The #1 Site for IT and Engineering Jobs - search all IT and Engineering  jobs.
M3p7776vr4n7n5z924f

Security Analyst I

Job Description

Ref ID: 00340-0011207667

Classification: Data Security Analyst

Compensation: DOE

Our East Bay client is looking for a Security Analyst I. As a Information Security Analyst I you will provide a broad range of analysis to all aspects of Information Security. The Information Security Analyst will carry out day-to-day Security Operations tasks under an Information Security Supervisor.
-Acquire and extract data from various sources that house key data in order to develop, update, support, verify, and publish reports using various reporting methods

-Utilize existing security tools and develop and/or deploy additional tools that enable increased visibility and awareness of known and potential threats.

-Audit, risk and control management, and systems documentation activities.

-Proactively identify areas requiring attention or improvement.

-Document security architecture, infrastructure components, and operating procedures to help maintain and manage a service catalog.

-Provide users and management with technical support on matters related to information security such as the criteria to use when selecting information security products from the service catalog.

-Develop, document, and refine processes for IT Risk and Control related tasks.

-Ensure that secure practices, procedures and policies are designed and implemented, provide input into future state decisions regarding information security technology design.

-Actively contribute and guide IT Subject Matter Experts through multiple concurrent risks and control management projects and facilitate the identification, and creation of documentation to support IT controls and control activities.

-Proactively reach out to IT Management to offer support and assistance in risk and control-related matters to ensure an open and effective risk and controls management culture.

Job Requirements

Recent completion of a Cyber Security program, Computer Science Degree, Information Security Degree or other related certifications in the Information Security field.
1-2 years’ of combined IT and security work experience with a broad range of exposure to systems analysis, application development, database design and administration
Work independently and troubleshoot technical and business process related issues.
Develop subject matter expertise in the entire information security stack.
Develop technical solutions for internal consumption.
Ability to appropriately analyze and respond to security events.
Experience managing and working in a SIEM
Understanding of malware, virus propagating vectors.
Understanding of current AV technologies.
Understanding of with Vulnerability Management concepts and best practices.
Understanding of the practice of managing and performing vulnerability scans
Knowledge of multiple Operating Systems (Windows, Linux and Mac OSX).
Understanding of networking concepts and protocols.
Understanding of concepts regarding securing Identity and access management users and roles.
Understanding of application security practices and tools.

Technology doesn't change the world. People do.

As a technology staffing firm, we can't think of a more fitting mantra. We're extreme believers in technology and the incredible things it can do. But we know that behind every smart piece of software, every powerful processor, and every brilliant line of code is an even more brilliant person.

Leader among IT staffing agencies

The intersection of technology and people — it's where we live. Backed by more than 65 years of experience, Robert Half Technology is a leader among IT staffing agencies. Whether you're looking to hire experienced technology talent or find the best technology jobs, we are your IT expert to call.

We understand not only the art of matching people, but also the science of technology. We use a proprietary matching tool that helps our staffing professionals connect just the right person to just the right job. And our network of industry connections and strategic partners remains unmatched.

Apply for this job now or contact our branch office at 888-490-4429 to learn more about this position.

All applicants applying for U.S. job openings must be authorized to work in the United States. All applicants applying for Canadian job openings must be authorized to work in Canada.

© 2019 Robert Half Technology. An Equal Opportunity Employer M/F/Disability/Veterans.

By clicking 'Apply Now' you are agreeing to Robert Half Terms of Use.

