Cyber Security Analyst II|
Compensation: $59K - $92K / Year
Minimum Education: Bachelors
Job Type: Full Time
Email this job to a friend
Cyber Security Analyst II
Arthur L Crume
Local Relocation Assistance Available
Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, firmware and software.
Ensures that IS security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS security.
Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents.
Investigates and resolves security incidents and recommends enhancements to improve security.
Develops techniques and procedures for conducting IS security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents.
Under moderate supervision monitors complex systems and response to known and emerging threats against my clients network via intrusion detection software.
Conducts detailed, comprehensive investigation of security issues by reviewing security log data, interpreting data in support of security event management process from various data feeds and triages on a wide variety of security events.
Under supervision performs incident handling process by maintaining knowledge in implementation of containment, protection and remediation activities.
Enhances knowledge of new and emerging threats that can affect the organization's information assets by analyzing of third party software/solutions, IT configuration changes (including access control requests) and network/system architecture from risk perspective.
Under supervision designs and configures security systems, including proxy, remote access, mail gateway, intrusion prevention, wireless networking, data leak prevention, security information and event management and web application firewalls.
Following guidance assesses and disseminates threats related to the enterprise in regard to current vulnerability by managing and developing an emerging threat model.
Under supervision assesses risks based on changes to implementation of ISO(International Organization for Standardization/BSO(Business Services Online), enhances knowledge of PCI(Payment Card Industry)/Logical Security guidelines and models, HIPPA(health insurance portability and accountability act), PII(Personally Identifiable Information), and Card personalization.
Participates in creating cost effective solutions for system/application development regarding Information Security processes and concepts in applicable systems and software.
Works under close supervision to perform day-to-day Information Security functions pertaining to numerous security software products and processes.
*Relevant Experience or Degree.
*Bachelor's degree in Computer Science, Info Security, or related field.
*Or relevant work experience in a related field.
*Typically Minimum 2 Years Relevant experience including network operations or engineering or system administration on Unix, Linux, MAC(Message Authentication Code) or Windows; common security operations, intrusion detection systems, Security Incident Even Management systems, Penetration Testing, Web Application assessment, Secure Coding practices.
Professional certifications CISSP(Certified Information System Security Professional)
CISM(Certified Information Security Manager)
GSEC(GIAC Security Essentials)
Typically Minimum 4 Years relevant experience.
Knowledge of industry standard security compliance programs PCI(Payment Card Industry)
GLBA(Gramm Leach Bliley Act) etc.
Desired Skills and Capabilities:
Developing professional expertise, applies company policies and procedures to resolve a variety of issues.
Works on problems of moderate scope where analysis of situations or data requires a review of a variety of factors.
Exercises judgment within defined procedures and practices to determine appropriate action.
Builds productive internal/external working relationships.
Normally receives general instructions on routine work, detailed instructions on new projects or assignments.
Ability to identify, communicate, and mitigate risk within technical solution designs
Continued self-education of new and emerging threats and relevant processes, controls, or technologies to mitigate them.
Knowledge and skills to contribute to all phases of Incident Response.
ALC Staffing Associates
509 N Vermilion
Danville, IL 61832