atlanta, GA, 30309, USA
11 days ago
senior data privacy and compliance analyst - secret clearance
senior data privacy and compliance analyst - secret clearance. + atlanta , georgia + posted august 11, 2024 **job details** summary + $52 - $70 per hour + contract + bachelor degree + category computer and mathematical occupations + reference1061563 job details job summary: As part of the Information and Cybersecurity Department (ICD), the Governance, Risk and Compliance (GRC) Vulnerability Risk Manager will play an integral role in communicating and tracking institutional risk incurred from vulnerabilities to key stakeholders within the organization. The ideal candidate for this role has knowledge of and experience with the implementation of cybersecurity best practices and frameworks related to vulnerability and risk management. This role reports to the GRC Manager. This position has been designated as hybrid and work will be performed in the Atlanta, GA metropolitan area within Eastern Time (ET) Zone. Position will start as a contract with potential for permanent hire. Pay is commensurate with level of experience. location: Atlanta, Georgia job type: Contract salary: $52 - 70 per hour work hours: 9am to 5pm education: Bachelors responsibilities: Job Purpose The Data Privacy and Compliance Analyst is responsible for assessing business policies, procedures, and operations to ensure the organization meets privacy requirements and government regulations for the protection of sensitive information. Privacy and Compliance Analysts manage the legal and operational risks related to sensitive and critical information assets, continuously assess business unit operations, and develop policies, procedures and user training necessary to meet or exceed privacy requirements. Key Responsibilities + Assists with difficult cybersecurity questions and requests from customers. + Direct sponsor engagement as required to review current and planned requirements for secure infrastructures that require compliance. + Guide requirements gathering and analysis. + Leads validation of security control configuration on systems, ensure all systems are configured to necessary controls, such as NIST, DFARS 252.204-7012, CMMC, and other similar requirements. + Articulates privacy requirements into product life-cycle including definition, requirements analysis, synthesis, cyber engineering analysis and implementation. + Conducts privacy impact analyses and identify areas needing improvement and recommend necessary enhancements to achieve privacy goals. + Reviews modifications to critical information systems and directs implementation of configuration changes. + Mentors lower-level cybersecurity and IT professionals across the enterprise. Additional Responsibilities + Reviewing new vulnerabilities identified from threat analysis sources and identify and prioritize new, high impact vulnerabilities. + Identifying the impacted assets and/or application(s) at risk. + Coordinate with different internal labs and business units in addressing plans of action and milestones. + Calculate and respond to key performance indicators - track mitigations to improve performance metrics. + Monitor and track the progress of risk remediation activities. Collaborate with stakeholders to ensure timely and effective remediation of identified risks and issues while providing regular briefings to senior management on vulnerabilities and mitigation activities. + Review and analyze vulnerability reports and liaison with business units to which they belong to track, monitor for compliance, and ensure closure. + Perform as backup to the Vulnerability Manager when need to run scheduled or ad-hoc reports as well as compile reports and distribute communication related to new critical vulnerabilities. + Assist in the analysis and remediation of findings discovered during scheduled internal and third-party vulnerability scans and penetration tests. + Provide strategic direction to ensure alignment with the organization's overarching cybersecurity strategies and policies. + Provide continuous improvement of the vulnerability management lifecycle. Required Minimum Qualifications + Experience in vulnerability management. + Ability to obtain a secret security clearance. + Practical knowledge of security applications and technologies, as well as operating system platforms including Windows, Mac, Linux, and Networking technologies. + Previous experience with vulnerability scanning, reporting, and management processes or tools. + Hands on knowledge of application and infrastructure vulnerability scanning tools (e.g., Rapid7, Nessus, Qualys, Fortify, etc.) in complex or large organizations. + Technical background to understand the characteristics and exploitation vectors for vulnerabilities being reported. + Advanced knowledge of Splunk, Tenable Nessus, API's, Excel and Power BI Platform for data analytics. + Experience with advanced Excel data manipulation and analysis including pivot tables, light macros, intermediate formulas. + Previous experience in analyzing data to present relevant metrics to remediation stakeholders and leadership. + Sound knowledge of common infrastructure vulnerability categorizations such as CVE, CVSS, and/or CWE. + Deep understanding of cybersecurity best practices and frameworks such as NIST 800-53/171, CMMC, RMF, MITRE, ATT&CK Framework, and OWASP top 10. + Risk management expertise with ability to translate technical risks for business leaders. + Experience judging the priority of a vulnerability based on risk and impact. + Excellent written and verbal communication skills. + One or more basic cybersecurity certifications such as: Security+, CEH, CND, CySA+, CCNA-Security or equivalent. Preferred Qualifications + Active Secret clearance. + 9 years of experience in vulnerability management + Master's degree + Experience leading or managing a Vulnerability Management program. + One or more advanced cybersecurity certifications such as: CISSP, CISM, CISA, CASP, GEVA, CCNP-Security or equivalent. qualifications: + Experience level: Experienced + Minimum 5 years of experience + Education: Bachelors (required) skills: + Compliance + data privacy + Vendor Risk AuditingEqual Opportunity Employer: Race, Color, Religion, Sex, Sexual Orientation, Gender Identity, National Origin, Age, Genetic Information, Disability, Protected Veteran Status, or any other legally protected group status.At Randstad Digital, we welcome people of all abilities and want to ensure that our hiring and interview process meets the needs of all applicants. If you require a reasonable accommodation to make your application or interview experience a great one, please contact HRsupport@randstadusa.com.Pay offered to a successful candidate will be based on several factors including the candidate's education, work experience, work location, specific job duties, certifications, etc. In addition, Randstad Digital offers a comprehensive benefits package, including health, an incentive and recognition program, and 401K contribution (all benefits are based on eligibility).This posting is open for thirty (30) days.
Confirm your E-mail: Send Email