Information architect [h1.location_city]
[job_alerts.create_a_job]
Information architect • tempe az
- [promoted]
Information Security Analyst
Tech Providers Inc.Phoenix, Arizona, United StatesMarket Information Technology Manager
Marriott Hotels ResortsScottsdale, Arizona, USAChief Information Officer (CIO)
ConfidentialGilbert, AZ, United States- [promoted]
Licensed Architect / Project Architect
gpacPhoenix, AZ, United States- [promoted]
Chief Information Officer
360socScottsdale, AZ, United States- [promoted]
Architect
CESOPhoenix, AZ, United States- [promoted]
Chief Information Security Manager
StaffingMesa, AZ, US- [promoted]
Information Architect
VirtualVocationsGilbert, Arizona, United States- [promoted]
Chief Information Officer
NY CREATESPhoenix, Arizona, United States- [promoted]
Manager, Information Security
Universal Technical InstitutePhoenix, AZ, US- [promoted]
Information Security Auditor
Nlets - The International Justice and Public Safety NetworkPhoenix, AZ, USInformation Security Analyst
Motion RecruitmentCHANDLER, Arizona, United States- [promoted]
Supervisor Information Security
Rogers CorporationChandler, AZ, United StatesPr Information Security Architect
Discount TireScottsdale, ArizonaEnterprise Governance Information Architect
Alliance of Professionals & Consultants, Inc.Tempe, AZ, US- [promoted]
INTERN - Information Technology
Central Arizona ProjectPhoenix, AZ, United Statestutor - Information Technology
BUKIPhoenix, AZ, US- [promoted]
Architect
Stanley ConsultantsPhoenix, AZ, US- [promoted]
Architect
CESO, Inc.Phoenix, AZ, USInformation Security Analyst
Tech Providers Inc.Phoenix, Arizona, United States- [job_card.temporary]
Role : Information Security Analyst Locations : 12851 Crossroads Parkway South, City of Industry, California 91746 (Onsite) Duration : 12+ Months contract Position Details Background Checks Yes Position Description An Information Security Specialist interprets information security policies, standards and other requirements as they relate to internal information system and coordinates the implementation of these and other information security requirements. The Information Security Specialist redesigns and reengineers internal information handling processes so that information is appropriately protected from a wide variety of problems including unauthorized disclosure, unauthorized use, inappropriate modification, premature deletion, and unavailability. The Information Security Specialist will provide highly specialized experience in one or more information, computer, or network security disciplines (e.g. penetration testing, accreditation, or risk assessment and mitigation); develop system security plans, certification and accreditation reviews; analyze and establish processes for comprehensive systems and data protection; assess and mitigate system security threats and risks; perform security audits, evaluation, risk assessments and make a strategic recommendations; and manages, supports, installs and maintains security tools and systems, and tracks security patches and incidents. Skills Required The Information Security Specialist will possess knowledge and experience in standard methodologies used in certification and accreditation processes; extensive experience following NIST guidelines in risk assessment and management; conducting vulnerability analysis; developing mitigation plans; and performing penetration testing, password protection testing and application security testing. Additional Skills Required Hands-on knowledge in standard methodologies used in certification and accreditation processes; and ability to follow and review NIST guidelines in risk assessment and management. Experience Required This classification must have a minimum of five (5) years of experience applying security policies, standards, testing, modification and implementation. At least three (3) years of that experience must be in information security analysis. Additional Experience Required 3 years in the last 5 years of experience in the following : NIST 800-53; conducting vulnerability analysis; and performing gap analysis and developing mitigation processes for identified risks. Education Required This classification requires the possession of a bachelor’s degree in an IT-related or Engineering field. Additional qualifying experience may be substituted for the required education on a year-for-year basis. Additional Education Required One or more of the following Security Certifications : Security +, Certified Ethical Hacker, Cloud Security Professional, CISSP.