NCDOT - Architect - Expert ISO Policy Change Development
The NCDIT-Transportation (NCDIT-T) Information Security Office (ISO) requires a senior information security architect specializing in industry standard security, risk, and compliance frameworks to develop security program documentation and policy.

The candidate will be allowed to work remotely until all staff may be required to return to site. At that point the candidate may be required to come onsite. The candidate will need to come onsite the first day to collect equipment. Do you accept this requirement?

The NCDIT-Transportation Information Security Office (NCDIT-T ISO) requires a contract information security specialist (expert) architect/analyst resource to provide information security policy, process, procedure, and program development for NCDIT-Transportation and the NCDOT business.  This position will be an NCDIT-Transportation Information Security Business Architect (ISBA, working title) dedicated primarily to support the creation and update of NCDOT's security program and related policies, standards, and procedures/processes. 



Required/Desired Skills


SkillRequired /DesiredAmountof Experience
Current or prior role as a PCI-DSS Qualified Security Assessor (QSA) or PCI-DSS Internal Security Assessor (ISA)Desired0
Experience leading or directly supporting PCI-DSS annual assessment for a L1 or L2 merchant, familiarity with PCI-DSS 3.2 or higher.Desired0
Strong knowledge and experience architecting/designing implementations, configuring, and risk assessing AWS and/or Azure cloud computing environments.Desired0
Progressive advanced experience as an IT information security professional working within an enterprise environment.Required5Years
Hands-on experience implementing, administrating and operating technologies such as firewalls, IDS/IPS, SIEM, antivirus, network traffic analyzersNice to have5Years
Detailed technical experience with network security, security protocols, access control, cryptography, application security, and data protection.Required5Years
Extensive experience with data classification, handling, assessment, and enforcement.Required5Years
Experience implementing and supporting systems within enterprise-class data center environments.Required5Years
Advanced knowledge of regulatory compliance including, but not limited to: OWASP, ISO, NIST, FISMA, PCI-DSS, HIPAA and IRS-1075.Required5Years
Experience leading risk assessments using industry standard frameworks such as ISO or NIST for complex IT projects and technologies.Required5Years
Experience developing, leading and executing information security incident response plans.Required5Years
Experience developing and implementing information security policy, standards and procedures.Required5Years
Experience providing research and evidence in support of audits.Required3Years
CISSP information security certification.Nice to have0
Specific experience implementing, administrating, or operating Tenable Nessus.Nice to have0
Specific experience implementing, administrating, operating or utilizing IBM Qradar SIEMHighly desired2Years
Experience consulting on information security solutions for a state or federal agency.Required2Years
Experience implementing and operating enterprise class data networking solutionsNice to have0
Experience implementing and operating enterprise class server and storage systemsNice to have0Years
Detailed expert knowledge of NIST 800-53, and performing risk assessments utilizing NIST 800-53.Required2Years
Detailed expert knowledge of ISO 27001, and performing risk assessments utilizing ISO 27001Nice to have0
Detailed expert knowledge of the NIST Cyber Security Framework (CSF), and performing risk assessments utilizing the NIST CSF.Required2Years
Familiarity and experience with the Department of Homeland Security (DHS) Cyber Security Evaluation Tool (CSET).Nice to have2Years
Experience consulting on information security and IT solutions for a state motor vehicles agency or department of transportation.Required0
Experience performing risk assessments, documenting and driving compliance with the North Carolina DIT Statewide Information Security Manual.Required0
Experience completing NC Department of Information Technology Privacy Threshold Analysis (PTA) documentation.Nice to have0
Experience completing NC Department of Information Technology Vendor Readiness Assessment Report (VRAR) documentation.Highly desired0
Trained and experience implementing and operating with ITIL (formerly Information Technology Infrastructure Library) concepts.Nice to have0
ITIL (formerly Information Technology Infrastructure Library) certification.Nice to have0
Familiarity and practical experience with SABSA or TOGAF enterprise architecture frameworks and methodologies.Nice to have0
SABSA or TOGAF certification.Nice to have0

Questions


No.Question
Question1Absences greater than two weeks MUST be approved by CAI management in advance, and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you accept this requirement?
Question2The candidate will be allowed to work remotely until all staff may be required to return to site. At that point the candidate may be required to come onsite. The candidate will need to come onsite the first day to collect equipment. Do you accept this requirement?
Question3Please list candidate's email address HERE.
Question4Please indicate how soon this candidate is available to start work. Vendors are encouraged to submit candidates that are available for the duration of the assignment.
Question5Vendor must disclose to the agency if the candidate will be subcontracted at the time of submission. Do you accept this requirement?
Question6Vendor must notify the agency if any portion of the requirements listed in this task order are to be outsourced to other countries. Do you accept this requirement?
Question7Candidates submitted above the rate of - will not be considered. Do you accept this requirement?
Question8Payment for all approved hours will be paid at the straight hourly rate regardless of the total hours worked by the engaged resource. It is the responsibility of the supplier to adhere to any applicable compensation laws including payment for overtime hours. Do you accept this requirement?
Question9Confirmation that you have thoroughly validated, and attest to the accuracy of, the credentials listed throughout this candidate’s VectorVMS profile and resume pursuant to Section 5.2.5 of ITS-009440 is required. Do you confirm?