Cyber Security - CIP - IT Security Analyst 3

Overview

Hybrid
$55 - $62
Contract - W2
Contract - 12 Month(s)
No Travel Required

Skills

Computer hardware
IT security
Intrusion detection
Linux
Microsoft Windows
Network
Corrective and preventive action
Customer service
Cyber security
Data
Subnetwork
FOCUS
Network security
Proxies
Security operations
Servers
Specification
System administration
Threat analysis
Unix

Job Details

Job Title: Cyber Security - CIP - IT Security Analyst 3 Job ID: 24-04804 Location: Dimondale, MI Duration: 1 year with possible extension.
Job Description
Short Job Description
The Senior Security Analyst position works as a member of the Client Security Operatons Team. The Senior Security Analyst position reviews and remediates cyber incidents and vulnerabilities found by IT level analysts to IT security specialists and managers to maintain the confidentiality, integrity, and availability of Client data.
Long Job Description:
The Senior Security Analyst position works as a member of the Security Operations Team. This role has a focus on networking security and system administration.
  • Reviews and validates security procedures to ensure adequate security procedures have been developed to identify and classify cyber events.
  • Ensures that all identified security operations tool issues are promptly and thoroughly investigated.
  • Identifies, reviews and validates specifications and implementation of security hardware and software. Implements corrective action as needed.
  • Performs administration of the proxy servers and information system.
  • Performs administration of the endpoint detection and response server and agent.
  • Performs administration of the intrusion protection and intrusion detection systems.
  • Provides excellent customer service.
Required Skills:
  • 5+ years of experience in IT Security.
  • Experience with Linux, Windows, and Unix.
  • Experience working with enterprise packet capture tools.
  • Experience with daily administration, configuring, deploying and architecting security network tools and security hw.
  • Configuration and administration of network taps.
  • Engineering rules, employing best practices.
  • Integrations with threat intelligence feeds.
  • Subnetting.
Contact:
Jaya Balaji: | | URL: ;/div>
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.