Home

Urgent Requirement :: IT Security Analyst 3 - Vulnerability Management :: Hybrid(Dimondale, MI) at Remote, Remote, USA
Email: [email protected]
From:

Tushar Chauhan,

CCIT

[email protected]

Reply to:   [email protected]

Hello,

Please find the job description of IT Security Analyst 3 - Vulnerability Management.

Job Title: IT Security Analyst 3 - Vulnerability Management 

Location: Hybrid (Dimondale, MI) (Candidate must be local)

Duration: 1 year with possible extension

Job Description:

Top Skills & Years of Experience:

5+ Years' IT Security Experience

Experience with vulnerability management scanning and reporting tools (requires strong Linux, Windows and/or UNIX administrative knowledge for troubleshooting).

Experience with trend analysis and creating dashboards using data scripting to provide metrics on the performance

Experience with Linux, Windows and Unix.

Experience with PowerShell and Python.

Experience with log parsing using grep, sed or AWK.

Overview:

Supports vulnerability management scanning and reporting tools (requires strong Linux,

Windows and/or UNIX administrative knowledge for troubleshooting).

Automates processes with scripting such as bash, PowerShell, and Python.

Parses logs in an automated fashion using Grep, AWK, Sed, etc.

Creates integration of vulnerability management data with other State of Michigan enterprise services.

Conducts data analysis of vulnerability management data, often integrated with other data

sources, to measure effectiveness of vulnerability remediation.  Data analysis tasks include

large datasets, which include structured, semi-structured, and unstructured data.

Interfaces with other agencies to make recommendations on how to improve the security

posture and reduce the number of security related vulnerabilities.

Conducts trend analysis, creates dashboards using data scripting to provide metrics on the

performance of security responsibilities, controls, and creates new reports based on those

collected metrics across multiple agencies.

Plans, schedules, implements, and maintains scalable vulnerability scans using modern

vulnerability management scanning tools for high complexity devices.

While ensuring safe and timely scanning that has minimal/no impact on scan targets and

provides troubleshooting of technical issues with scans.

Conducts internal vulnerability audits of servers, network devices, applications, and other

devices.

Reviews and validates security procedures to ensure adequate security procedures have been developed to identify and classify cyber events.

Thanks & Regards

Tushar Chauhan

[email protected]

+1 (248)301-2788

Keywords: information technology Michigan
Urgent Requirement :: IT Security Analyst 3 - Vulnerability Management :: Hybrid(Dimondale, MI)
[email protected]
[email protected]
View all
Mon Aug 26 22:47:00 UTC 2024

To remove this job post send "job_kill 1694000" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 1

Location: ,