What are the responsibilities and job description for the IT Security Analyst 3_Dimondale, MI 48821/ Hybrid position at Accrete Macro Solutions LLC?
Job Title: IT Security Analyst 3 - Vulnerability Management
Location: Dimondale, MI 48821/ Hybrid
Duration: 12 months of contract with strong possibility of extension
Interview Process: Onsite interviews to be held at the Dimondale office. (NO virtual interviews will be requested) Candidates submitted must be willing to attend a face-to-face interview.
Job Description
IT Security Analyst 3 – Vulnerability Management
Overview
Location: Dimondale, MI 48821/ Hybrid
Duration: 12 months of contract with strong possibility of extension
Interview Process: Onsite interviews to be held at the Dimondale office. (NO virtual interviews will be requested) Candidates submitted must be willing to attend a face-to-face interview.
Job Description
IT Security Analyst 3 – Vulnerability Management
Overview
- Supports vulnerability management scanning and reporting tools (requires strong Linux, Windows and/or UNIX administrative knowledge for troubleshooting).
- Automates processes with scripting such as bash, PowerShell, and Python.
- Parses logs in an automated fashion using Grep, AWK, Sed, etc.
- Creates integration of vulnerability management data with other State of Michigan enterprise services.
- Conducts data analysis of vulnerability management data, often integrated with other data sources, to measure effectiveness of vulnerability remediation. Data analysis tasks include large datasets, which include structured, semi-structured, and unstructured data.
- Interfaces with other agencies to make recommendations on how to improve the security posture and reduce the number of security related vulnerabilities.
- Conducts trend analysis, creates dashboards using data scripting to provide metrics on the performance of security responsibilities, controls, and creates new reports based on those collected metrics across multiple agencies.
- Plans, schedules, implements, and maintains scalable vulnerability scans using modern vulnerability management scanning tools for high complexity devices.
- While ensuring safe and timely scanning that has minimal/no impact on scan targets and provides troubleshooting of technical issues with scans.
- Conducts internal vulnerability audits of servers, network devices, applications, and other devices.
- Reviews and validates security procedures to ensure adequate security procedures have been developed to identify and classify cyber events.
- 5 years’ experience in IT Security
- Extensive experience with vulnerability management scanning and reporting tools.
- Experience with Linux, Windows, and Unix.
- Experience with PowerShell and Python.
- Experience with log parsing using - Grep, Sed and/or AWK.
- Preferred experience with SQL ETL.