Description

Help

Search

 Select CountryCanadaUnited States

 Select State 

 

 All Accounting - FinanceAdvertisingAgricultureAirline - AviationArchitecture - BuildingArt - Photography - JournalismAutomotive - Motor Vehicles - PartsBanking - Financial ServicesBiotechnologyBroadcasting - Radio - TVBuilding MaterialsChemicalComputer HardwareComputer SoftwareConstructionConsultingConsumer ProductsCredit - Loan - CollectionsDefense - AerospaceEducation - Teaching - AdministrationElectronicsEmployment - Recruiting - StaffingEnergy - Utilities - Gas - ElectricEntertainmentEnvironmentalExercise - FitnessFashion - Apparel - TextileFoodFuneral - CemeteryGovernment - Civil ServiceHealthcare - Health ServicesHomebuildingHospitalityHotel - ResortHVACImport - ExportIndustrialInsuranceInternet - ECommerceLandscapingLaw EnforcementLegalLibrary ScienceManaged CareManufacturingMedical EquipmentMerchandisingMilitaryMortgageNewspaperNot for Profit - CharitableOffice Supplies - EquipmentOil Refining - Petroleum - DrillingOther Great IndustriesPackagingPharmaceuticalPrinting - PublishingPublic RelationsReal Estate - Property MgtRecreationRestaurantRetailSales - MarketingSecuritiesSecuritySemiconductorSocial ServicesTelecommunicationsTrainingTransportationTravelWireless

 Status ActiveOpenRe-open

 

Reset

<< Back to all jobs

Network Security Analyst 1

[Austin , TX, 73301] |   2023-09-22 10:53:48

Apply Now

Share Job 

Job Code : 2023-MY3TECH1121

Network Security Analyst 1

Austin, TX (Onsite)

12 months Contract with possibility to extension

 

A network security analyst ensures that information systems and computer networks are secure. This includes protecting the company against hackers and cyber-attacks, as well as monitoring network traffic and server logs for activity that seems unusual. Additionally, these analysts are responsible for finding vulnerabilities in the computer networks and creating recommendations for how to minimize these vulnerabilities. The network security analyst investigates security breaches, develops strategies for any security issues that arise, and utilizes the help of firewalls and antivirus software to maintain security

Responsible for finding vulnerabilities in the computer networks and creating recommendations for how to minimize these vulnerabilities. Knowledge and experience with Tenable/Nessus vulnerability scanning. Participate in incident response activities and 24/7 on-call rotation as needed.

 

Candidate Skills and Qualifications:

YearsRequired/PreferredExperience
2RequiredKnowledge of computer networking concepts and protocols, and network security methodologies.
2RequiredKnowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
2RequiredKnowledge of cyber threats and vulnerabilities.
2RequiredKnowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
2RequiredKnowledge of systems diagnostic tools and fault identification techniques.
2RequiredKnowledge of system administration, network, and operating system hardening techniques.
2RequiredKnowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
2RequiredKnowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.
2RequiredKnowledge of penetration testing principles, tools, and techniques.
2RequiredKnowledge of an organization’s threat environment.
2RequiredSkill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
2RequiredSkill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).
2RequiredSkill in the use of penetration testing tools and techniques.
2RequiredSkill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.).
2RequiredSkill in conducting application vulnerability assessments.
2RequiredConduct and/or support authorized penetration testing on enterprise network assets.
2RequiredPrepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.
2RequiredPerform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas.
3PreferredTenable/Nessus administration, operation and vulnerability management.

Education

Any Graduate