will be remote but program will only allow candidates who are LOCAL to the Austin area ONLY. Candidates must already reside in Texas.

Minimum Requirements:

Candidates that do not meet or exceed the

minimum

stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. Actual Years Experience Years Experience Needed Required/ Preferred Skills/Experience 8 Required Coordinates and executes security policies and controls, as well as assess vulnerabilities within the company. 8 Required Experience with data and network security processing, security systems management, and security violation investigation. 8 Required On a daily basis performs analysis of on-prem and cloud security and monitor security operations including security architecture reviews. 8 Required Understands regulatory requirements, has in-depth knowledge of industry standards and trends, and is proficient with the latest cybersecurity software. 8 Required In-depth knowledge of AWS Cloud Security. 8 Required Experience with managing various projects and ability to plan and oversees all aspects of the projects. 8 Required Strong ability to identify problems/issues, analyze and evaluate alternatives and recommend/implement effective solutions. 8 Required Orchestrate calls to include, but not limited to project kick-off calls, notification of high/critical findings during the testing process, and close out calls to review test findings, evidence, process steps to reproduce, and remediation recommendations. 8 Required Experience implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up to date on the latest intelligence, including hackers' methodologies, in order to anticipate breaches. 8 Required Extensive experience with working with and implementing NIST 800-37, NIST 800-53, MARS-E controls, POA&Ms, and developing Corrective Action Plans. 8 Required Review violations of computer security procedures and discuss procedures with HHSC/TIERS Security team. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. 8 Required In depth knowledge and hand on experience on AWS platform. 8 Required Experience with Security web application firewalls. 8 Required Experience with managing conflict and resolving issues at managerial levels. 8 Required Experience with reviewing and coordinating audit responses, evidence gathering, and plan of actions. Experience collaborating with IT departments to coordinate audit responses. 5 Preferred Skilled information technology professional with advanced experience developing and implementing IT policy, standards and procedures. 4 Preferred Experience in delivering technical training in cloudbased technology is a plus. 4 Preferred Experience providing Windows and Linux operating system and application support. 4 Preferred Experience with information security risk assessments. 4 Preferred Experience with security governance and documentation and security plan documents. 3 Preferred Experience ITIL - ticketing using Remedy and ServiceNow. 3 Preferred Ability to training staff on network and information security procedures, processes and information safeguarding. 3 Preferred Experience working with Archer GRC, Dynatrace, Splunk, Imperva Web Application Firewall, Qualys and MS Office tools. I need Three References

Reference Name

( Required ): Title (Optional)

Company Name

( Required ):

Phone Number

( Required include area code): E-mail address (Optional): Professional Relationship (Optional):

Peer Co-Worker Supervisor

Customer End-User Subordinate

Reference Name

( Required ): Title (Optional)

Company Name

( Required ):

Phone Number

( Required include area code): E-mail address (Optional): Professional Relationship (Optional):

Peer Co-Worker Supervisor

Customer End- User Subordinate

Reference Name

( Required ): Title (Optional)

Company Name

( Required ):

Phone Number

( Required include area code): E-mail address (Optional): Professional Relationship (Optional):

Peer Co-Worker Supervisor

Customer End- User Subordinate