Endpoint Security Analyst

Temporary

Title : Endpoint Security Analyst

Location : Tallahassee, FL - Hybrid

Duration : 1 year contract

Compensation : $50-55 / hr

Job Description :

The Endpoint Security Analyst develops, evaluates and manages systems security across the enterprise. Areas of concentration include account management, password auditing, network based and Web application-based vulnerability scanning, virus management and intrusion detection.

Requires technical expertise in systems administration and security tools, combined with the knowledge of security practices and procedures.

Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines).

Prepares status reports on security matters to develop security risk analysis scenarios and response procedures.

Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls.

Involved in the evaluation of products and / or procedures to enhance productivity and effectiveness. Provides direct support to the business and IT staff for systems security related issues.

Educates users on systems security standards and procedures. Must have broad technical knowledge of network operating systems (e.g., UNIX, NT).

Education :

Bachelor's Degree in Computer Science, Information Systems, Business Administration, Information Security, or another related field;

or equivalent work experience.

Experience :

Four years of experience in the work related to the position is required.

Primary Job Duties / Tasks :

Serve as a member of the Computer Security Incident Response Team. Duties includes researching incidents, identifying corrective actions, documenting status and coordinating responses to Computer Security Incidents.

Responsible for the tracking and monitoring of endpoint software viruses. Enforces endpoint security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security breaches, exceptions, updates, and maintains and documents security controls.

Work in conjunction with the department's Patch Management and Configuration Team in identifying secure configurations for standard products.

Provide support / information as needed for implementation of secure baselines through package roll out and / or group policy.

After implementation of secure baselines, use tools to review and ensure compliance with established baselines.

Responsible for the administration and maintenance of endpoint vulnerability products, endpoint vulnerability risk reporting, and routine endpoint vulnerability scanning,

Job Specific Knowledge, Skills, and Abilities ( KSAs ) :

The submitted candidate must be able to apply common knowledge, skills, and abilities in the following areas :

1. Knowledge in the use of appropriate security controls to protect the confidentiality, integrity and availability of information technology resources.

2. Knowledge of, and experience with, various computing technologies such as, but not limited to : Windows, Windows Server, Transmission Control Protocol / Internet Protocol (TCP / IP)

3. Knowledge of vulnerability management tools.

4. Knowledge in the use of information security practices and standards such as NIST , CIS Critical Security Controls and the Florida Cybersecurity Standards (74-2 Florida Administrative 60GG-2).

Ability to review, assess and document compliance with standards.

5. Knowledge of Microsoft Systems Center Configuration Manager (SCCM) and other Microsoft support tools / technologies such as Group Policy and PowerShell.

6. Knowledge of the application of operating system security settings through direct manipulation of the registry.

7. Knowledge of Security Information and Event Management (SEIM) tools. Ability to utilize, configure and manage SPLUNK preferred but not required.

8. Skills in applying, analyzing and assessing information systems and security controls.

9. Skilled in the detection of software and hardware security problems.

10. Ability to analyze complex technical architecture for security issues.

11. Ability to be self-motivated, detail-oriented with excellent follow through.

12. Ability to assess and analyze risk and provide recommendations to successfully manage risk.

13. Ability to author documented analysis of systems to verify compliance with security controls.

14. Ability to effectively communicate orally and in writing to a variety of audiences. This includes the ability to communicate professionally with management, to communicate technical issues and concepts to non-technical staff, and to effectively explain security concepts and their benefit.

15. Ability to solve problems independently and with teams and exhibit sound judgement and decision-making skills.

16. Knowledge of Malwarebytes, Windows Defender, and other vulnerability scanning tools.

General Knowledge Skills and Abilities ( KSAs ) :

The submitted candidate must be able to apply common knowledge, skills, and abilities in the following areas :

1. Initiative : Must be able to comprehend assignments, organize workload, and meet deadlines with little direction. Must be able to monitor and analyze situations to determine the next step.

