Security Analyst

Confidential Company  •  Starkville, MS

5 - 7 years experience  •  Technology

Salary depends on experience
Posted on 05/30/18 by Cynet Sytems
Confidential Company
Starkville, MS
5 - 7 years experience
Technology
Salary depends on experience
Posted on 05/30/18 Cynet Sytems

We are looking for Security Analyst for our client in Starkville, MS

Job Title: Security Analyst

Job Location: Starkville, MS

Job Type: Contract ? 12 Months / Contract to Hire / Direct Hire

US citizens and those authorized to work in the US are encouraged to apply. We are unable to sponsor H1b candidates at this time.

Job Description:

 

  • Information Security Analyst to work with IT Security team. Candidate will monitor our computer networks for security issues, install and fully implement security software, and document any security issues or breaches.
  •  Contractor will work with a diverse team. The client is located in Starkville, MS, a vibrant college town.
  • Monitor computer networks for security issues.
  • Investigate security breaches and other cybersecurity incidents.
  • Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
  • Document security breaches and assess the damage they cause.
  • Work with security team to perform tests and uncover network vulnerabilities.
  • Fix detected vulnerabilities to maintain a high-security standard.
  • Stay current on IT security trends and news.
  • Develop company-wide best practices for IT security.
  • Perform penetration testing.
  • Help colleagues install security software and understand information security management.
  • Research security enhancements and make recommendations to management.
  • Stay up-to-date on information technology trends and security standards.
  • Team Player
  • Stay up-to-date on Relevant Technologies
  • Conduct continuous analysis of securitythreat information (viruses, malicious code, industry events, hackers and zero-day exploits, DDOS attacks, IDS/IPS and SIEM alerting, etc.) in order to proactively assess and investigate emerging threats and potential impact.
  • Troubleshooting of issues and testing across multiple platforms and applications
  • Triage and drive vulnerability issues to a thorough, immediate, and effective conclusion
  • Manage endpoint protection and intrusion detection system tools and policies
  • Review security requirements at relevant phases for both technical and operational perspective for new and existing projects
  • Analyze, review, customize and recommend securityarchitectures for internal projects 
  • Identifies, implements, and monitors best practices for information securityarchitecture
  • Monitor and recommend changes in standards that affect application security, especially in the area of privacy and identity theft

 

REQUIREMENTS: 

 

  • 5-7yrs Technical hands on experience
  • Bachelors Degree in the field of computer science or the appropriate amount of related work experience.
  • 3+ yrs. Wintel
  • 3+ yrs. Linux
  • 3+ yrs. Desktop Security
  • 3+ yrs. Laptop Security
  • 1+ yrs. Firewalls
  • Expected to stay up-to-date on the latest intelligence, including hackers? methodologies, in order to anticipate security breaches
  • Experience with planning and implementing security measures to protect computer systems, networks and data
  • Must be analytical
  • Excellent written/verbal communication skills
  • Experience creating, modifying and updating Intrusion Detection System (IDS)
  • Experience creating, modifying and updating Security Information Event Management (SIEM) tools
  • Detail oriented
  • Ability to discover vulnerabilities in information systems
  • Experience with Intrusion Prevention systems
  • Information technology knowledge
  • Experience monitoring compliance with information security policies and procedures
  • Experience with remediate security issues
  • Experiencing responding to requests for specialized cyberthreatreports
  • Experiencing performing cyber and threat analysis
  • Performing security monitoring
  • Preventing hacker intrusion
  • Must have strong problem-solving skills
  • Deadline oriented; providing timely and relevant securityreports
  • Self-motivated
  • Ability to stay one-step ahead of cyber attacks
  • Strong technical background in Data Loss Prevention
  • Experience supporting and managing security services
  • Ability to create and implement detailed action plans for security solutions
  • Ability to write security requirements and design documents.
  • Ability to identify and mitigate vulnerabilities within the network, system, and application environment
  • In-depth understanding of common operating systems (Linux/Windows), networking protocols, application security, databases, and Internet applications development
  • Must have a thorough knowledge with web application and Internet security. Must have a broad knowledge in information technology trends
  • Ability to communicate technical security information to non-technical personnel
  • Strong interpersonal and communication skills
  • Ability to work independently in a self-directed manner and collaboratively as a member of security team 
  • Hands-on cybersecurity tool administration and troubleshootingexperience.
  • Working technical knowledge of Rapid7 or equivalent scanning tool.

 

Required Skills/Experience:

 

  • Working technical knowledge of NIST Cybersecurity Frameworks.
  • Working technical knowledge of Active Directory & reporting
  • Working technical knowledge of Identity and access management.
  • Working technical knowledge of TCP/IP
  • Working technical knowledge of Risk Based and Profile based authentication.
  • Working technical knowledge SIEM Administration.
  • Working technical knowledge Network Security.
  • Working technical knowledge Information Security Policies.
  • Working technical knowledge Microsoft Threat Management Tool
  • Experience working with SSL VPN?s.
  • Experience working with Network Diagramming tools.
  • Experience working with application development environments.
  • Knowledge of Project Management Tools and methodologies.
  • Solid working knowledge of current Internet technologies, including XML, HTML
  • Knowledge of applicable data privacy policies & Security best practices. Personal Attributes
  • Flexible and adaptable regarding learning and understanding new technologies.
  • Strong written and oral communication skills.
  • Strong interpersonal skills.
  • Ability to conduct research into software-related issues and products.
  • Highly logical.
  • Technically proficient.
  • Highly self-motivated and directed.
  • Keen attention to detail.
  • Proven analytical and problem-solving abilities.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Ability to work both independently and in a team-oriented, collaborative environment.

 

PREFERRED:

 

  • Preference given to candidates with the below skills/experience. Must also meet minimum requirements. 
  • Preferred certifications a plus? , GSEC, GCIH, CISSP,Comp TIA
  • NIST ? Government Standard 
  • ISOxxx ? International Standard  
  • IOS for Mac Security
  • Python for security data analysis and automation
  • Java for application coding
  • Shell scripting for automation and data analysis
  • SQL for security applications and analysis
  • MySQL for understanding databasesecurity
  • Experience with any of the following: Splunk, StealthBits, Varonis, Symantec, Rapid 7, AppSpider MF Fortify, OKTA, DUO or any similar tools
  • Communicate Up, Down, and Across All Levels of the Organization and Technical Backgrounds
  • Deep Understanding of Risk Management Framework
  • Experience defining process for Managing Network Security Evaluate and Deconstruct Malware Software
  • Familiar with Security Regulations and Standards
  • Implementation and maintenance of Security Frameworks for Existing and New Systems

Not the right job?
Join Ladders to find it.
With a free Ladders account, you can find the best jobs for you and be found by over 20,0000 recruiters.