Job Overview
Key Responsibilities:
- Day-to-day monitoring of business security requests, and taking action(s) as required; following established processes
- DLP design and triaging events for inspection
- Preparing DLP and other KPIs and reports
- Assisting IT and business with security requests, interfacing with internal teams as required
- Participate in the design, development, and implementation of security initiatives to ensure the best possible measures are in place to maintain a secure operation.
- Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems and databases.
- Develop, implement, and enforce security strategies, policies, and procedures
- Analyze, recommend, and implement security technologies such as firewalls, IDS (network and server), certificates, and PKI
- Review, analyze, and/or apply relevant methodologies, programs, policies, procedures, standards, guidelines, and IT Security Risk Management methodologies.
- Develop IT Security standards, procedures, and guidelines pursuant to the requirements of relevant standards, procedures, and guidelines.
- Develop IT Security policy in the areas of IT security and assurance, standard Certification & Accreditation frameworks for IT systems, information infrastructure protection, product evaluation, privacy, Business Continuity Planning, contingency planning and Disaster Response Planning, Research &Development.
- Develop and deliver training material relevant to the resource category.
- Identify threats to, and vulnerabilities of operating systems (such as MS, Unix, Linux, and Novell), and wireless architectures.
- Identify personnel, technical, physical, and procedural threats to and vulnerabilities of IT systems.
- Solid knowledge of enterprise firewall configuration (Palo Alto, Fortigate, SonicWall, Cisco ASA)
- Good understanding of application protocols such as DNS, DHCP, HTTP, FTP, Telnet, SSH, IPSEC, SNMP
- Network security using Cisco ISE (dot1x, profiling, and posturing)
- Working experience in network concepts, including the TCP/IP model, routing protocols, switching technologies, and firewall policies.
- Experience implementing and operating network monitoring and management products.
- Strong knowledge of routing protocols like EIGRP, OSPF, BGP, IPv4/IPv6, PPPoE, Multicast, Wireless (ARUBA), QoS and VXLAN
- Strong knowledge of all aspects of TCP/IP, DHCP, DNS, ARP, SMTP, WCCP, RADIUS, TACACS, NAP, ACLS, STP, F5 Load balancing, and MPLS WAN technology
- Hands-on experience with SIEM analysis will be a plus.
- Work closely with the Cyber Threat Intelligence team to enhance the results of the analysis and provide additional context.
- Act as point of contact to end users and vendors through e-mail and phone.
Education & Experience Requirements:
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related discipline is preferred.
- A minimum of 1 years’ experience in IT support, network security, or related technical roles.
Job Type: Full-time
Pay: Up to $22.00 per hour
Benefits:
- Casual dress
- Company events
- Dental care
- On-site parking
- Vision care
Application question(s):
- Can you provide an example of a time when you monitored and acted on business security requests? What processes did you follow?
- Describe your experience with the analysis of security events, including the use of SIEM tools if applicable.
- Have you implemented or supported network monitoring and management products? If so, which tools have you used?
- Are you familiar with implementing and operating network monitoring and management products? Please list any additional tools or methodologies you have employed that are relevant to this role.
- Have you contributed to the development or enforcement of IT security policies, procedures, and guidelines? (Yes/No)
- Have you been involved in tasks related to business continuity, contingency planning, or disaster response planning? (Yes/No)
- Provide a brief overview of your contributions in these areas.
- Please provide an example of a policy or standard you developed, including the framework (e.g., Certification & Accreditation, Business Continuity Planning) it was based on.
Experience:
- IT support: 1 year (required)
Work Location: In person