Cybersecurity Analyst- CISSP or GIAC Certified
LOCATION AUSTIN, TX
Day 1 onsite Work Days (i.e. Monday-Friday) Work Hours (i.e. 8:00 AM - 5:00 PM CST)
As Sr. Cyber Security Consultant, you will maintain and operates a variety of security measures and software that perform cybersecurity functions such as access control, monitoring or vulnerability assessment. Provides support to the end-user community and ensures they have up-to-date protection from malicious software and other cyber threats. Tests and recommends security measures to remediate and mitigate risk. Provides reportsand other information related to information security issues as requested by management and other groups. Performs evaluation and analysis of securityapplications and systems and makes recommendations to management. Recommendsbest practices to ensure system security across the enterprise.
x Performs risk assessments and recommend ssecurity measures.
x Monitors security systems for possible intrusion.
x Interacts with end users concerning malware, spam, vulnerabilities and any other cybersecurity issues.
x Reviews and creates audit reports on userand system activities.
x Reviews system generated logs for anomalies and takes appropriate actions.
x Actively probes the network for newthreats and risks.
x Documents, deploys, reviews and maintains cybersecurity policies, standards, guidelines and procedures.
x Plans and implements cybersecurity technology projects.
x Provides business continuity/disaster recovery and risk analysis expertise.
x Monitors security alerts on internet andother intelligence feeds and determines whether reported threats could impact client’sinformation technology or operational technology systems.
x Provides technical consulting to othergroups on cybersecurity requirements.
x Implements and ensures technical securitysystems including SIEM, VAT, network IDS, antivirus, web and email filters and firewalls.
x Performs cybersecurity incident responseactivities.
x Documents and maintains objectiveevidence to demonstrate Client CIP regulatory compliance.
x Creates and delivers security trainingmaterials and classes for asset owners, software developers and systemadministrators.
x Provides oversight regarding compliancewith security regulations, standards and laws.
x For incumbents performing as a CyberSecurity Coordinator (CSC) – A CSC is responsible for the following:
Minimum Qualifications: 10 or more yearsof experience in cybersecurity or relevant experience
Preferred Qualifications: CISSP, GIAC or similar certification Knowledge, Skills andAbilities:
x Knowledge of business continuity planning and disaster recovery
x knowledge of anti-virus and anti-spam technologies
x Knowledge of technology asset management
x Knowledge of technology hardware and software platforms andsystems
x Skill in analytical and technical documentation
x Skill in verbal and written communication
x Skill in articulating complex, technical information to bothtechnical and non-technical audiences
x Skill in analyzing significant volumesof detailed information and understanding the security implications
x Skill in understanding complex systems across diverse technicalplatforms
x Intermediate skill level in Microsoft office and software updatetools
x Advanced skill level in network security and web filteringsoftware
x Advanced skill level in security vulnerability scanning tools
x Ability to balance and manage competing high priority work demands
x Ability to build relationships and foster teamwork
x Ability to work in a team environment
x Ability to conduct sensitive security investigations and maintainconfidentiality Work Environment:
x Majority of work hours are spent in an office environment
x May require working in noisy environments in the vicinity of heavyequipment
x Work involves weekends, holidays and non-standard hours
x Work involves providing 24/7/365 on-call support on a rotatingbasis
x Work involves traveling and lodging out of town Physical Demands:
x Work involves frequent finger/hand manipulation in using akeyboard and mouse
TECHNICAL SKILLS
Must Have
- A degree(s) in information technology, computer science or relevant field may be substituted per client’s guidelines for certain years of experience.
- Nine or more years of experience in cybersecurity or relevant experience.
Nice To Have
- CISSP, GIAC or similar certification
- NERC Compliance Understanding