Security Analyst
Security
Research Triangle North Carolina Direct Hire May 10, 2021

As a trusted partner to our client, we are helping to identify and screen a Security Analyst for a full-time, permanent opening in Research Triangle, North Carolina.

 

Essential Functions:

  • Monitors and audits workstations, servers, networks and companywide websites to detect and manage the health of the network security operations systems. Respond to events by documenting and investigating alerts generated to prevent unauthorized access to companywide systems.
  • Monitor and analyze companywide security and network systems daily log events, to identify potential security threats. Sources include, but not limited to; sensor alert logs, firewall logs, content filtering logs, Web Application Firewall (WAF) and Security Incident Event Manager (SIEM).
  • Provide written reports to the Information Security Manager detailing all security events related to network security and/or network infrastructure matters and submit these reports according to the procedures and reporting requirement guidelines.
  • Utilize email, instant messaging, and other monitoring tools to remain aware of current network threats. Review all incoming alerts, properly investigate and create incident tickets for all identified potential security threats within the company’s incident response-tracking platform.
  • Communicate information to remediation technicians and may be required to help with remediation after the technicians are consulted.
  • Identify the necessity for, and implementation of, the creation of new intrusion detection signatures. Tune SIEM log integration and analysis rules to reduce both false positives and false negatives.
  • Assists with the maintenance, patching and hardening of Firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Application Firewalls, Security Information and Event Management systems (SIEM), Remote User Access (VPN), Web/URL Filtering systems, Application Security Testing systems, Authentication systems and Proxy systems.
  • Performs vulnerability scans on a routine basis as well as for all new system installations in accordance with Vulnerability Scans and Configuration Control procedures. Produce ad-hoc reports as directed by Information Security Manager.
  • Prepare monthly reports to include but not limited to; status and progress of all current open security incident tickets and ad-hoc assignments.
  • Install, configures, and monitor remote access control systems such as Virtual Private Network (VPN) and SSL-VPN products.
  • Installs, configures, and monitors boundary protection systems such as Web/URL filtering, Web Application Firewall (WAF) products and proxy systems.
  • Assists in design, Installation, configuration of network infrastructure such as routers, switches, and wireless access systems, as well as document network architecture and access control.
  • Monitors and troubleshoots network issues. In addition, maintains the security of network devices, and monitors systems to ensure transmission integrity.
  • Consults with IT team members during the Functional Design phase of development efforts to ensure new applications meet appropriate security requirements.
  • Works with Information Technology staff, users, peers, and vendors to routinely review, research and diagnose security-related problems; develops implements and documents problem resolutions. Advises/assists other system administrators in securing their systems.
  • Conducts internal and external audits and penetration attempts (as designed) to ensure perimeter devices and internal servers are hardened properly.
  • Monitors that appropriate authorization and access controls are in place. Reports to the Information Systems Manager if there are issues.
  • Assists with the development of companywide Change and Configuration Management Policies to ensure confidentiality, integrity and availability of business and customer information. Assists in all aspects of infrastructure system changes with a focus on security and throughout the system and application lifecycle, to include platforms, operating systems, applications, and supporting structures for the build and release of source code and/or products. Responsible for planning, scheduling, communicating, and managing day-to day tasks to sustain and maintain the Configuration/CMDB Management functions.
  • Assists with the development of the companys Disaster Recovery Plan. Updates the Disaster Recovery Plan as needed, assists in the Disaster Recovery process, and coordinates the IT Disaster Recovery functions.
  • Provides established guidance and training to peers and management staff on recommended security practices.
  • Assists with the development of the Agency Security Policy and any associated procedures to ensure compliance with federal, state and industry laws and regulations.
  • Assists management as needed and performs other duties as assigned.

 

Education:

  • Bachelor’s Degree in Computer Science, Information Technology, Management Information Services, or a closely related field; or equivalent combination of education and experience.
  • CompTIA Security +. certification required. Proof of certifications to be printed and provided to prior to assignment.
  • One or more of the following certificates are highly recommended: Global Information Assurance Certification (GIAC), Global Security Essentials Certification (GSEC), Cisco Certified Security Professional (CCSP), Certified Information System Auditor (CISA), or Certified Information Systems Security Professional (CISSP).

 

Experience Required:

  • Three years of experience working with a variety of security and network products in a production environment.
  • Three years of experience in network administration, preferably with Cisco and/or Barracuda products.
  • Three years of experience in Information Security, preferably in log analysis, threat detection and mitigation.
  • Experience in Microsoft Azure including but not limited to; networking, network security groups (NSG), load balances, virtual machines (VM), virtual appliances and express route.
  • Experience with administration of a variety of operating systems, such as Windows Desktop, Windows Server, Linux, Unix and/or i5/OS.
  • Knowledge of and experience with disaster recovery planning, exercises, and maintaining documentation.
  • Strong working knowledge and experience with configuration management planning and the use of automated tools to store, track, and manage configuration items.

 

Converge Technology Solutions offers equal opportunity to employees and applicants regardless of race, color, creed, sex, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, sexual orientation or any other consideration made unlawful by federal, state, or local laws. Converge Technology Solutions does not accept unsolicited resumes from third-party vendors associated with fees.