Configure custom IT security policies, manage and maintain operational availability of DOH networked devices by using a variety of security applications and systems in cloud or on prem network environments.
This position is for a role that requires candidates to work onsite in a hybrid model.
In addition to the normal background check and compliance items, this candidate will need to pass a State of NJ Fingerprinting background check prior to start.
Experience in the field of Information Systems Security required.
SIEM - Google Chronical
Web Filtering Tool - Zscaler ZIA
Firewall - Firewall rules, subnet, ports
1. Significant Experience with Google Chronical, McAfee SIEM to
(a) Configure and implement rules, data sets, APIs, third party cloud API integration to facilitate ingestion of logs sources like o365, Azure AD, AWS (b) Migrate and implement McAfee SIEM log data sets to Google Chronical (c) Configure IOC, and alerts (d) Conduct searches raw logs, Investigate alerts, assets, domains, users, IPs, files, Google Cloud Threat Intelligence (GCTI). (e) Configure and monitor events using rules, and run rules against historical data (f)Working experience with YARA-L language
2. Experience with Firewall and Firewall rules, IP addressing, subnets, ports and VPN.
(a). Configure and implement firewall rules (b). Audit firewall rules and network segmentation. (c). Verify and Submit firewall rule requests
3. Experience with Web filtering tool specifically with Zscaler (ZIA), and Cisco Umbrella
(a). Implement new web filtering solution Zscaler ZIA (b) Test, verify and implement policies, create groups, grand access to groups.
4. Experience with NextGen Antivirus Crowdstrike to investigate, and remediate incidents, alerts, IOCs, and IOAs.
5. Experience with AD, GPOs, Security groups, Windows Servers, Desktop OS.
6. Experience in the field of Information Systems Security required. Analyst must have working knowledge of relevant FISMA/NIST information security regulations and guidelines.
7. Working knowledge of IT Security Best Practices regarding (a) networks and networking including protocol analysis, anomaly detection, and troubleshooting
Required/Desired Skills
Skill | Required /Desired | Amount | of Experience | Exp you have |
Prior hands on experience configuring, migrating and implement rules, data sets, APIs, and third party cloud API's for the Google Chronicle SIEM | Required | 2 | Years | |
Prior hands on experience configuring, migrating and implementing SIEM rules using McAfee SIEM | Required | 3 | Years | |
Prior experience documenting, creating and provisioning network firewall rule sets | Required | 3 | Years | |
Prior hands on knowledge and experience conducting security analysis using Crowdstrike in a professional environment | Highly desired | 3 | Years | |
Prior hands on knowledge and experience conducting group policy using Active Directory, Server and Desktop OS in a professional environment | Highly desired | 3 | Years | |
Prior hands on knowledge and experience of TCP/IP segmentation, ports and DNS protocols | Highly desired | 3 | Years | |
Ability to demonstrate effective written and verbal communication skills. | Highly desired | 3 | Years | |
Questions
No. | Question |
Question1 | Where is the candidate currently geographically located? |
Question2 | If the candidate resides more than 1 hour from the client site, will the candidate relocate for the position? |
Question3 | Is the candidate able to work onsite at least 3 days per week according to the hybrid schedule? |