- Expiry Date: 18 June 2021
To detect, monitor, provide analysis and resolution on security incidents across the organization.To implement appropriate security measures to prevent security vulnerabilities.
Essential functions and responsibilities:
Analyzes and resolves security incidents.
Administers various IT security tools and applications.
Performs analysis of suspected malicious code and other software or programs and provides written and/or verbal analysis to management.
Assists IT groups and business units as necessary in troubleshooting compatibility issues between security tools and business or productivity programs.
Analyzes client and customer needs as required.
Works closely with management on assigned projects from inception through implementation ensuring adequate internal communication and user involvement is maintained.
Assists management in investigating IT or cyber-security events and developing resolutions.
Provides feedback and suggestions to improve IT Security processes and procedures.
Works closely with project managers to meet and complete project milestones accurately and on time.
**Experience with deploying SIEM sensors and event monitors, configuring log capture, monitoring SIEM and collector operations. 12+ months experience! **
Skills & Knowledge:
Knowledge of artificial intelligence and machine learning
Knowledge of the confidentiality, integrity and availability (CIA) triad
Knowledge of Information technology security frameworks
Knowledge of carbon black protection, Symantec endpoint protection and security information and events management (SIEM) solutions preferred
Ability to work with networked computers and servers
Ability to work independently and solve problems as they arise
Ability to handle confidential and sensitive information with integrity
Ability to continuously learn new technologies
Self-motivated and possess the ability to work in fast-paced environment
Oral and written communication skills, including presentation skills
PC literate, including Microsoft Office products
Analytical and interpretive skills
Strong organizational skills
Ability to work in a team environment
Ability to meet or exceed Performance Competencies
Education & Licensing:
Bachelor's degree in a computer related field from an accredited college or university preferred.Major in information systems or computer science preferred.CompTIA Security+ certification, Certified Ethical Hacker (CEH), GIAC Certified Enterprise Defender (GCED), and/or Certified Information Security Manager (CISM) preferred.
Six (6) years of related experience or equivalent combination of education and experience required to include four (4) years using transmission control protocol/internet protocol (TCP/IP) services or networks, various operating systems, and desktop productivity software.Experience with network topologies, security and access control tools, encryption technologies and algorithms preferred.
TRANSMISSION CONTROL PROTOCOL
TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL
About ASK: ASK Consulting is an award-winning technology and professional services recruiting firm servicing Fortune 500 organizations nationally. With 5 nationwide offices, two global delivery centers, and employees in 42 states-ASK Consulting connects people with amazing opportunities
ASK Consulting is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all associates.