Overview
On Site
$60 - $65
Contract - W2
Contract - 6 Month(s)
Skills
CrowdStrike
SIEM
Splunk
SCCM
Defender
Job Details
Contract to Hire Position W2 candidates only
Job Responsibilities:
The responsibilities below illustrate work performed by this position. Not all duties assigned to this position are included, nor is it expected that everyone in this position will be assigned every job responsibility.
SECURITY MONITORING
- Respond to all user, system, and network security incidents.
- Troubleshoot problems associated with security tools.
- Stay abreast of emerging security threats, vulnerabilities, and controls.
- Filter and analyze large datasets from security logging and telemetry sources and build tools to integrate data into operational controls.
- Automate security controls, data, and processes to provide improved metrics and operational support.
- Filter and analyze large datasets from security logging and telemetry sources and build tools to integrate data into operational controls, including SIEM and log Aggregation Tools. Tools may include Splunk or other managed SIEM solutions that utilize the Open Cybersecurity Schema Framework to normalize log data.
- Knowledge of the latest trends and awareness of current hacking techniques and cybercrime.
- Familiarity with firewall rules and advanced threat protection capabilities in next-generation firewall technologies is a plus. Candidate should have a working knowledge of either Cisco or Palo Alto firewall technologies.
HOST AND CLOUD SECURITY
- Implement and administer automated security update technologies for client and server systems. Candidate should be familiar with WSUS for server patching, Intune for client patching or SCCM.
- Implement and administer advanced endpoint protection technologies. Technologies should include Windows Defender, CrowdStrike or other 3rd party MDR agents.
- Test and identify network and system vulnerabilities and work with the appropriate owners to address them. Candidates should be familiar with network scanners such as Nessus, Tenable or Qualys and be able to interpret reporting and communicate remediation steps to others in the department.
- Help shape the organization s security policies and standards for use in on-premises and cloud environments.
- Create technical documents on the use of security technologies.
DATA SECURITY AND COMPLIANCE
- Direct and influence multi-disciplinary teams in implementing and operating information security controls. Candidate should be familiar with NIST, CJIS or CIS frameworks and understand how to implement one or more of these standards in a working environment.
- Provide subject matter expertise on information security architecture and systems engineering to other IT and business teams.
- Interpret security and technical requirements into business requirements and communicate security risks to relevant stakeholders.
- Perform other related duties as requested.
Minimum qualifications (mandatory):
- Bachelor s degree. Additional experience may be substituted for education.
- Two years of related work experience with computer systems, applications and Cyber Security technologies. Additional education may substitute for experience.
Preferred Job Qualifications:
- Knowledge in the assigned technical areas this position is responsible for.
- A CISSP certification is desirable.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.