Provide support to plan, coordinate, and implement the organization\u2019s cybersecurity goals.<\/li>\n<\/ul>\nQualifications:<\/strong><\/p>\n\n- 4-year college degree in Computer Science or related field and 2 years\u2019 experience or 5 years\u2019 experience in lieu of a college degree.<\/li>\n
- Experience demonstrating strong analytical, troubleshooting and problem-solving skills for cybersecurity.<\/li>\n
- At least 2 years of security policy experience.<\/li>\n
- Ability to analyze privacy requirements and implementation within the organization.<\/li>\n
- Ability to quickly learn and apply privacy investigation and data collection techniques appropriately to ongoing investigations.<\/li>\n
- Knowledge of NIST and FISMA guidelines and Federal Cybersecurity policy.<\/li>\n
- Excellent communication skills, both written and oral.<\/li>\n<\/ul>\n
Desired Skills<\/strong><\/p>\n\n- Understanding of IRS Information Security and Privacy and Various Cloud Environments.<\/li>\n<\/ul>\n
Benefits<\/strong>TestPros offers a competitive salary, medical\/dental\/vision insurance, life insurance, paid time off, paid holidays, 401(k) retirement plan with company match, opportunities for professional growth, cell phone discounts, and much more! All benefits are per TestPros current policies and are subject to change without notice. Benefits are available to full-time employees.TestPros, Inc. is an Equal Opportunity Employer.EEO Statement<\/strong>All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, gender identity, marital status, age, national origin, protected veteran status, or disability. VEVRAA Federal Contractor.<\/p>\n","protected":false},"excerpt":{"rendered":"Company OverviewTestPros is a successful and growing business, established in 1988 to provide Information Technology (IT) technical support services to a wide range of Commercial and U.S. Federal, State, and Local Government customers. Our capabilities include Program Management, Program Oversight, Process Audit, Intelligence Analysis, Cyber Security, NIST SP 800-171 Assessment and Compliance, Computer Forensics, Software …<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[156],"tags":[],"_links":{"self":[{"href":"https:\/\/currentaffairs360.com\/wp-json\/wp\/v2\/posts\/2860"}],"collection":[{"href":"https:\/\/currentaffairs360.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/currentaffairs360.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/currentaffairs360.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/currentaffairs360.com\/wp-json\/wp\/v2\/comments?post=2860"}],"version-history":[{"count":2,"href":"https:\/\/currentaffairs360.com\/wp-json\/wp\/v2\/posts\/2860\/revisions"}],"predecessor-version":[{"id":2862,"href":"https:\/\/currentaffairs360.com\/wp-json\/wp\/v2\/posts\/2860\/revisions\/2862"}],"wp:attachment":[{"href":"https:\/\/currentaffairs360.com\/wp-json\/wp\/v2\/media?parent=2860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/currentaffairs360.com\/wp-json\/wp\/v2\/categories?post=2860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/currentaffairs360.com\/wp-json\/wp\/v2\/tags?post=2860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}