2. Communication : Can clearly convey information, in both written and verbal formats, to individuals or groups in a wide variety of settings (i.

e., project team meetings, management presentations, etc.). Must have the ability to effectively listen and process information provided by others.

3. Customer Service : Works well with clients and customers (i.e., business office, public, or other agencies). Able to assess the needs of the customer, provide information or assistance to satisfy expectations or resolve a problem.

4. Decision Making : Makes sound, well-informed, and objective decisions utilizing critical thinking skills and analysis.

5. Flexibility : is open to change, new processes (or process improvement), and new information. Can adapt in response to new information, changing conditions, or unexpected obstacles.

Ability to receive and give constructive criticism and maintain effective work relationships with others.

6. Interpersonal : Shows friendliness, courtesy, understanding, and politeness to others

7. Leadership : Motivates, encourages, and challenges others. Can adapt leadership styles in a variety of situations.

8. Problem Solving : Able to identify, evaluate, and use sound judgement to generate and evaluate alternative actions, and make recommendations as accordingly.

9. Team Building : Encourages, inspires, and guides others toward accomplishing the common goal as an equal member of the team.

10. Quality Assurance : Knowledge of the ideologies, techniques and tools for quality assurance and control. The ability to put the ideologies, techniques, and tools into practice.

Our benefits package includes :

Comprehensive medical benefits

Competitive pay, 401(k)

Retirement plan

and much more!

About INSPYR Solutions :

As a leading information technology partner, we connect top IT talent with our clients to provide innovative business solutions through our IT Staffing, Professional Services, and Infrastructure Solutions divisions.

We understand and value the unique needs of highly-skilled information technology professionals in the industry and always strive to stay above the curve.

Our company was founded on the following core values : Be the Best, Understand the Urgency, Never Ever Give Up, Have the Courage to Excel, and Make a Contribution.

We take pride in our business model and strive to create a positive workplace environment through an exemplary culture.

INSPYR Solutions provides Equal Employment Opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability, or genetics.

In addition to federal law requirements, INSPYR complies with applicable state and local laws governing nondiscrimination in employment in every location in which the company has facilities.

Apply Now

Related Jobs

Endpoint Security Analyst

INSPYR Solutions Tallahassee, FL
APPLY

Title : Endpoint Security Analyst

Location : Tallahassee, FL - Hybrid

Duration : 1 year contract

Compensation : $50-55 / hr

Job Description :

The Endpoint Security Analyst develops, evaluates and manages systems security across the enterprise. Areas of concentration include account management, password auditing, network based and Web application-based vulnerability scanning, virus management and intrusion detection.

Requires technical expertise in systems administration and security tools, combined with the knowledge of security practices and procedures.

Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines).

Prepares status reports on security matters to develop security risk analysis scenarios and response procedures.

Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls.

Involved in the evaluation of products and / or procedures to enhance productivity and effectiveness. Provides direct support to the business and IT staff for systems security related issues.

Educates users on systems security standards and procedures. Must have broad technical knowledge of network operating systems (e.g., UNIX, NT).

Education :

Bachelor's Degree in Computer Science, Information Systems, Business Administration, Information Security, or another related field;

or equivalent work experience.

Experience :

Four years of experience in the work related to the position is required.

Primary Job Duties / Tasks :

Serve as a member of the Computer Security Incident Response Team. Duties includes researching incidents, identifying corrective actions, documenting status and coordinating responses to Computer Security Incidents.

Responsible for the tracking and monitoring of endpoint software viruses. Enforces endpoint security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security breaches, exceptions, updates, and maintains and documents security controls.

Work in conjunction with the department's Patch Management and Configuration Team in identifying secure configurations for standard products.

Provide support / information as needed for implementation of secure baselines through package roll out and / or group policy.

After implementation of secure baselines, use tools to review and ensure compliance with established baselines.

