What are the responsibilities and job description for the Cloud Cybersecurity Project Manager position at Amer Technology, Inc?
Job Details
The Cloud Cybersecurity Project Manager III will handle the project budget and timeline using an enterprise portfolio project management software and coordinating with the Managed Services vendor to ensure that project implementation is on time, under budget, and within scope to accommodate the best value for Department of State Health Services (DSHS). The Cloud Cybersecurity Project Manager III must follow the Department of Information Resources (DIR) Project Management Framework, ensuring compliance within Health and Human Services and DSHS Security and Information Technology Standards.
This Cloud Cybersecurity Project Manager III position requires a PPM certification.
- CANDIDATE SKILLS AND QUALIFICATIONS
Minimum Requirements: | ||
Years | Required/Preferred | Experience |
10 | Required | Advanced security project management experience, extensive experience with implementation of a complex DLP, web information systems, information systems controls, and sound judgment to plan critically think, and achieve goals. |
8 | Required | Ability to effectively manage a large-scale project for the implementation of a complex DLP, vulnerability management applications. |
8 | Required | Managing up to three staff augmentation contractors, including Two Network Security Analyst, and one Application/Software Developer or Cloud Security Analyst |
8 | Required | Handle the project budget and timeline using an enterprise portfolio project management software and coordinating with the Managed Services vendor to ensure that project is on time, under budget, and within scope and best value for DSHS |
8 | Required | Strong Knowledge and Familiarity using the Department of Information Resources (DIR) Project Management Framework, ensuring compliance within Health and Human Services and DSHS Security and Information Technology Standards. |
8 | Preferred | Experience Designing, Building and Security Web Information Systems using SaaS vulnerability management and DLP applications. |
5 | Preferred | Familiar managing when resources are limited able to handle gaps that might require them to independently perform a variety of complicated Information Technology (IT) tasks, as such a wide degree of creativity and latitude is expected. |
3 | Preferred | Experience working with HHSC Security or Network Engineers at HHSC |