Hiring:W2 Candidates Only
Visa:Open to any visa type with valid work authorization in the USA
Description:
- This position will be accountable for performing a wide range of complex security procedures and processes necessary
- to ensure the safety of information systems and assets and protect systems and data from intentional or inadvertent
- access or destruction. Ensures that users understand and adhere to the necessary procedures and processes to
- maintain security. Conducts complex IT data and security forensic investigations. Conducts internal vulnerability
- management to meet regulatory and standards compliance. Requires knowledge of domain structures user
- authentication and digital signatures. Requires in-depth knowledge of intrusion detection and internet architecture.
- Implements and administers Cybersecurity related systems.
Required Skills/Experience:
- 5 years of Cybersecurity related experience.
- Tenable/Nessus or other vulnerability scanning experience.
- Endpoint protection AV/XDR AV/XDR policy config endpoint agents.
- SIEM logging/syslog Alerting.
- Windows/Linux Server administration of on-premise Cybersecurity applications.
- Experience with cybersecurity tools used for routine security related tasks. Example: Nmap Wireshark phishing sim.
- Experience participating in situational tabletop exercises (malware phishing ransomware).
- Experience with vulnerability scanning identification and remediation penetration testing endpoint
- protection/hardening CIS benchmarks NIST/Cybersecurity frameworks MITRE ATT&CK Matrix IRS 1075 SSA PII
- threat vectors threat hunting incident response and remediation.
- Experience with common IT infrastructure found in most large organizations including but not limited to load balancers
- network LAN/WAN firewall email AV SIEM GPO web proxy web application development processes database
- Windows/Linux server Windows workstation wireless 365 ATP/DLP.
- Strong written and verbal communication. Office (Word Excel Outlook One-Drive SharePoint).
Preferred
- XQL Python PowerShell
- Cybersecurity certification
Hiring:W2 Candidates Only Visa:Open to any visa type with valid work authorization in the USA Description: This position will be accountable for performing a wide range of complex security procedures and processes necessary to ensure the safety of information systems and assets and protect systems ...
Hiring:W2 Candidates Only
Visa:Open to any visa type with valid work authorization in the USA
Description:
- This position will be accountable for performing a wide range of complex security procedures and processes necessary
- to ensure the safety of information systems and assets and protect systems and data from intentional or inadvertent
- access or destruction. Ensures that users understand and adhere to the necessary procedures and processes to
- maintain security. Conducts complex IT data and security forensic investigations. Conducts internal vulnerability
- management to meet regulatory and standards compliance. Requires knowledge of domain structures user
- authentication and digital signatures. Requires in-depth knowledge of intrusion detection and internet architecture.
- Implements and administers Cybersecurity related systems.
Required Skills/Experience:
- 5 years of Cybersecurity related experience.
- Tenable/Nessus or other vulnerability scanning experience.
- Endpoint protection AV/XDR AV/XDR policy config endpoint agents.
- SIEM logging/syslog Alerting.
- Windows/Linux Server administration of on-premise Cybersecurity applications.
- Experience with cybersecurity tools used for routine security related tasks. Example: Nmap Wireshark phishing sim.
- Experience participating in situational tabletop exercises (malware phishing ransomware).
- Experience with vulnerability scanning identification and remediation penetration testing endpoint
- protection/hardening CIS benchmarks NIST/Cybersecurity frameworks MITRE ATT&CK Matrix IRS 1075 SSA PII
- threat vectors threat hunting incident response and remediation.
- Experience with common IT infrastructure found in most large organizations including but not limited to load balancers
- network LAN/WAN firewall email AV SIEM GPO web proxy web application development processes database
- Windows/Linux server Windows workstation wireless 365 ATP/DLP.
- Strong written and verbal communication. Office (Word Excel Outlook One-Drive SharePoint).
Preferred
- XQL Python PowerShell
- Cybersecurity certification
View more
View less