Sorry, this listing is no longer accepting applications. Don’t worry, we have more awesome opportunities and internships for you.

Information Security Analyst

duvari group

Information Security Analyst

Chesterfield, MO
Full Time
Paid
  • Responsibilities

    Truly a key role with our customer who is targeting both Information Security Analysts who are both Technical and Compliance-minded 

    Growth mindset and someone who is confident in what they know, and aware of what they don’t.

    • Primarily responsible for securing our customer's environment. 
    • Can engage outside support to help in areas where light, for learning
    • Stay abreast of new technology and potential threats. Planner/proactive
    • Have your back to support, but if general or unpatched systems and breach, not a good situation
    • Certs are a plus, but can obtain those they don't have
    • Growth opportunities likely and the position is highly visible (= +/-)
    • Assist in leading and assessing/implementing of solutions. 

     

    Company Description

    SECURITY ANALYST

    Requirements and Competencies:

    B.S. /B.A. Degree (Computer Science, Security).

      • 5+ years of experience working as a Cyber Security Analyst, Security Operations Analyst OR SOC Analyst would be highly preferable.
      • 3+ years of Incident response and investigations experience.
      • 3+ years of practical experience across the following technologies: EDR, Anti-Virus, Firewall, Network protocols, Windows security events, Phishing mitigation, WireShark, MS Office (Excel in particular). * Familiarity with the following: Permissions management, DLP, Active Directory, VPN, PowerShell (or any high-level programming language).
      • Managed security measures and operated software to protect systems and information infrastructure, including firewalls and data encryption programs.
      • Prior experience in threat hunting, threat research and threat intelligence skills.
      • Conducted vulnerability assessments and relevant incident response.
      • Analyzed SIEM events.
      • Strong understanding of networking technology.
      • Great collaboration, interpersonal, and communication skills.
      • Advanced analytical and problem-solving abilities.
      • Excellent organizational and time-management skills.

      Primary Responsibilities:

      • Responsible for the overall monitoring and management of all security service categories including Policy Development, Security Training, Identity and Access Mgmt., Firewall Device Mgmt., Threat Detection/Response, and other categories as designated.
      • Ensuring the security technology provided by the organization is performing to optimal standards.
      • Conduct open-source and closed-source threat intelligence.
      • Work with the wider team to enhance the cyber security environment.
      • Monitors computer networks for security issues.
      • Investigate and mitigate security breaches and other cybersecurity incidents.
      • Installs security measures and operates software to protect systems and information infrastructure, including firewalls and data encryption programs.
      • Documents security breaches and assesses any damages caused.
      • Performs tests and uncovers network vulnerabilities.
      • Fixes detected vulnerabilities to maintain a high-security standard.
      • Researches and recommends security enhancements.
      • Stay up-to-date on information technology trends and security standards to become the subject matter expert.
      • Knowledge of information security engineering methods and technologies for IT infrastructure, web, mobility, and WAN / LAN networking, and patch management.
      • Ability to direct, control and plan development of IT security programs that will meet current and future needs.
      • Assists in revising and updating the Information System Security Policy and Incident Response Plan.
      • Performs daily systems/network security event monitoring.
      • Performs security hardening and configuration reviews in coordination with System Admins.
      • Troubleshooting of security systems and devices (configuration, permissions, feature compatibility, etc.)
      • Manage Security Incident Response with wider team.
      • Manages vulnerability scanning tools and responds to results with change requests to address high severity issues.
      • Manage Firewalls, Threat Detection, and other security tool configurations; managing protection rules, performing updates, licenses renewals as needed.
      • Responsible for information security procedural knowledge documentation.
      • Works with security vendors and other external partners to resolve issues.
      • Participates in annual security device inventory and support/licensing review effort.
      • Trains staff on network and information security procedures.
      • Monitors security access management logs and other security metrics
      • Prepares reports by collecting, analyzing, and summarizing information regarding security operations and processes.
      • Responds to emergency situations as needed, during and after normal business hours, to identify, assess and mitigate critical operational issues.