Description
Company Description
IT
Job Description
Role: Security Analyst
Location: Miami, FL
Duration: 6+ Months
BGV will be done for the selected candidates.
Performs threat hunting, triaging, and reporting information security events
Provide oversight to security incidents, processes, and escalations to determine the root cause and extent of the incidents
An understanding of Unix security
Drive the analysis and trending of security log data from a heterogeneous security devices
Performs information security policy review for third party/vendor relationships and monitor the service level agreements per agreed upon terms
Assist the security incident response team through all remediation and recovery phases
Develop procedures related to the review of vulnerabilities.
Develop security policies, standards, procedures and guidelines.
Implement and support security-focused tools and services.
Experience with the following tools is a plus: Nexspose
Responsible for security incident report investigation, and incident handling working closely with internal team, HR and Legal to perform investigation of security incidents in accordance with company policy.
Research the latest information security trends
Conduct strategic analysis of existing, new and evolving network security technologies
Knowledge of vulnerability scanning using the Tenable Nessus system or other equivalent network vulnerability assessment tools
Provide subject matter expertise to IT Compliance during IT internal and external audits
Assess security risks to the corporation's information and communications systems
Ability to research and understand the latest vulnerabilities and threats
Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques
Knowledge of malware families, botnets, threats by sector, and various attack campaigns and attacker methods, tools/techniques/practices
Conducts security research in keeping abreast of latest security issues.
Recognizes potential, successful and unsuccessful intrusion attempts and compromises through reviews and analyses of relevant event detail and summary information
Please respond with your word resume and requested details:
Full Name :
Work Authorization:
Contact Number :
Email ID :
Skype ID:
Current location:
Willing to relocate :
Rate/hr :
Additional Information
All your information will be kept confidential according to EEO guidelines.