The Security Analyst (SA) has an understanding of all aspects of computer and network security, including such areas as firewall administration, encryption technologies and network protocols.
IA-OCIO-SA2-SOC Analyst 1 (666521)
This position supports the State of Iowa’s Office of the Chief Information Officer (OCIO), Security Operations Center (SOC).
The purpose of this position is to provide tier one triage for information security incidents and occasional afterhours information technology issues.
Serve as the first line contact for the Security Operations Center. Participate in incident handling processes such as incident discovery, analysis and verification, incident tracking, containment and recovery, incident response coordination, escalation, and notification.
Assist in coordinating with other teams to remediate detected incidents. Assist in communicating intelligence to key personnel.
CandidateRequirements :
- Knowledge of securitytechnologies, including but not limited to firewall, IDS, policy management,security processes / best-practice, logging / monitoring, antivirus, vulnerabilityassessment, patch management, and incident response.
- Knowledge of common andemerging attack vectors, penetration methods and countermeasures.
- Knowledge of conflictresolution and incident escalation preferred.
- Ability to work effectivelywith customers to solve business challenges while balancing the need forconfidentiality, integrity, and availability.
- Ability to resolve issues ina variety of complex situations which require complex judgments and
solutions based on sophisticated analytical thought.
- Ability to solve complexproblems, convey both oral and written instruction, and handle multiple taskinterruptions while providing services in a professional and courteous manner.
- Ability to work with diverseaudiences and translate technical information into non-technical
information.
- Must be an individual ofhigh integrity and be a model of unwavering integrity to others.
- Commitment to fostering adiverse working environment.
- Ability to workindependently, as part of a team of peers, and to support and contribute to a
multidisciplinary team environment.
Required / Desired Skills
SkillRequired / DesiredAmountof ExperienceKnowledge of security technologies, including but not limited to : firewall, IDS, policy management, security processes / best-practice,logging / monitoriRequired4YearsKnowledge of common and emerging attack vectors, penetration methods and countermeasuresRequired4YearsKnowledge of conflict resolution and incident escalation preferred.
Required4YearsAbility to work effectively with customers to solve business challenges while balancing the need for confidentiality, integrity, andavailabilityRequired4YearsAbility to resolve issues in a variety of complex situations which require complex judgments and solutions based on sophisticatedanalytical thought.
Required4YearsAbility to solve complex problems, convey both oral and written instruction, and handle multiple task interruptions while providingservices in a profRequired4YearsAbility to work with diverse audiences and translate technical information into non-technical informationRequired4YearsMust be an individual of high integrity and be a model of unwavering integrity to others.
Required4YearsCommitment to fostering a diverse working environmentRequired4YearsAbility to work independently, as part of a team of peers, and also to support and contribute to a multidisciplinary team environmeRequired4Years
Questions
No.QuestionQuestion1The Contractor must report any disciplinary action, misdemeanor or felony convictions to the State for any temporary IT staff provided.
Do you agree to this requirement?Question2Absences greater than two weeks MUST be approved by CAI Management in advance, and contact information must be provided to CAI so that a resource can be reached during his or her absence.
The client has the right to dismiss the resource if she or he does not return to work by the agreed upon date. Do you accept this requirement?
Question3This requirement falls under the E-RTR process. The candidate MUST submit their Right to Represent electronically following the process to be considered.
Do you accept this requirement?Question4Please list candidate's email address.Question5The Vendor Rate for this position is $47.
02. Do you accept this requirement?Question6PROVIDE CANDIDIDATES CURRENT LOCATION (CITY / STATE) HERE REQUIRED Question7SHOW YOUR WORK - In the summary of qualifications field under the details tab of the candidate's profile, you should explain why your candidate is the best fit for this position.
Please confirm that you have thoroughly validated and attested to the accuracy of the credentials listed throughout this candidate's VectorVMS profile and resume according to Section 5.
2.5 of ITS-009440. Do you confirm? Candidates will get rejected if an agency cuts and pastes the candidates' resumes into this field REQUIRED Question8DOM DoIT contractor personnel are now required to undergo additional background check investigations (run by DOM DoIT) before starting, requiring the completion of several waiver forms & fingerprint processes.
The selected candidate will be responsible for completing all the necessary waiver forms, scheduling and completing the fingerprinting process, and returning all completed items to DOM DoIT for processing.
Please confirm you have discussed this with your candidate, and he / she will comply if selected. Question9PROVIDE CANDIDATES FULL PHYSICAL ADDRESS where DOM DoIT Background Check form and Fingerprint cards are to be mailed REQUIRED Question10INTERVIEW DATES : Interviews will be conducted on JUNE 17, 28, 19 only to submit candidates available for interviews on the date(s) provided.