Remote - Cyber Security Analyst - Local to PA only at Harrisburg, Pennsylvania, USA |
Email: [email protected] |
From: Usha Geethari, StellarIT Solutions [email protected] Reply to: [email protected] Hi, This is Usha form Stellar IT Solutions! You intrigued us in your profile; hence I have a Great Opportunity for you with our direct client so kindly view the below job description and let me know your interest to proceed further. Title: Cyber Security Analyst Location: Harrisburg, PA Duration: Short Term ***The method of interview is virtual via Teams with the candidate's participation with video-enabled, followed by an in-person interview at The Server Farm (1400 Cameron Street, Harrisburg, PA 17103).*** ***Client would prefer candidates local to the Harrisburg, PA Area.*** ***This position is fully remote; however, the individual is required to pick up commonwealth-issued equipment the first day and badging could very well be done that first day too.*** Selected candidates must provide a completed PATCH check and work authorization done at vendor expense prior to engagement. Engaged candidates must bring a check or money order for $20 payable to the Commonwealth of Pennsylvania on the first day work to pay for a badge. PennDOT seeks a local Cyber Security Analyst whose strength is in firewalls with minimum 5 years' experience with at least 2 years in a large-scale enterprise Windows environment. This position is fully remote; however, the individual will need to come onsite to The Server Farm at the manager's request. Overview This candidate serves as a Cyber Security Analyst within the Information Security Office of Pennsylvanias Infrastructure and Economic Development IT Delivery Center (IED DC) which includes the Department of Transportation (PennDOT), PA Emergency Management Agency (PEMA) and the Department of Community and Economic Development (DCED). Job Responsibilities Demonstrates good judgement and problem-solving skills. Reacts and adapts to changing circumstances rapidly. Technically proficient and experienced with Windows and Unix/Linux operating systems, enterprise class firewalls, network security, network traffic analysis, incident response, vulnerability analysis, packet analysis, and systems hardening. Possesses proficient knowledge of layer 2 switching and layer 3 routing protocols, encryption protocols, communication protocols. Examples include but not limited to: TLS/SSL, IPsec, SSH, PGP, VLAN, LLDP, LACP, ARP, 802.1x, DNS, AES, etc. Assists in deterring, identifying, monitoring, investigating and analyzing network intrusions. Collects intrusion artifacts, indicators of compromise, correlates artifacts across systems, and gathers other relevant facts to enable mitigation of potential incidents within the enterprise. Receives and analyzes network alerts from various sources within the enterprise. Determines the alert trigger, the severity of the alert, and prioritizes response accordingly. Track and document incidents from initial detection to final resolution. Participates in the containment and neutralization of cyber threats based on the intelligence and indicators of compromise gathered. Assesses damage to services, systems, networks, data and other relevant assets. Participates in the restoration and reconstitution of systems and services. Makes recommendations to prevent the recurrence of cyber incidents and verifies that normal operations have resumed. Manages, monitors, and analyzes several security technologies to include defensive and offensive security solutions on the perimeter and internal networks such as firewalls, intrusion detection/prevention systems (IDS/IPS), data loss prevention, etc. Uses data from Security Information and Event Management (SIEM) and other logging solutions to conduct analysis, identify cyber trends, disseminate relevant findings, and recommend suitable security and/or compensating controls. Participates in the design and implementation of security controls. Grants and revokes access to restricted resources, ensures that end-users are authorized to access requested resources, and participates in periodic system audits/cleanup initiatives. Assists leadership in planning and implementing cybersecurity infrastructure or technology related projects, participates in the installation of equipment, related cabling, and conducts ongoing maintenance/repair of security infrastructure assets as needed. Performs research, evaluates security technologies/services, to drive process improvements, integrate automation, increase efficiency, strengthen service delivery, and improve security posture. Assists in maintaining an accurate and thorough knowledgebase. Creates and revises documentation, procedures, flowcharts, diagrams, etc. Leverages Commonwealth incident tracking and ticketing systems to receive tasks from other units, delegate tasks to other units, prioritize daily tasks, document actions taken, and the final resolution for tasks completed. Provides on-call and/or emergency support, including after-hours as needed. Adheres to established service management processes and procedures. Performs all other related duties as assigned. Requirements Professional cyber-security experience in large-scale Windows environments 5 years minimum. Understanding of current threats and trends in information security. Professional oral and written communication skills. Excellent soft skills such as listening, presenting, and negotiating. Must pass required Pennsylvania State Police background check (cannot have any felony offenses) Ability to work remotely. Desired Active cyber-security certification from an accredited organization such as ISC2, CISA, CompTIA, EC-Council, ISACA, GSEC, etc. Skill Required / Desired Amount of Experience Consultants Experience Minimum 5 years' professional cyber-security experience w/at least 2 years in a large-scale enterprise Windows environment Required 5 Years Understanding of current threats and trends in information security Required Professional oral and written communication skills Required Excellent soft skills such as listening, presenting, and negotiating Required Must pass required Pennsylvania State Police background check (cannot have any felony offenses). Required Desired Certifications (1 or more)- ISC2, CISA, CompTIA, EC-Council, ISACA, GSEC (or other relevant cert(s) such as CISSP, GSEC, GCIH, GCFA, CISM) Desired Experience with Firewalls: AlgoSec, Checkpoint, CISCO ASA, SilverPeak, VMWare NSX Desired Experience with scripting languages PowerShell, Python, etc. Nice to have Experience with forensic tools, such as Network security monitoring: FireEye NX, AX, PX Endpoint, Splunk ES Nice to have Experience with Web vulnerability scanning: Tenable.IO, Rapid7 AppSpider Nice to have Experience with Encryption: Globalscape Secure FTP, PGP Nice to have Experience with Penetration testing: Metasploit, Kali Linux, Netsparker, and Wireshark Nice to have Experience with Network intrusion detection tools such as Snort, Security Onion, SolarWinds Security Event Manager Nice to have Experience with Packet sniffers such as Tcpdump and Windump Nice to have Familiarity with SAST and DAST tools such as Veracode, AppSpider and AppScan Nice to have Thanks & Regards, Usha R Senior Talent Acquisition https://www.linkedin.com/in/usha-g-3a2ba2101 Work: 240-774-0203| Email: [email protected] Rockville, MD | McLean, VA | Palo Alto, CA StellarIT.com | StellariDeaLabs.com Keywords: rlang information technology California Maryland Pennsylvania Virginia Remote - Cyber Security Analyst - Local to PA only [email protected] |
[email protected] View all |
Wed May 22 02:39:00 UTC 2024 |