The successful candidate will be responsible for implementing, maintaining and administering an enterprise-class network infrastructure, including LAN, MAN and WAN services for Solar Turbines Incorporated. The position will support the network requirements of in-house and purchased applications and infrastructure.
The Cloud Security Analyst will be responsible for understanding the customers security requirements, and then implementing security solutions that 1) meet the customers requirements, and 2) align with the standard managed cloud security policies and procedures. The role requires expertise in ISO27001, SSAE16, PCI, HIPAA security standards .
In this role, the candidate will perform daily operations and monitor events from multiple sources including, but not limited to, SIEM consoles, network and host based intrusion detection systems, firewall consoles, system logs (Unix and Windows), applications, databases, and other security information monitoring tools.
In this role, the selected candidate will monitor, detect, and take immediate action on events and incidents as they occur on the network; automate analysis activities via scripting and integration of multiple existing tools.
In this role, you will perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy.
In this role, the selected candidate will develop and maintain Security infrastructure solutions for Large Complex Multivendor Network Environments; provide troubleshooting support for complex enterprise security environments.
In this role, the selected candidate will collaborate with internal IT and Security staff to establish and enforce IT security best practices, information protection objectives, process improvements and effective IT security controls.
In this role, you will prepare detailed specifications, requirements, scope documents and logic flowcharts for the development and implementation of the most complex application programs and modifications.
In this role, the selected candidate will monitor, audit, secure and protect business critical operational data, systems and processes within these standards while also understanding the business drivers that exist within the enterprise.
In this role, the selected candidate will configure systems following Department of Defense (DoD) Certification and Accreditation (C&A) guidance and perform C&A assessments to evaluate compliance with established cyber security policies and regulations.