Experis
Project Planning Defining project governance (controls) for each project.
Planning each overall project including, but not limited to, detailed definition of the scope, tasks and activities of each project.
Aligning the deliverables (outputs) to the project and PROGRAMs outcome with the aid of the business change manager.
Participate in design and technical reviews.
Participate in the development of the training curriculum.
Capture best-practice knowledge among the technical teams.
Build standard operating procedures for solution implementation and support.
Transfer knowledge to the technical teams.
Actively listen to internal and external user concerns, problems and needs to implement that information when creating solution plans.
Project Oversight Monitoring and managing daily project activities throughout the life cycle of each individual project.
Managing and utilizing internal and external (vendor) resources for the execution of each project.
Establishing clear and regular communication with vendor project managers.
Ensuring the availability of resources for project tasks.
Identify and managing risks and issues, escalating issues as needed, and implementing corrective measurements.
Monitoring and reporting on each projects budget.
Managing changes to the project scope, schedule, and budget, if necessary.
Report issues to the PROGRAM Manager and provide corrective action as necessary.
Project Reporting Managing stakeholder communication, including providing regular project status reports.
Reporting overall project(s) status to the Program Manager and Program Administrator at regular intervals and on an ad-hoc basis.
Assisting the Program Manager and Program Administrator with developing the reports for the Interim Finance Committee (IFC).
Provide status reports as outlined and requested by RCCD.
Formatting, information required and timeframes for ad-hoc reports shall be determined on a case-by-case basis, as needed.
Weekly Status Reports Provide weekly status reports to the PROGRAM Manager and Program Administrator via email by close of business each Friday.
Weekly Status Reports shall include, but not be limited to: a) Project (s) status; b) What is to be accomplished during the next reporting period; c) Updated project timeline showing percentage completed, tasks assigned, completed and remaining; d) Identified necessary resources required for activities during the next time period Project Summary Provide a monthly Project Summary to the PROGRAM Manager and Program Administrator, via email, no later than the 5th business day of each month throughout the duration of the contract.
Project Summary reports shall include, but not be limited to: a) Project status; b) Accomplishments during the period, (i.e.
meetings held and conclusions/decisions determined); c) Problems encountered and proposed/actual resolutions; d) Project issues that need to be addressed; e) Identification of schedule slippage and strategy for resolution; f) Identified necessary resources required for activities during the next time period ADDITIONAL INFORMATION: Consultants must respond, in detail, to their knowledge and experience related to cyber security and cloud environments.
Lack of experience in the following areas is not cause for an automatic rejection.
Failure to respond/acknowledge these areas may result in the consultant being removed from consideration.
1) Cyber Security: Consultants must respond, in detail, to their experience related to Cyber Security as related to protecting anything connected across the network: Hardware, Software, Data in transit and rest, Mobile devices, etc.
and threats such as, but not limited to: Network Intrusion
– Any unauthorized activity on a computer network from an outside source.
Phishing/Spear Phishing
– Phishing uses false pretenses to steal information like passwords and credit card details.
Spear-phishing is a malicious email-spoofing attack that aims to gain entry to software via malicious malware thats downloaded through an attachment.
Ransomware
– Ransomware will either lock your computer to prevent access, or threaten to make sensitive files public.
Rootkit
– A rootkit is a program that allows hackers to hide other malware like spyware and viruses on your computer.
Spyware
– Collects information like passwords, credit card numbers, web browsing and email addresses and uses it for malicious purposes.
Trojans
– Malicious programs in disguise that don’t replicate, but , create a backdoor that gives hackers control of your computer.
Virus
– Malicious software that replicates itself when activated so it can spread to other computers and files.
Zero-day Exploit
– This is a vulnerability that has not been discovered by software or security vendors.
The vulnerability can be exploited until it is detected and patched, when it stops being zero-day.
2) Cloud and Hybrid Cloud Environments: Public Cloud
– Owned and operated by a third-party cloud service providers, which deliver their computing resources, like servers and storage, over the Internet.
All hardware, software, and other supporting infrastructure is owned and managed by the cloud provider which is accessed and managed via a web browser.
Private Cloud
– Cloud computing resources used exclusively by a single business or organization; the services and infrastructure are maintained on a private network.
Hybrid Cloud
– Combine public and private clouds bound together by technology that allows data and applications to be shared between them.
3) Types of Cloud Services: Infrastructure as a service (IaaS)
– Rented IT infrastructureservers and virtual machines (VMs), storage, networks, operating systems.
Platform as a service (PaaS)
– Cloud computing services that supply an on-demand environment for developing, testing, delivering, and managing software applications.
FaaS (functions as a service)/Serverless computing
– Focuses on building application functionality without the time necessary for continually managing the servers and infrastructure required to do so.
Software as a service (SaaS)
– Typically a subscription service to host and manage the software application and underlying infrastructure and handle any maintenance (software upgrades and security patching); accessible via a web browser.
EXPERIENCE and SKILLS REQUIRED Bachelors degree in business Strong interpersonal communication skills Organizational skills and ability to solve complex problems Willingness to work independently and as part of a team 5 years project management experience Proven experience and understanding in project management Proven stakeholder management skills Proven experience managing a team Experience using computers for a variety of tasks Experience with Criminal Justice and Law Enforcement and related security requirements governing the connection with and access to criminal justice information Project Management Professional (PMP) certification from the Project Management Institute Project scheduling experience, utilizing project planning applications such as Microsoft Project (prefer experience with Smartsheet).
EXPERIENCE and SKILLS PREFERRED Smartsheet Software Cloud Computing Cyber Security Experis is an Equal Opportunity Employer (EOE/AA) Job Requirements: