IIT Inc. Home

IIT Jobs Data Bank-Job Detail

Submit Resume For This Job (via email)
Follow us on LinkedIn or Twitter or Facebook
Follow us on Facebook Follow us on LinkedIn
ID Location Skills $$ Job Type Status
10033 Midtown Manhattan NY, NY 10001 Cyber Security Analyst: SME, IDS/IPS, Firewalls, HTTP, DNS, FTP, SMTP DOE Contract OPEN
If you are unable to click on links above to submit resume, you may email your resume to
jobs@iit-inc.com    

Subject=IIT Career Site/Resume for JobID=10033 (Cyber Security Analyst: SME, IDS/IPS, Firewalls, HTTP, DNS, FTP, SMTP) in Midtown Manhattan NY NY 10001 (AMI)

Estimated Length: Open Ended

***LOCAL CANDIDATES ONLY (IN-PERSON INTERVIEW)

Education Requirements

  • A baccalaureate degree from an accredited college and four years of satisfactory full-time experience related to projects and policies required by the particular position.

Preferred Skills

  • Subject Matter Expert (SME) in the Cybersecurity field.
  • Strong background experience in Information Technology with Windows, Linux, and Unix platforms.
  • Strong background experience as a Level 2 (or above) Cyber Security Incident Response Analyst performing incident handling, forensics, sensor alert tracking and cybersecurity incident case management.
  • Expert level experience working with security technologies such as IDS/IPS, Firewalls, SIEM, Network Packet Analyzers, Antivirus, Network Behavior Analysis tools, Malware analysis, Firewalls, DLP, endpoint protection, log collection and analysis.
  • Experience using and configuring tools such as Net Profiler, Imperva, Fire Eye and FirePower.
  • Strong working knowledge of network protocols, ports and common services such as TCP/P protocols and application layer protocols (e.g., HTTP/S, DNS, FTP, SMTP, etc.).
  • Hands on experience with scripting languages such as Python, Perl, Bash, and Powershell.
  • Knowledge of privilege escalation, persistence and lateral movement techniques
  • Identify and be able to react to network attacks, viruses, mal ware, SPAM, phishing and other intrusions.
  • Ability to conduct system security vulnerability and threat analyses, gathering of intelligence, risk assessments, mitigation planning and implementation.
  • Perform network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output.
  • Utilize understanding of attack signatures, tactics, techniques and procedures associated with advanced persistent threats.
  • Demonstrated understanding of cyber security risk management concepts, cybersecurity frameworks, control standards, secure coding principles, and security technologies.
  • Effective interpersonal skills and the ability to thrive in a team environment.
  • Ability to develop creative and innovative solution to complex business issues.
  • Ability to balance various projects simultaneously.

Responsibilities

  • Align with and support the execution of the Information Security Program vision and strategy.
  • Provide assistance in the implementation, maintenance, and monitoring of the information security program into in-scope operational areas (gap analysis, risk assessment, third party assessments, procedure/specification development, execution of recurring procedures, incident response).
  • Identify, analyze and communicate security vulnerabilities.
  • Serve as an information security subject matter expert and trusted advisor.
  • Understand current as well as emerging security threats and assist in the design of application architecture to mitigate threats where possible.
  • Stay abreast of new security technologies and assist in the integration of new technology into architecture design when appropriate.
  • As a contributor, take ownership for assigned areas of responsibility and effectively manage workloads to meet team deadlines.
  • Clearly and concisely communicate in both written form and verbally to leadership and Management.
  • Review security features of newly implemented systems, ensuring they meet existing security requirements and policies, Review proposed changes to existing policy as conditions warrant.
  • On a day to day basis, the candidate will review reports to identify threats. Reports may be generated from tools such as: such as Net Profiler, Imperva, Fire Eye and FirePower.
 
Submit Resume For This Job (via email)
 
Don't See a Position Matching Your Skills?
Click here to Email / Register your resume and be notified of future job openings.
 
About IIT:

Founded in 1995, IIT is a leading provider of Workforce Solutions to Government and Fortune-1000 organizations. IIT is a winner of Inc-500 award. IIT's core services include:

  • Consulting for projects / IT Outsourcing
  • IT staffing (Contract / Temporary / Contingent / Consulting)
  • Custom Workforce Solutions
  • Recruitment Process Outsourcing (RPO)
  • Headquartered in New York, IIT has over 400 consultants deployed at Client Sites. Other IIT highlights include

  • Winner of Inc-500 award 2 consecutive years
  • Winner of Ernst & Young / USPAACC Fast-50 award 2 consecutive years
  • Winner of USPAACC Top-10 Award in the Northeast US
  • IBM Business Partner
  • Oracle Business Partner
  • Adobe Business Partner
  • NYSA Member - New York Staffing Association - Regional Affiliate of ASA / American Staffing Association
  • NYS MBE certified
  • Our Consultants love working for IIT

  • Competitive compensation
  • W2 or C2C
  • Biweekly Direct Deposit for W2 Consultants
  • Visa and Green Card sponsorship opportunities for qualified individuals
  • Local contact for you to meet and talk to anytime (not someone sitting overseas in a different time zone)
  • Follow us on LinkedIn or Twitter or Facebook

    IIT is an Equal Opportunity Employer