Logo
Verdant Infotech Solutions

Network Security Analyst 3

Verdant Infotech Solutions, Lewisville, Texas, us, 75029


Network Security Analyst 3 / Austin, TX HybridNetwork Security Analyst 3

/

Local onlyAustin, TX Hybrid12+ MonthsVisa: GC,USC,H1B,H4EAD,GCEAD,TN.Local to Texas onlyCandidates must be local to State of Texas, preferably the Austin metro area.

Out of State candidates will be screened out.The worker will work remotely 2 days in a week and 3 days at the office (Mon, Wed & Thurs).

A network security analyst ensures that information systems and computer networks are secure. This includes protecting the company against hackers and cyber-attacks, as well as monitoring network traffic and server logs for activity that seems unusual. Additionally, these analysts are responsible for finding vulnerabilities in the computer networks and creating recommendations for how to minimize these vulnerabilities. The network security analyst investigates security breaches, develops strategies for any security issues that arise, and utilizes the help of firewalls and antivirus software to maintain security.Must be extremely familiar with Web Application Firewalls. Specifically, how to integrate, network design principles, and how properly configure filters to prevent exploits against vulnerable software, configuration and establish interconnections to the Organizational SIEM. SIEM communication should include working with program areas Information Security Manager leading project to establish necessary alerts and rules so that program areas responsible can respond timely.

Minimum Requirements:

Candidates that do not meet or exceed the

minimum

stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. ActualYearsExperience YearsExperienceNeeded Required/Preferred Skills/Experience 8 Required Ensuring that information systems and computer networks are secure. The ability to protect DSHS against hackers and cyber-attacks, as well as monitoring network traffic and WAF logs for activity that seems unusual. 3 Preferred

Experiencing working with HHS CISO Office or the Network Service Division for IT Large projects.