SECURITY ANALYST ||Onsite||6+ months at Remote, Remote, USA |
Email: [email protected] |
From: Shiva Chauhan, TEK Inspirations LLC [email protected] Reply to: [email protected] Hello, Hope you are doing well, Please check the below job description and let me know if you have any suitable candidate for the same: SECURITY ANALYST Location: Onsite: BOCA RATON, FLORIDA Duration: 6+ months Need local to Florida candidates Only PLEASE PROVIDE THE FOLLOWING: Full Education Details with Active LinkedIn Resume Self Certification Form: Requirements A four-year college degree or equivalent industry training and certifications. Three to five years of experience in a security analyst or related position. Technical knowledge of enterprise-class technologies such as firewalls, routers, switches, wireless access points, VPNs, and desktop and server operating systems. Thorough understanding of Microsofts enterprise technology platform, including Azure, Active Directory, SQL, and the Windows server and desktop operating systems. Thorough understanding of Redhat and Oracle database operating systems. Working experience with the following technology vendors and products: Splunk, Tripwire, Rapid7 Nexpose Vulnerability Scanner, Metasploit, Qualys Vulnerability Scanner (Cloud), Delinea Secret Server, Carbon Black Application Protection, Veracode SAST & DAST Technologies. Strong writing skills, as well as the ability to articulate security-related concepts to a broad range of technical and non-technical staff. Demonstrated experience implementing and/or enforcing security and compliance frameworks such as NIST, PCI DSS, and ISO. Ability to demonstrate self-sufficient working capacity and proficient problem-solving skills. Responsibilities Proactively monitor the environment to detect and implement steps to mitigate cyber-attacks before they occur. Provide technical expertise regarding security-related concepts to operational teams within the department and the business. Review, investigate, and respond to real-time alerts within the environment. Review real-time and historical reports for security and/or compliance violations. Monitor online security-related resources for new and emerging cyber threats. Assesses new security technologies to determine potential value for the enterprise. Conducts vulnerability assessments of department systems and networks. Manage systems owned by the Security Risk and Compliance Office (SRCO) Liaise with the departments trusted security manage services, infrastructure technical resources, and 3rd party business vendors. Thanks & Regards, Shiva Chauhan IT Recruiter TEK Inspirations LLC : 13573 Tabasco Cat Trail, Frisco, TX 75035 Email: [email protected] Keywords: information technology Texas |
[email protected] View all |
Wed Oct 04 19:28:00 UTC 2023 |