Job Description

Ref No.:18-14051
Location: Trenton, New Jersey
Short Description:

Information Security Analyst 3 with a bachelors degree and 6+years experience in the field of Information Technology and Information Systems Security required.This position will operate a suite of security software in state and Client environment.

Complete Description:

*The Client (Client) is seeking a Senior information Security Analyst with a bachelor's degree and 6+ years experience in the IT and security industry

The Information Security Analyst responsible for engineering, implementation, configuration and monitor security for the Departments network, applications and systems. The design and implementation of proper protection for all of the Departments digital assets is paramount to protecting the proprietary and confidential information used in everyday processes. The Information Security Analyst will design information security architecture and continuously monitor and update the systems and controls as required. Monitor all systems for violations of the Client security policy and take necessary remedial actions to stop and prevent further violations.

Information Security Analyst is responsible for installing, configuring and supporting the security monitoring and the compliance of our information systems.

JOB FUNCTIONS/DUTIES AND RESPONSIBILITIES
* Manage, Monitor Security tools and System for Client..
* Assists in defining, creating and implementing banks Information Security Policy/Standards, Guidelines
* Defines, helps to install, configures and administer Information Security technologies intended to protect the bank's digital assets from internal and external threats.
* Monitors all Information Security related systems intended to provide incident reporting or predictive analysis of the bank's systems.
* Responds to Information Security incidents.
* Responsible for Security Information and Event Management (SIEM), Vulnerability Management, Incident Management and response
* Works with auditors.
* Review and approval of the system/network configuration changes, system patches and updates according to the departments procedures.
* Review compliance with the information security policy and standards.
* Provides periodic reporting on information security issues and gaps
* Interfaces with external contacts and third parties
* Performs all functions as assigned by CISO
* Provide high quality work by ensuring accuracy and seeking to continuously improve Information Security processes by embracing new and better ways of doing things.

REQUIREMENTS

* Bachelor's degree or equivalent.
* Strong IP, network, Microsoft Windows, Linux, UNIX, Middleware experience and knowledge.
* Ability to investigate and respond to Information Security Incidents, Threats and Vulnerabilities.
* Three (3) to Seven (7) years' experience in Information Security and Engineering of Security tools
* Understanding, configuration and monitoring knowledge of SIEM tool
* Use of the McAfee suite of tools, IBM App scan, Nessus, ,Rapid7, or similar tools will be required
* Knowledge of IDS/IPS and Firewall infrastructure
* Applications experience .
* CISSP, CISA,CISM,CEH type of certifications are plus, but not required

Skills:
SkillsRequired Minimum Experience Candidate ExperienceLast Used
Prior experience Implementing & administering Enterprise Antivirus software (Desktop and Server) cloud and on premises.Required6 Years
Hands on experience with an Enterprise application scanning toolRequired1 Years
Prior experience writing rules, policies and exclusions for security products and configure reports.Required6 Years
Prior experience working with NIST compliance standards and writing security standardsRequired6 Years
Broad experience in systems and network protocols, architecture and infrastructureRequired6 Years
Prior experience remediating active intrusionRequired2 Years
Prior experience working within environments that utilize ITIL processes (such as Incident/Problem/Configuration/Change management)Highly desired4 Years
Implement and administer OWASP vulnerabilty management tools, scans, reportsHighly desired4 Years
Prior experience with administration, configuration and reporting of security incident event logging tool McAfee SIEM or IBM QRadarHighly desired2 Years
Prior experience working with windows registry, Active Directory and Group PolicyHighly desired6 Years
Prior experience with Mobile Device Management (Policy configuration and console management) for AndroidDesired2 Years
Prior experience with MDM (Policy configuration and console management) for AirwatchDesired2 Years
Prior experience deploying ForcepointDesired2 Years

QuestionsQuestionsAnswers
Question 1Absences greater than two weeks MUST be approved by CAI management in advance, and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you accept this requirement?
Question 2Please list candidate's email address HERE that will be used when submitting E-RTR.
Question 3Is the candidate available for a round one, in person interview?
Question 4Where is the candidate geographically located?
Question 5Which projects have you worked where your primary role was to function as a security monitor of multiple systems?
Question 6What types of enterprise antivirus software has the candidate deployed?
Question 7What types of enterprise applications scanning tools has the candidate worked with?

QuestionsQuestionsAnswers
Question 1Absences greater than two weeks MUST be approved by CAI management in advance, and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you accept this requirement?
Question 2Please list candidate's email address HERE that will be used when submitting E-RTR.
Question 3Is the candidate available for a round one, in person interview?
Question 4Where is the candidate geographically located?
Question 5Which projects have you worked where your primary role was to function as a security monitor of multiple systems?
Question 6What types of enterprise antivirus software has the candidate deployed?
Question 7What types of enterprise applications scanning tools has the candidate worked with?

Application Instructions

Please click on the link below to apply for this position. A new window will open and direct you to apply at our corporate careers page. We look forward to hearing from you!

Apply Online