Cyber-Security Analyst Job at Elite Technical , Harrisburg, PA

bE1qY1ZsRUY0Y3ZuWExzSnNyY1A1S2M2SXc9PQ==
  • Elite Technical
  • Harrisburg, PA

Job Description

Cyber-Security Analyst

Our Client is looking for a Cyber Security Analyst local in the Harrisburg PA area.

Desired Qualifications:

-Active cyber-security certification from an accredited organization such as ISC2, CISA, CompTIA, EC-Council, ISACA, GSEC, etc.
-Experience with Firewalls: AlgoSec, Checkpoint, CISCO ASA, SilverPeak, VMWare NSX
-Experience with scripting languages - PowerShell, Python, etc.
-Experience with forensic tools, such as Network security monitoring: FireEye NX, AX, PX Endpoint, Splunk - ES
-Experience with Web vulnerability scanning: Tenable.IO, Rapid7 AppSpider
-Experience with Encryption: Globalscape Secure FTP, PGP - Nice to have
-Experience with Penetration testing: Metasploit, Kali Linux, Netsparker, and Wireshark
-Experience with Network intrusion detection tools such as Snort, Security Onion, SolarWinds Security Event Manager
-Experience with Packet sniffers such as Tcpdump and Windump
-Familiarity with SAST and DAST tools such as Veracode, AppSpider and AppScan

If you want to learn more, please contact Elite Technical for more information.

Required Skills

Required Skills:

-5 years experience as a professional cyber-security / firewall in large-scale enterprise Windows environments
-Understanding of current threats and trends in information security.
-Professional oral and written communication skills.
-Excellent soft skills such as listening, presenting, and negotiating.
-Possesses proficient knowledge of layer 2 switching and layer 3 routing protocols, encryption protocols, communication protocols. Examples include but not limited to: TLS/SSL, IPsec, SSH, PGP, VLAN, LLDP, LACP, ARP, 802.1x, DNS, AES, etc.

Job Responsibilities:
- Demonstrates good judgment and problem-solving skills. Reacts and adapts to changing circumstances rapidly. Technically proficient and experienced with Windows and Unix/Linux operating systems, enterprise class firewalls, network security, network traffic analysis, incident response, vulnerability analysis, packet analysis, and systems hardening. Possesses proficient knowledge of layer 2 switching and layer 3 routing protocols, encryption protocols, communication protocols. Examples include but not limited to: TLS/SSL, IPsec, SSH, PGP, VLAN, LLDP, LACP, ARP, 802.1x, DNS, AES, etc.
- Assists in deterring, identifying, monitoring, investigating and analyzing network intrusions. Collects intrusion artifacts, indicators of compromise, correlates artifacts across systems, and gathers other relevant facts to enable mitigation of potential incidents within the enterprise.
- Receives and analyzes network alerts from various sources within the enterprise. Determines the alert trigger, the severity of the alert, and prioritizes response accordingly. Track and document incidents from initial detection to final resolution.
- Participates in the containment and neutralization of cyber threats based on the intelligence and indicators of compromise gathered. Assesses damage to services, systems, networks, data and other relevant assets. Participates in the restoration and reconstitution of systems and services. Makes recommendations to prevent the recurrence of cyber incidents and verifies that normal operations have resumed.
- Manages, monitors, and analyzes several security technologies to include defensive and offensive security solutions on the perimeter and internal networks such as firewalls, intrusion detection/prevention systems (IDS/IPS), data loss prevention, etc.
- Uses data from Security Information and Event Management (SIEM) and other logging solutions to conduct analysis, identify cyber trends, disseminate relevant findings, and recommend suitable security and/or compensating controls.
- Participates in the design and implementation of security controls. Grants and revokes access to restricted resources, ensures that end-users are authorized to access requested resources, and participates in periodic system audits/cleanup initiatives.
- Assists leadership in planning and implementing cybersecurity infrastructure or technology related projects, participates in the installation of equipment, related cabling, and conducts ongoing maintenance/repair of security infrastructure assets as needed.
- Performs research, evaluates security technologies/services, to drive process improvements, integrate automation, increase efficiency, strengthen service delivery, and improve security posture.
- Assists in maintaining an accurate and thorough knowledgebase. Creates and revises documentation, procedures, flowcharts, diagrams, etc.
- Leverages client's incident tracking and ticketing systems to receive tasks from other units, delegate tasks to other units, prioritize daily tasks, document actions taken, and the final resolution for tasks completed.
- Provides on-call and/or emergency support, including after-hours as needed.
- Adheres to established service management processes and procedures.
- Performs all other related duties as assigned.

Apply Now

Job Tags

Contract work, Local area,

Similar Jobs

Two Maids & A Mop

Hiring Immediately/House Cleaner/Maid/Monday thru Friday Job at Two Maids & A Mop

 ...Housekeeper/ House Cleaning /MaidsHiring Immediately!Candidates with the following experience are encouraged to apply : home health...  ...cleaning services that range from routine weekly maintenance to deep cleanings of a home from top to bottom. We recognize and reward... 

YogaSix - Oak Park

Yoga Studio Manager Job at YogaSix - Oak Park

The Yoga Studio Manager is responsible for ensuring an exceptional customer experience at YogaSix Oak Park. He/she will lead a team of Yoga Instructors and Sales Staff to meet and exceed studio sales, member experience, and financial performance goals. About you: ...

Houston Methodist

Supervisor Cash Applications - EPIC-Cash Applications & Systems (Museum District) Job at Houston Methodist

 ...insurance activity between the bank lockbox, patient accounting system, and the general ledger. The Supervisor Cash Applications monitors...  ...as appropriate, and balanced daily between the bank account, Epic system, and accounting ledgers. The supervisor position responsibilities... 

Bates College

Custodian (Full Time, Full Year) Job at Bates College

 ...waste removal, dusting, mopping, and vacuuming floor surfaces, cleaning restrooms, restocking consumables, and non- routine work such as...  ...employs 200 faculty members and 550 staff.The college is proud of deep roots in the Lewiston/Auburn community, Maines second-largest... 

CA Dept Fish & Wildlife

ENVIRONMENTAL SCIENTIST Job at CA Dept Fish & Wildlife

 ...Resiliency Program is seeking a motivated professional to work as an Environmental Scientist reviewing and evaluating Timber Harvest Plans and...  ...of fish and wildlife resources, assessing the application of law, regulation and policy, conducting listed and sensitive species...