Requirements:
Demonstrated experience in conducting technical risk assessments of applications, and analyzing and mitigating system vulnerabilities. Demonstrated expertise in evaluating web-based applications, databases, and off-the-shelf systems for security vulnerabilities and implementing realistic mitigating strategies. Experience in developing and implementing information security policies and procedures. Knowledge of network operating systems, system penetration technology, and data encryption methods. Ability to communicate effectively, both orally and in writing, with elected officials, senior staff, information systems professionals, and technical and non-technical users. Candidates must be able to secure and maintain appropriate level of personnel security, such as a Secret or Top Secret security clearance or and extended background investigation, as determined by management. .
|