CASY-MSCCN Jobs

CASY-MSCCN Logo

Job Information

CGT Staffing Security Analyst 2 in Pittsburgh, Pennsylvania

Security Analyst 2

Direct Hire

Minimum Requirements:

  • 3 years of experience in IT networking, security, and systems.
  • Bachelor's degree in Computer Science, Information Systems, Information Security, Networking, or a related field
  • Certifications related to networking, security, and systems administration preferred
  • Firewall rule management.
  • Palo Alto administration preferred.

Knowledge of: •    Next-gen firewall management. •    PKI, encryption, and authentication protocols. •    IP, TCP/IP, and other network administration protocols.

Ability to: •    Demonstrate analytical and problem-solving skills. •    Prioritize. •    Communicate effectively. •    Conduct research into IT security issues and products as required. •    Work within a collaborative environment.

Position Summary:

  • Perform day-to-day operations of the in-place security

```{=html}

``` - Identify, investigate, and resolve of security incidents detected by those systems.

Duties: Strategy & Planning

  • Participates in the planning and design of enterprise security architecture as well as the enterprise business continuity plan and disaster recovery plan.
  • Creates enterprise security policies, standards, baselines, guidelines, and procedures.

Acquisition & Deployment

  • Maintains up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors.
  • Recommends additional security solutions or enhancements to existing security solutions to improve overall enterprise security
  • Performs the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise's security documents specifically.

Operational Management

  • Maintains operational configurations of all in-place security solutions.
  • Monitors all in-place security solutions for efficient and appropriate operations.
  • Reviews alerts from SEIM, IDS, EDR and other security solutions. Interpret the implications of that activity and devise plans for appropriate resolution.
  • Participates in investigations into problematic activity.
  • Designs and executes vulnerability assessments, penetration tests, and security audits, and facilitates resolution of discovered problems.
DirectEmployers