Job Description:
Responsibilities:
Musthave skills: 4 y of exp in information security or cybersecurity and/or networksecurity; Splunk and/or Qualys and/or vulnerability and/or SIEM; Cycognito and/or Orca and/or Axonius.
PREFERRED : CSE CCNA CISSP CISA Security certifications; Linus/Unix TCP/IP Active Directory Microsoft Windows platforms (desktop/server) Open System platforms (desktop/servers) database platforms (SQL/Oracle); antivirus APT detection data loss protection (DLP) WAF webcontent filtering IDS/IPS vulnerability scanners forensics tools DB monitors; networking device components (i.e. managed switches routers and firewalls); managing vulnerability scanning (static/dynamic) and penetration testing.
Requirements: Experience in computer systems with specialization within information security and/or network security.
Experience working with the following solutions: Cycognito Splunk Qualys Orca and/or Axonius.
Experience with antivirus APT detection data loss protection (DLP) WAF web content filtering IDS/IPS vulnerability scanners forensics tools SIEM DB monitors.
Experience working with networking device components (i.e. managed switches routers and firewalls).
Experience with managing vulnerability scanning (static/dynamic) and penetration testing;
Experience configures and/or correlate information in DNS and understands basic network routing concepts;
Security Certification.
Associate Degree
Preferred: Experience which includes the following: Linus/Unix TCP/IP Active Directory Microsoft Windows platforms (desktop/server) Open System platforms (desktop/servers) database platforms (SQL/Oracle);
MCSE CCNA CISSP CISA Certifications;
Bachelors degree
Responsibilities include but are not limited to the following:
Serviceoriented and must work easily with end users IT administrators and management;
Uses data encryption firewalls and other appropriate security tools and applications to conceal and protect transfers of confidential digital information;
Safeguards system security and improves overall server and network efficiency by training users and promoting security awareness;
Monitor security related websites and email distributions to possess knowledge of common exploits vulnerabilities and countermeasures;
Assist in implementation of corporate security policy functions/procedures that align to security mandates/standards that include SarbanesOxley HIPPA and PCI compliance;
Handle vulnerability management process which includes scoping vulnerability scanning penetration testing reporting ticket administration and remediation followup tasks;
Recognize and identify potential gaps in areas where existing data security policies and procedures require changes or where new ones need to be developed especially regarding future business expansion