Dear Associates,
Hope you are doing great! *Please reply to **[email protected] <[email protected]> * This is Ali Ahmed from Exatech Inc. We have an immediate need for below mention requirement, if you feel that you are a perfect match to this requirement, please forward your most updated resume along with the best time and number to carry out further discussions. Looking forward to hear from you... *Role: Cyber Security Analyst* *Location: Milwaukee, WI* *Duration 6+ Months* *Rate: $/hr on C2C All Incl.* *Job Description:* The Cyber Security Analyst is responsible for the daily activities associated with information security throughout the enterprise including, but not limited to, investigating and reporting for incident response, vulnerability scanning, remediation efforts and patch management. Development of security information and event management including watch list, alerting and problem resolution. The individual will assist the Information Technology department in developing a state of the art cyber security incident response program. This includes advanced persistent threat, persistent threat, policies and program resilience pertaining to cyber security. *Job Responsibilities:* Maintain user security by developing access controls, monitoring and evaluation of security standards. Maintain security patches on all server devices and workstations. Responsible for *McAfee* products such as ePo, HIPS, Firewall, Disk Encryption, Virus Scan and mobile device security. Develop and maintain website white lists, and application white lists. Conduct external penetration test that mimic the real world techniques of cybercriminals. Conduct internal network penetration test to look for confirmation weaknesses, unsecure network files shares, and data leakage. Monitor the enterprise computing environment (servers, firewalls, intrusion detection/prevention systems, anti-virus and malware) logs, and network traffic for activities including but not limited to: policy violations, abnormal behaviors, intrusions, best practice recommendations, etc. Schedule regular cybersecurity reports (i.e., event logs, firewalls, cyber incidents). Implement and audit domain administration restrictions, and Group Policy application on user and computer objects. Review and monitor administrator account management (normal and privileged). Research and deploy DLP standards pertaining to products. Responsible for Annual Business Continuity testing including RPO/RTO metrics for all assets managed at corporate and co-location. Assist with reviewing and remediating items found during vulnerability scanning both internal and external. Participate in information security audits and oversee penetration testing of all networks and systems to identify system and application vulnerabilities. Identify new vulnerabilities and threats. Create and maintain a cyber security risk assessment. Execute information security project and initiatives. Draft and review information security policies, standards and procedures. Regards *Ali Ahmed* *Exatech Inc* 4758 Forest Ridge Dr Mason OH 45040 Phone: 513-433-5531 Email: [email protected] Web: www.exatechinc.com -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
