Remote hiring_Information Security Analyst_Doral, FL_Local to Florida at Florida, New York, USA |
Email: [email protected] |
From: Deepanjan Chakraborty, Adame Services LLC [email protected] Reply to: [email protected] Title: Information Security Analyst Location-Doral, FL Remote Duration-6+Months Requirements: Experience in computer systems with specialization within information security and/or network security; Experience working with the following solutions: Cycognito, Splunk, Qualys, Orca, and/or Axonius; Experience with anti-virus, APT detection, data loss protection (DLP), WAF, web content filtering, IDS/IPS, vulnerability scanners, forensics tools, SIEM, DB monitors Experience working with networking device components (i.e., managed switches, routers, and firewalls); Experience with managing vulnerability scanning (static/dynamic) and penetration testing; Experience configures and/or correlate information in DNS and understands basic network routing concepts; Security+ Certification; Associate Degree Preferred: Experience which includes the following: Linus/Unix, TCP/IP, Active Directory, Microsoft Windows platforms (desktop/server), Open System platforms (desktop/servers), database platforms (SQL/Oracle); MCSE, CCNA, CISSP, CISA Certifications; Bachelors degree Responsibilities include but are not limited to the following: Service-oriented and must work easily with end users, IT administrators, and management; Uses data encryption, firewalls, and other appropriate security tools and applications to conceal and protect transfers of confidential digital information; Safeguards system security and improves overall server and network efficiency by training users and promoting security awareness; Monitor security related websites and email distributions to possess knowledge of common exploits, vulnerabilities and countermeasures; Assist in implementation of corporate security policy functions/procedures that align to security mandates/standards that include Sarbanes-Oxley, HIPPA, and PCI compliance; Handle vulnerability management process, which includes scoping, vulnerability scanning, penetration testing, reporting, ticket administration, and remediation follow-up tasks; Recognize and identify potential gaps in areas where existing data security policies and procedures require changes, or where new ones need to be developed, especially regarding future business expansion Keywords: database information technology Florida |
[email protected] View all |
Tue Mar 19 00:22:00 UTC 2024 |