Information Security Analyst Specialist on W2 need10+yrs at Remote, Remote, USA |
Email: [email protected] |
From: Austin varma, Eminencets [email protected] Reply to: [email protected] Information Security Analyst Specialist - Remote role Must Haves: 7+ years of experience with Database Security, Scripting Automation, Information Security, Endpoint Security Looking for experience with IBM Guardian (Database Security Monitoring) OR Tripwire File Integrity Monitoring OR Imperva Database Activity Monitoring Emphasis is on Automation using Python, Database Deployment Automation, Server Build using Python Database security, Database Protection and Database Activity Monitoring experience required Possible to extension but no plan for conversion More focus on endpoint security Position Overview: Seeking an Information Security Analyst Specialist to join the Endpoint Security team! The engineer is responsible for providing engineering and operations in support of multiple endpoint security technologies, with an emphasis on Guardium Data Protection, and Tripwire File Integrity Monitoring. The engineer will have the opportunity to become a member of a team managing several pioneering technologies. Security Administration and Operations: Automation of existing operational task as it relates to Database Activity Monitoring and File Integrity Monitoring Install, configure, and troubleshoot Data Protection and Database Activity Monitoring Agents, and other agent-based applications running on Databases, Windows desktops, Windows Servers, Unix Servers, EC2 and at the containers level. Apply patches and upgrades to clients, appliances, and utilities on a regular basis. Perform daily monitoring for integrity and availability of appliances, management of servers, systems and processes which may also include reviewing system and application logs, error messages and verifying services or jobs are running as expected. Establish and maintain operational, configuration and other process/procedures to ensure efficiency of new and existing detective and preventative configuration policies. Provide support to Risk management and IT Security Audit teams assisting in answers, solutions and problem solving. answers, artifacts, and solutions. Provide support to the Cyber Security Operations Center and Threat Detection Teams with recommendations and handling of their requests for changes, updates and improvements of endpoint polices. Coordinate with other infrastructure, engineering, and application project/support teams to ensure new policies/assets are deployed and issues impacting tools and systems are resolved quickly and effectively without adversely impacting the affected business systems. Augment production support team to ensure 24/7 coverage and operations. Responsibilities sometimes require working evenings and weekends, sometimes with little or no advanced notice. Participate in on-call rotation. Coordinate with Information Security team to ensure solution assurance and compliance to security policy, procedures, standards, and baseline security configurations. Understand and advocate IT Security standards, reference architectures. Demonstrate an understanding of malware, threats, vulnerabilities, and the complete affect these could have in the environment. Communicate optimally with clients to identify needs and evaluate alternative technical solutions and strategies. Qualifications: 5-7 years of relevant experience in IT Security Extensive Python scripting and automation experience required. Experience with IBM Guardium Database Activity Monitoring or similar tools that focus on Database Security Experience with Tripwire File Integrity Monitoring, or similar tools that performs FIM Knowledge of various Database Flavors including DB2, Sybase, Oracle, MSSQL and MongoDB Familiar with industry security regulations and frameworks (MITRE Attack Framework, NIST, CIS CSC, etc.) Familiar with change management processes and activities and change review board routines. 3-5 years of demonstrated ability in administration of security technologies. An understanding of Endpoint Protection, File Integrity Monitoring, Data Loss Prevention, Security Configuration Management, Database Activity Monitoring, Data Masking, Malware Isolation, SaaS security solutions and cloud client security. Working knowledge of network ports, protocols, and firewalls An understanding of HIPS clients and firewall rules and settings. Working knowledge of cloud security for AWS, GCP and Azure. Needs to be organized and have the capability to multitask by working multiple problems, tasks and still seeing tasks through to closure working with all type of endpoint technologies. Must have experience working on physical and virtual appliances. Configurations, Windows, Linux, and Network command line. Keys to Success in this Role: Must be able to effectively perform both independently and cross-functionally as a strong team contributor. Can work to help model and mentor other team members. Keywords: information technology |
[email protected] View all |
Tue Oct 24 00:52:00 UTC 2023 |