I am seeking an experienced IT Clearance Specialist to ensure highest security standards for healthcare contract ASAP. I need someone available for 2 hours today (Sunday) 5pm-10pET or tomorrow 8am-10am ET.
Responsibilities include configuring my Mac laptop, iPhone and servers to meet specific requirements listed at the end of this post. I will need to provide screenshots of all the settings. I have Norton Antivirus and VPN already. I need specific help around Mail app, Google Account Admin settings, and WaveApp.
Requirements include proven experience in IT clearance and security, knowledge of Apple products, problem-solving skills, and communication skills.
PLEASE ONLY APPLY IF
1. YOU KNOW HOW TO SET THE CONFIGURATIONS PROVIDED BELOW ON A MAC, IPHONE, MAIL APP, AND GOOGLE ACCOUNT.
2. YOU CAN ACCOMPLISH THIS IN 2 HOURS WHILE GUIDING ME ON THE A VIDEO CALL.
3. YOU ARE AVAILABLE TODAY OR TOMORROW MORNING AS SPECIFIED
REQUIREMENTS:
Endpoint protection
1. "Screenshot of antivirus/antimalware deployment on servers
• Showing signature update is set to daily or whenever an update is available
• Showing full system scan is set at least every 12 hours
• Showing real-time protection is enabled
• Showing inability for an end user to disable/uninstall the antivirus/antimalware solution
2. "Screenshot of antivirus deployment on endpoints (laptop/desktop)
• Showing signature update is set to daily or whenever an update is available
• Showing full system scan is set at least every 12 hours
• Showing real-time protection is enabled
• Showing inability for an end user to disable/uninstall the antivirus/antimalware solution
Vulnerability management
3. "Latest vulnerability scan results of External facing servers (and evidence of remediation status)
Executive summary should show:
• What is being scanned
• Scanning Results and Findings
*Show Remediation action plan and status for the identified Critical and High risks vulnerabilities.
Transmission Protection
4. "Screenshot showing the data in transit is protected by encryption.
Access control
"*This is only relevant to suppliers that has externally facing applications*
5. Screenshot demonstrating MFA is enforced for all users with the ability to access UHG protected and confidential using web/mobile application access.
6. Screenshot demonstrating re-authentication using MFA or alerting for critical events for critical events. (e.g., bank change, name, address, beneficiary change, etc.)
7. Screenshot demonstrating bot protection upon login, password reset, and registration.
And Screenshot of admin console bot protection solution deployed.
8. Screenshot risk based authentication for web/mobile application.
9. Screenshot confirming MFA is enforced for all users with the ability to establish remote connections
• Screenshots demonstration authentication process for remote connections
Data protection and privacy
10. Report of Servers where UHG data resides, provide a screenshot showing encryption is enabled
11. "Report of Workstations where UHG data resides, provide a screenshot showing encryption is enabled
12. "Report of Removable Media where UHG data sits, provide a screenshot showing encryption is enabled
• Process or tool used to encrypt removable media