The candidate will be allowed to work remotely until all staff may be required to return to site. At that point the candidate may be required to come onsite. The candidate will need to come onsite the first day to collect equipment. Do you accept this requirement?
The NCDIT-Transportation Information Security Office (NCDIT-T ISO) requires a contract information security specialist (expert) architect/analyst resource to provide information security policy, process, procedure, and program development for NCDIT-Transportation and the NCDOT business. This position will be an NCDIT-Transportation Information Security Business Architect (ISBA, working title) dedicated primarily to support the creation and update of NCDOT's security program and related policies, standards, and procedures/processes.
Skill | Required /Desired | Amount | of Experience |
---|---|---|---|
Current or prior role as a PCI-DSS Qualified Security Assessor (QSA) or PCI-DSS Internal Security Assessor (ISA) | Desired | 0 | |
Experience leading or directly supporting PCI-DSS annual assessment for a L1 or L2 merchant, familiarity with PCI-DSS 3.2 or higher. | Desired | 0 | |
Strong knowledge and experience architecting/designing implementations, configuring, and risk assessing AWS and/or Azure cloud computing environments. | Desired | 0 | |
Progressive advanced experience as an IT information security professional working within an enterprise environment. | Required | 5 | Years |
Hands-on experience implementing, administrating and operating technologies such as firewalls, IDS/IPS, SIEM, antivirus, network traffic analyzers | Nice to have | 5 | Years |
Detailed technical experience with network security, security protocols, access control, cryptography, application security, and data protection. | Required | 5 | Years |
Extensive experience with data classification, handling, assessment, and enforcement. | Required | 5 | Years |
Experience implementing and supporting systems within enterprise-class data center environments. | Required | 5 | Years |
Advanced knowledge of regulatory compliance including, but not limited to: OWASP, ISO, NIST, FISMA, PCI-DSS, HIPAA and IRS-1075. | Required | 5 | Years |
Experience leading risk assessments using industry standard frameworks such as ISO or NIST for complex IT projects and technologies. | Required | 5 | Years |
Experience developing, leading and executing information security incident response plans. | Required | 5 | Years |
Experience developing and implementing information security policy, standards and procedures. | Required | 5 | Years |
Experience providing research and evidence in support of audits. | Required | 3 | Years |
CISSP information security certification. | Nice to have | 0 | |
Specific experience implementing, administrating, or operating Tenable Nessus. | Nice to have | 0 | |
Specific experience implementing, administrating, operating or utilizing IBM Qradar SIEM | Highly desired | 2 | Years |
Experience consulting on information security solutions for a state or federal agency. | Required | 2 | Years |
Experience implementing and operating enterprise class data networking solutions | Nice to have | 0 | |
Experience implementing and operating enterprise class server and storage systems | Nice to have | 0 | Years |
Detailed expert knowledge of NIST 800-53, and performing risk assessments utilizing NIST 800-53. | Required | 2 | Years |
Detailed expert knowledge of ISO 27001, and performing risk assessments utilizing ISO 27001 | Nice to have | 0 | |
Detailed expert knowledge of the NIST Cyber Security Framework (CSF), and performing risk assessments utilizing the NIST CSF. | Required | 2 | Years |
Familiarity and experience with the Department of Homeland Security (DHS) Cyber Security Evaluation Tool (CSET). | Nice to have | 2 | Years |
Experience consulting on information security and IT solutions for a state motor vehicles agency or department of transportation. | Required | 0 | |
Experience performing risk assessments, documenting and driving compliance with the North Carolina DIT Statewide Information Security Manual. | Required | 0 | |
Experience completing NC Department of Information Technology Privacy Threshold Analysis (PTA) documentation. | Nice to have | 0 | |
Experience completing NC Department of Information Technology Vendor Readiness Assessment Report (VRAR) documentation. | Highly desired | 0 | |
Trained and experience implementing and operating with ITIL (formerly Information Technology Infrastructure Library) concepts. | Nice to have | 0 | |
ITIL (formerly Information Technology Infrastructure Library) certification. | Nice to have | 0 | |
Familiarity and practical experience with SABSA or TOGAF enterprise architecture frameworks and methodologies. | Nice to have | 0 | |
SABSA or TOGAF certification. | Nice to have | 0 |
No. | Question |
---|---|
Question1 | Absences greater than two weeks MUST be approved by CAI management in advance, and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you accept this requirement? |
Question2 | The candidate will be allowed to work remotely until all staff may be required to return to site. At that point the candidate may be required to come onsite. The candidate will need to come onsite the first day to collect equipment. Do you accept this requirement? |
Question3 | Please list candidate's email address HERE. |
Question4 | Please indicate how soon this candidate is available to start work. Vendors are encouraged to submit candidates that are available for the duration of the assignment. |
Question5 | Vendor must disclose to the agency if the candidate will be subcontracted at the time of submission. Do you accept this requirement? |
Question6 | Vendor must notify the agency if any portion of the requirements listed in this task order are to be outsourced to other countries. Do you accept this requirement? |
Question7 | Candidates submitted above the rate of - will not be considered. Do you accept this requirement? |
Question8 | Payment for all approved hours will be paid at the straight hourly rate regardless of the total hours worked by the engaged resource. It is the responsibility of the supplier to adhere to any applicable compensation laws including payment for overtime hours. Do you accept this requirement? |
Question9 | Confirmation that you have thoroughly validated, and attest to the accuracy of, the credentials listed throughout this candidate’s VectorVMS profile and resume pursuant to Section 5.2.5 of ITS-009440 is required. Do you confirm? |