What are the responsibilities and job description for the Security Analyst III position at Vinsys Information Technology Inc?
Candidates MUST be WI residents or willing to relocate to WI at their own expense prior to starting. This position can work 100% remotely (within the state of WI).
Under the general guidance of the IT Operations Manager, this position is responsible for growing and operating the agency IT Security Program at Wisconsin Department of Financial Institutions (DFI). The Security Analyst III is expected to be familiar with a wide variety of IT security concepts, practices, and technologies.
Basic Qualification
Additional Skills :
Background Check : No
Drug Screen : No
Under the general guidance of the IT Operations Manager, this position is responsible for growing and operating the agency IT Security Program at Wisconsin Department of Financial Institutions (DFI). The Security Analyst III is expected to be familiar with a wide variety of IT security concepts, practices, and technologies.
- The position serves as an expert resource and relies on extensive experience and judgment to plan and accomplish goals.
- This includes providing advanced analysis to manage the security design, implementation, monitoring, and incident response related to networks, servers, storage, applications, databases, and endpoints.
- The position will lead projects to implement new security controls and technologies. The position will also assist with the creation of policies, procedures, standards, and guidelines.
- This position may lead and direct the work of others. A wide degree of creativity and latitude is expected.
- IT Security 8 to 10 years
- CrowdStrike administration expert knowledge
- Tenable administration expert knowledge
- Strong attention to detail
- Excellent communication skills (written and verbal)
- CISSP or equivalent 1 year
- Administer CrowdStrike
- Administer Tenable
- Perform IT security risk assessments. Develop, recommend, and implement remediation strategies.
- Research vendor offerings and conduct proof of concepts.
- Coordinate with other teams to implement new technologies and remediate issues.
- Monitor asset inventory, installed agents, and status of devices.
- Review vulnerability dashboards and organizational impact of changing threat landscape.
- Monitor data inventories, policy violations. Produce reports and metrics.
- Author policies, procedures, standards, and guidelines related to IT security and compliance.
- Monitor and process incident response queues.
- Manage endpoint firewall operation and adjust as necessary.
- Work independently as well as within a team environment
Basic Qualification
Additional Skills :
Background Check : No
Drug Screen : No