Security Analyst – Triage
Hi,
Hope you are doing good.
Please find the below requirement and share the suitable profile as per the requirement
Title: Security Analyst – Triage
Client: Comcast
Location: Philadelphia, Pennsylvania
Interview Process: Technical phone screen followed by a face-to-face personal interview at the vendor and/or candidate’s expense.
Duration: Long- term contract
Additional Information: Software security experience not network security.
Process to submit a candidate to CEI for review:
- Attach the candidate’s resume, as well as the candidate’s phone and email contact information.
- Include the candidate’s current location and ability to have a personal face-to-face interview after a technical phone screen.
- Include the candidate’s confirmed rate, if you directly hold the candidate’s visa (or a partner company does), and the end date of the candidate’s last contract.
- Please do not call to inform of us of submission, but reach out through email if you have any specific questions. We will review candidates and provide you with feedback.
Job Description:
Security Analyst – Triage
Philadelphia, PA 19103
Job Requirements:
- Ability to read code or previous software development or scripting experience with one of the following technologies: Ruby, Ruby on Rails, Java, J2EE, Python, Perl, PHP, Bash, Shell, JavaScript, jQuery, NodeJS,
- Background with security or application security, such as cyber security, vulnerability management, or information assurance. We support the security of web applications in the environment, so a security background with incident management or triage/root cause analysis would work as well.
- Experience working with a ticketing system (Jira, ServiceNow, etc.)
- Tableau experience a plus
- Bachelor's Degree in Computer Science, Information Systems, or other related field.
Job Summary:
- Develops and manages security for more than one IT functional area (e.g., data, systems, network and/or Web) across the enterprise.
- Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines).
- Prepares status reports on security matters to develop security risk analysis scenarios and response procedures.
- Responsible for the tracking and monitoring of software viruses.
- Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls.
- Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness.
- Provides direct support to the business and IT staff for security related issues.
- Educates IT and the business about security policies and consults on security issues regarding user built/managed systems.
- Represents the security needs of the organization by providing expertise and assistance in all IT projects with regard to security issues.
Note: Due to lot of calls, I may miss your call. Email is the best way to reach me. Kindly co-operate. Many Thanks…..
Regards,
Thanks.
Steve Smith
Steve Smith
steve@gissllc.com
Global Interworks Solution
Leading Edge Enterprise
Everyone has untapped potential
1150 1st Ave #501, King of Prussia, PA 19406, USA
Global Interworks Solution
Leading Edge Enterprise
Everyone has untapped potential
1150 1st Ave #501, King of Prussia, PA 19406, USA
Cell 215-554-2152 I Fax 215-699-6501 I Gisscorp.com
Click here to unsubscribe
Comments
Post a Comment
Thanks