Job Description: | DAILY DUTIES / RESPONSIBILITIES: The system engineer will be responsible for managing the discovery, analysis, tracking, and remediation of vulnerabilities across the agency's technology systems. Responsibilities include: " Maintain and improve the vulnerability management process. " Develop solutions and automated methods to reduce manual and repetitive tasks. " Follow a mature change management process preparing change management requests and presenting requests to the change management board for approval. " Work closely with key stakeholder groups, including the SOC, to ensure appropriate levels of engagement and focus are maintained. " Plan and implement technical changes without unexpected disruption to the service and with minimal oversight. " Create, maintain, and review operational processes and support documentation. " Adheres to Information Technology application development standards and security requirements. " Prepare and maintain system documentation and architecture diagrams as assigned. " Ability to plan, organize, review, implement associated project milestones to completion. " Requires mastery technical and business knowledge in multiple disciplines/processes. " Create supporting project and system documentation. " Provide updates to the Project Team. " Assist with development of policies and procedures to conform and comply with agency standard cyber security policy design related to information risk management, designation of data as to criticality, confidentiality, and protection. (NIST 800-53, FISMA, SC InfoSec Requirements http://admin.sc.gov/technology/information-security/policies-and-procedures, etc.) The position will be utilized for 40 hours per week for the duration of this project. The selected candidate should be able to work flexible hours where it may be necessary for work to be completed outside traditional business hours. The candidate will work closely with the Enterprise Computing Services Team Lead and Section Manager to identify, prioritize, and schedule workload and implementation to IT standards and procedures. The candidate will work closely with customer and subject matter experts for the system design, migration to the new framework, and testing. This will also include compliance to DHEC security policy/procedures as well as integrating systems when possible to streamline staff workflows, user security, and data correction. Module support of the project. " DHEC will require that selected personnel sign the DHEC confidentially agreement and/or Business Associate (BA) agreement if applicable. All web services must be secure. " DHEC will not accept any offers including an "up-lift charge. The rate paid per consultant must not exceed the maximum rate established for this position described in the State contract terms. " Contractors must be onsite during each week throughout the term of the contract. " Follow agency IT Standards, policies, and procedures to include documentation. " All source code (compiled and un-compiled) will become the sole property of the South Carolina Department of Health and Environmental Control. Any source code, data, product, or functionality resulting from this SOW or previously owned/developed by DHEC will remain the sole property of DHEC and is not to be incorporated into the core product of any vendor's application. Any modifications and interfaces developed under said contract will be not be used by the contractor for any independent project of the contractor or published or publicized by the contractor without written permission of DHEC. " DHEC has the final say on all programming choices. Payment Schedule: All timesheets shall be entered and approved in a timely manner per State contract terms. The State will not pay any extra costs (i.e. Travel, employee benefits, insurance, room and board, etc.) for temporary employees under this contract. DHEC Support: DHEC will provide: " All required information including formulas, data, and mechanisms to check output. " Staff to assist with any application or data questions. " Conference rooms and scheduling for any application demos. " Workstation and required software. REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE): 1. WINDOWS SERVER 2. SECURITY TOOLS ABILITY TO INSTALL AND USER VARIOUS SECURITY TOOLS 3. CONFIGURATION MANAGEMENT 4. MICROSOFT ACTIVE DIRECTORY 5. UNDERSTANDING OF COMPUTER AND NETWORK OPERATING SYSTEM FUNDAMENTALS (E.G. OPERATING SYSTEMS, APPLICATIONS, STORAGE, NETWORKING) 6. EXPERIENCE IN PROJECT INVOLVING PCI/NSIT SECURITY IMPLEMENTATIONS AND/OR AUDITS 7. RISK/VULNERABILITY ASSESSMENTS 8. POWERSHELL 9. ITIL PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE): 1. Experience with security and data classification related to CDC, HIPAA, and PCI. 2. GP 3. Knowledge of Information Technology Field, best practices, organization, and operations 4. Experience with SolarWinds 5. Ability to integrate technical systems with agency goals and objectives. 6. Ability to establish positive working relationships with technical staff, customers and others involved in data-centric management. 7. Excellent written, oral, and interpersonal communication skills 8. Experience working with PCI environments REQUIRED EDUCATION: Bachelor's or Master's Degree in a relevant field of work or equivalent work experience. |