URGENT: Cybersecurity Analyst at Houston, Texas, USA |
Email: [email protected] |
From: Lovely Singh, Tek Inspiration [email protected] Reply to: [email protected] Hi, Hope you are doing great!!! Please share suitable profile Role: Cybersecurity Analyst Duration:6 Months Location: Houston, Tx-remote MOI:SKYP Description: This position supports the InformationRisk Strategy Management (IRSM) Vulnerability Management (VM) program reportingto the Vulnerability Management Team Lead. Responsibilities include managingthe vulnerability remediation process to ensure weaknesses identified throughvulnerability scanning and assessments / penetration tests along with anyemergency concerns are assigned to owners and tracked to resolution. Responsible for analyzing information/data collected from vulnerabilityassessments and scans; and in conjunction with the IRSM risk managers, helpsrecommend mitigations in the form of policies, standards, and controls as theyapply to the major risk domains. This person will also support projectinitiatives to assess vulnerability of Chevrons IT assets. In this role, you will have theopportunity to: Support project initiatives toassess vulnerabilities in Chevrons IT assets and perform validation testing ofremediated vulnerabilities from business vulnerability assessments, as needed. Gain foundational knowledge in cybersecurity and apply that knowledge towardremediation initiatives. Build foundational skills in cybersecurity toolsets including infrastructureand application scanning, phishing campaigns, cloud access security broker, andother cross functional security tools. Engage leaders across the enterprise to share results and gain commitment. This role can be located in either Houston, remote, or hybrid. Candidates do not have to be in Houston, but are preferred to be inHouston, however. Bachelors degree in InformationTechnology (IT), Computer Science, Engineering or equivalent experience. Strong desire to grow capability to effectively analyze the results ofvulnerability scans and assessment results. Experience will include interpreting results and providing remediationguidance. The ideal candidate should have a fundamental understanding of the currenttactics, techniques, and procedures relating to cybersecurity. Technical - Demonstrated ability in vulnerabilitymanagement or related field such as penetration testing, SOC, or threatintelligence. -Understanding of attacker mindset,exploitation, and how vulnerabilities are leveraged. - Knowledge of Cybersecurity principles andvarious information security technologies (i.e., IDS/IPS, HIPS, DLP, firewalls,network engineering, database, etc.). - In-depth experience with cybersecurityconcepts, vulnerability scanning tools, and other security techniques such asactive/passive reconnaissance, vulnerability identification, exploitation,phishing, social engineering, and command and control techniques. - Broad understanding in one of the followinginformation technology areas used to support and manage the business (i.e.,web, networking, database, cloud, telephony, mobile, applications, etc.). Domain Knowledge - Must understand IT systems (Operating Systems,databases, and applications). - Experience in one of the following areas: asystem administrator, application developer, programmer familiarity with MSWindows or UNIX/Linux operating systems. - Strong desire to learn new tools andtechnologies highly motivated to apply that knowledge toward understanding andcommunicating the sources of vulnerabilities. Communication - Candidates should demonstrate strong verbal,written and presentation skills, as well as an ability to communicate technicalinformation to different audiences (management, non-technical, ITProfessionals, PCN Professionals). Able to engage and interview stakeholdersrequesting vulnerability management services to capture key information neededto effectively understand, clearly articulate, and document remediation plans. ***Responsibilities include managing thevulnerability remediation process to ensure weaknesses identified throughvulnerability scanning and assessments / penetration tests along with anyemergency concerns are assigned to owners and tracked to resolution. Responsible for analyzing information/datacollected from vulnerability assessments and scans; and in conjunction with theIRSM risk managers, helps recommend mitigations in the form of policies,standards, and controls as they apply to the major risk domains. This personwill also support project initiatives to assess vulnerability of Chevrons ITassets. REGARD Lovely Singh Keywords: information technology Texas |
[email protected] View all |
Tue Jan 24 21:26:00 UTC 2023 |