Information Security Analyst Information Technology (IT) - Detroit, MI at Geebo

Information Security Analyst

Quick Apply Contract 4 hours ago Full Job Description Scope of Services:
Protect data and information systems against unauthorized access, modification, or destruction Maintain and monitor data security Manage network, intrusion detection and prevention systems Respond to and analyze security incidents Perform security awareness training Prepare status reports on security matters to develop security risk analysis scenarios and response procedures.
Responsible for the tracking, monitoring and resolution of security incident tickets.
Audit and report on user accounts and access permissions Provides direct support to the business and IT staff for security related issues.
Recommend and implement appropriate cybersecurity tools and countermeasures Assist in the development and documentation of security procedures and business continuity plans.
Perform internal vulnerability security scans, monitor Web Portal from support services that conduct monthly external network vulnerability scans, analyze report data, and create, assign, and monitor technical service tickets to responsible technicians for the address and remediation of any discovered vulnerabilities.
Coordinate and participate in the administration of Disaster Recovery and Business Continuity plans and tests.
Track, report, and document results.
Participate as a member of the Technology Services Cyber Incident Response Team (CIRT).
Analyze data and incidents and develop reports and brief on findings, Maintain an advance knowledge set of current PCI-DSS requirements.
Monitor controls and practices to assure of continuous alignment to PCI-DSS Compliance.
Assist the Technology Services Security Manger in annual PCI-DSS Attestations.
General
Qualifications:
The successful candidate should have a broad business background, good interpersonal communications skills and a thorough understanding of information security practices Qualifications & Skills:
For consideration, the candidate must meet the following minimum requirements.
1-5 years' experience in information systems security (Cyber security systems monitoring, Incident response, threat hunting) Familiarity with security threats involving devices, networks, and systems as well as solutions that prevent, detect, and respond to those threats.
Familiarity with current cybersecurity technologies such as firewalls, proxies, network and host-based intrusion prevention, data loss prevention, vulnerability assessment, security information/event management, endpoint security, anti-virus/anti-malware, etc.
Must demonstrate knowledge in threat hunting across a variety of data sources including writing custom SIEM queries, EDR queries, and other technologies.
Familiarity with security intelligence and research methods.
Knowledge of Information Security best practices.
B.
S.
in Computer Science, Engineering, Information Systems, or equivalent experience preferred.
Operational knowledge of web/email applications and their potential vulnerabilities.
Operational knowledge of operating systems and their potential vulnerabilities.
CEH, CASP, or SANS GSEC preferred.
Job Type:
Contract Salary:
$25.
49 - $59.
61 per hour Schedule:
8 hour shift Ability to commute/relocate:
Detroit, MI 48219:
Reliably commute or planning to relocate before starting work (Required)
Experience:
information systems security:
6 years (Preferred) Cybersecurity:
3 years (Preferred) prevention, data loss prevention, vulnerability assesment:
5 years (Preferred) data loss prevention, vulnerability assessment:
4 years (Preferred) anti-virus/anti-malware:
5 years (Preferred) Work Location:
One location Quick Apply.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.