Security Analyst II Information Technology (IT) - Hopedale, MA at Geebo

Security Analyst II

Position Overview A Security Analyst II primary objective is to handle a broad spectrum of cybersecurity tasks to the betterment of the security posture of our clients, security knowledge of our partners, and cybersecurity awareness in our community.
The Security Analyst will perform Risk Assessments, Incident response and be a key role in our growing Managed Security Services division.
Primary Responsibilitieso Lead Client Risk Assessments, perform technical review and GAP analysis of key security controlso Deliver Risk Reports to clients Senior Leadership Teamso Review data output from tool set to effectively provide clients with strategic roadmap t0 improve cybersecurity postureo Understand Compliance as it pertains to IT and security.
(HIPPA, DFS, NIST, CMMC, NY- DFS/SHIELD)o Identify and recommend measures to improve the security posture of the client's environment.
o Develop methods of intelligence collection for the purpose of creating finished intelligence reports.
o Work with security leadership to develop strategies and plans to enforce computer security requirements and address identified risks.
o Monitor residual risk, vulnerabilities, and other computer security exposures, including misuse of information assets and noncomplianceo Reviews results from the internal and external vulnerability scans and report to SOC or Client for recommended remediationo Review and investigate escalated alerts and incidents from SOC team.
o Perform Incident response for internal teamo Point of escalation for client IR, review and perform root cause analysiso Create detailed intelligence reports that outlines Risk level and potential likelihood to client infrastructure o Identify and recommend measures to improve the security posture of the client's environment.
o Provide recommendations and actions for Operations teams, Security teams, and other stakeholders based on timely intelligence information.
o Manage and qualify tools to support the collection and analysis of intelligence information.
Desired Skills & Experience o Bachelor's degree from an accredited college in a related discipline.
o 2-4 yrs.
experience with threat intelligence and other security domain experience in mission critical environment.
o Proficient with common protocols/services (AD, GPO, DNS, DHCP, HTTP, SMTP, RDP, FTP etc.
)o Excellent knowledge of technical security solutions (firewalls, SIEM, IDS/IPS/ AVs, DLP, proxies, network behavioral analytics, endpoint, and cloud security).
o Experience in developing, documenting, and maintaining security policies, processes, procedures, and standards.
o In-depth knowledge and understanding of information risk concepts and principles to relate business needs to security controls.
o Demonstrated ability to build working relationships with a wide range of operational teams.
o Network+, CEH, CISM, Security+, GIAC or CISSP certifications preferred.
Other Requirements:
o Candidate must be a US-Citizeno Pass a background checkBenefitso Medical/Dental/Vision Insuranceo 401k with matcho Generous paid leave policies.
o Life Insurance and Short-Term Disability coverageo Performance based incentiveo Career advancement opportunities.
If you meet the above qualifications and a desire to work with an industry leader in IT Solutions and are the team player that we are looking for, consider joining our team.
PI226642956 Recommended Skills Business Requirements Certified Information Security Manager Certified Information Systems Security Professional Cloud Computing Security Dns Data Analysis Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.