[Close] 

Sr. Information Security Analyst

Company Name:
Allied Global Services
Are you ready for something different? Do you have a passion for security controls? Do you love the practical aspects of cyber security? Is compliance of policies and procedures important to you? If yes, let's talk today about why our client is the right next step for you and your career.


What you'll do:
Coordinating investigation and reporting of security incidents.
Monitor, assess, and fine-tune business continuity and disaster recovery program, perform/coordinate network penetration tests, application vulnerability assessment scans
and risk assessment reviews.
Develop information security procedures to align with security policies
Ensure compliance with company policies and procedures through auditing and monitoring of security controls
Report effectiveness and/or lack of security controls to appropriate personnel, advise on remediation plans to address gaps
Participate as a member of Incident Response and Business Continuity plans
Participate in PCI compliance programs
What you'll need:
Requires a Bachelor's degree in
computer
science, information security, or a related field, or equivalent work experience
Working Knowledge of vulnerability testing desired
Experience with log management/SIEM reporting tools (Splunk)
Understanding of networking and TCP IP Principles
Understanding of endpoint security controls
Familiar with security software products and audit tools (Nessus, Microsoft Baseline Analyzer, etc.)
Understand information security concepts, protocols, "industry best practices" and strategies
Investigative and/or assessment/audit experience
Knowledge of Microsoft Active Directory, LDAP, Internet security and network security technologies (TCP/IP, firewalls, IDS, Anti-Virus products, etc.) and third party security or audit tools is required, as well a understanding how to implement application level security controls and mechanisms
Security related certifications desired (Security+, GIAC, CISSP, etc.)

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Cybersecurity Program Analyst Lead
Fort Leavenworth, KS Calibre
Fabric & Color Analyst - Manhattan, KS
Manhattan, KS Hanes Brands
Sr. Syteline Controller
Wichita, KS Washington Frank
Senior SAP Configuration Analyst
Wichita, KS INVISTA S.A.R.L.