1 day ago

Cybersecurity Contractor

Jobs via Dice

Hybrid
Full Time
$150,000
Hybrid

Job Overview

Job TitleCybersecurity Contractor
Job TypeFull Time
CategoryCommerce
Experience5 Years
DegreeMaster
Offered Salary$150,000
LocationHybrid

Who's the hiring manager?

Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Uncover Hiring Manager

Job Description

Role Summary

As a Cybersecurity Contractor for Axiom Technology Group, you will be a crucial support to the project team, ensuring the robust security and integrity of information systems and data. This role requires over 14 years of experience and is responsible for conducting comprehensive security assessments, vulnerability analyses, and implementing advanced cybersecurity measures. You will monitor and respond to security incidents, develop policies, and collaborate with stakeholders to embed best practices throughout projects.

Core Responsibilities

  • Conduct security assessments and vulnerability analyses to identify potential risks.
  • Implement and maintain cybersecurity measures, including firewalls, encryption, and intrusion detection systems.
  • Monitor and respond to security incidents and breaches, providing timely resolution.
  • Develop and update security policies, procedures, and documentation to ensure compliance with industry standards.
  • Collaborate with stakeholders to ensure cybersecurity best practices are integrated into all aspects of the project.

Information Technology Services (ITS) Cyber Security, Risk & Compliance (CSRC) Support

This position specifically supports ITS Cyber Security, Risk & Compliance programs, focusing on risk management, compliance management, third-party risk assessments, and security awareness. You will be responsible for understanding and assessing security, confidentiality/privacy, and operational risks associated with third-party provider solutions, ensuring adherence to relevant laws, regulations, and industry security standards.

Specific Duties Include

  • Conduct information security assessments of third-party vendors to determine their ability to protect confidential data.
  • Enhance risk/vulnerability assessment programs and questionnaires to aid in the identification and mitigation of security risks.
  • Identify and document information security vulnerabilities and risks in the information technology environment.
  • Evaluate identified vulnerabilities and risks, working with business owners, risk management, and vendor representatives.
  • Identify tasks necessary to remediate identified vendor risks and vulnerabilities; negotiate dates for remediation to be complete.
  • Track progress on remediation of identified risks and vulnerabilities and provide appropriate reporting to constituents.
  • Monitor appropriate sources for newly identified vulnerabilities, evaluate the risk such vulnerabilities pose to the organization's information and systems, and advise management of appropriate measures.
  • Monitor appropriate industry sources to maintain awareness of new security tools and techniques and research those that can improve the organization's protection capabilities.
  • Maintain expertise in identifying security risks in the hardware, software, and systems used by the organization.
  • Participate in continuing education, seminars, and professional organizations to remain current on developments in the information security profession.
  • Ensure that identified risks are managed in accordance with the Risk Management program.

Key Skills/Competency

  • Cybersecurity
  • Risk Management
  • Compliance Management
  • Vulnerability Analysis
  • Third-Party Risk Assessments
  • Security Assessments
  • Incident Response
  • Security Policies
  • Intrusion Detection Systems
  • Encryption & Firewalls

Tags:

Cybersecurity Contractor
Cybersecurity
Risk Management
Compliance
Vulnerability Analysis
Third-Party Risk
Security Assessments
Incident Response
Security Policies
Data Integrity
Information Security
Firewalls
Encryption
Intrusion Detection Systems
SIEM
GRC
Network Security
Cloud Security
Endpoint Security
Data Loss Prevention

Share Job:

How to Get Hired at Jobs via Dice

  • Research Axiom Technology Group's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor to understand their client-focused approach in technology and security.
  • Customize your resume for cybersecurity: Highlight your 14+ years of experience in risk management, compliance, third-party security, and incident response, aligning with Axiom Technology Group's needs.
  • Showcase practical security expertise: Provide concrete examples of successful vulnerability analysis, security incident resolution, and effective security policy development in past roles.
  • Prepare for in-depth technical questions: Focus on risk frameworks (e.g., NIST, ISO), compliance standards (e.g., HIPAA, GDPR), and methodologies for vendor security assessments.
  • Demonstrate commitment to continuous learning: Discuss relevant certifications (e.g., CISSP, CISM) and explain how you stay current with evolving cybersecurity threats and emerging technologies.

Frequently Asked Questions

Find answers to common questions about this job opportunity

Explore similar opportunities that match your background