*Title: ** Endpoint Security Analyst*
*Work authorization: **any (candidate must be authorized to work in US)*
*Location: ** Tallahassee, FL*
*Estimated Duration: **6 months with possible extension*

*Must-have skills: * *UNIX, NT, SCCM, PowerShell, SEIM, SPLUNK,
Malwarebytes, Windows Defender, TCP/IP, NIST, CIS Critical Security
Controls*

*Requirements:*

   - Experience in security practices and procedures (4+ years);
   - Experience in systems administration and security tools;
   - Experience with network operating systems (e.g., UNIX, NT);
   - Experience with Microsoft Systems Center Configuration Manager (SCCM)
   and other Microsoft support tools/technologies such as Group Policy and
   PowerShell;
   - Experience with Security Information and Event Management (SEIM) tools;
   - Experience utilizing, configuring and managing SPLUNK (preferred);
   - Experience with vulnerability management tools;
   - Experience with Malwarebytes, Windows Defender, and other
   vulnerability scanning tools;
   - Experience in the use of appropriate security controls to protect the
   confidentiality, integrity and availability of information technology
   resources;
   - Experience with, various computing technologies such as, but not
   limited to: Windows, Windows Server, Transmission Control Protocol/Internet
   Protocol (TCP/IP);
   - Experience in the use of information security practices and standards
   such as NIST, CIS Critical Security Controls and the Florida Cybersecurity
   Standards (74-2 Florida Administrative 60GG-2);
   - Experience in the application of operating system security settings
   through direct manipulation of the registry;
   - Bachelor’s Degree in Computer Science, Information Systems, Business
   Administration, Information Security or another related field; or
   equivalent work experience.


*Responsibilities *include but are not limited to the following:

   - Develop, evaluate and manage systems security across the enterprise;
   - Assist in the development and implementation of security policies and
   procedures (e.g., user log-on and authentication rules, security breach
   escalation procedures, security auditing procedures and use of firewalls
   and encryption routines);
   - Enforce security policies and procedures by administering and
   monitoring security profiles, reviews security violation reports and
   investigates possible security exceptions, updates, and maintains and
   documents security controls;
   - Provide direct support to the business and IT staff for systems
   security related issues;
   - Serve as a member of the Computer Security Incident Response Team;
   - Responsible for the tracking and monitoring of endpoint software
   viruses;
   - Provide support/information as needed for implementation of secure
   baselines through package roll out and/or group policy;
   - Responsible for the administration and maintenance of endpoint
   vulnerability products, endpoint vulnerability risk reporting, and routine
   endpoint vulnerability scanning,



Thanks...

Uday Varanganti
Recruiting Specialist
[email protected]
O: (785)380 8559

-- 
You received this message because you are subscribed to "rtc-linux".
Membership options at http://groups.google.com/group/rtc-linux .
Please read http://groups.google.com/group/rtc-linux/web/checklist
before submitting a driver.
--- 
You received this message because you are subscribed to the Google Groups 
"rtc-linux" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/rtc-linux/CAEmiLYsRC-zh_Fzrd8UFipn1GSs%3DZZqfesPHWPQVbRpMPto9Zg%40mail.gmail.com.

Reply via email to