Logo
InfoPeople

IT Security Analyst

InfoPeople, Dimondale, Michigan, United States, 48821


Top Skills & Years of Experience:•5+ years of experience in IT Security.•Experience with Linux, Windows, and Unix.•Experience working with enterprise packet capture tools.•Experience working with Enterprise Intrusion Prevention Systems (IPS/IDS).•Experience with daily administration, configuring, deploying and architecting security network tools and security hw.•Configuration and administration of network taps.•Engineering rules, employing best practices.•Integrations with threat intelligence feeds.•Subnetting.Please keep resumes condensed and under 5 pages, when possible.

Short Job DescriptionThe Senior Security Analyst position works as a member of the MiSOC SecurityOperatons Team. The Senior Security Analyst position reviews and remediates cyberincidents and vulnerabilities found by IT level analysts to IT security specialists andmanagers to maintain the confidentiality, integrity, and availability of State of Michigandata.Long Job DescriptionThe Senior Security Analyst position works as a member of the Security OperationsTeam. This role has a focus on networking security and system administration.•Reviews and validates security procedures to ensure adequate securityprocedures have been developed to identify and classify cyber events.•Ensures that all identified security operations tool issues are promptly andthoroughly investigated.•Identifies, reviews and validates specifications and implementation of securityhardware and software. Implements corrective action as needed.•Performs administration of the proxy servers and information system.•Performs administration of the endpoint detection and response server andagent.•Performs administration of the intrusion protection and intrusion detectionsystems.•Provides excellent customer service.Required Skills:•5+ years of experience in IT Security.•Experience with Linux, Windows, and Unix.•Experience working with enterprise packet capture tools.•Experience with daily administration, configuring, deploying and architectingsecurity network tools and security hw.•Configuration and administration of network taps.•Engineering rules, employing best practices.•Integrations with threat intelligence feeds.•Subnetting.