Responsible for the administration and maintenance of endpoint vulnerability products, endpoint vulnerability risk reporting, and routine endpoint vulnerability scanning,

Job Specific Knowledge, Skills, and Abilities ( KSAs ) :

The submitted candidate must be able to apply common knowledge, skills, and abilities in the following areas :

1. Knowledge in the use of appropriate security controls to protect the confidentiality, integrity and availability of information technology resources.

2. Knowledge of, and experience with, various computing technologies such as, but not limited to : Windows, Windows Server, Transmission Control Protocol / Internet Protocol (TCP / IP)

3. Knowledge of vulnerability management tools.

4. Knowledge in the use of information security practices and standards such as NIST , CIS Critical Security Controls and the Florida Cybersecurity Standards (74-2 Florida Administrative 60GG-2).

Ability to review, assess and document compliance with standards.

5. Knowledge of Microsoft Systems Center Configuration Manager (SCCM) and other Microsoft support tools / technologies such as Group Policy and PowerShell.

6. Knowledge of the application of operating system security settings through direct manipulation of the registry.

7. Knowledge of Security Information and Event Management (SEIM) tools. Ability to utilize, configure and manage SPLUNK preferred but not required.

8. Skills in applying, analyzing and assessing information systems and security controls.

9. Skilled in the detection of software and hardware security problems.

10. Ability to analyze complex technical architecture for security issues.

11. Ability to be self-motivated, detail-oriented with excellent follow through.

12. Ability to assess and analyze risk and provide recommendations to successfully manage risk.

13. Ability to author documented analysis of systems to verify compliance with security controls.

14. Ability to effectively communicate orally and in writing to a variety of audiences. This includes the ability to communicate professionally with management, to communicate technical issues and concepts to non-technical staff, and to effectively explain security concepts and their benefit.

15. Ability to solve problems independently and with teams and exhibit sound judgement and decision-making skills.

16. Knowledge of Malwarebytes, Windows Defender, and other vulnerability scanning tools.

General Knowledge Skills and Abilities ( KSAs ) :

The submitted candidate must be able to apply common knowledge, skills, and abilities in the following areas :

1. Initiative : Must be able to comprehend assignments, organize workload, and meet deadlines with little direction. Must be able to monitor and analyze situations to determine the next step.

2. Communication : Can clearly convey information, in both written and verbal formats, to individuals or groups in a wide variety of settings (i.

e., project team meetings, management presentations, etc.). Must have the ability to effectively listen and process information provided by others.

3. Customer Service : Works well with clients and customers (i.e., business office, public, or other agencies). Able to assess the needs of the customer, provide information or assistance to satisfy expectations or resolve a problem.

4. Decision Making : Makes sound, well-informed, and objective decisions utilizing critical thinking skills and analysis.

5. Flexibility : is open to change, new processes (or process improvement), and new information. Can adapt in response to new information, changing conditions, or unexpected obstacles.

Ability to receive and give constructive criticism and maintain effective work relationships with others.

6. Interpersonal : Shows friendliness, courtesy, understanding, and politeness to others

7. Leadership : Motivates, encourages, and challenges others. Can adapt leadership styles in a variety of situations.

8. Problem Solving : Able to identify, evaluate, and use sound judgement to generate and evaluate alternative actions, and make recommendations as accordingly.

9. Team Building : Encourages, inspires, and guides others toward accomplishing the common goal as an equal member of the team.

10. Quality Assurance : Knowledge of the ideologies, techniques and tools for quality assurance and control. The ability to put the ideologies, techniques, and tools into practice.

Our benefits package includes :

Comprehensive medical benefits

Competitive pay, 401(k)

Retirement plan

and much more!

About INSPYR Solutions :

As a leading information technology partner, we connect top IT talent with our clients to provide innovative business solutions through our IT Staffing, Professional Services, and Infrastructure Solutions divisions.

We understand and value the unique needs of highly-skilled information technology professionals in the industry and always strive to stay above the curve.

Our company was founded on the following core values : Be the Best, Understand the Urgency, Never Ever Give Up, Have the Courage to Excel, and Make a Contribution.

