IT Security Analyst Job at Gandiva Networks Inc
Qualifications
- At least 5 years of experience in Security Incident response activities at SOC Analyst Level 2 or above
- At least 3 years of experience with Intrusion Prevention Systems and Tools.
- Extensive experience performing Cyber and Technical Threat Analyses.
- Familiarity with Security Regulations and Standards.
- Bachelor or Masters degree
Experience & Skills requirement:
- Experience in IBM QRADAR Product
- Ability to work on Palo Alto security products from an Incident response perspective
- Experience implementing and Maintaining Security Frameworks for Existing and New Systems. (Highly desired)
- Familiarity with cyber threat intelligence and MITRE's ATT&CK framework. (Highly desired)
- Knowledgeable of penetration/vulnerability assessment methodologies and the cyber kill chain. (Highly desired)
- Possess one of the following: CISSP, CSSLP, CEH, CCSK, CompTIA Security+ and/or other IT Security Certs. (Highly desired)
Soft skills :
- Excellent written and oral skills, ability to work closely with multiple customers, manage expectations and track engagement scope
- Must be able to effectively collaborate and work with others.
- Strong verbal and written communication skills.
Responsibilities:
- Conduct firewall system security and vulnerability analyses and risk assessments for NG911.
- Perform Cyber Security and technical threat analysis.
- Develop and maintain Security Incident and Event Manager.
- Evaluate security system controls and monitoring for vulnerabilities.
- Determine security requirements by evaluating strategies and business requirements.
- Analyze potential impact of new threats, develop, and implement expert firewall solutions to mitigate those threats, and communicate risks to public safety agencies.
- Review risks to critical applications and recommend security controls. Ensure the security controls are adequate for all Public Safety Answering points (PSAPs) in the commission of the 911 program at PSAP.
- Monitoring and responding to malicious activity, and perform cybersecurity investigations
- Perform technical and forensic investigations.
- Create playbook for security events.
- Analyze system services, operating systems, networks, and applications to address possible cyber attacks
- Automate processes leveraging scripts (Python, batch, etc.).
- Run reports to gather data from SQL databases (SQL).
- Creation of SIEM dashboards to help visualize data and events.
- Set the program strategy and develop approaches to integrate automation/orchestration services into existing and future processes that will support the verticals within Threat Management.
- Respond and resolve basic operational technical Incidents and Requests.
Job Types: Full-time, Contract
Pay: $70.00 - $80.00 per hour
Experience level:
- 6 years
Schedule:
- 8 hour shift
- Monday to Friday
Ability to commute/relocate:
- New York, NY 10004: Reliably commute or planning to relocate before starting work (Required)
Experience:
- IBM Qradar: 3 years (Preferred)
- SOC Analyst L2: 3 years (Required)
Work Location: In person
Please Note :
ajayjain.com is the go-to platform for job seekers looking for the best job postings from around the web. With a focus on quality, the platform guarantees that all job postings are from reliable sources and are up-to-date. It also offers a variety of tools to help users find the perfect job for them, such as searching by location and filtering by industry. Furthermore, ajayjain.com provides helpful resources like resume tips and career advice to give job seekers an edge in their search. With its commitment to quality and user-friendliness, Site.com is the ideal place to find your next job.