IIT Inc. Home

IIT Jobs Data Bank-Job Detail

Submit Resume For This Job (via email)
Follow us on LinkedIn or Twitter or Facebook
Follow us on Facebook Follow us on LinkedIn
ID Location Skills $$ Job Type Status
9902 Midtown Manhattan NY, NY 10001 Lead IT Security Engineer / Analyst: IDS/IPS,Firewalls,SIEM,Imperva(PERM - No Visa Sponsorship) DOE FTE Employee OPEN
If you are unable to click on links above to submit resume, you may email your resume to
jobs@iit-inc.com    

Subject=IIT Career Site/Resume for JobID=9902 (Lead IT Security Engineer / Analyst: IDS/IPS,Firewalls,SIEM,Imperva(PERM - No Visa Sponsorship)) in Midtown Manhattan NY NY 10001 (MGI)

FTE Employee Position: No Visa Sponsorship available.

***LOCAL CANDIDATES ONLY (IN-PERSON INTERVIEW)

Minimum Qualification Requirements 

  • A baccalaureate degree from an accredited college and 8+ years of experience; including 5+ yrs of recent experience in IT Security domain

Preferred Skills 

  • Subject Matter Expert (SME) in the Cybersecurity field.
  • Strong background experience in Information Technology with Windows, Linux, and Unix platforms.
  • Strong background experience as a Level 2 (or above) Cyber Security Incident Response Analyst performing incident handling, forensics, sensor alert tracking and cybersecurity incident case management.
  • Expert level experience working with security technologies such as IDS / IPS, Firewalls, SIEM, Network Packet Analyzers, Antivirus, Network Behavior Analysis tools, Malware analysis, Firewalls, DLP, endpoint protection, log collection and analysis.
  • Experience using and configuring tools such as Net Profiler, Imperva, Fire Eye and FirePower.
  • Strong working knowledge of network protocols, ports and common services such as TCP/P protocols and application layer protocols (e.g., HTTP/S, DNS, FTP, SMTP, etc.).
  • Hands on experience with scripting languages such as Python, Perl, Bash, and Powershell.
  • Knowledge of privilege escalation, persistence and lateral movement techniques
  • Identify and be able to react to network attacks, viruses, mal ware, SPAM, phishing and other intrusions.
  • Ability to conduct system security vulnerability and threat analyses, gathering of intelligence, risk assessments, mitigation planning and implementation.
  • Perform network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output.
  • Utilize understanding of attack signatures, tactics, techniques and procedures associated with advanced persistent threats.
  • Demonstrated understanding of cyber security risk management concepts, cybersecurity frameworks, control standards, secure coding principles, and security technologies.
  • Effective interpersonal skills and the ability to thrive in a team environment.
  • Ability to develop creative and innovative solution to complex business issues.
  • Ability to balance various projects simultaneously.

Responsibilities

  • Align with and support the execution of the Information Security Program vision and strategy.
  • Provide assistance in the implementation, maintenance, and monitoring of the information security program into in-scope operational areas (gap analysis, risk assessment, third party assessments, procedure/specification development, execution of recurring procedures, incident response).
  • Identify, analyze and communicate security vulnerabilities.
  • Serve as an information security subject matter expert and trusted advisor.
  • Understand current as well as emerging security threats and assist in the design of application architecture to mitigate threats where possible.• Stay abreast of new security technologies and assist in the integration of new technology into architecture design when appropriate.
  • As a contributor, take ownership for assigned areas of responsibility and effectively manage workloads to meet team deadlines.
  • Clearly and concisely communicate in both written form and verbally to leadership and Management.
  • Review security features of newly implemented systems, ensuring they meet existing security requirements and policies, Review proposed changes to existing policy as conditions warrant.
  • On a day to day basis, the candidate will review reports to identify threats. Reports may be generated from tools such as: such as Net Profiler, Imperva, Fire Eye and FirePower.
 
Submit Resume For This Job (via email)
 
Don't See a Position Matching Your Skills?
Click here to Email / Register your resume and be notified of future job openings.
 
About IIT:

Founded in 1995, IIT is a leading provider of Workforce Solutions to Government and Fortune-1000 organizations. IIT is a winner of Inc-500 award. IIT's core services include:

  • Consulting for projects / IT Outsourcing
  • IT staffing (Contract / Temporary / Contingent / Consulting)
  • Custom Workforce Solutions
  • Recruitment Process Outsourcing (RPO)
  • Headquartered in New York, IIT has over 400 consultants deployed at Client Sites. Other IIT highlights include

  • Winner of Inc-500 award 2 consecutive years
  • Winner of Ernst & Young / USPAACC Fast-50 award 2 consecutive years
  • Winner of USPAACC Top-10 Award in the Northeast US
  • IBM Business Partner
  • Oracle Business Partner
  • Adobe Business Partner
  • NYSA Member - New York Staffing Association - Regional Affiliate of ASA / American Staffing Association
  • NYS MBE certified
  • Our Consultants love working for IIT

  • Competitive compensation
  • W2 or C2C
  • Biweekly Direct Deposit for W2 Consultants
  • Visa and Green Card sponsorship opportunities for qualified individuals
  • Local contact for you to meet and talk to anytime (not someone sitting overseas in a different time zone)
  • Follow us on LinkedIn or Twitter or Facebook

    IIT is an Equal Opportunity Employer