We take pride in our business model and strive to create a positive workplace environment through an exemplary culture.

INSPYR Solutions provides Equal Employment Opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability, or genetics.

In addition to federal law requirements, INSPYR complies with applicable state and local laws governing nondiscrimination in employment in every location in which the company has facilities.

Temporary
APPLY

System Security Specialist

Visium Resources, Inc. Tallahassee, FL
APPLY

IntroductionVisium Resources has been asked to identify qualified candidates for this System Security Specialist position located in Tallahassee, FL.

This position is a contract hire opportunity which is expected to be either onsite or remote (which will be at the discretion of the supervisor) for a duration of one year with a strong possibility of a contract extension.

SummaryThe selected System Security Specialist will support the development, implementation and life-cycle management of new and existing enterprise technologies required to support the IT Security Administration Team.

Job Description : Technical Analyst for IT Security Continual Service Improvement : Perform activities within the Plan, Do, Check, Act lifecycle related to the effectiveness of security controls.

Service Reviews : maintain inventories of services and infrastructure utilized by the Security Administration Team and review their applicability to accomplishing team goals.

Process Evaluations : in coordination with the IT risk management process, evaluate the effectiveness of services by identifying and analyzing metrics and benchmarks in the interest of the Security Administration Team.

Initiatives : define initiatives to improve services and processes based on reviews and evaluations.Monitoring : track initiative effectiveness and assist in troubleshooting and refining changes to security operations.

Security Analyst for Security Administration Team : Analyze large amounts of data to identify patterns and potential risks.

Use data to make informed decisions and develop mitigation strategies.Perform information security and privacy incident response.

Communicate complex technical information to technical and non-technical stakeholders while demonstrating strong written and verbal communication skills.

Provide technical expertise to users, management, vendors, and peers for issues involving other department business offices and vendors.

Support and drive continuous service improvement efforts within the risk management process.Qualified candidates would have the following : 6 years of combined IT and security work experience with infrastructure / network and multi-platform environments including on-premises and cloud environments across IaaS, PaaS, SaaS, VM, bare metal, and other common IT platforms.

4 years of experience in operations and maintenance of endpoint-related security products (AV, EDR, XDR, drive encryption).

2 years of experience in operations and maintenance of Azure Active Directory security (events, incidents, login events, MFA).

2 years of experience in operations and maintenance of Office 365 Security and Compliance (one or all of Exchange online, SharePoint, Teams, OneDrive, Purview).

2 years of experience working in IT security identifying and assessing risks, developing risk management strategies, and implementing risk mitigation measures.

2 years of experience working in IT security operations in all stages of the Identify, Protect, Detect, Respond, and Recover lifecycle.

2 years of experience analyzing and investigating security alerts, events, and logs from various security tools and systems to determine the cause and extent of security breaches.

2 years of experience designing, implementing, and maintaining management systems to track progress of complex IT projects at an enterprise scale, to completion.

2 years of experience working with automated IT performance reporting (any tools).2 years of experience applying outcomes of incident analysis, risk management, and performance reporting to enable Continual Service Improvement (CSI).

Visium Resources is an award-winning employment firm with a mission to match talented individuals with highly successful organizations.

At Visium, our company"s success is based on your success. When you work with us, you are never 'just a number'. You are our most important asset.

Here, you will know us by name through our regular visits to client sites and even occasional luncheons. We will always be there when you need assistance and will always go the extra mile to ensure that you are as successful as possible.

Whether you're looking for contract, contract-to-hire or permanent opportunities, we firmly believe there is no employment agency that will work harder for you than Visium.

Visium Resources is an equal opportunity employer and values diversity. All employment is decided based on qualifications, merit and business need.

