Remote (Wisconsin Local Needed) Security Analyst NO H1B NO CPT at Remote, Remote, USA |
Email: [email protected] |
From: Ankit Upadhyay, Pivotal Technologies [email protected] Reply to: [email protected] Security Analyst IV Client WDETF Location Remote (Must live in Wisconsin) Duration Contract (6/30/2024 with possible extensions) Status NO CPT, H1 Pay - $50 CTC Top Skills & Years of Experience: IT Security 5 years IT Professional 8 years Project leadership experience 4 years Experience evaluating and implementing vendor security offerings 4 years Strong attention to detail Excellent communication skills (written and verbal) Position Information: Under the general guidance of the Chief Information Security Officer (CISO) and in cooperation with the Security Technical Team Lead, this position is responsible for providing advanced security analysis to manage the design, implementation, and monitoring of security for ETFs computer platforms and systems, both at ETF and hosted by DET. The computer platforms include network, server/storage/backup, application platform (mainframe, client/server, web) and application architectures. This position specializes in information and network security. It analyzes security risks and plans controls, develops policies and procedures to implement security practices, and coordinates implementation of security controls. This position may lead projects to implement new security controls. This position will also have daily, weekly, and monthly duties operating security control systems in place at ETF. It will monitor compliance with security policies and procedures. Required Skills: IT Security 5+ years IT Professional 8+ years Project leadership experience 4+ years Experience evaluating and implementing vendor security offerings 4+ years Strong attention to detail Excellent communication skills (written and verbal) Preferred: CISSP or equivalent 1 year Regular duties may include the following representative tasks: Research vendor offerings and conduct POCs. Coordinate with other teams to implement new technologies and remediate issues. Monitor asset inventory, installed agents, and status of devices. Review vulnerability dashboards and organizational impact of changing threat landscape. Monitor data inventories, policy violations. Produce reports and metrics. Monitor and process incident response queues. Monitor SIEM logs and investigate incidents. Monitor content filter dashboards and investigate anomalies as appropriate. Manage endpoint firewall operation and adjust as necessary. Work independently as well as within a team environment Thanks & Regards, Ankit Upadhyay IT Recruiter Office: +1 ( 703) 570-8775 (Ext-217) Email- [email protected] Keywords: information technology |
[email protected] View all |
Mon Jul 17 20:40:00 UTC 2023 |