Export HTML to Word Document with JavaScript



CANDIDATE REFERENCESolicitation Number: 302CSD2108Title/Level: Information Security Manager 2 Candidate Name:Category: SecurityReference Name (Required):Title:Company Name (Required):Phone Number (Required include area code):E-mail Address: Professional Relationship: PeerCo-WorkerSupervisorCustomerEnd-UserSubordinateReference Name (Required):Title:Company Name (Required):Phone Number (Required include area code):E-mail Address: Professional Relationship: PeerCo-WorkerSupervisorCustomerEnd-UserSubordinateReference Name (Required):Title:Company Name (Required):Phone Number (Required include area code):E-mail Address: Professional Relationship: PeerCo-WorkerSupervisorCustomerEnd-UserSubordinateNOTE: ONLY INCLUDE THE INFORMATION REQUESTED ON THIS FORM.?DO NOT INCLUDE ADDITIONAL INFORMATION.?CANDIDATE QUALIFICATIONSSolicitation Number: 302CSD2108Title/Level: Information Security Manager 2 Candidate Name:Category: SecurityMinimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.ActualYearsExperienceYearsExperienceNeededRequired/PreferredSkills/Experience?4RequiredGraduation from an accredited four-year college or university with major coursework in information technology security, computer information systems, computer science, management information systems, or a related field is generally preferred.?5PreferredProven work experience in security architecture, demonstrating solutions delivery, principles and emerging technologies - designing and implementing security solutions. This includes continuous monitoring and making improvements to those solutions.?5PreferredExperience consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements.?5PreferredProven expertise in security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks.?5PreferredIdentity and access management (IAM) – the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources.?5PreferredKnowledge and experience working with relevant National Institute of Standards and Technology (NIST) standards.?5PreferredKnowledge and experience working with ISO27001 – specifications for a framework of policies and procedures that include all legal, physical and technical controls involved in an organization’s risk management.?5PreferredExperience delivering/managing Identity and access management (IAM) solutions – the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources.?5PreferredExperience working with security management tools (e.g., vulnerability scanners, file integrity monitoring, configuration monitoring, etc.) and perimeter technologies (e.g., router, firewalls, web proxies and intrusion prevention, etc.).?5PreferredKnowledge of configuration management, change control/problem management integration, risk assessment and acceptance, exception management and security baselines (e.g. CIS Baselines, NIST, vendor security technical implementation guides, etc.).?5PreferredStrong awareness of networking and internet protocols, including TCP/IP, DNS, SMTP, HTTP and distributed networks.?5PreferredKnowledge of web services, API, REST and RPC.?5PreferredAbility to resolve complex security issues in diverse and decentralized environments; to learn, communicate, and teach new information and security technologies; and to communicate effectively.?5PreferredExcellent communication and organizational skills, and the ability to stay focused on completing tasks and meeting goals within a busy workspace .?5PreferredExtensive skill in effective verbal and written communications with other computer professionals, clients, and stakeholders.?5PreferredKnowledge of software development life cycle methodologies. Ability to analyze and problem solve.?5PreferredAbility to establish and always maintain effective and professional working relationships with others in the course and scope of conducting business.?5PreferredCISSP-ISAAP or equivalent certification.?5PreferredAbility to obtain required certification within 6 months and maintain approved baseline certification for position (i.e. CISSP-ISAAP or equivalent).?CANDIDATE ACKNOWLEDGEMENTRFO: 445 Solicitation Number: 302CSD2108Title/Level: Information Security Manager 2Candidate Name:Category: SecurityI hereby authorize Innosoul, Inc. dba Innosoul Information Technologies, Inc. to submit my resume in response to Solicitation 302CSD2108 for Office of the Attorney General of Texas.I understand that submission of my resume by multiple vendors may result in my disqualification from this opportunity. Customers reserve the right to hire a candidate submitted by multiple vendors.Worker signature: ?_______________________________Date: ? _______________________ ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download