Job Description : Must-have skills: Security Analyst, firewalls, routers, switches, wireless access points, VPNs; Microsoft's enterprise technology platform, including Azure, Active Directory, SQL, and the Windows server and desktop operating systems.
Redhat and Oracle; Splunk, Tripwire, Rapid7 Nexpose, Vulnerability Scanner, Metasploit, Qualys Vulnerability Scanner (Cloud), Delinea Secret Server, Carbon Black Application Protection, Veracode SAST & DAST Technologies.
NIST, PCI DSS, and ISO.
Requirements : Availability to work 100% at the Client's site in Boca Raton, FL (required); Experience in a security analyst or related position (3-5 years); Experience with enterprise-class technologies such as firewalls, routers, switches, wireless access points, VPNs, and desktop and server operating systems; Experience with Microsoft's enterprise technology platform, including Azure, Active Directory, SQL, and the Windows server and desktop operating systems; Experience with Redhat and Oracle database operating systems; Working experience with the following technology vendors and products: Splunk, Tripwire, Rapid7 Nexpose Vulnerability Scanner, Metasploit, Qualys Vulnerability Scanner (Cloud), Delinea Secret Server, Carbon Black Application Protection, Veracode SAST & DAST Technologies; Experience implementing and/or enforcing security and compliance frameworks such as NIST, PCI DSS, and ISO; Experience Managing systems owned by the Security Risk and Compliance Office (SRCO); A four-year college degree or equivalent industry training and certifications Responsibilities : Proactively monitor the environment to detect and implement steps to mitigate cyber-attacks before they occur; Provide technical expertise regarding security-related concepts to operational teams within the department and the business; Review, investigate, and respond to real-time alerts within the environment; Review real-time and historical reports for security and/or compliance violations; Monitor online security-related resources for new and emerging cyber threats; Assesses new security technologies to determine potential value for the enterprise; Conducts vulnerability assessments of department systems and networks; Liaise with the departments trusted security manage services, infrastructure technical resources, and 3rd party business vendors We will contact you if we have news for you.
The lack of contact doesn't mean we are ignoring you or didn't receive your email.