12 days old
2017-11-102017-12-08

IT Security Analyst

Jacksonville, FL 32204
  • Job Code
    587228
  • Payrate
    $75,000 To $90,000

Description


Randstad Technologies is looking for an IT Security Analyst. Daily this person will administer information systems program to validate security policies and regulatory requirements are met across the business, ensuring the company and its systems are protected from domestic or international security threats. Evaluates security controls to ensure effectiveness and compliance with the information security program and regulatory requirements; manages security control remediation efforts; and supports internal and external information security related audits. Uses information security tools and procedures to respond to inquiries. Recommends security solutions, advises on systems and application-level security configurations, and investigates/mitigates security risks as required.



  • 6+ years of experience
  • Must currently possess or be willing to obtain CISSP or equivalent professional certification (CISM, GSEC, etc.) within 6 months of starting if hired.


Top skills/preferences in the role:



  • DLP - Forcepoint or industry equivalent
  • SIEM - QRadar or industry equivalent
  • DAM - Guardium or industry equivalent
  • IDS/IPS - Palo Alto or industry equivalent
  • They need to have a solid understanding of Windows and Linux operating systems as well network related concepts.


This person will work on a team of 7 security engineers supporting engineering related task for a variety of security tools across the enterprise. They will be responsible for operational break/fix activities as well as projects to enhance existing or implement new security related technologies.


GENERAL DUTIES & RESPONSIBILITIES



  • Develops and manages security for business units across the enterprise to prevent hackers from compromising company systems and information.
  • Provide operational and project support for security tools including but not limited to: Security Information Event Monitoring (SIEM), Intrusion Detection Systems (IDS), Database Activity Monitoring (DAM), Data Loss Prevention (DLP), Privileged Access Management (PAM), Identity Management (IDM), Hardware Security Module (HSM), Transparent Database Encryption (TDE), Enterprise Key and Certificate Management (EKCM), Database Encryption, File Encryption, and/or API Encryption.
  • Serve as the subject matter expert (SME) in relation to installation, configuration, and troubleshooting of security tools.
  • Provide rotating on-call support for security tools to include nights and weekends.
  • Provides direct support to the business and IT staff for security-related issues.
  • Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness.
  • Represents the security needs of the organization by providing expertise and assistance in all IT projects with regard to security issues.
  • Educates IT and the business about security policies and consults on security issues regarding user built/managed systems.
  • Develops and implements security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures, and use of firewalls and encryption routines).
  • Enforces security policies and procedures by administering and monitoring security profiles; reviews security violation reports; investigates possible security exceptions; and updates, maintains, and documents security controls.
  • Review firewall rules and access control lists
  • Performs other related duties as assigned.


EDUCATIONAL GUIDELINES


Bachelor's Degree in Computer Science, Information Systems or the equivalent combination of education, training, or work experience. One or more of the following certifications is highly preferred: CISSP, CISM, CEH, GSEC, MCSE, RHCE, CCNP, and/or CASP.


GENERAL KNOWLEDGE, SKILLS & ABILITIES



  • Experience supporting one or more of the following types of security applications or tools: Security Information Event Monitoring (SIEM), Intrusion Detection Systems (IDS), Database Activity Monitoring (DAM), Data Loss Prevention (DLP), Privileged Access Management (PAM), Identity Management (IDM), Hardware Security Module (HSM), Transparent Database Encryption (TDE), Enterprise Key and Certificate Management (EKCM), Database Encryption, File Encryption, and/or API Encryption
  • Experience working with QRadar, Guardium, Websense, Splunk, SafeNet, Venafi, Protegrity, SailPoint, Secret Server, or an industry equivalents is a plus
  • Working knowledge of Linux, Windows, and Network Operating Systems
  • Understanding of networking concepts and technologies
  • Experience writing scripts to automate tasks using common scripting languages (PowerShell, Bash, Python, Perl, etc.)
  • Basic knowledge of XML, JSON, and/or Regular Expressions
  • Basic knowledge of databases and SQL queries


    Knowledge of business environment and the ability to evaluate information security risk implications

  • Knowledge of relevant legal and regulatory requirements
  • Knowledge of common information security management frameworks
  • Experience working with a diverse range of data sources/streams and managing these effectively
  • Excellent analytical, decision-making and problem-solving skills
  • Ability to develop partnership-oriented relationships with business executives and functional leaders, especially as it relates to operations and technology
  • Strong background in security operations, processes, solutions and technologies
  • Strong understanding of policy, compliance, and best practice security principles
  • Knowledge of infrastructure, key processes, and technology-oriented risk issues, specifically around security and privacy
  • Experience with enterprise risk assessment methodologies
  • Must be able to multitask in a fast-paced environment with focus on timeliness, documentation, and communications with peers and business users alike.
  • Proficiency in project management
  • Ability to communicate well both verbally and in writing to technical and non-technical audiences of various levels within company or outside the organization (executives, regulators, clients, etc.)
  • Results oriented, business focused, and successful at interfacing across multiple organizational units


JOB FAMILY LEVEL


Advanced professional level role. Works independently on many IT security projects as a project team member, more frequently as a project leader. Works on large, complex security issues or projects that require increased skill in multiple IT functional areas. Requires extensive knowledge of security issues, techniques and implications across all existing computer platforms. May manage or serve as a project leader for IT security projects or the security components of multi-discipline projects. Must have extensive knowledge in networking, databases, systems and/or Web operations. May coach more junior staff. Typically requires six (6) or more years of combined IT and security work experience with a broad range of exposure to systems analysis, applications development, and database design and administration and at least three (3) or more years of experience in a lower-level IT Security Analyst role. Must currently possess or be willing to obtain CISSP or equivalent professional certification within 6 months of starting (CISM, GSEC, etc.).

Categories

  • Information Technology

Randstad utilizes a technology-driven focus with a human touch to provide better staffing and business solutions to organizations around the world. Our team of experts match professionals with available career opportunities in a variety of fields.

Featured Jobs

Career News

Share this job:

IT Security Analyst

Randstad Technologies
Jacksonville, FL 32204

Share this job

IT Security Analyst

Randstad Technologies
Jacksonville, FL
US

Separate email addresses with commas

Enter valid email address for sender.

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast