Information Security analyst - American Technology Consulting
Indianapolis, IN
About the Job
The Jr. Security Analyst in Security Operations will collaborate with the ITSecurity Operations department, as well as other Indiana Office of TechnologyTeams to help identify, and collaborate with IT Teams, and state agencies toreduce risk associated with the State of Indiana’s security posture. Inaddition, role will be the point of contact for one or more agencies theindividual will be responsible for creating reports that assesses the agency’scurrent security posture across several subject areas including, but not limitedto, policy compliance, asset/software management, vulnerability management,cloud operations, data security, and identity and access management. Theindividual will then be responsible for conducting meetings with other IT areas,leadership, and with their assigned agencies to address issues found and assistwith the remediation efforts. This role assists other engineers on the largerSecurity Team with the use of tools and their outputs to enhance the security ofstate information.A Day in the Life:The essential functions of this role are as follows:• Provides routine security administration• Professionally handle communications with internal and external stakeholderson compliance issues• Educate control and system owners on compliance workflows and processes• Gather and report on established metrics within the security complianceprograms• Maintain State and Federal security control framework's adherent to CIS, NIST,and Indiana State policies• Assist in defending systems against unauthorized access, modification and/ordestruction• Monitors and address security alerts, incidents and disasters• Assists with supporting network, intrusion detection and prevention systems• Delivers technical reports and work with agencies on findings• Implements effective tools and processes to protect computers, networks,software, data and information systems against any possible attacks• Assists senior staff with security upgrades, tools and countermeasures• Uses outputs from security tools such as anti-virus software, securitymonitoring tools, vulnerability scanning, SIEM, IPS/IDS etc.• Supports security standards, security systems and authentication protocolsThe job description is not designed to cover or contain a comprehensive listingof activities, duties or responsibilities that are required of the employee.Other duties, responsibilities and activities may change or be assigned at anytime.
Source : American Technology Consulting