*Job Title   : Information Security Analyst*

*Location   : Carlstadt, NJ*

*Duration   : 6 Months*

*Extension : Possible*



*Job Description*

The Information Security Analyst will proactively monitor the security of
production systems and infrastructure, while identifying and escalating
potential incidents or anomalies for further investigation.  The ideal
candidate must be able to work independently and have basic project
management skills.

Desired areas of knowledge include Vulnerability Assessment, Intrusion
Prevention and Detection, Access Control and Authorization, Firewall
Rulesets, Encryption, Web-filtering, Advanced Threat Protection and
infrastructure security.



*Responsibilities*

·         Conduct application vulnerability scans with AppScan, MetaSploit,
and various other proxy tools (BURP, Fiddler, etc.,)

·         Review and analyze alerts and logs from Firewalls (FW), Intrusion
Detection Systems (IDS), Antivirus (AV), and other security threat data
sources.

·         Maintain SIEM/log analysis solution, including data collection,
aggregations, and regular exception reporting.

·         Analyze and or escalate security threats found internally or via
Managed Security Service Providers.

·         Monitor and distribute security notifications in adherence with
the established notification / security information sharing protocols.

·         Assist with formulation and distribution of Information Security
Metrics and Event Reports.

·         Assists with review of Network and Application vulnerability scan
alerts and reports.

·         Work closely with developers and business teams to identify
application related vulnerabilities; Follow-up on outstanding findings,
document new or updated applications and/or technology infrastructure
elements, etc.



*Qualifications*

·         2-4 years of relevant experience with vulnerability scanners and
web application testing tools such as IBM IBM AppScan, Nessus, Nmap,
NeXpose, Metasploit, etc.

·         Knowledge of network security, current information security
threats and incident management concepts and practices.

·         Hands-on experiencing with implementing secure guidelines on
various Network Technologies and Operating System platforms including
Microsoft Windows, Red Hat Linux, IBM AIX, and HP-UX.

·         Knowledge of IT Data Security Compliance Programs including
Payment Card Industry (PCI), and Sarbanes-Oxley.

·         Strong critical thinking and problem solving skills.

·         Excellent written and oral communications skills





Regards,

John Michael

Sr.IT Recruiter

Email: john.mich...@marvelinfotech.com

Hangouts Mail ID *aktharpasha...@gmail.com <aktharpasha...@gmail.com>*

Phone: 732-377-3310

Marvel Infotech, Inc.

45 Knightsbridge Road

Suite #101, Piscataway,

NJ 08854

-- 
You received this message because you are subscribed to the Google Groups 
"oraapps" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to oraapps+unsubscr...@googlegroups.com.
To post to this group, send email to oraapps@googlegroups.com.
Visit this group at https://groups.google.com/group/oraapps.
For more options, visit https://groups.google.com/d/optout.

Reply via email to