Recent Searches

You haven't searched anything yet.

5 CL - Security Analyst - Advanced Security Analyst - Advanced Jobs in Blythewood, SC

SET JOB ALERT
Details...
Zencon Group
Blythewood, SC | Other
$75k-91k (estimate)
1 Month Ago
Zencon Group
Blythewood, SC | Other
$75k-91k (estimate)
1 Month Ago
Talent Software services
Blythewood, SC | Contractor
$86k-104k (estimate)
1 Month Ago
Talent Software services
Blythewood, SC | Contractor
$86k-104k (estimate)
1 Month Ago
Intellibee
Blythewood, SC | Full Time
$101k-124k (estimate)
4 Months Ago
CL - Security Analyst - Advanced Security Analyst - Advanced
Zencon Group Blythewood, SC
$75k-91k (estimate)
Other | Business Services 1 Month Ago
Save

Zencon Group is Hiring a CL - Security Analyst - Advanced Security Analyst - Advanced Near Blythewood, SC

Job Description:
Remote Work Availability: 0%
SCOPE OF THE PROJECT:
Enhance the security posture of the South Carolina Department of Motor Vehicles (SCDMV) to protect sensitive citizen data and ensure the integrity of motor vehicle licensing and titling systems.
DAILY DUTIES / RESPONSIBILITIES:
1. PRIORITIZE AND PATCH VULNERABILITIES: ANALYZE REPORTS, IDENTIFY CRITICAL SYSTEMS, RECOMMEND PATCHES BASED ON RISK AND BEST PRACTICES, AUTOMATE DEPLOYMENT USING SCCM, GPO, OR POWERSHELL.
2. HUNT FOR THREATS: LEVERAGE THREAT INTELLIGENCE FEEDS AND DEFENDER FOR ENDPOINT TO PROACTIVELY SEARCH FOR SUSPICIOUS ACTIVITY, INVESTIGATE POTENTIAL INDICATORS OF COMPROMISE, AND ESCALATE THREATS FOR INCIDENT RESPONSE.
3. STAY INFORMED ON THREATS: CONTINUOUSLY UPDATE YOUR KNOWLEDGE OF CYBER THREATS THROUGH INTELLIGENCE FEEDS AND REPORTS, IDENTIFY POTENTIAL ATTACK VECTORS RELEVANT TO YOUR ORGANIZATION.
4. EMPOWER EMPLOYEES: DEVELOP AND MAINTAIN SECURITY AWARENESS TRAINING, CONDUCT REGULAR TRAINING SESSIONS, SIMULATE PHISHING ATTACKS TO TEST AWARENESS, AND TRACK PARTICIPATION TO MEASURE PROGRAM EFFECTIVENESS.
5. OPTIMIZE DEFENDER FOR ENDPOINT: CONFIGURE POLICIES FOR OPTIMAL THREAT DETECTION AND PREVENTION, MONITOR ALERTS AND INVESTIGATE INCIDENTS, MANAGE ENDPOINT PROTECTION SETTINGS ACROSS DEVICES, GENERATE REPORTS TO IDENTIFY SECURITY WEAKNESSES.
6. REPORT SECURITY POSTURE: PROVIDE REGULAR REPORTS ON VULNERABILITY PATCHING, ONGOING THREAT HUNTS, AND SECURITY AWARENESS PROGRAM EFFECTIVENESS, INCLUDING KEY METRICS AND PROPOSED MITIGATION STRATEGIES FOR IDENTIFIED SECURITY GAPS.
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• VULNERABILITY MANAGEMENT: ANALYZE REPORTS, PRIORITIZE PATCHING, UNDERSTAND NIST BEST PRACTICES.
• THREAT HUNTING & INTELLIGENCE: UTILIZE THREAT FEEDS, INVESTIGATE SUSPICIOUS ACTIVITY, STAY CURRENT ON CYBER THREATS.
• SECURITY AWARENESS TRAINING: DEVELOP & DELIVER TRAINING, ASSESS EMPLOYEE AWARENESS THROUGH SIMULATIONS.
• SECURITY AUTOMATION: LEVERAGE SCCM, GPO, POWERSHELL FOR PATCH DEPLOYMENT.
• ENDPOINT SECURITY (DEFENDER FOR ENDPOINT): CONFIGURE POLICIES, ANALYZE ALERTS, MANAGE ENDPOINT PROTECTION.
• INCIDENT RESPONSE: IDENTIFY AND ESCALATE POTENTIAL SECURITY THREATS.
• COMMUNICATION: DELIVER REPORTS ON SECURITY POSTURE AND PROPOSE MITIGATION STRATEGIES.
• PROBLEM-SOLVING: ANALYZE DATA, IDENTIFY ANOMALIES, AND RECOMMEND SOLUTIONS.
• ATTENTION TO DETAIL: ENSURE ACCURATE ANALYSIS AND CONFIGURATION FOR EFFECTIVE SECURITY MEASURES.
PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• SCRIPTING: AUTOMATE TASKS BEYOND SCCM, GPO, AND POWERSHELL FOR INCREASED EFFICIENCY.
• DIGITAL FORENSICS: INVESTIGATE SECURITY INCIDENTS AND COLLECT EVIDENCE FOR DEEPER ANALYSIS.
• NETWORK SECURITY: UNDERSTAND NETWORK PROTOCOLS AND FIREWALLS TO STRENGTHEN OVERALL SECURITY POSTURE.
• CLOUD SECURITY: AS CLOUD ADOPTION GROWS, UNDERSTANDING CLOUD-SPECIFIC SECURITY SOLUTIONS BECOMES VALUABLE.
REQUIRED EDUCATION: A bachelor's degree in information technology systems, computer science, cybersecurity, or a related field with 3 years' experience in a security focused role. Relevant experience may be substituted for the degree on a year-for-year basis
REQUIRED CERTIFICATIONS: Not required, however we prioritize applicants who have:
• Certified Incident Handler (GCIH)
• Certified Computer Security Incident Handler (CSIH)
• EC-Council Certified Incident Handler (ECIH)
• EC-Council Certified Network Defender (CND)
• GIAC Critical Infrastructure Protection (GCIP)
• GIAC Defensible Security Architecture (GDSA)

Job Summary

JOB TYPE

Other

INDUSTRY

Business Services

SALARY

$75k-91k (estimate)

POST DATE

06/02/2024

EXPIRATION DATE

10/02/2024

WEBSITE

linuxnode.com

HEADQUARTERS

AZ

SIZE

<25

INDUSTRY

Business Services

Show more

Zencon Group
Contractor
$65k-80k (estimate)
2 Weeks Ago
Contractor
$102k-127k (estimate)
3 Weeks Ago