Remote NG911 Security Analyst

Overview

$Negotiable
Full Time
Part Time
Accepts corp to corp applications
Contract - Independent
Contract - W2
Contract - 12

Skills

NG911 Security Analyst

Job Details

Location: Remote: Monday- Friday; 9-5 ET; Ability to come on-site as required

Experience: 8YEARS

Duration: 11 MONTHS

Work Hour: 35 hours/week

Job Description

This request is for a NG911 Subject Matter Expert (SME) needed to continue the project work for the Class 1/2/3 and Call Handling upgrades of the Next Generation 9-1-1 emergency call system and provide expertise and technical knowledge during the configuration, and test phases.

NG911 - Security Analyst

Determine security requirements by evaluating business strategies and business requirements.

Analyze appropriate security assurance levels.

Evaluate security policy and next-generation threats.

Analyze potential impact of new threats and exploits, develop, and implement expert firewall solutions to mitigate those threats.

Analyze risks to critical applications and recommend security controls.

Communicate risks to relevant business units.

SCOPE OF SERVICES

NG911 - Security Analyst

Determine security requirements by evaluating business strategies and business requirements.

Analyze appropriate security assurance levels.

Evaluate security policy and next-generation threats.

Analyze potential impact of new threats and exploits, develop, and implement expert firewall solutions to mitigate those threats.

Analyze risks to critical applications and recommend security controls.

Communicate risks to relevant business units.

MANDATORY SKILLS/EXPERIENCE Note: Candidates who do not have the mandatory skills will not be considered

  • Minimum 8 years of experience with Intrusion Prevention Systems and Tools.
  • Extensive experience performing Cyber and Technical Threat Analyses.
  • Familiarity with Security Regulations and Standards.
  • Monitoring and responding to malicious activity, and perform cybersecurity investigations
  • Perform technical and forensic investigations.
  • Create playbook for security events.
  • Analyze system services, operating systems, networks, and applications to address possible cyber-attacks.
  • Automate processes leveraging scripts (Python, batch, etc.)
  • Run reports to gather data from SQL databases (SQL).
  • Creation of SIEM dashboards to help visualize data and events.
  • Respond and resolve basic operational technical Incidents and Requests
  • Creation of rules to address false/positive events.
  • SOAR expertise.
  • Experience in onboarding Logs
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.