Immediate opening for Cyber security Analyst in Pennsylvania locals only at Remote, Remote, USA |
Email: [email protected] |
Hello, Please find the below job - PennDOT - TAS2 A4 SC3 (Cyber Security Analyst) a LOCALS TO PENNSYLVANIA ONLY Job Title PennDOT - TAS2 A4 SC3 (Cyber Security Analyst) Location Harrisburg, Pennsylvania Skills Needed N/A Job Description Please see complete description ***This requisition's current PO is funded through 6/30/24, but will be extended. Contract end date is dependent on the final schedule and projected needs. Historically additional funding should last a year and occur from 7/1/24-6/30/25.*** ***The method of interview is virtual via Teams with the candidate's participation with video-enabled, followed by an in-person interview at The Server Farm (1400 Cameron Street, Harrisburg, PA 17103).*** ***Clientwould prefer candidates local to the Harrisburg, PA Area.*** ***This position is fully remote; however, the individual is required to pick up commonwealth-issued equipment the first day and badging could very well be done that first day too.*** ***Do not resubmit candidates from previous similarly released req # 700775.*** Selected candidates must provide a completed PATCH check and work authorization done at vendor expense prior to engagement. Engaged candidates must bring a check or money order for $20 payable to the Commonwealth of Pennsylvania on the first day work to pay for a badge. PennDOT seeks a local Cyber Security Analyst whose strength is in firewalls with minimum 5 years' experience with at least 2 years in a large-scale enterprise Windows environment. This position is fully remote; however, the individual will need to come onsite to The Server Farm at the manager's request. Overview This candidate serves as a Cyber Security Analyst within theInformation Security Office of Pennsylvanias Infrastructure and EconomicDevelopment IT Delivery Center (IED DC) which includes the Department ofTransportation (PennDOT), PA Emergency Management Agency (PEMA) and theDepartment of Community and Economic Development (DCED). Job Responsibilities Demonstrates good judgement and problem-solving skills. Reacts and adapts tochanging circumstances rapidly. Technically proficient and experienced withWindows and Unix/Linux operating systems, enterprise class firewalls, networksecurity, network traffic analysis, incident response, vulnerability analysis,packet analysis, and systems hardening. Possesses proficient knowledge of layer2 switching and layer 3 routing protocols, encryption protocols, communicationprotocols. Examples include but not limited to: TLS/SSL, IPsec, SSH, PGP, VLAN,LLDP, LACP, ARP, 802.1x, DNS, AES, etc. Assists in deterring, identifying, monitoring, investigating and analyzingnetwork intrusions. Collects intrusion artifacts, indicators of compromise,correlates artifacts across systems, and gathers other relevant facts to enablemitigation of potential incidents within the enterprise. Receives and analyzes network alerts from various sources within theenterprise. Determines the alert trigger, the severity of the alert, andprioritizes response accordingly. Track and document incidents frominitial detection to final resolution. Participates in the containment and neutralization of cyber threats based onthe intelligence and indicators of compromise gathered. Assesses damage toservices, systems, networks, data and other relevant assets. Participates inthe restoration and reconstitution of systems and services. Makesrecommendations to prevent the recurrence of cyber incidents and verifies thatnormal operations have resumed. Manages, monitors, and analyzes several security technologies to includedefensive and offensive security solutions on the perimeter and internalnetworks such as firewalls, intrusion detection/prevention systems (IDS/IPS),data loss prevention, etc. Uses data from Security Information and Event Management (SIEM) and otherlogging solutions to conduct analysis, identify cyber trends, disseminaterelevant findings, and recommend suitable security and/or compensatingcontrols. Participates in the design and implementation of security controls. Grants andrevokes access to restricted resources, ensures that end-users are authorizedto access requested resources, and participates in periodic systemaudits/cleanup initiatives. Assists leadership in planning and implementing cybersecurity infrastructure ortechnology related projects, participates in the installation of equipment,related cabling, and conducts ongoing maintenance/repair of securityinfrastructure assets as needed. Performs research, evaluates security technologies/services, to drive processimprovements, integrate automation, increase efficiency, strengthen servicedelivery, and improve security posture. Assists in maintaining an accurate and thorough knowledgebase. Creates andrevises documentation, procedures, flowcharts, diagrams, etc. Leverages Commonwealth incident tracking and ticketing systems to receive tasksfrom other units, delegate tasks to other units, prioritize daily tasks,document actions taken, and the final resolution for tasks completed. Provides on-call and/or emergency support, including after-hours as needed. Adheres to established service management processes and procedures. Performs all other related duties as assigned. Requirements Professional cyber-security experience in large-scale Windows environments 5years minimum. Understanding of current threats and trends in information security. Professional oral and written communication skills. Excellent soft skills such as listening, presenting, and negotiating. Must pass required Pennsylvania State Police background check (cannot have any felony offenses) Ability to work remotely. Desired Activecyber-security certification from an accredited organization such as ISC2,CISA, CompTIA, EC-Council, ISACA, GSEC, etc. Required/Desired Skills Skill Required /Desired Amount of Experience Minimum 5 years' professional cyber-security experience w/at least 2 years in a large-scale enterprise Windows environment Required 5 Years Understanding of current threats and trends in information security Required 0 Professional oral and written communication skills Required 0 Excellent soft skills such as listening, presenting, and negotiating Required 0 Must pass required Pennsylvania State Police background check (cannot have any felony offenses). Required 0 Desired Certifications (1 or more)- ISC2, CISA, CompTIA, EC-Council, ISACA, GSEC (or other relevant cert(s) such as CISSP, GSEC, GCIH, GCFA, CISM) Desired 0 Experience with Firewalls: AlgoSec, Checkpoint, CISCO ASA, SilverPeak, VMWare NSX Desired 0 Experience with scripting languages PowerShell, Python, etc. Nice to have 0 Experience with forensic tools, such as Network security monitoring: FireEye NX, AX, PX Endpoint, Splunk ES Nice to have 0 Experience with Web vulnerability scanning: Tenable.IO, Rapid7 AppSpider Nice to have 0 Experience with Encryption: Globalscape Secure FTP, PGP Nice to have 0 Experience with Penetration testing: Metasploit, Kali Linux, Netsparker, and Wireshark Nice to have 0 Experience with Network intrusion detection tools such as Snort, Security Onion, SolarWinds Security Event Manager Nice to have 0 Experience with Packet sniffers such as Tcpdump and Windump Nice to have 0 Familiarity with SAST and DAST tools such as Veracode, AppSpider and AppScan Nice to have 0 Thanks & Regards Sudheer Kondaveti Recruitment Associate Office: (470) 560-3648 E-Mail: sudheerk @codeforce.com Your feedback is important to us and will help improve our recruitment process! Click here. ! CODEFORCE 360 This e-mail (and any attachments), is confidential and may be privileged. It may be read, copied and used only by intended recipients. Unauthorized access to this e-mail (or attachments) and disclosure or copying of its contents or any action taken in reliance on it is unlawful. Unintended recipients must notify the sender immediately by e-mail/phone & delete it from their system without making any copies or disclosing it to a third person. If you choose not to receive any e-mails from our company, please reply with "REMOVE" in the subject line. -- Keywords: information technology purchase order Pennsylvania Immediate opening for Cyber security Analyst in Pennsylvania locals only [email protected] |
[email protected] View all |
Tue May 21 20:51:00 UTC 2024 |