Title : Lead Security Analyst Opportunity
Hire Type : Contract
Location : Madison Yards Way, Madison, WI (Remote)
Work Arrangement: ~98% Remote but must reside in WI. Mostly remote, but onsite once a quarter or as operational needs dictate. All candidates must be current Wisconsin residents at the time of submission. No relocation allowed.
Required Skills: IT Security (5+ years), IT Domain (8+ years), Lead roles (4+ years), Assessment/Selection of vendor security offerings.
Nice To Have Skills: CISSP.
Feel free to share with me candidates if they meet the following criteria:
The candidate addresses all of the below:
The candidate is currently a Wisconsin resident at the time of submission (and will remain so for the duration of the contract)
8+ years in IT
5+ years in IT Security
4+ years in lead roles
4+ Evaluation/implementation of 3rd Party security offerings
DETAILS
Under the general guidance of the Chief Information Security Officer (CISO) and in cooperation with the Security Technical Team Lead, this position is responsible for providing advanced security analysis to manage the design, implementation, and monitoring of security for ETF’s computer platforms and systems, both at ETF and hosted by the Department of Enterprise Technology (DET). The platforms include network servers, storage, backups, application platforms (mainframe, client/server, web), and application architectures.
This role specializes in information and network security, including risk analysis, control planning, policy development, security control implementation, and compliance monitoring. It may involve leading projects to implement new security controls and operating security systems at ETF.
Required Skills:
· IT Security – 5+ years
· IT Professional – 8+ years
· Project leadership experience – 4+ years
· Experience evaluating and implementing vendor security offerings – 4+ years
Nice to Have Skills:
· CISSP or equivalent – 1+ year
Duties of Role:
· Research vendor offerings and conduct Proof of Concepts (POCs).
· Coordinate with other teams to implement new technologies and remediate issues.
· Monitor asset inventory, installed agents, and device status.
· Review vulnerability dashboards and assess the organizational impact of the changing threat landscape.
· Monitor data inventories for policy violations and produce reports/metrics.
· Process incident response queues and investigate SIEM logs.
· Monitor content filter dashboards and investigate anomalies.
· Manage endpoint firewall operations and adjust as necessary.
· Work independently as well as in a team environment.
Any Graduate