Senior Data Privacy and Compliance Analyst - Secret Clearance - Randstad USA
Atlanta, GA 30318
About the Job
As part of the Information and Cybersecurity Department (ICD), the Governance, Risk and Compliance (GRC) Vulnerability Risk Manager will play an integral role in communicating and tracking institutional risk incurred from vulnerabilities to key stakeholders within the organization. The ideal candidate for this role has knowledge of and experience with the implementation of cybersecurity best practices and frameworks related to vulnerability and risk management. This role reports to the GRC Manager. This position has been designated as hybrid and work will be performed in the Atlanta, GA metropolitan area within Eastern Time (ET) Zone. Position will start as a contract with potential for permanent hire. Pay is commensurate with level of experience.
location: Atlanta, Georgia
job type: Contract
salary: $52 - 70 per hour
work hours: 9am to 5pm
education: Bachelors
responsibilities:
Job Purpose
The Data Privacy and Compliance Analyst is responsible for assessing business policies, procedures, and operations to ensure the organization meets privacy requirements and government regulations for the protection of sensitive information. Privacy and Compliance Analysts manage the legal and operational risks related to sensitive and critical information assets, continuously assess business unit operations, and develop policies, procedures and user training necessary to meet or exceed privacy requirements.
Key Responsibilities
- Assists with difficult cybersecurity questions and requests from customers.
- Direct sponsor engagement as required to review current and planned requirements for secure infrastructures that require compliance.
- Guide requirements gathering and analysis.
- Leads validation of security control configuration on systems, ensure all systems are configured to necessary controls, such as NIST, DFARS 252.204-7012, CMMC, and other similar requirements.
- Articulates privacy requirements into product life-cycle including definition, requirements analysis, synthesis, cyber engineering analysis and implementation.
- Conducts privacy impact analyses and identify areas needing improvement and recommend necessary enhancements to achieve privacy goals.
- Reviews modifications to critical information systems and directs implementation of configuration changes.
- Mentors lower-level cybersecurity and IT professionals across the enterprise.
Additional Responsibilities
- Reviewing new vulnerabilities identified from threat analysis sources and identify and prioritize new, high impact vulnerabilities.
- Identifying the impacted assets and/or application(s) at risk.
- Coordinate with different internal labs and business units in addressing plans of action and milestones.
- Calculate and respond to key performance indicators - track mitigations to improve performance metrics.
- Monitor and track the progress of risk remediation activities. Collaborate with stakeholders to ensure timely and effective remediation of identified risks and issues while providing regular briefings to senior management on vulnerabilities and mitigation activities.
- Review and analyze vulnerability reports and liaison with business units to which they belong to track, monitor for compliance, and ensure closure.
- Perform as backup to the Vulnerability Manager when need to run scheduled or ad-hoc reports as well as compile reports and distribute communication related to new critical vulnerabilities.
- Assist in the analysis and remediation of findings discovered during scheduled internal and third-party vulnerability scans and penetration tests.
- Provide strategic direction to ensure alignment with the organization's overarching cybersecurity strategies and policies.
- Provide continuous improvement of the vulnerability management lifecycle.
Required Minimum Qualifications
- Experience in vulnerability management.
- Ability to obtain a secret security clearance.
- Practical knowledge of security applications and technologies, as well as operating system platforms including Windows, Mac, Linux, and Networking technologies.