Job Seekers, Please send resumes to resumes@hireitpeople.com
Complete Description:
The consultant shall work with software architects and technical teams to manage the security current and future application software solutions. The consultant should have experience implementing and applying security controls for a wide range of application solutions, specifically within an enterprise environment. Consultant should be well-versed in conducting vulnerability assessments and penetration tests.
The consultant shall develop guidance documentation based on the Risk Management Framework as part of current and future applications deployments. Using technical assessment techniques, consultant shall assess the security posture and provide necessary input at each stage of the application development lifecycle and convey well-defined technical recommendations to stakeholders.
The consultant shall have familiarity with industry standards and shall enhance the District’s ability to harden the security of applications through design, development and implementation of security analytics, assessments, correlation and through ad-hoc responses. Additionally, the consultant shall stay abreast of emerging technologies and drive awareness of current security risks in support of enhancing the application development efforts of the District.
The consultant should have familiarity with industry standards, guidelines and regulatory compliance requirements related to information security practices such as NIST 800-115, ISO 27001, NIST 800-53 etc.
Consultant may be asked to participate in a penetration lab test as part of the interview
Behavior Characteristics:
Must be a U.S. Citizen and able to obtain a secret level clearance
Effective oral and written communication skills
Ability to make effective presentations and develop professional reports
Keen Problem solving and analysis
Skills:
Skill | Required / Desired | Amount | of Experience | Expertise Rating |
BA/BS in CyberSecurity, Information Security, Engineering, Computer Sciences, information Technology, Information Management, or related field preferr | Required | 4 | Years | 3 - Expert |
CISSP, GPEN, OSCP, LPT, CEH or related certification | Required | 4 | Years | 3 - Expert |
Demonstrated expertise with one or more scripting languages - Python, PowerShell, Bash, Perl etc | Required | 4 | Years | 3 - Expert |
Expert knowledge of Penetration testing techniques to include network services, client-side, web application, mobile, wireless, remote war and social | Required | 4 | Years | 3 - Expert |
Experience with implementing security controls for enterprise applications | Required | 6 | Years | 3 - Expert |
Expert knowledge in Information Security best practices | Required | 10 | Years | 3 - Expert |
Please indicate which relevant certification