Security Analyst with hacker methodologies, IDS, SIEM, data loss prevention, NIST, active directory, IAM, Microsoft Threat Management Tool, SSL VPN, network diagramming tool and networking experience

Job ID: MS-53318 (99990504)

Security Analyst with hacker methodologies, IDS, SIEM, data loss prevention, NIST, active directory, IAM, Microsoft Threat Management Tool, SSL VPN, network diagramming tool and networking experience

Location: Starkville, MS – A small college town approximately 2.5 hours outside of Jackson, MS.
Duration: 12 months
Positions: 2 (2/3)
Cover sheet must be completed & attached to resume. See attached template & instructions on how to incorporate into resume without losing formatting.

REQUIREMENTS:
Years Required Skills/Experience
5-7yrs. Technical hands on experience
N/A Bachelor’s Degree in the field of computer science or the appropriate amount of related work experience.
3+ yrs. Wintel
3+ yrs. Linux
3+ yrs. Desktop Security
3+ yrs. Laptop Security
1+ yrs. Firewalls
N/A Expected to stay up-to-date on the latest intelligence, including hackers’ methodologies, in order to anticipate security breaches
N/A Experience with planning and implementing security measures to protect computer systems, networks and data
N/A Must be analytical
N/A Excellent written/verbal communication skills
N/A Experience creating, modifying and updating Intrusion Detection System (IDS)
N/A Experience creating, modifying and updating Security Information Event Management (SIEM) tools
N/A Detail oriented
N/A Ability to discover vulnerabilities in information systems
N/A Experience with Intrusion Prevention systems
N/A Information technology knowledge
N/A Experience monitoring compliance with information security policies and procedures
N/A Experience with remediate security issues
N/A Experiencing responding to requests for specialized cyber threat reports
N/A Experiencing performing cyber and threat analysis
N/A Performing security monitoring
N/A Preventing hacker intrusion
N/A Must have strong problem-solving skills
N/A Deadline oriented; providing timely and relevant security reports
N/A Self-motivated
N/A Ability to stay one-step ahead of cyber attacks
N/A Strong technical background in Data Loss Prevention
N/A Experience supporting and managing security services
N/A Ability to create and implement detailed action plans for security solutions
N/A Ability to write security requirements and design documents.
N/A Ability to identify and mitigate vulnerabilities within the network, system, and application environment
N/A In-depth understanding of common operating systems (Linux/Windows), networking protocols, application security, databases, and Internet applications development
N/A Must have a thorough knowledge with web application and Internet security. Must have a broad knowledge in information technology trends
N/A Ability to communicate technical security information to non-technical personnel
N/A Strong interpersonal and communication skills
N/A Ability to work independently in a self-directed manner and collaboratively as a member of security team
N/A Hands-on cyber security tool administration and troubleshooting experience.
N/A Working technical knowledge of Rapid7 or equivalent scanning tool.
Years Required Skills/Experience
N/A Working technical knowledge of NIST Cybersecurity Frameworks.
N/A Working technical knowledge of Active Directory & reporting
N/A Working technical knowledge of Identity and access management.
N/A Working technical knowledge of TCP/IP
N/A Working technical knowledge of Risk Based and Profile based authentication.
N/A Working technical knowledge SIEM Administration.
N/A Working technical knowledge Network Security.
N/A Working technical knowledge Information Security Policies.
N/A Working technical knowledge Microsoft Threat Management Tool
N/A Experience working with SSL VPN’s.
N/A Experience working with Network Diagramming tools.
N/A Experience working with application development environments.
N/A Knowledge of Project Management Tools and methodologies.
N/A Solid working knowledge of current Internet technologies, including XML, HTML
N/A Knowledge of applicable data privacy policies & Security best practices. Personal Attributes
N/A Flexible and adaptable regarding learning and understanding new technologies.
N/A Strong written and oral communication skills.
N/A Strong interpersonal skills.
N/A Ability to conduct research into software-related issues and products.
N/A Highly logical.
N/A Technically proficient.
N/A Highly self-motivated and directed.
N/A Keen attention to detail.
N/A Proven analytical and problem-solving abilities.
N/A Ability to effectively prioritize and execute tasks in a high-pressure environment.
N/A Ability to work both independently and in a team-oriented, collaborative environment.

PREFERRED:
Preference given to candidates with the below skills/experience. Must also meet minimum requirements.
Preferred certifications a plus– , GSEC, GCIH, CISSP,Comp TIA
NIST – Government Standard
ISOxxx – International Standard
IOS for Mac Security
Python for security data analysis and automation
Java for application coding
Shell scripting for automation and data analysis
SQL for security applications and analysis
MySQL for understanding database security
Experience with any of the following: Splunk, StealthBits, Varonis, Symantec, Rapid 7, AppSpider MF Fortify, OKTA, DUO or any similar tools
Communicate Up, Down, and Across All Levels of the Organization and Technical Backgrounds
Deep Understanding of Risk Management Framework
Experience defining process for Managing Network Security Evaluate and Deconstruct Malware Software
Familiar with Security Regulations and Standards
Implementation and maintenance of Security Frameworks for Existing and New Systems
Preference given to candidates with the below skills/experience. Must also meet minimum requirements.
Installing Firewall and Data Encryption Programs
Maintaining Security Records of Monitoring and Incident Response Activities
Network and System Administration Experience
Producing Situational and Incident-Related Reports
Providing Host-Based Forensics

PROJECT NAME: NSPARC Security and Compliance
Information Security Analyst to work with IT Security team. Candidate will monitor our computer networks for security issues, install and fully implement security software, and document any security issues or breaches.
NSPARC is a research center at Mississippi State University in Starkville, MS. Contractor will work with a diverse team. NSPARC is located in Starkville, MS, a vibrant college town.

JOB DESCRIPTION:
• Monitor computer networks for security issues.
• Investigate security breaches and other cyber security incidents.
• Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
• Document security breaches and assess the damage they cause.
• Work with security team to perform tests and uncover network vulnerabilities.
• Fix detected vulnerabilities to maintain a high-security standard.
• Stay current on IT security trends and news.
• Develop company-wide best practices for IT security.
• Perform penetration testing.
• Help colleagues install security software and understand information security management.
• Research security enhancements and make recommendations to management.
• Stay up-to-date on information technology trends and security standards.
• Team Player
• Stay up-to-date on Relevant Technologies
• Conduct continuous analysis of security threat information (viruses, malicious code, industry events, hackers and zero-day exploits, DDOS attacks, IDS/IPS and SIEM alerting, etc.) in order to proactively assess and investigate emerging threats and potential impact.
• Troubleshooting of issues and testing across multiple platforms and applications
• Triage and drive vulnerability issues to a thorough, immediate, and effective conclusion
• Manage endpoint protection and intrusion detection system tools and policies
• Review security requirements at relevant phases for both technical and operational perspective for new and existing projects
• Analyze, review, customize and recommend security architectures for internal projects
• Identifies, implements, and monitors best practices for information security architecture
• Monitor and recommend changes in standards that affect application security, especially in the area of privacy and identity theft

Mississippi Candidate Cover Sheet_Final (1).docx

Instructions – Inserting Cover Sheet (1).pdf

Leave a Reply