The #1 Site for IT and Engineering Jobs - search all IT and Engineering  jobs.

Information Security AHS Analyst

Job Description


Cyber Security Services is seeking a highly motivated candidate for the position of Technology Analyst for providing L2/L3 support for the Security Infrastructure. He/she will be expected to oversee the Operations related work and projects, Security assessment, COB testing, maintenance of documentation and inventories, integration of Infrastructure and tools under global operational model, Manage the production problems, root cause analysis/resolution for system issues, defects, and minor enhancements, perform on-call support as required, perform risk control self-assessment tests and exercises, supporting project transition, operations, and technology. This candidate should be a technical leader with excellent communication skills and in-depth background in UNIX & Wintel technologies.

Candidate is expected to have a firm grasp of system administration, network protocols, networking issues and solutions, system monitoring, databases, and storage. The candidate may act as a member of quick-response project task-support team and will often work under demanding deadlines, operating as team member as well as independently to resolve complex problems. Applicant may be asked to initially focus on compliance-related projects which may include but not limited to the following tasks: sync-up of inventories, coordination efforts related to as well as implementation of certificate renewals and migration efforts, COB test coordination efforts, coordination of required environment scans and tests and the implementation of any remediation required for resulting vulnerabilities.

Qualifications:

  • Years of related experience: 2-5
  • Hands on experience with Unix scripting, SQL and ability to write complex queries
  • HSM (Hardware Security Module) knowledge, experience in ATTLA, Safenet (LUNA, PSE) and THALES. Working knowledge in Key and certificate encryption, life cycle and end to end communication.
  • Knowledge of Security tools and hands-on experience with some of the following technologies is an added advantage:
    o Security Infrastructure technologies Such as CiscoSecure, Entrust, Token Technologies, Tectia, Powerbroker, Unix Security tools, Kerberos, Directory Server, HSM, PKI Infrastructure.
    o Linux, Red Hat, Solaris, AIX, Windows Server and other Unix based operating systems
    o Web Servers (Apache, IIS, Sun One Web servers)
    o Application Servers (WebLogic, WebSphere)
    o Databases (Oracle, SQL server, Sybase)
    o Understanding of Programming languages (Java, Perl, C/C++,)
    o Thorough understanding of security, network architectures and protocols.
  • Familiarity of Compliance and risk management frameworks and methodologies (ISO27002, SDLC).
  • Certifications (CISSP, ITIL, CCNA/CCNP, CEH, Redhat, Solaris, MCSE) are highly desirable
    Key Responsibilities and Attributes:
  • Provide Technical Application Support Leadership for the Security Infrastructure and Applications.
  • Production and UAT Environment Troubleshooting expertise.
  • Capacity, performance and Stability reporting and Management.
  • Lead initiative to develop/improve scripts and other programs for system monitoring and maintenance.
  • Provide Technical Mentoring.
  • Lead Operations-related projects and Security assessment for the infrastructure associated with the applications in scope.
  • Leadership Skills to Document and do knowledge transfer to other team members.
  • Be responsible to assess the risk and associated impact of all operational issues and change events and react quickly to escalate to technology management in a timely manner when required.
  • Work closely with the infrastructure team to ensure the operational requirements are met during application integrations
  • Continuously keep the Knowledge Share repository up to date.
  • Strong interpersonal and communication skills.
  • Strong analytical skills and attention to detail.
  • Ability to work across all levels of the organization.
  • Proven ability to work with demanding global partners within aggressive timelines; solid problem solving, analytical and technical abilities.

Job Requirements

Job Title: Information Security AHS Analyst Job location: Irving, TX / New Castle, DE / Tampa, FL Job Duration: Full time

Job Snapshot

Location US-TX-Irving, TX
Employment Type Full-Time
Pay Type Year
Pay Rate N/A
Store Type IT & Technical
Apply

Company Overview

ACS Solutions

ACS Group provides services to Fortune 1000 companies across various industry verticals. With a proven track record of managing project demands while improving the efficiency, productivity and profitability of new and existing projects through process improvement, ACS Group is consistently recognized for identifying and implementing strategic solutions that create and preserve long-term business value. Learn More

