Cyber Security Analyst- Onsite Austin, TX(TX locals only) at Austin, Texas, USA |
Email: [email protected] |
From: Arpitha S, Stellar IT Solutions [email protected] Reply to: [email protected] Cyber Security Analyst Onsite Austin, TX(TX locals only) ***Onsite*** Required to be local to Austin, TX Job Description: A network security analyst ensures that information systems and computer networks are secure. This includes protecting the company against hackers and cyber-attacks, as well as monitoring network traffic and server logs for activity that seems unusual. Additionally, these analysts are responsible for finding vulnerabilities in the computer networks and creating recommendations for how to minimize these vulnerabilities. The network security analyst investigates security breaches, develops strategies for any security issues that arise, and utilizes the help of firewalls and antivirus software to maintain security Responsible for finding vulnerabilities in the computer networks and creating recommendations for how to minimize these vulnerabilities. Knowledge and experience with Tenable/Nessus vulnerability scanning. Participate in incident response activities and 24/7 on-call rotation as needed. Candidate Skills & Qualifications: Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. Years Required/Preferred Experience 10+ Required Knowledge of computer networking concepts and protocols, and network security methodologies. 2 Required Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). 2 Required Knowledge of cyber threats and vulnerabilities. 2 Required Knowledge of host/network access control mechanisms (e.g., access control list, capabilities list). 2 Required Knowledge of systems diagnostic tools and fault identification techniques. 2 Required Knowledge of system administration, network, and operating system hardening techniques. 2 Required Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). 2 Required Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. 2 Required Knowledge of penetration testing principles, tools, and techniques. 2 Required Knowledge of an organizations threat environment. 2 Required Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems. 2 Required Skill in detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort). 2 Required Skill in the use of penetration testing tools and techniques. 2 Required Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, Nmap, etc.). 2 Required Skill in conducting application vulnerability assessments. 2 Required Conduct and/or support authorized penetration testing on enterprise network assets. 2 Required Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions. 2 Required Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas. 3 Preferred Tenable/Nessus administration, operation and vulnerability management. Regards, Arpitha S Technical Recruiter Email: [email protected] Rockville, MD | McLean, VA | Palo Alto, CA StellarIT.com | StellariDeaLabs.com Keywords: information technology California Maryland Texas Virginia |
[email protected] View all |
Mon Sep 18 23:17:00 UTC 2023 |