StaffAttract
  • Login
  • Create Account
  • Products
    • Private Ad Placement
    • Reports Management
    • Publisher Monetization
    • Search Jobs
  • About Us
  • Contact Us
  • Unsubscribe

Login

Forgot Password?

Create Account

Job title, industry, keywords, etc.
City, State or Postcode

IT Information Security Engineer II - eDiscovery

Idaho Division of Human Resources - Boise, ID

Apply Now

Job Description

IT Information Security Engineer II eDiscovery Print (Apply IT Information Security Engineer II eDiscovery Salary $65,748.80 - $71,572.80 AnnuallyLocation Boise, IDJob TypeFull TimeDepartmentInformation Technology ServicesJob Number15359Closing10/21/2022 11:59 PM Mountain Description Benefits Questions DescriptionInformation Technology Services is a team of dedicated professionals providing core technology and cybersecurity services to agencies statewide, enabling state employees to serve Idaho''s citizens. We sincerely hope you will consider being part of o ur success. Information Technology Services (ITS), currently has an opening for an Information Security Engineer Level II position in our Chinden office in Boise. This position provides critical support to agencies in the management and fulfillment of eDiscovery requests, Public Records Requests, Compliance scanning, data classification and data permissions management. The selected individual must possess an in-depth knowledge of data management, data security, data classification and data access tools and classification methods. This position will define, setup, manage and administer data automation tools used to conduct in-depth analysis of data repositories for the purpose of responding quickly and accurately to eDiscovery requests, Public Records requests, and Compliance Audit requests. In addition, this role will analyze, update, and implement access and permissions to agency data, as well as to maintain an overall data classification profile on multi-agency information.This job announcement will remain open until the position has been filled. Applications will be reviewed periodically as they are received. Applicants are encouraged to apply and submit their applications as soon as possible. The ideal candidate would have the following interpersonal and skills and qualifications: Excellent time management skills;Good understanding of basic legal requirements related to eDiscovery, Public Records Request and Information Confidentiality;Good knowledge of chain-of-custody concepts as it pertains to chain-of-custody requirements as it pertains to information forensics, integrity and evidence gathering;Ability to work as part of a team is essential;One or more of the following cybersecurity accreditations, Security + CISSP, CHFI;On-time and consistent attendance at the nominated workplace is essential;Face-to-face interaction with customers, staff and management is required;Ability to interact in a non-partisan manner when working in political environments or when involved in political activities is required;Excellent writing and grammar skills are essential;Must be able to work as part of an on-call, 24/7 shift rotation schedule;Ability to work long hours, holidays and weekends;Ability to work under stressful conditions and work to tight timelines.BENEFITS:Excellent low-cost Health, Dental, Vision Insurance (Participation in one of the nation''s best state retirement systems PERSI Retirement (Generous vacation and sick leave accrual beginning as soon as you startEleven paid holidays a yearMultiple savings plans, including optional 401k & Deferred Compensation plansGroup Life Insurance/Disability Insurance/Supplemental Life Insurance (Employee Assistance ProgramWellness Program (Benefits Summary (Download PDF reader) (Please note: The successful candidate MUST pass a national level, fingerprint-based background check, including multiple agency specific background checks specific to handling of sensitive information related to CJIS, HIPPA, FTI, PCI and other information requiring a very high level of confidentiality. Example of DutiesManages, implements, operates, and maintains data classification and discovery software tools and automation; Undertakes data classification and permission scanning to monitor, administer, update and report on sensitive information location and user permissions related to data access; Provides fast and accurate response to eDiscovery and Public Records Requests; Interacts and communicates with agency personnel on the fulfillment of eDiscovery and Public Records Requests; Maintains reports and status on eDiscovery and Public Records Requests; Manages data permissions and access requests; Participates in agency compliance audits related to sensitive data access, permissions and storage management. Minimum QualificationsGood knowledge of cybersecurity incident response and handling methodologies; authentication, authorization, and access control methods; vulnerability information dissemination sources (e.g., alerts, errata, and bulletins); common threats, vulnerabilities, and related mitigation strategies.Experience administering cryptography and cryptographic key management concepts. PREFERRED QUALIFICATION: Experience fulfilling eDiscovery, Public Records requests, Compliance scanning, data classification and data permissions management . Supplemental InformationPlease enter your responses to the supplemental questions in the space provided. You must have the minimum level of experience or education described in the typically gained by statements for each question to qualify for this position. Scoring will be based on the information you provide. A higher rating may be obtained based on the extent of your education and experience, so take your time to provide a detailed and complete answer to each question. Please do not cite, Refer to Resume or See Resume as a response.Thank you for your interest in employment with Information Technology Services! If you have questions about this position please contact us at:Email: [Click Here to Email Your Resumé]Hiring is done without regard to race, color, religion, national origin, sex, age or disability. If you need special accommodations to satisfy testing requirements, please contact the Division of Human Resources at (208) 334-2263. Preference may be given to veterans who qualify under state and federal laws and regulations. may not be applicable for temporary or seasonal positions.01 MQ 1 of 5 Describe how you have obtained good knowledge of incident response and handling methodologies. Help: Help: Typically gained by at least two years of work experience in IT cybersecurity incident response and handling methodologies OR one year of work experience and two related college/vocational courses. Work experience should be within the last five years. 02 MQ 2 of 5 Describe how you have obtained good knowledge of authentication, authorization, and access control methods. Help: Typically gained by at least two years of work experience in network security OR one year of work experience and two college/vocational level courses covering security practices. Work experience should be within the last five years. 03 MQ 3 of 5 Describe your experience administering cryptography and cryptographic key management concepts. Help: Typically gained by at least two years of work experience with the management of cryptographic keys and protecting them from loss or misuse. This encompasses generating, using, storing, archiving, and deleting of keys. Work experience should be within the last five years. 04 MQ 4 of 5 Describe how you have obtained good knowledge of vulnerability information dissemination sources (e.g., alerts, errata, and bulletins). Help: Typically gained by at least two years of professional work experience in network security OR one year of work experience and two college/vocational level courses covering security practices. Work experience should be within the last five years. 05 MQ 5 of 5 Describe how you have obtained good knowledge of common threats, vulnerabilities, and related mitigation strategies. Help: Typically gained by at least two years of work experience obtained within the last five years working in network security with routine responsibility monitoring and handling common threats, vulnerabilities, and related mitigation strategies OR one year of work experience and successful completion of at least two related college/vocational courses. 06 Extra Credit: Please describe your experience and length of time responding to and fulfilling eDiscovery, Public Records requests, Compliance scanning, data classification and data permissions management. Help: Typically gained by working in a role that required data gathering and analysis, using automated tools, and being provided under strict timelines. Required Question AgencyState of IdahoAddress304 North 8th Street Boise, Idaho, 83720 WebsiteApply Please verify your email address Verify Email

Created: 2025-11-15

➤
Footer Logo
Privacy Policy | Terms & Conditions | Contact Us | About Us
Designed, Developed and Maintained by: NextGen TechEdge Solutions Pvt. Ltd.