Dear Consultant,
I recently came across your resume posting on the internet and was
wondering if you are still available or interested in
hearing about other career opportunities? Below is a job description I
would like to discuss with you. If you or someone you
know might be interested in hearing more about this or other career
opportunities please email me a word version of you
resume along with the best time and number to reach you at.

*REPLY ME AT:dayle.wil...@itbtalent.com <dayle.wil...@itbtalent.com>*

TitleL: Cyber Security Analyst
Location: Columbus OH
Duration: 6 Months

NOTE: !!Must Need  GC & USC!!

Job Family Description:
Designs, analyzes, develops, codes, tests, debugs and documents programming
to satisfy business requirements. Proficient in application development
skills for more than one technology as well as proficient in multiple
design techniques. This position should typically be used for an advanced
or lead level resource.

Core Qualifications
•Extensive knowledge of all common business-related IT functions • Able to
identify potential online security risks • Adept at preparing detailed
training procedures • Solid understanding of various security software
applications • Strong work ethic that includes solid attendance record and
frequent overtime • Excellent internal and external communications skills

Certifications
CISSP® - Certified Information Systems Security Professional

Responsibilities:
• Responsibility for information cyber security analysis & response with
the mission of protecting the firm from internet attacks / threat actors.
• Lead initiatives and the implementation of capabilities in order to
advance the Cyber Threat program • Enhance and distribute security incident
response and escalation procedures to ensure timely and effective handling
of security events and alerts • Apply knowledge of technical, analytical
skills to ensure the confidentiality, integrity, and availability of all
information systems assets and ensure compliance with company policies,
procedures, contractual, and regulatory requirements.
• A solid understanding of Penetration Testing, Vulnerability Management,
Threat Vector Analysis, Intrusion Detection and Prevention, Incident
Management and Response, Web Application Security, Risk Assessment and
Mitigation methodologies, and Counter Threat Operations.

Work Habits / Soft Skills
• Ability to work methodically and is very detail oriented • Eagerness to
dig into technical questions and examine them from all sides • Enthusiastic
and highly adaptable • Strong analytical and diagnostic skills •
Demonstrated skills in innovation and collaboration • Keep a current
understanding of vulnerabilities from the Internet • Maintaining awareness
and knowledge of contemporary standards, practices, procedures and methods
• Excellent presentation and communications skills to effectively
communicate with management and customers • Ability to clearly articulate
complex concepts both written and verbally • Ability, understanding, and
usage of active listening skills especially with customers

Regards:
Dayle Wilson - IT Technical Recruiter
ITBrainiac Inc.
Direct : 201-448-4949
dayle.wil...@itbtalent.com

-- 
You received this message because you are subscribed to the Google Groups "SAP 
or Oracle Financials" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-or-oracle-financials+unsubscr...@googlegroups.com.
To post to this group, send email to sap-or-oracle-financials@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-or-oracle-financials.
For more options, visit https://groups.google.com/d/optout.

Reply via email to