Job Description
Please note that this position is with our direct client
We are looking for a IT Security Analyst 4 (Min 5+yrs Exp) HYBRID (In Person Interview )
POSITION DESCRIPTION
DIRECT CLIENT Position
Number of positions: 1
Length: 12Months +
Work Address: Richmond, VA
Immediate Interviews In Person Interview
IT Security Analyst 4
Please Note this position Hybrid (ONSITE Required: 2-3 days/week)
Document and address organization\'s information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle.
3 days - on site -2 days - remote
Notes from the manager:
For this position we are really looking for someone who is strong in Security Operations (Vulnerability Management, Penetration Testing, Incident Response, Identity Access Management, etc.). A few of the candidates were strong in Risk Management (Risk Assessment, Data Classification, Audits, etc.) but we already have those skills on our team. The remaining candidates mostly struggled to answer basic technical questions relating to security and seemed to mostly come from more IT Operations backgrounds. We are looking for an experienced person as this is not an entry level opening.
General things to consider when screening:
1. Experience with vulnerability management is key for this position.
2. Experience with application penetration is key for this position.
3. Experience with Dev SecOps/Secure Software Development Lifecycle (Secure SDLC/SSDLC)/Secure by Design is key for this position.
4. Scripting and automation experience is highly desired for this position.
5. Interpersonal skills and being able to talk with and manage stakeholders are key for this position.
Analyze the security impact of application, configuration, and infrastructure changes to ensure compliance with the security standard as part of the change management lifecycle.
Assess the configurations of applications, servers, and network devices for compliance with the security standard.
Analyze and document how the implementation of new system or new interfaces between systems impacts the security posture of the current environment.
Assess and document the security impact and risks of newly discovered vulnerabilities in the environment.
Coordinate resolution of application and infrastructure security vulnerabilities with System Owners, IT, and vendors. Track resolution of vulnerabilities and provide regular updates to management.
Coordinate resolution of endpoint security vulnerabilities with users and provide regular updates to management.
Respond to, and investigate, security incidents and provide thorough post-event analyses.
Perform internal application penetration testing, document findings, and recommend improvements to improve the organizations security posture.
Complete annual password security audits and coordinate completion of agency wide user access audits in compliance with the security standard.
Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately.
Create and maintain desk procedures and process documentation for all responsibilities.
Required/Desired Skills
Candidates must have ALL the Required skills in order to be considered for the position. Desired or Highly Desired skills are a PLUS but may NOT be required.
Skill Matrix (Please fill the last two columns of this matrix)
Experience with Business workflow processes
Required / Desired
Amount
of Experience
Years of Experience
Last Used
NIST 800-53 rev 5 and/or Criminal Justice Information System (CJIS) specifications for an information security management system.
Required
5
Years
Software development lifecycle, vulnerability management processes, role-based authentication methodologies, etc.
Required
5
Years
Familiarity with programming languages such as Python, Java, JavaScript, C++, C#, SQL, HTML, CSS, and/or COBOL.
Required
5
Years
Expertise in using automated vulnerability scanners like Nessus, Qualys, Retina, and/or Tenable.
Required
5
Years
Familiarity with web application security testing tools like Burp Suite, Fortify, and/or AppScan.
Required
5
Years
Basic scripting skills (e.g. WDL, VBScript, JavaScript, PowerShell, Python) for automation
Required
5
Years
IT security or risk assessment certifications are advantageous (CISM, CCSP, CISSP, CEH, CompTIA Pentest+ and/or CompTIA Security+)
Required
5
Years
...Job Description Energy Management Corporation (EMC) currently has an opening for Electric Motor Mechanic in our Salt Lake City Shop. We will also consider other levels of Electric Motor Mechanics. Please apply if interested. Hours: PM Shift 3:00 PM to 11:30 PM...
...sectors. Our vision was to become a leading specialist, and we have achieved this through a... ...includes our in-house proprietary performance marketing technologies and reporting platforms, in... ...Reporting directly to the Director of Search, we are seeking a highly motivated and...
...Who We Are: At McGuire Moorman Lambert Hospitality, we create memorable experiences through thoughtful food, genuine service, and timeless design. Founded by Larry McGuire, Tom Moorman, and Liz Lambert, MML is built on a foundation of storytelling, attention to detail...
...year of retail experience ~ Second language (speaking, reading, and/or writing) ABOUT US Based in Portland, Oregon, Fred Meyer merged with The Kroger Company in 1998. Today, we re proudly serving Fred Meyer customers in over 120 stores throughout Oregon,...
...Metal Commercial Roofer Progressive Roofing is growing and looking for the best of the best roofing professionals! Are you looking for year round work and growth opportunity? If the answer is yes, then we want to meet with you!! Skills/Qualifications needed:...