Job ID: MS-53318 (99990504)
Security Analyst with hacker methodologies, IDS, SIEM, data loss prevention, NIST, active directory, IAM, Microsoft Threat Management Tool, SSL VPN, network diagramming tool and networking experience
Location: Starkville, MS – A small college town approximately 2.5 hours outside of Jackson, MS.
Duration: 12 months
Positions: 2 (2/3)
Cover sheet must be completed & attached to resume. See attached template & instructions on how to incorporate into resume without losing formatting.
REQUIREMENTS:
YearsRequired Skills/Experience
5-7yrs. Technical hands on experience
N/ABachelor’s Degree in the field of computer science or the appropriate amount of related work experience.
3+ yrs. Wintel
3+ yrs. Linux
3+ yrs. Desktop Security
3+ yrs. Laptop Security
1+ yrs. Firewalls
N/AExpected to stay up-to-date on the latest intelligence, including hackers’ methodologies, in order to anticipate security breaches
N/AExperience with planning and implementing security measures to protect computer systems, networks and data
N/AMust be analytical
N/AExcellent written/verbal communication skills
N/AExperience creating, modifying and updating Intrusion Detection System (IDS)
N/AExperience creating, modifying and updating Security Information Event Management (SIEM) tools
N/ADetail oriented
N/AAbility to discover vulnerabilities in information systems
N/AExperience with Intrusion Prevention systems
N/AInformation technology knowledge
N/AExperience monitoring compliance with information security policies and procedures
N/AExperience with remediate security issues
N/AExperiencing responding to requests for specialized cyber threat reports
N/AExperiencing performing cyber and threat analysis
N/APerforming security monitoring
N/APreventing hacker intrusion
N/AMust have strong problem-solving skills
N/ADeadline oriented; providing timely and relevant security reports
N/ASelf-motivated
N/AAbility to stay one-step ahead of cyber attacks
N/AStrong technical background in Data Loss Prevention
N/AExperience supporting and managing security services
N/AAbility to create and implement detailed action plans for security solutions
N/AAbility to write security requirements and design documents.
N/AAbility to identify and mitigate vulnerabilities within the network, system, and application environment
N/AIn-depth understanding of common operating systems (Linux/Windows), networking protocols, application security, databases, and Internet applications development
N/AMust have a thorough knowledge with web application and Internet security. Must have a broad knowledge in information technology trends
N/AAbility to communicate technical security information to non-technical personnel
N/AStrong interpersonal and communication skills
N/AAbility to work independently in a self-directed manner and collaboratively as a member of security team
N/AHands-on cyber security tool administration and troubleshooting experience.
N/AWorking technical knowledge of Rapid7 or equivalent scanning tool.
YearsRequired Skills/Experience
N/AWorking technical knowledge of NIST Cybersecurity Frameworks.
N/AWorking technical knowledge of Active Directory & reporting
N/AWorking technical knowledge of Identity and access management.
N/AWorking technical knowledge of TCP/IP
N/AWorking technical knowledge of Risk Based and Profile based authentication.
N/AWorking technical knowledge SIEM Administration.
N/AWorking technical knowledge Network Security.
N/AWorking technical knowledge Information Security Policies.
N/AWorking technical knowledge Microsoft Threat Management Tool
N/AExperience working with SSL VPN’s.
N/AExperience working with Network Diagramming tools.
N/AExperience working with application development environments.
N/AKnowledge of Project Management Tools and methodologies.
N/ASolid working knowledge of current Internet technologies, including XML, HTML
N/AKnowledge of applicable data privacy policies & Security best practices. Personal Attributes
N/AFlexible and adaptable regarding learning and understanding new technologies.
N/AStrong written and oral communication skills.
N/AStrong interpersonal skills.
N/AAbility to conduct research into software-related issues and products.
N/AHighly logical.
N/ATechnically proficient.
N/AHighly self-motivated and directed.
N/AKeen attention to detail.
N/AProven analytical and problem-solving abilities.
N/AAbility to effectively prioritize and execute tasks in a high-pressure environment.
N/AAbility to work both independently and in a team-oriented, collaborative environment.
PREFERRED:
Preference given to candidates with the below skills/experience. Must also meet minimum requirements.
Preferred certifications a plus– , GSEC, GCIH, CISSP,Comp TIA
NIST – Government Standard
ISOxxx – International Standard
IOS for Mac Security
Python for security data analysis and automation
Java for application coding
Shell scripting for automation and data analysis
SQL for security applications and analysis
MySQL for understanding database security
Experience with any of the following: Splunk, StealthBits, Varonis, Symantec, Rapid 7, AppSpider MF Fortify, OKTA, DUO or any similar tools
Communicate Up, Down, and Across All Levels of the Organization and Technical Backgrounds
Deep Understanding of Risk Management Framework
Experience defining process for Managing Network Security Evaluate and Deconstruct Malware Software
Familiar with Security Regulations and Standards
Implementation and maintenance of Security Frameworks for Existing and New Systems
Preference given to candidates with the below skills/experience. Must also meet minimum requirements.
Installing Firewall and Data Encryption Programs
Maintaining Security Records of Monitoring and Incident Response Activities
Network and System Administration Experience
Producing Situational and Incident-Related Reports
Providing Host-Based Forensics
PROJECT NAME: NSPARC Security and Compliance
Information Security Analyst to work with IT Security team. Candidate will monitor our computer networks for security issues, install and fully implement security software, and document any security issues or breaches.
NSPARC is a research center at Mississippi State University in Starkville, MS. Contractor will work with a diverse team. NSPARC is located in Starkville, MS, a vibrant college town.
JOB DESCRIPTION:
•Monitor computer networks for security issues.
•Investigate security breaches and other cyber security incidents.
•Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
•Document security breaches and assess the damage they cause.
•Work with security team to perform tests and uncover network vulnerabilities.
•Fix detected vulnerabilities to maintain a high-security standard.
•Stay current on IT security trends and news.
•Develop company-wide best practices for IT security.
•Perform penetration testing.
•Help colleagues install security software and understand information security management.
•Research security enhancements and make recommendations to management.
•Stay up-to-date on information technology trends and security standards.
•Team Player
•Stay up-to-date on Relevant Technologies
•Conduct continuous analysis of security threat information (viruses, malicious code, industry events, hackers and zero-day exploits, DDOS attacks, IDS/IPS and SIEM alerting, etc.) in order to proactively assess and investigate emerging threats and potential impact.
•Troubleshooting of issues and testing across multiple platforms and applications
•Triage and drive vulnerability issues to a thorough, immediate, and effective conclusion
•Manage endpoint protection and intrusion detection system tools and policies
•Review security requirements at relevant phases for both technical and operational perspective for new and existing projects
•Analyze, review, customize and recommend security architectures for internal projects
•Identifies, implements, and monitors best practices for information security architecture
•Monitor and recommend changes in standards that affect application security, especially in the area of privacy and identity theft
Mississippi Candidate Cover Sheet_Final (1).docx
Instructions – Inserting Cover Sheet (1).pdf