Information Security Management

• B.S. Information technology or equivalent
Required Experience:
• IT operations background or audit background
• Cisco, Microsoft Windows, Oracle databases (EBS)and Unix enterprise networking
• 5 years or more of Security related experience or equivalent training
• Experienced in identifying and preventing security breaches
• Security-related hardware and software experience; LAN/WAN, WLAN management and systems security administration
• Experience with user and system authentication methodologies, Single Sign On, Data authentication methods, authorization options required
•  Vulnerability Assessment

Knowledge, Skills, & Abilities:
• Top troubleshooting skill
• Team-building approach
• Customer service oriented
• Knowledge of networking, TCP/IP and related upper-layer protocols
• Well-versed in Network Security and software vulnerability issues
• SUS, Manage Soft, Windows 2000 Server and Red Hat Linux exposure

Physical Requirements: Office environment

Work Conditions: Weekend and/or evening hours may be required. Travel may be required.

The physical demands and work environment characteristics described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Scientific Games Corporation and its affiliates (collectively, “SG”) are engaged in highly regulated gaming and lottery businesses.   As a result, certain SG employees may, among other things, be required to obtain a gaming or other license(s), undergo background investigations or security checks, or meet certain standards dictated by law, regulation or contracts.   In order to ensure SG complies with its regulatory and contractual commitments, as a condition to hiring and continuing to employ its employees, SG requires all of its employees to meet those requirements that are necessary to fulfill their individual roles.  As a prerequisite to employment with SG (to the extent permitted by law), you shall be asked to consent to SG conducting a due diligence/background investigation on you.

This job description should not be interpreted as all-inclusive; it is intended to identify major responsibilities and requirements of the job. The employee in this position may be requested to perform other job-related tasks and responsibilities than those stated above.

SG is an Equal Opportunity Employer and does not discriminate against applicants due to race, ethnicity, gender, sexual orientation, veteran status, or on the basis of disability or any other federal, state or local protected class. If you’d like more information about your equal employment opportunity rights as an applicant under the law, please click here EEOC Poster.

Latest:Digitisation threatened by lack of security

cyber security

Business manager and IT specialist Yves Ephraim said that government needs to ensure that its planned digitisation of public records is sufficiently secured in order to prevent cyber attacks and theft of personal information.

Governor General Sir Rodney Williams announced during Thursday’s Throne Speech that the ruling administration would be digitising records in some of its departments, including the National Archives.

“In 2016, the digitisation of many government records and archive materials shall take place,” Sir Rodney said. “The Office of Intellectual Property and Commerce is expected to complete registration of a newly incorporated company in less than 24 hours.”

However, Ephraim said that the move could prove dangerous without the proper consideration of cyber security.

“The risk is that, as much as it provides a convenience for people, it also provides opportunity for nefarious characters to do reputational damage or even financial damage,” Ephraim said. “So therefore it means that there’s some responsibility on the part of whoever is delivering the service to ensure that … Security has to be paramount.”

Personal information is also inherently at risk for any member of the public who uses the Internet to register for government services, Ephraim said.

“You are going to have to give up personal information. For example, in the case of driver’s licences, there’s quite a bit of personal information that is saved in the Transport Board system. And if that information is passed back and forth through the Internet, then they need to make sure that they have measures in place to protect that.”

Ephraim also noticed that current websites maintained by the Government of Antigua & Barbuda are already unsecured, making the possibility of a security threat much more likely.

Read more in today’s Daily Observer.

IT Specialist (INFOSEC/APPSW) (Information Security/Application Software)

To apply to the IT Specialist (INFOSEC/APPSW) (Information Security/Application Software) job posting, please login or become a FlexJobs member.

If you have any questions, please feel free to give us a call toll-free at

Find a job faster!

Professional, safe

Hand-screened leads

No scams, ad, junk

50+ job categories

Get Started Now!

New Committee Asks for Info on Clinton Email Server

Another congressional committee is investigating the cyber-hack vulnerability of the private email server used by former Secretary of State Hillary Clinton.

Texas Rep. Lamar Smith, who chairs the House Science, Space, and Technology Committee, has announced he’s asking for information from several private companies that provided Clinton with software and services for the server she used at home.

“Understanding these companies’ roles … is critical to improving government cybersecurity standards,” Smith said in a statement.

“A high profile government official deviating from established information security requirements raises significant concerns. The sensitive nature of the information stored on … Clinton’s private server created a unique challenge to ensure all of the information was properly safeguarded.”

Smith argues the State Department scored only a 42 out of 100 on the federal government’s cybersecurity report card – a grade lower than one given the Office of Personnel Management, which was the target of a massive cyber-hack that exposed the private information of 20 million Americans. 

The investigation will run alongside a similar inquiry led by Wisconsin Republican Sen. Ron Johnson, chairman of the Senate Homeland Security Committee, The Hill reports

Johnson’s probe, launched last summer, found cyberattacks from China, South Korea and Germany had targeted Clinton’s private email but were rebuffed by a monitoring device from security firm, SECNAP.

Clinton’s campaign has bashed Johnson’s efforts as a politically motivated “sham,” The Hill reports.

House Science panel opens new investigation into Clinton emails

Hillary Clinton already has the FBI and a Senate judiciary committee on her tail about her private emails possibly containing classified info, but now it looks like she has to face yet another inquiry on the matter. Two days ago, House Science, Space and Technology Committee Chairman Lamar Smith (R-Texas) opened a second congressional committee to investigate the security of those emails.

In particular, Smith is focusing on the four companies involved: Platte River Networks, which maintained the server; Datto Inc, which backed it up in the cloud; SECNAP Network Security Corp., which installed a security monitoring service; and Fortinet, which provided the encryption software. Smith’s committee has already sent letters to all four requesting further information.

Smith’s investigation is done in very much the same vein as an existing inquiry by Senate Homeland Security Committee chairman Ron Johnson (R-Wis.) into the emails. Johnson has also been working with Committee Chair Chuck Grassley (R-Iowa) to look into who at the State Department level approved her use of her personal email setup and how that happened.

“A high profile government official deviating from established information security requirements raises significant concerns,” Smith said in a statement.