Hybrid - Two days in office
Client requires the services of
1 Security Administrator Specialist, hereafter referred to as Candidate(s), who meets the general qualifications of
Security Administrator Specialist, Security and the specifications outlined in this document for the
Client .
All work products resulting from the project shall be considered "works made for hire" and are the property of the
Client and may include pre-selection requirements that potential Vendors (and their Candidates) submit to and satisfy criminal background checks as authorized by Texas law.
Client will pay no fees for interviews or discussions, which occur during the process of selecting a Candidate(s).
Client requires the services of (1) Security Administrator- Specialist hereafter referred to as Worker, who meets the general qualification of Security Administrator Specialist and the specifications outlined in this document for Texas Parks and Wildlife Department.
- Conduct Supply Chain Risk (third party hosted applications) Assessment
- This includes all 3rd party hosted risks that are business critical.
- Create Annual Checklist for Compliance Efforts such as for CJIS, PCI, TXRAMP, etc.
- Develop/Maintain Management Plans - Risk, Patch, Access, Vulnerability, etc.
- Develop Dashboards as a Communication Tool
- Internal for Cybersecurity Team and IT
- External for Divisional Awareness
Minimum Requirements
II. CANDIDATE SKILLS AND QUALIFICATIONS
Candidates that do not meet or exceed the
minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. Years Required/Preferred Experience 5 Required Developing and revising policies, standards, processes, and guidelines. 5 Required Managing risks related to the use of Information Technology, Information Security, Privacy, Regulatory Compliance and Governance. 5 Required Conducting gap analysis and implementing frameworks and standards such as NIST 5 Required Conducting vendor risk assessments against organizational security requirement 5 Required Experience with computers, networks, firewalls, switches, encryption, and authentication methods. 3 Required Experience writing technical documentation for IT solutions, including operational guides and compliance documentation 2 Required Experience in Data analysis and report creation in Excel, PowerPoint, and Power BI Desktop