Severity: Notice
Message: MemcachePool::get(): Server 127.0.0.1 (tcp 11211, udp 0) failed with: Connection refused (111)
Filename: drivers/Cache_memcached.php
Line Number: 142
Backtrace:
File: /home/theinjobs/public_html/application/controllers/Indeed.php
Line: 536
Function: get
File: /home/theinjobs/public_html/application/controllers/Indeed.php
Line: 863
Function: indeed_job_details
File: /home/theinjobs/public_html/index.php
Line: 316
Function: require_once
Employment Type : Full-Time
Primary Responsibilities --------------------------------------------- Job Types: Full-time, Contract Pay: $57,714.00 - $952,019.00 per year Schedule: Ability to commute/relocate: Application Question(s): Education: Experience: Work Location: Multiple Locations
CONTRACT JOB DESCRIPTION
Responsibilities:
1. Determines, develops, and implements enterprise information assurance/security standards and procedures.
2. Coordinates, develops, and evaluates security programs for an organization.
3. Recommends information assurance/security solutions to support customers’ requirements.
4. Identifies, reports, and resolves security violations.
5. Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.
6. Supports customers at the highest levels in the development and implementation of doctrine and policies.
7. Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.
8. Performs analysis, design, and development of security features for system architectures.
9. Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers.
10. Designs, develops, engineers, and implements solutions that meet security requirements.
11. Provides integration and implementation of the computer system security solution.
12. Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.
13. Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.
14. Ensures that all information systems are functional and secure.