Permanent
APPLY

Okta Security Analyst

Gravity IT Resourcing Tallahassee, FL
APPLY

Apply Now

Job Title : Okta Security Analyst

Location : Remote

Job Type : Contract

Referral Fee :

Salary Range : 115-145k

Employment Eligibility : Gravity cannot transfer nor sponsor a work visa for this position. Applicants must be eligible to work in the U.S. for any employer directly

Position Overview

Our client is seeking a skilled Okta IAM Security Analyst / Specialist to join their team. This person will have Expertise in OKTA, Access Gateway, Single Sign-On, Adaptive MFA, Universal directory, Advanced Server Access, API Access Management, Secure authentication, access management systems, Identity as a Service (IDaaS), WS-Federation, OAuth, OpenID Connect and Life Cycle Management to support design, implementation and support for end to end deployment.

Duties and Responsibilities

  • Expertise in OKTA, Access Gateway, Single Sign-On, Adaptive MFA, Universal directory, Advanced Server Access, API Access Management, Secure authentication, access management systems, Identity as a Service (IDaaS), WS-Federation, OAuth, OpenID Connect and Life Cycle Management.
  • Extensive and demonstrated experience in end-to-end deployment of OKTA solution.
  • Experience with OKTA planning, implementation, and operations.
  • Experience in integrating Okta with on-premises directory and Cloud.
  • Analyze, design, develop, implement, and support Okta integrations for various business functions.
  • Configure Okta to provide enterprise Single Sign-On services and enable Multi-Factor Authentication (MFA) platform features for internal and external applications.
  • Identify required attributes, customizing login pages and implement security policies.
  • Follow SDLC (Agile), change management and document the procedures on OKTA solutions to meet compliance requirements.
  • Assist application teams through the SDLC process (including requirements gathering, configuration, testing to integrate applications with Okta).
  • Contribute to support repeatable processes for Access Management using Okta.
  • Understanding of cloud computing architecture, technical design and implementations, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) delivery models.
  • Experience in various authentication standards such as Security Assertion Markup Language (SAML), OAuth and OpenID Connect.
  • Experience with various LDAP products including AD.
  • Managing cloud identity profiles.
  • Mentoring and training others in the use and functionality of the Okta SaaS products including MFA and ensuring analysis, design, implementation, and support artifacts meet or exceed established Service Level objectives
  • Anticipate, identify, track and resolve technical issues

Required Experience and Skills

  • Bachelor’s degree in Business Administration, Computer Science, Engineering, MBA or related field preferred
  • 5 + years in experience in Okta Identity Access Management
  • Experience in developing and supporting and administering Okta IAM
  • Experience in working with large IT teams to execute and lead successful project implementations
  • Ability to effectively prioritize and execute tasks in a fast paced, high velocity, environment; ability to stay focused on responsibilities, meet deadlines and manage competing priorities under pressure.
  • Ability to drive effective meetings : workshops, design, and problem-solving sessions. Ability to present ideas in business friendly and user-friendly language;

demonstrated aptitude for working with, supporting and communicating with

Apply Now

Temporary
APPLY

Physical Security Analyst

Acuren Tallahassee, FL
APPLY

Job Details

Description

GENERAL DESCRIPTION OF POSITION

The position of Physical Security Analyst reports to the Sr Physical Security Officer.This job is responsible for ensuring that company employees and customers have a safe and secure environment from which to work and transact business.

In doing so, the SAI will assist in overseeing security policies and procedures, monitor and respond to security incidents, as well as conduct security scans of company facilities (both in person and virtually) to ensure adherence to policies and procedures.

Additionally, the Physical Security Analyst is responsible for assisting in the assessment of risks and the offering solutions for mitigation.

ESSENTIAL DUTIES AND RESPONSIBILITIES

1. Conduct physical security and risk vulnerability inspections, evaluate and provide recommendations for mitigation.

2. Develop and implement physical security standards and procedures. This duty is performed as needed.

3. Evaluate existing security policies and procedures.

4. Assist in the development of security training for company personnel.

5. Recommend actions to avoid conditions conducive to threats such as vandalism, terrorism or theft.

6. Evaluate clearances for management and personnel according to the information and property they may access.

7. Review facilities designs and assist in designing the appropriate security measures for the property to include access, alarms, cameras, DVRs, etc.

