*Title: ** Endpoint Security Analyst* *Work authorization: **any (candidate must be authorized to work in US)* *Location: ** Tallahassee, FL* *Estimated Duration: **6 months with possible extension*
*Must-have skills: * *UNIX, NT, SCCM, PowerShell, SEIM, SPLUNK, Malwarebytes, Windows Defender, TCP/IP, NIST, CIS Critical Security Controls* *Requirements:* - Experience in security practices and procedures (4+ years); - Experience in systems administration and security tools; - Experience with network operating systems (e.g., UNIX, NT); - Experience with Microsoft Systems Center Configuration Manager (SCCM) and other Microsoft support tools/technologies such as Group Policy and PowerShell; - Experience with Security Information and Event Management (SEIM) tools; - Experience utilizing, configuring and managing SPLUNK (preferred); - Experience with vulnerability management tools; - Experience with Malwarebytes, Windows Defender, and other vulnerability scanning tools; - Experience in the use of appropriate security controls to protect the confidentiality, integrity and availability of information technology resources; - Experience with, various computing technologies such as, but not limited to: Windows, Windows Server, Transmission Control Protocol/Internet Protocol (TCP/IP); - Experience in the use of information security practices and standards such as NIST, CIS Critical Security Controls and the Florida Cybersecurity Standards (74-2 Florida Administrative 60GG-2); - Experience in the application of operating system security settings through direct manipulation of the registry; - Bachelor’s Degree in Computer Science, Information Systems, Business Administration, Information Security or another related field; or equivalent work experience. *Responsibilities *include but are not limited to the following: - Develop, evaluate and manage systems security across the enterprise; - Assist in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines); - Enforce security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls; - Provide direct support to the business and IT staff for systems security related issues; - Serve as a member of the Computer Security Incident Response Team; - Responsible for the tracking and monitoring of endpoint software viruses; - Provide support/information as needed for implementation of secure baselines through package roll out and/or group policy; - Responsible for the administration and maintenance of endpoint vulnerability products, endpoint vulnerability risk reporting, and routine endpoint vulnerability scanning, Thanks... Uday Varanganti Recruiting Specialist [email protected] O: (785)380 8559 -- You received this message because you are subscribed to "rtc-linux". Membership options at http://groups.google.com/group/rtc-linux . Please read http://groups.google.com/group/rtc-linux/web/checklist before submitting a driver. --- You received this message because you are subscribed to the Google Groups "rtc-linux" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/rtc-linux/CAEmiLYsRC-zh_Fzrd8UFipn1GSs%3DZZqfesPHWPQVbRpMPto9Zg%40mail.gmail.com.
