Job Description :
DLP Consultant / Firewall and Proxy Analyst / Cyber Intelligence Analyst

Location – Stamford, CT / Kettering, OH / Alpharetta, GA / Charlotte, NC / Chicago, IL



1. Firewall and Proxy Analyst

Job Description –

· Network Security Operations Analyst will focus primarily on the analysis and implementation of firewall and proxy policy and the identification, tracking and remediation of risks related to network security infrastructure.
· Bachelor’s degree and a minimum 2 years of work experience or Computer Science OR in in lieu of a degree, a High School Diploma/GED and minimum 4 years equivalent work experience.
· A minimum of 3 years of experience in Information Technology, Information Security Operations, Information Assurance, IT Auditing, or a related field, or a bachelor’s degree in information technology or a related field.
· Minimum of 2 years’ experience working in a large, complex network environment.
· Minimum of 1 year of working knowledge of Cisco ASA access lists and Proxy technology


Job responsibilities –

· Network Security Operations Analyst will focus primarily on the analysis and implementation of firewall and proxy policy and the identification, tracking and remediation of risks related to network security infrastructure.
· Bachelor’s degree and a minimum 2 years of work experience or Computer Science OR in in lieu of a degree, a High School Diploma/GED and minimum 4 years equivalent work experience.
· A minimum of 3 years of experience in Information Technology, Information Security Operations, Information Assurance, IT Auditing, or a related field, or a bachelor’s degree in information technology or a related field.
· Minimum of 2 years’ experience working in a large, complex network environment. Minimum of 1 year of working knowledge of Cisco ASA access lists and Proxy technology


2. Cyber Intelligence Analyst –

Job Description –

· 3-5 years of experience in industry information security
· Minimum 3 years of cyber security and threat intelligence experience.
· Experience and/or understand of malware analysis.
· Understanding of the cyber kill chain and threat intelligence lifecycle.
· Understanding of cyber- tactics, technologies, and procedures to counter attacks and threats.

Preferred Skills – Knowledge of incident response, crisis management, vulnerabilities management, detection, and hunting.

Job responsibilities –

· 3-5 years of experience in industry information security or related technology experience required, experience in the financial services industry required.
· Minimum three years of cyber security and threat intelligence experience.
· Experience in analysis of large data sets for the purpose of identifying malicious activity.
· Experience and/or understand of malware analysis. Understanding of the cyber kill chain and threat intelligence lifecycle.
· Understanding of cyber- tactics, technologies, and procedures to counter attacks and threats. Knowledge of incident response, crisis management, vulnerabilities management, detection, and hunting.

3. Data Loss Prevention (DLP) Analysts –

Job Description –

· Works with Business Unit Security Officers to review DLP events
· Investigate user behavior to determine if activity is abnormal or part of existing practice using multiple tools (previous DLP events, Splunk etc
· Escalate appropriate events; escalate egregious or malicious behavior to CIRT for further investigation/remediation.
· Collection of metrics; break down behavioral trends by department, policy, etc. and report metrics.
· Investigate ways to improve event detection; find methods to circumvent current detection rules and suggest changes accordingly.

Preferred Skills - Symantec DLP, Splunk, Python, IDS/IPS, Network Experience

Job responsibilities –

· Works with Business Unit Security Officers to review DLP events: Investigate user behavior to determine if activity is abnormal or part of existing practice using multiple tools (previous DLP events, Splunk etc.
· Escalate appropriate events; escalate egregious or malicious behavior to CIRT for further investigation/remediation.
· Collection of metrics; break down behavioral trends by department, policy, etc. and report metrics.
· Investigate ways to improve event detection; find methods to circumvent current detection rules and suggest changes accordingly. Preferred experience in : Symantec DLP, Splunk, Python, IDS/IPS, Network Experience
             

Similar Jobs you may be interested in ..