*Job Title : Information Security Analyst* *Location : Carlstadt, NJ*
*Duration : 6 Months* *Extension : Possible* *Job Description* The Information Security Analyst will proactively monitor the security of production systems and infrastructure, while identifying and escalating potential incidents or anomalies for further investigation. The ideal candidate must be able to work independently and have basic project management skills. Desired areas of knowledge include Vulnerability Assessment, Intrusion Prevention and Detection, Access Control and Authorization, Firewall Rulesets, Encryption, Web-filtering, Advanced Threat Protection and infrastructure security. *Responsibilities* · Conduct application vulnerability scans with AppScan, MetaSploit, and various other proxy tools (BURP, Fiddler, etc.,) · Review and analyze alerts and logs from Firewalls (FW), Intrusion Detection Systems (IDS), Antivirus (AV), and other security threat data sources. · Maintain SIEM/log analysis solution, including data collection, aggregations, and regular exception reporting. · Analyze and or escalate security threats found internally or via Managed Security Service Providers. · Monitor and distribute security notifications in adherence with the established notification / security information sharing protocols. · Assist with formulation and distribution of Information Security Metrics and Event Reports. · Assists with review of Network and Application vulnerability scan alerts and reports. · Work closely with developers and business teams to identify application related vulnerabilities; Follow-up on outstanding findings, document new or updated applications and/or technology infrastructure elements, etc. *Qualifications* · 2-4 years of relevant experience with vulnerability scanners and web application testing tools such as IBM IBM AppScan, Nessus, Nmap, NeXpose, Metasploit, etc. · Knowledge of network security, current information security threats and incident management concepts and practices. · Hands-on experiencing with implementing secure guidelines on various Network Technologies and Operating System platforms including Microsoft Windows, Red Hat Linux, IBM AIX, and HP-UX. · Knowledge of IT Data Security Compliance Programs including Payment Card Industry (PCI), and Sarbanes-Oxley. · Strong critical thinking and problem solving skills. · Excellent written and oral communications skills Regards, John Michael Sr.IT Recruiter Email: john.mich...@marvelinfotech.com Hangouts Mail ID *aktharpasha...@gmail.com <aktharpasha...@gmail.com>* Phone: 732-377-3310 Marvel Infotech, Inc. 45 Knightsbridge Road Suite #101, Piscataway, NJ 08854 -- You received this message because you are subscribed to the Google Groups "oraapps" group. To unsubscribe from this group and stop receiving emails from it, send an email to oraapps+unsubscr...@googlegroups.com. To post to this group, send email to oraapps@googlegroups.com. Visit this group at https://groups.google.com/group/oraapps. For more options, visit https://groups.google.com/d/optout.