Select CountryCanadaUnited States
Select State
All Accounting - FinanceAdvertisingAgricultureAirline - AviationArchitecture - BuildingArt - Photography - JournalismAutomotive - Motor Vehicles - PartsBanking - Financial ServicesBiotechnologyBroadcasting - Radio - TVBuilding MaterialsChemicalComputer HardwareComputer SoftwareConstructionConsultingConsumer ProductsCredit - Loan - CollectionsDefense - AerospaceEducation - Teaching - AdministrationElectronicsEmployment - Recruiting - StaffingEnergy - Utilities - Gas - ElectricEntertainmentEnvironmentalExercise - FitnessFashion - Apparel - TextileFoodFuneral - CemeteryGovernment - Civil ServiceHealthcare - Health ServicesHomebuildingHospitalityHotel - ResortHVACImport - ExportIndustrialInsuranceInternet - ECommerceLandscapingLaw EnforcementLegalLibrary ScienceManaged CareManufacturingMedical EquipmentMerchandisingMilitaryMortgageNewspaperNot for Profit - CharitableOffice Supplies - EquipmentOil Refining - Petroleum - DrillingOther Great IndustriesPackagingPharmaceuticalPrinting - PublishingPublic RelationsReal Estate - Property MgtRecreationRestaurantRetailSales - MarketingSecuritiesSecuritySemiconductorSocial ServicesTelecommunicationsTrainingTransportationTravelWireless
Status ActiveOpenRe-open
Network Security Analyst 1
[Austin , TX, 73301] | 2023-09-22 10:53:48
Share Job
Job Code : 2023-MY3TECH1121
Network Security Analyst 1
Austin, TX (Onsite)
12 months Contract with possibility to extension
A network security analyst ensures that information systems and computer networks are secure. This includes protecting the company against hackers and cyber-attacks, as well as monitoring network traffic and server logs for activity that seems unusual. Additionally, these analysts are responsible for finding vulnerabilities in the computer networks and creating recommendations for how to minimize these vulnerabilities. The network security analyst investigates security breaches, develops strategies for any security issues that arise, and utilizes the help of firewalls and antivirus software to maintain security
Responsible for finding vulnerabilities in the computer networks and creating recommendations for how to minimize these vulnerabilities. Knowledge and experience with Tenable/Nessus vulnerability scanning. Participate in incident response activities and 24/7 on-call rotation as needed.
Candidate Skills and Qualifications:
Years | Required/Preferred | Experience |
2 | Required | Knowledge of computer networking concepts and protocols, and network security methodologies. |
2 | Required | Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
2 | Required | Knowledge of cyber threats and vulnerabilities. |
2 | Required | Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). |
2 | Required | Knowledge of systems diagnostic tools and fault identification techniques. |
2 | Required | Knowledge of system administration, network, and operating system hardening techniques. |
2 | Required | Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). |
2 | Required | Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. |
2 | Required | Knowledge of penetration testing principles, tools, and techniques. |
2 | Required | Knowledge of an organization’s threat environment. |
2 | Required | Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems. |
2 | Required | Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort). |
2 | Required | Skill in the use of penetration testing tools and techniques. |
2 | Required | Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.). |
2 | Required | Skill in conducting application vulnerability assessments. |
2 | Required | Conduct and/or support authorized penetration testing on enterprise network assets. |
2 | Required | Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions. |
2 | Required | Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas. |
3 | Preferred | Tenable/Nessus administration, operation and vulnerability management. |
Any Graduate