Urgent Requirement :: IT Security Analyst 3 - Vulnerability Management :: Hybrid(Dimondale, MI) at Remote, Remote, USA |
Email: [email protected] |
From: Tushar Chauhan, CCIT [email protected] Reply to: [email protected] Hello, Please find the job description of IT Security Analyst 3 - Vulnerability Management. Job Title: IT Security Analyst 3 - Vulnerability Management Location: Hybrid (Dimondale, MI) (Candidate must be local) Duration: 1 year with possible extension Job Description: Top Skills & Years of Experience: 5+ Years' IT Security Experience Experience with vulnerability management scanning and reporting tools (requires strong Linux, Windows and/or UNIX administrative knowledge for troubleshooting). Experience with trend analysis and creating dashboards using data scripting to provide metrics on the performance Experience with Linux, Windows and Unix. Experience with PowerShell and Python. Experience with log parsing using grep, sed or AWK. Overview: Supports vulnerability management scanning and reporting tools (requires strong Linux, Windows and/or UNIX administrative knowledge for troubleshooting). Automates processes with scripting such as bash, PowerShell, and Python. Parses logs in an automated fashion using Grep, AWK, Sed, etc. Creates integration of vulnerability management data with other State of Michigan enterprise services. Conducts data analysis of vulnerability management data, often integrated with other data sources, to measure effectiveness of vulnerability remediation. Data analysis tasks include large datasets, which include structured, semi-structured, and unstructured data. Interfaces with other agencies to make recommendations on how to improve the security posture and reduce the number of security related vulnerabilities. Conducts trend analysis, creates dashboards using data scripting to provide metrics on the performance of security responsibilities, controls, and creates new reports based on those collected metrics across multiple agencies. Plans, schedules, implements, and maintains scalable vulnerability scans using modern vulnerability management scanning tools for high complexity devices. While ensuring safe and timely scanning that has minimal/no impact on scan targets and provides troubleshooting of technical issues with scans. Conducts internal vulnerability audits of servers, network devices, applications, and other devices. Reviews and validates security procedures to ensure adequate security procedures have been developed to identify and classify cyber events. Thanks & Regards Tushar Chauhan [email protected] +1 (248)301-2788 Keywords: information technology Michigan Urgent Requirement :: IT Security Analyst 3 - Vulnerability Management :: Hybrid(Dimondale, MI) [email protected] |
[email protected] View all |
Mon Aug 26 22:47:00 UTC 2024 |