Contact Information

US-TX-Irving, TX
American CyberSystems, Inc.
678-259-9062
Snapshot
ACS Solutions
Company:
US-TX-Irving, TX
Location:
Full-Time
Employment Type:
Year
Pay Type:
N/A
Pay Rate:
IT & Technical
Store Type:

Job Description


Cyber Security Services is seeking a highly motivated candidate for the position of Technology Analyst for providing L2/L3 support for the Security Infrastructure. He/she will be expected to oversee the Operations related work and projects, Security assessment, COB testing, maintenance of documentation and inventories, integration of Infrastructure and tools under global operational model, Manage the production problems, root cause analysis/resolution for system issues, defects, and minor enhancements, perform on-call support as required, perform risk control self-assessment tests and exercises, supporting project transition, operations, and technology. This candidate should be a technical leader with excellent communication skills and in-depth background in UNIX & Wintel technologies.

Candidate is expected to have a firm grasp of system administration, network protocols, networking issues and solutions, system monitoring, databases, and storage. The candidate may act as a member of quick-response project task-support team and will often work under demanding deadlines, operating as team member as well as independently to resolve complex problems. Applicant may be asked to initially focus on compliance-related projects which may include but not limited to the following tasks: sync-up of inventories, coordination efforts related to as well as implementation of certificate renewals and migration efforts, COB test coordination efforts, coordination of required environment scans and tests and the implementation of any remediation required for resulting vulnerabilities.

Qualifications:

  • Years of related experience: 2-5
  • Hands on experience with Unix scripting, SQL and ability to write complex queries
  • HSM (Hardware Security Module) knowledge, experience in ATTLA, Safenet (LUNA, PSE) and THALES. Working knowledge in Key and certificate encryption, life cycle and end to end communication.
  • Knowledge of Security tools and hands-on experience with some of the following technologies is an added advantage:
    o Security Infrastructure technologies Such as CiscoSecure, Entrust, Token Technologies, Tectia, Powerbroker, Unix Security tools, Kerberos, Directory Server, HSM, PKI Infrastructure.
    o Linux, Red Hat, Solaris, AIX, Windows Server and other Unix based operating systems
    o Web Servers (Apache, IIS, Sun One Web servers)
    o Application Servers (WebLogic, WebSphere)
    o Databases (Oracle, SQL server, Sybase)
    o Understanding of Programming languages (Java, Perl, C/C++,)
    o Thorough understanding of security, network architectures and protocols.
  • Familiarity of Compliance and risk management frameworks and methodologies (ISO27002, SDLC).
  • Certifications (CISSP, ITIL, CCNA/CCNP, CEH, Redhat, Solaris, MCSE) are highly desirable
    Key Responsibilities and Attributes:
  • Provide Technical Application Support Leadership for the Security Infrastructure and Applications.
  • Production and UAT Environment Troubleshooting expertise.
  • Capacity, performance and Stability reporting and Management.
  • Lead initiative to develop/improve scripts and other programs for system monitoring and maintenance.
  • Provide Technical Mentoring.
  • Lead Operations-related projects and Security assessment for the infrastructure associated with the applications in scope.
  • Leadership Skills to Document and do knowledge transfer to other team members.
  • Be responsible to assess the risk and associated impact of all operational issues and change events and react quickly to escalate to technology management in a timely manner when required.
  • Work closely with the infrastructure team to ensure the operational requirements are met during application integrations
  • Continuously keep the Knowledge Share repository up to date.
  • Strong interpersonal and communication skills.
  • Strong analytical skills and attention to detail.
  • Ability to work across all levels of the organization.
  • Proven ability to work with demanding global partners within aggressive timelines; solid problem solving, analytical and technical abilities.

Job Requirements

Job Title: Information Security AHS Analyst Job location: Irving, TX / New Castle, DE / Tampa, FL Job Duration: Full time
Sologig Advice

For your privacy and protection, when applying to a job online: Never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction.Learn More

By applying to a job using sologig.com you are agreeing to comply with and be subject to the workinretail.com Terms and Conditions for use of our website. To use our website, you must agree with theTerms & Conditionsand both meet and comply with their provisions.
Information Security AHS Analyst Apply now