The #1 Site for IT and Engineering Jobs - search all IT and Engineering  jobs.
Mjc7bt6twhh30glppxf

Information Security Analyst - W2

Job Description

NOTE: U.S. Citizens, GC and those authorized to work in the U.S (without Sponsorship) are encouraged to apply.
We are unable to Consider OPT or H1B Visa Candidates for this position.

Key Responsibilities & Essential Tasks
Information Security Event & Incident Operations - 40% - Perform security event monitoring, alerting, investigations, notification, and response activities. Tune and adjust alert triggers and security monitoring thresholds. Generate security event data reports. Create and distribute security advisories. Perform security incident management and response activities.
Threat & Vulnerability Management - 30% - Ingest and process threat intelligence data.Perform threat hunting, threat identification, and threat analysis/assessment activities. Conduct research into new and emerging threats. Perform vulnerability identification and vulnerability management activities including vulnerability reduction through pursuit of patching and security configuration remediation.
Computer Security Forensics - 10% - Conduct information security incident forensics
investigations including forensic data captures, drive imaging, and data recovery with the aim of identifying, preserving, recovering, analyzing and presenting facts and evidence in accordance with standard evidentiary procedures. Capture and preserve evidence of computer crimes for use in internal or external criminal, civil, or administrative proceedings.
Information Security Documentation - 10% - Maintain and improve information security policies, standards, processes, and procedural documentation. Author and maintain Knowledge Base articles, Work Instructions, and other guidance documentation. Create and disseminate information security news articles and other advisory documentation.
Projects and Other Duties - 10% - Participate in security and IT improvement projects and initiatives; Provide consulting and advice to clients; Plan and execute special security-focused projects and initiatives; Perform other duties as assigned and required.

Minimum Qualifications

  • Bachelor's degree or higher in Computer Science, Information Technology, Information Security or closely related discipline from an appropriately accredited institution
  • 5+ years of experience in Information Technology positions with responsibility for security operations and/or configuration.
  • Demonstrated recent experience with information security operations functions, activities, tools, and systems.
  • Demonstrated recent experience with end-user client computing systems including Windows, Mac, and Linux OS.
  • Demonstrated recent experience with server and network infrastructure operations, including Windows and Linux servers, virtual server systems, and complex enterprise network routing and switching.
  • Demonstrated recent experience with security configurations on cloud computing
  • Excellent interpersonal and written communication skills.


Preferred Qualifications

  • Demonstrated recent experience with Splunk Enterprise Security, Rapid7 Nexpose, Cisco Stealthwatch, Cisco Firepower, Palo Alto firewalls, G-Suite security tools, Varonis Data Security Platform, Spirion Data Security Software (IdentityFinder), Endace packet capture, and/or AccessData FTK
  • Demonstrated recent experience with MS-Azure IaaS security features
  • Previous experience in higher educational institutions
  • Information security industry (ex: CISSP, SSCP, GSEC, CISA) or vendor-specific (ex: CCSP, CCSA) security certifications



Please Contact: Pradeep Kumar @ 336 875 3130

Contact:

Category Code: JN008

Job Requirements

 

Job Snapshot

Location US-NC-Greensboro, NC
Employment Type Full-Time
Pay Type Year
Pay Rate N/A
Store Type IT & Technical
Apply

Company Overview

CRG

Whether you are looking for an Information Technology, Accounting Finance, HR / Administrative role, or Executive Jobs, you can search from our extensive list of job openings and work with our recruiters to match you with one of the companies that aligns with your career goals. As a job seeker, you are treated to the benefit of working with a local recruiter that specializes in your industry, with convenient access to our centrally located Greensboro or Charlotte, NC staffing agency offices. After reviewing your resume and speaking with you to identify your strengths, skills, and personality, we match you with one of our openings and guide you through the hiring process. CRG is committed to helping you take the next step in your career and finding an opportunity where you will thrive. Learn More

Contact Information

US-NC-Greensboro, NC
CRG
336.812.9855
Icon-social-facebookIcon-social-linkedinIcon-social-twitter
Snapshot
CRG
Company:
US-NC-Greensboro, NC
Location:
Full-Time
Employment Type:
Year
Pay Type:
N/A
Pay Rate:
IT & Technical
Store Type:

Job Description

NOTE: U.S. Citizens, GC and those authorized to work in the U.S (without Sponsorship) are encouraged to apply.
We are unable to Consider OPT or H1B Visa Candidates for this position.

Key Responsibilities & Essential Tasks
Information Security Event & Incident Operations - 40% - Perform security event monitoring, alerting, investigations, notification, and response activities. Tune and adjust alert triggers and security monitoring thresholds. Generate security event data reports. Create and distribute security advisories. Perform security incident management and response activities.
Threat & Vulnerability Management - 30% - Ingest and process threat intelligence data.Perform threat hunting, threat identification, and threat analysis/assessment activities. Conduct research into new and emerging threats. Perform vulnerability identification and vulnerability management activities including vulnerability reduction through pursuit of patching and security configuration remediation.
Computer Security Forensics - 10% - Conduct information security incident forensics
investigations including forensic data captures, drive imaging, and data recovery with the aim of identifying, preserving, recovering, analyzing and presenting facts and evidence in accordance with standard evidentiary procedures. Capture and preserve evidence of computer crimes for use in internal or external criminal, civil, or administrative proceedings.
Information Security Documentation - 10% - Maintain and improve information security policies, standards, processes, and procedural documentation. Author and maintain Knowledge Base articles, Work Instructions, and other guidance documentation. Create and disseminate information security news articles and other advisory documentation.
Projects and Other Duties - 10% - Participate in security and IT improvement projects and initiatives; Provide consulting and advice to clients; Plan and execute special security-focused projects and initiatives; Perform other duties as assigned and required.

Minimum Qualifications

  • Bachelor's degree or higher in Computer Science, Information Technology, Information Security or closely related discipline from an appropriately accredited institution
  • 5+ years of experience in Information Technology positions with responsibility for security operations and/or configuration.
  • Demonstrated recent experience with information security operations functions, activities, tools, and systems.
  • Demonstrated recent experience with end-user client computing systems including Windows, Mac, and Linux OS.
  • Demonstrated recent experience with server and network infrastructure operations, including Windows and Linux servers, virtual server systems, and complex enterprise network routing and switching.
  • Demonstrated recent experience with security configurations on cloud computing
  • Excellent interpersonal and written communication skills.


Preferred Qualifications

  • Demonstrated recent experience with Splunk Enterprise Security, Rapid7 Nexpose, Cisco Stealthwatch, Cisco Firepower, Palo Alto firewalls, G-Suite security tools, Varonis Data Security Platform, Spirion Data Security Software (IdentityFinder), Endace packet capture, and/or AccessData FTK
  • Demonstrated recent experience with MS-Azure IaaS security features
  • Previous experience in higher educational institutions
  • Information security industry (ex: CISSP, SSCP, GSEC, CISA) or vendor-specific (ex: CCSP, CCSA) security certifications



Please Contact: Pradeep Kumar @ 336 875 3130

Contact:

Category Code: JN008

Job Requirements

 
Mtg1ts72dqnq0nmn2g2
Sologig Advice

For your privacy and protection, when applying to a job online: Never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction.Learn More

By applying to a job using sologig.com you are agreeing to comply with and be subject to the workinretail.com Terms and Conditions for use of our website. To use our website, you must agree with theTerms & Conditionsand both meet and comply with their provisions.
Information Security Analyst - W2 Apply now