Information Security Analyst - Syntricate Technologies Inc
Memphis, TN
About the Job
This is a contract position, and we offer payment options of W2, C2C, or 1099 per hour.
The interview process will be initiated as soon as possible.
We are excited to hear back from you.
Job Description:
Role: Information Security Analyst
Location: Memphis, TN – Onsite [3 Days every week]
Duration: 6 months
M2F – 8:00 am – 5:00 pm
Description: Responsible for assisting the Information Security Lead with the technical analysis and reporting on the information security areas including: Host, Client, Mobile, And Network Systems; Internal and External Access Control Lists; Intrusion Detection and Prevention; Electronic Data Protection; and Evolving Threats. Also provides Information Security Consultation to Project Teams.
Requirements
Additional Recruitment Details
Top Skills Preferred
Ideal Candidate Profile
Essential Job Functions
The interview process will be initiated as soon as possible.
We are excited to hear back from you.
Job Description:
Role: Information Security Analyst
Location: Memphis, TN – Onsite [3 Days every week]
Duration: 6 months
M2F – 8:00 am – 5:00 pm
Description: Responsible for assisting the Information Security Lead with the technical analysis and reporting on the information security areas including: Host, Client, Mobile, And Network Systems; Internal and External Access Control Lists; Intrusion Detection and Prevention; Electronic Data Protection; and Evolving Threats. Also provides Information Security Consultation to Project Teams.
- Requires thorough knowledge of information security practices and technologies
- Ability to speak and write clearly and understandably for internal and external relations
- Understand extremely complex verbal or written instructions
- Understand information security issues dealing with computer hardware, software, and infrastructure.
Requirements
- SIEM – Google SecOps and Rapid7 with RFP for new SIEM in the works
- Akamai CDN w/ associated security tools
- CASB / SASE
- Palo Alto firewalls
- Forensics
- Microsoft 365 security administration
- Okta (IAM)
- CyberArk (Privileged access)
- Sailpoint (Governance)
- Varonis
- Mobile Threat Defense
- Prefer Security+ or similar certification or higher in the field of Information Security as well as a demonstrated interest in Information Security
- While the candidate doesn't have to know all these tools, a broad range of experience in the area in which these tools cover is required
Additional Recruitment Details
Top Skills Preferred
- SME in multiple areas of Information Security e.g. SIEM, Incident Response, CTI, Identity, Application Security, M365 Administration.
Ideal Candidate Profile
- Ability to work with a highly skilled, collaborative group of professionals and offer contributions in multiple areas of expertise in Information Security as mentioned above.
- Owning their work and contributing proactively where needed.
- Bringing value with the soft skills necessary to communicate effectively and collaborate across departmental lines where needed.
- Good attitude and desire to succeed both in a team and individually.
- Knowledge ordinarily acquired through the attainment of a Bachelor's degree in Business or Information Systems plus 3 years of progressive information security experience.
- Information security certification preferred. If no degree, must show extensive years of experience.
Essential Job Functions
- Work in the Information Security lab and work with a close team of analysts, engineers, and architects to mature the Information Security department and protect the organization and its donors.
- Analyzes and monitor enterprise information security systems and reports all suspicious activity. Requires use of a personal computer.
- Assists in developing and maintaining the information security response plan and enterprise information security policies and procedures.
- Operates in an unbiased manner, maintaining confidentiality and integrity with all information security events.
- Assists the Information Security Lead and other systems administrators on information security issues; provides information security consulting services to system administrators.
- Provide security best practices and guidance to project teams.
- Works with Information Security team to perform information security risk assessments and serves as an internal analyst for security issues.
- Responsible penetration testing and vulnerability management; provides accurate and timely reporting; escalates issues to management.
- Uses the Internet and other similar information collection methods to stay current with the latest information security threats and mitigation techniques.
- Provides analysis of information security processes and tools recommending innovative solutions for enhancing processes and toolsets.
- Assist with training personnel on information security issues.
Source : Syntricate Technologies Inc