8. Prepare reports related to security incidents, access,effectiveness of the security program, and risk assessments.

9. Serve as a conduit between retail staff and third party security providers.

10. Assist with developing a strategic framework to ensure security upgrades are completed timely and in order of risk posed to the company.

11. Conduct video reviews such as pulls for Law Enforcement , HRand Subpoenas and respond in a timely manner.

12.Completes required BSA / AML training and other compliance training as assigned.

13. The ability to work in a constant state of alertness and in a safe manner.

14. Perform any other related duties as required or assigned.

QUALIFICATIONS

To perform this job successfully, an individual must be able to perform each essential duty mentioned satisfactorily.The requirements listed below are representative of the knowledge, skill, and / or ability required.

EDUCATION AND EXPERIENCE

Knowledge of a specialized field (however acquired), such as basic accounting, computer, etc. Equivalent of four years in high school, plus night, trade extension, or correspondence school specialized training, equal to two years of college, plus 2 years related experience and / or training, and 1 to 6 months related management experience, or equivalent combination of education and experience.

COMMUNICATION SKILLS

Ability to effectively communicate information and respond to questions in person-to-person and small group situations with customers, clients, general public and other employees of the organization.

ability to write reports, business correspondence, and policy / procedure manuals; ability to effectively present information and respond to questions from groups of managers, clients, customers, and the general public.

MATHEMATICAL SKILLS

Ability to add, subtract, multiply, and divide in all units of measure, using whole numbers, common fractions, and decimals.

Ability to compute rate, ratio, and percent and to prepare and interpret bar graphs.

CRITICAL THINKING SKILLS

Ability to solve practical problems and deal with a variety of known variables in situations where only limited standardization exists.

Ability to interpret a variety of instructions furnished in written, oral, or diagram formats.

REQUIRED CERTIFICATES, LICENSES, REGISTRATIONS

Not indicated.

PREFERRED CERTIFICATES, LICENSES, REGISTRATIONS

CompTIA A+ Certification

CompTIA Security+ Certification

SOFTWARE SKILLS REQUIRED

Intermediate : 10-Key, Alphanumeric Data Entry, Contact Management, Presentation / PowerPoint, Spreadsheet, Word Processing / Typing

Basic : Accounting, Database

WORKING CONDITIONS

Periodically exposed to such elements as noise, intermittent standing, walking, pushing, carrying, or lifting; but none are present to the extent of being disagreeable.

ENVIRONMENTAL CONDITIONS

The following work environment characteristics described here are representative of those an employee encounters while performing essential functions of this job.

Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

The noise level in the work environment is usually moderate.

PHYSICAL ACTIVITIES

The following physical activities described here are representative of those that must be met by an employee to successfully perform the essential functions of this job.

Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions and expectations.

Semi-repetitive, low physical. Semi-repetitive type work which requires periods of concentration for varied time cycles as prescribed by the tasks.

While performing the functions of this job, the employee is regularly required to sit, use hands to finger, handle, or feel, talk or hear;

frequently required to reach with hands and arms; and occasionally required to stand, walk, climb or balance, stoop, kneel, crouch, or crawl.

The employee must occasionally lift and / or move up to 25 pounds. Specific vision abilities required by this job include close vision; and distance vision.

ADDITIONAL INFORMATION

General knowledge related to physical security, DVRs, and video surveillance preferred.

Knowledge and experience with Verint Systems' Ops-Center and Vid-Center preferred.

Knowledge and experience with Pacom Systems preferred.

1 year of experience in Retail Banking / Financial Services preferred

Full-time
APPLY

Security Analyst - Advanced

TECKpert Tallahassee, FL
APPLY

We are looking for an Security Analyst - Advanced to support our client based in Tallahassee, FL US BASED CANDIDATES ONLY.

This is an on-site position. Candidates must be located in Tallahassee, FL. Who we are Founded in 2009 and headquartered in beautiful Miami, FL, TECKpert is a tech consulting and staff augmentation firm.

