Gathering your results ...
8 days
Not Specified
Not Specified
Not Specified
<p>The Information Security Analyst will primarily be responsible for monitoring for intrusions and malicious activity, assessing effectiveness of security controls protecting county information assets, identifying gaps, assessing risk, facilitating and participating in the execution the security lifecycle for IT projects, and overseeing compliance with laws and regulations pertaining to county information systems. The ideal candidate for this role will have a holistic approach to assessing security risks and uses abstract thinking to contextualize problems and formulate solutions. This job requires the ability to utilize information from many sources including: frameworks, guidelines, threat-intelligence, and industry best-practices to inform decision making.</p> <p>The anticipated hiring range for this role is $95,452.18 - $109,770.00 annually. The full salary range for the role is $95,452.18 - $138,405.66 annually.</p> <ul> <li>Monitor systems and networks for malicious activity. </li><li>Participate in internal and external security & compliance audits. </li><li>Installation, configuration, and support of technical security controls and countermeasures. </li><li>Maintenance of security policies, procedures, guidelines, and standards. </li><li>Promotes activities to create information security awareness throughout organization. </li><li>Participate as a technical security role of the internal computer incident response team. </li><li>Perform regular vulnerability scans and participate in remediation efforts. </li><li>Monitor and Manage Data Loss Prevention (DLP) solution. </li><li>Work with subject matter experts to complete System Security Plan. </li><li>Assist with monitoring and operating other security solutions under the responsibility of the IT Security group. </li><li>Assist with day-to-day operations within the IT Security group. </li><li>Assist security and technical teams with monitoring and responding to operational alerts. </li><li>Participate as member of internal computer incident response team. </li><li>Attends conferences and training as required to maintain proficiency. </li><li>Perform other related duties and responsibilities as required. </li><li>Research and stay up-to-date on latest threats, vulnerabilities, tools, and techniques, compliance, laws, regulations, and best-practices. </li><li>Must be able to work a flexible schedule when required to operate during maintenance windows of various county departments. </li><li>Unplanned after-hours work is rare but should be expected occasionally. </li><li>Technical aptitude to adapt and learn in a rapidly changing environment and solve complex problems. </li><li>Technical competency to assess and propose security controls to address security gaps. </li><li>Working knowledge of common compliance frameworks such as HIPAA, PCI, NIST. </li><li>Skilled in log and packet analysis. </li><li>Excellent written and verbal communication skills. </li><li>Ability to take initiative with minimal supervision. </li><li>Ability to perform well under pressure and in disruptive environments. </li><li>Strong interpersonal skills, and demonstrated ability to work effectively with customers and colleagues. </li><li>Prior experience in a technical support capacity. </li><li>Knowledge of SAML and Microsoft ADFS is a plus. </li><li>Firewall Administration a plus. </li><li>Working knowledge of TCP-IP networks. </li><li>Ability to work after-hours when required. </li><li>Proficient with Microsoft Windows and Linux operating systems. </li><li>Communicate clearly and concisely, both orally and in writing. </li><li>Establish, maintain and foster positive and harmonious working relationships with those contacted in the course of work. </li><li>Strong knowledge of HIPAA Security Rule and PCI compliance. </li><li>Knowledge of CJIS is a plus. </li><li>Strong technical background and understanding of enterprise networking and datacenter environments. </li><li>Experience with Microsoft Azure and Office 365 is a plus. </li><li>Knowledge of industry best practices and frameworks. </li><li>Up-to-date knowledge of security threats and exploitation techniques. </li><li>Experience configuring, tuning, and troubleshooting Nexpose vulnerability scanner or similar product Experience with Metasploit and Kali Linux a plus </li></ul> <p>Education and Training: A BS in Information Security, Computer Science, Telecommunications, or closely related field, OR equivalent experience is required.</p> <p>Experience: At least three (3) years experience working in technology or information security roles.</p> <p>License or Certificate: </p> <ul> <li> <p>Security+, GIAC, OSCP, CISSP, CCSP, or other equivalent certifications preferred but not required.</p> </li><li> <p>Valid Driver's License and transportation to multiple County buildings.</p> </li></ul> <p>Background Check: Must pass a criminal (CBI) background check.</p>
POST A JOB
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!