Cyber Security - IT Security Analyst 3: Hybrid:12Month:Skype at Remote, Remote, USA |
Email: [email protected] |
From: Kanchan Sharma, Tek Inspirations LLC [email protected] Reply to: [email protected] Hello, Hope you are doing well, Please check the below job description and let me know if you have any suitable candidate for the same: Job Description - Role-: Cyber Security - IT Security Analyst 3 - Vulnerability Management Team - Interview Process: Onsite interviews to be held at the Dimondale office. (NO virtual interviews will be requested) Candidates submitted must be willing to attend a face-to-face interview. - Remote or On-site: Candidates must be currently local within a commutable distance, no more than 1-1.5 hours. Manager is not interested in candidates who would need to relocate to accept the role. Position will be hybrid, in office 2 days a week upon start. - Hiring manager has asked that candidate's resumes be kept to under 4 pages long Duration: 1 year with possible extension in Dimondale, MI. Overview/Job Description: Supports vulnerability management scanning and reporting tools (requires strong Linux, Windows and/or UNIX administrative knowledge for troubleshooting). Automates processes with scripting such as bash, PowerShell, and Python. Parses logs in an automated fashion using Grep, AWK, Sed, etc. Creates integration of vulnerability management data with other State of Michigan enterprise services. Conducts data analysis of vulnerability management data, often integrated with other data sources, to measure effectiveness of vulnerability remediation. Data analysis tasks include large datasets, which include structured, semi-structured, and unstructured data. Interfaces with other agencies to make recommendations on how to improve the security posture and reduce the number of security related vulnerabilities. Conducts trend analysis, creates dashboards using data scripting to provide metrics on the performance of security responsibilities, controls, and creates new reports based on those collected metrics across multiple agencies. Plans, schedules, implements, and maintains scalable vulnerability scans using modern vulnerability management scanning tools for high complexity devices. While ensuring safe and timely scanning that has minimal/no impact on scan targets and provides troubleshooting of technical issues with scans. Conducts internal vulnerability audits of servers, network devices, applications, and other devices. Reviews and validates security procedures to ensure adequate security procedures have been developed to identify and classify cyber events. Required Skills: Top Skills & Years of Experience: - 5+ Years' IT Security Experience - Experience with vulnerability management scanning and reporting tools (requires strong Linux, Windows and/or UNIX administrative knowledge for troubleshooting). - Experience with trend analysis and creating dashboards using data scripting to provide metrics on the performance. - Experience with Linux, Windows and Unix. - Experience with PowerShell and Python. - Experience with log parsing using grep, sed or AWK. - Preferred experience with SQL ETL. Thanks & Regards, Kanchan Sharma IT Recruiter TEK Inspirations LLC 13573 Tabasco Cat Trail, Frisco, TX 75035 Cell- 469-430-1409 Email: [email protected] Keywords: information technology Michigan Texas Cyber Security - IT Security Analyst 3: Hybrid:12Month:Skype [email protected] |
[email protected] View all |
Tue Aug 27 01:31:00 UTC 2024 |