At TECKpert, we offer a contingent workforce built for any size digital transformation project. Experts in design, development, IT, analytics and marketing, provide innovative digital solutions to achieve success in our new economy.

Our leaders identify the technical talent best suited to bolster our client’s capabilities, across all industries, including, healthcare, government, finance, legal, real estate, and startups.

The project TECKpert seeks to hire an Network Security Analyst - Advanced to support our client, a government agency based in Tallahassee, FL.

The contractor shall provide technical capability, knowledge, industry partnerships, experience, and expertise / proficiency required to design, code, modify, and support the Department’s information technology security solutions. Job duties shall include -

  • Monitoring the department’s IT systems and networks for security threats, vulnerabilities, and anomalies.
  • Responding to security incidents, containing incidents, and investigating root cause.
  • Identifying and remediating vulnerabilities, to include the implementation of scanning tools, disaster response plans, incident response plans, and firewalls and the conducting of penetration testing.
  • Designing and implementing security architecture that ensures confidentiality, integrity, and availability of the department’s data and applications.
  • Ensuring that the department complies with applicable regulatory requirements and industry standards.
  • Promoting security awareness with the department. Compensation and Term This opportunity is for a full-time, one year contract position with possible extensions and pay commensurate with experience up to $50 / hour or $104,000 per year.

Medical, dental, vision and life insurance available after 30 days of hire. Candidates are expected to work onsite at our client’s location.

Interview will be held either virtually or in person Qualifications you need A successful Network Security Analyst - Advanced candidate possesses or provides the following : Bachelor's degree in computer science, software engineering, or a related field

  • Four years of experience working in an IT security capacity
  • A current security certifications (e.g. CompTIA Security+, CISSP, CEH, GCIH, etc.)
  • A strong understanding of the latest security threats, vulnerabilities, and exploits
  • Knowledge of cybersecurity frameworks such as NIST, CIS, and ISO
  • Knowledge of cloud security
  • A demonstratable track record of incident response experience Additional Skills - 1. Technical Understanding
  • Network Security : A deep understanding of network security protocols, including TCP / IP, DNS, VPN, and SSL. The candidate should be able to monitor and secure network traffic, detect network-based attacks, and configure network security devices.
  • Operating Systems : The candidate should be proficient in Windows, Linux, and other operating systems. They should be able to secure the operating systems by hardening them, configuring firewalls, and monitoring system logs for signs of intrusion.
  • Databases : The candidate should have experience with database security and be familiar with database management systems such as Oracle, Microsoft SQL Server, and MySQL.

They should be able to implement security measures such as access control, encryption, and auditing.

Cloud Security : The candidate should have knowledge of cloud security concepts, including identity and access management, virtualization, and cloud-based security services.

They should be able to assess and mitigate the security risks associated with cloud computing.

  • Programming : The candidate should have knowledge of programming languages such as Python, Perl, and Bash, and be able to write scripts for automating security tasks such as log analysis and vulnerability scanning.
  • Cyber Threats : The candidate should have an in-depth understanding of various cyber threats such as malware, phishing, social engineering, and zero-day attacks.

They should be able to identify, analyze, and respond to these threats in real time.

Planning : The candidate should have knowledge and experience relating to the development of disaster recovery plans and incident response plans.

2. Communication, Problem Solving. Leadership, Team work *no third parties and no sponsorship* Working with us Working with TECKpert means more options.

As new opportunities arise, you tell us what you think is a good fit for you. What industries interest you most? Do you prefer an on-location, 9-5?

Or would you want a flexible schedule and remote work? We proudly offer a wide variety of roles. Many of our TECKperts enjoy coworking and skills training coupled with the stability of full-time employment.

We believe TECKpert gives today's digital professionals an agile path to start and advance their career. All of our opportunities require at least 20 hours per week and can be one to twelve months in length.

Choose the opportunity that matches your interest and desired cadence. TECKpert provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Powered by JazzHR

Full-time
APPLY