Job Snapshot

Location US-CA-San Ramon
Employment Type Full-Time
Pay Type Year
Pay Rate N/A
Store Type Engineering & Aerospace, IT & Technical, Creative & Design
Other Compensation: DOE
Apply

Company Overview

Robert Half Technology

With more than 100 locations worldwide, Robert Half Technology is a leading provider of technology professionals on a project and full-time basis for initiatives ranging from web development and systems integration to network security and technical support. Learn More

Contact Information

US-CA-San Ramon
Recruiter
Icon-social-facebookIcon-social-linkedinIcon-social-twitter
Snapshot
Robert Half Technology
Company:
US-CA-San Ramon
Location:
Full-Time
Employment Type:
Year
Pay Type:
N/A
Pay Rate:
Engineering & Aerospace, IT & Technical, Creative & Design
Store Type:

Job Description

Ref ID: 00340-0011207667

Classification: Data Security Analyst

Compensation: DOE

Our East Bay client is looking for a Security Analyst I. As a Information Security Analyst I you will provide a broad range of analysis to all aspects of Information Security. The Information Security Analyst will carry out day-to-day Security Operations tasks under an Information Security Supervisor.
-Acquire and extract data from various sources that house key data in order to develop, update, support, verify, and publish reports using various reporting methods

-Utilize existing security tools and develop and/or deploy additional tools that enable increased visibility and awareness of known and potential threats.

-Audit, risk and control management, and systems documentation activities.

-Proactively identify areas requiring attention or improvement.

-Document security architecture, infrastructure components, and operating procedures to help maintain and manage a service catalog.

-Provide users and management with technical support on matters related to information security such as the criteria to use when selecting information security products from the service catalog.

-Develop, document, and refine processes for IT Risk and Control related tasks.

-Ensure that secure practices, procedures and policies are designed and implemented, provide input into future state decisions regarding information security technology design.

-Actively contribute and guide IT Subject Matter Experts through multiple concurrent risks and control management projects and facilitate the identification, and creation of documentation to support IT controls and control activities.

-Proactively reach out to IT Management to offer support and assistance in risk and control-related matters to ensure an open and effective risk and controls management culture.

Job Requirements

Recent completion of a Cyber Security program, Computer Science Degree, Information Security Degree or other related certifications in the Information Security field.
1-2 years’ of combined IT and security work experience with a broad range of exposure to systems analysis, application development, database design and administration
Work independently and troubleshoot technical and business process related issues.
Develop subject matter expertise in the entire information security stack.
Develop technical solutions for internal consumption.
Ability to appropriately analyze and respond to security events.
Experience managing and working in a SIEM
Understanding of malware, virus propagating vectors.
Understanding of current AV technologies.
Understanding of with Vulnerability Management concepts and best practices.
Understanding of the practice of managing and performing vulnerability scans
Knowledge of multiple Operating Systems (Windows, Linux and Mac OSX).
Understanding of networking concepts and protocols.
Understanding of concepts regarding securing Identity and access management users and roles.
Understanding of application security practices and tools.

Technology doesn't change the world. People do.

As a technology staffing firm, we can't think of a more fitting mantra. We're extreme believers in technology and the incredible things it can do. But we know that behind every smart piece of software, every powerful processor, and every brilliant line of code is an even more brilliant person.

Leader among IT staffing agencies

The intersection of technology and people — it's where we live. Backed by more than 65 years of experience, Robert Half Technology is a leader among IT staffing agencies. Whether you're looking to hire experienced technology talent or find the best technology jobs, we are your IT expert to call.

We understand not only the art of matching people, but also the science of technology. We use a proprietary matching tool that helps our staffing professionals connect just the right person to just the right job. And our network of industry connections and strategic partners remains unmatched.

Apply for this job now or contact our branch office at 888-490-4429 to learn more about this position.

All applicants applying for U.S. job openings must be authorized to work in the United States. All applicants applying for Canadian job openings must be authorized to work in Canada.

© 2019 Robert Half Technology. An Equal Opportunity Employer M/F/Disability/Veterans.

By clicking 'Apply Now' you are agreeing to Robert Half Terms of Use.

Mwm71d69lzbc3jm6rwg
Sologig Advice

For your privacy and protection, when applying to a job online: Never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction.Learn More

By applying to a job using sologig.com you are agreeing to comply with and be subject to the workinretail.com Terms and Conditions for use of our website. To use our website, you must agree with theTerms & Conditionsand both meet and comply with their provisions.
Security Analyst I Apply now