Location:- Madison, WI, 53703
100% onsite
(No WI residency required. Open to nationwide candidates. No designated workspace will be assigned however, selected candidate must be available to work at our location as needed. )
Local Candidate Preferred
RFP REPONSE DUE 007/08
RATE is POSTED in Skill Matrix
W2/1099 only No C2C
Submission Procedure DO NOT EMAIL
- Step 1 go to CERECT website (https://certecinc.com/certec-open-positions/_) DOWNLOAD and COMPLETE SKILLS MATRIX
Skills Matrix (link)
Link: https://docs.google.com/document/d/1BCZaC3dKgv_fRBN5_0YJsQ6J0wvGWT2D/edit?usp=sharing&ouid=116800367808649467210&rtpof=true&sd=true
Step 2 PLEASE DO NOT SUBMIT VIA LINKEDIN, INDEED OR DICE USE THE EASY APPLY BUTTON AT:
https://certecinc.com/certec-open-positions/
Any other submission format may not be reviewed
The Department of Children and Families – Bureau of Information Technology Services is looking for a Security Analyst IV to work on Cybersecurity initiatives.
- Work both independently and as part of a team to increase DCF’s information security posture.
- Incumbent will possess a strong background in IT security, with extensive experience in security activities such as:
- Active Directory reporting
- User and access auditing
- Risk assessments.
- Security operations
- Security audits
- Incident handling
- Scripting (e.g. PowerShell, VB)
- Strong interpersonal skills. Ability to work well with teams throughout DCF.
Qualification
Desired Experience
Active directory management
10+ years
User account auditing
8+ years
Risk Assessment
5+ years
Scripting
5+ years
Analytical/problem solving skills
5+ years
Excellent oral and written communication skills
5+ years
Outlook
5+ years
MS Office products
5+ years
Data analysis
5+ years
Security operations
8+ years
Top Desired Required Skills
- Strong business analysis experience in documenting policy, processes, and procedures.
- Ability to work independently and maintain timelines.
- Experience securing IT applications by defining and maintaining access privileges, defining access review methodologies, and performing access reviews.
- Experience implementing IT security improvements by assessing current state; performing risk assessments and providing mitigation strategies.
Interview Process
- Phone and web-based interviews will be acceptable.
- However, an in--person interview may be required.
- Interviews will be set up shortly after the posting close date.
- MUST provide three (3) business references for the interview. (One reference must be a supervisory level.)
Important Notes
- Candidate MUST be physically located in the United States. International candidates/phone numbers will not be accepted.
- Candidate must follow ALL DCF work rules.
- Candidate must be available to perform all work during the Central Standard Time (CST) business hours 9:00 am – 3 pm (or CST hours as defined by the hiring manager)
- Candidate will be required to provide their own equipment for this position (See job description for required specifications.)