Job Description :
Responsibilities:

Client is looking for an individual who will join the security team of a major nationwide organization, with thousands of sites, to continually improve its complex multi-protocol nationwide network.
The ideal candidate for this job will be an experienced information security practitioner who is goal-oriented and strives to exceed expectations.
Responsible for implementation/deployment/support of Nessus scan engines and Tenable Security Center Continuous View systems and peripherals with Engineering, SOC, TIU, and IR.
(Tenable Nessus Agents, available with Nessus Manager and Tenable.io Vulnerability Management, increase scan flexibility by making it easy to scan assets without needing ongoing host credentials or assets that are offline, as well as enable large-scale concurrent scanning with little network impact.
cyber exposure platform.
Maintains local and network credentials Tenable Security Center and provisions access to vulnerability scanning systems.
Responsible for integration of Nessus/TSC with other security and IT systems management tools (i.e. ForeScout, Cisco ISE, RedSeal, Splunk
Responsible for developing and maintaining standard processes and operating procedures, creating technical architecture diagrams and system build documentation.
Responsible for supporting penetration testing toolset; including “fly-away kit” (i.e. laptops, VMs, wireless devices) used for internal/external penetration testing.
Works with vulnerability management team to build asset repositories and asset scan policies.

Qualifications:

Strong Splunk experience in creating effective dashboards, hunting cyber threats using event correlation and acting on machine intelligence to remediate vulnerabilities and risk to the enterprise.
Netflow analytics for compliance and threat hunting
Work with suppliers of data (e.g., WonMug, Cisco ISE, StealthWatch) to maximize efficiency and accuracy of data feeds into Splunk.
Advise suppliers of potential features in their tools that could be activated to improve security (e.g., TrustSec and Security Group Tagging in ISE
Ability to map application components to identify security problems and provide solutions.
Analyze data imports into Splunk for accuracy and completeness.
compare data from the various network security tools to identify overlaps and search for gaps.
Conduct initial triage assessments of findings from network security tools.
Engages with other internal and external forces to get and share information to improve processes and security posture.
Troubleshoots application connectivity and performance through log analysis and network captures, etc.
Project planning experience.
Excellent writing skills.
Microsoft office suite of applications.

Certifications: CISSP, Certified Ethical Hacker (C|EH), SFCP, GCIA, ISSEP, ISSMP, GAH, GCFA, CSLC, CISM, CCNA, CCNP