I have a very urgent DIRECT CLIENT requirement for *Security Analyst*
in *Columbia,
SC*. Please Let Me Know If you have available candidate, please reply with
their word resume, location, rate and contact number.

Please send the resumes at r...@cncconsulting.com

Job Title: Security Analyst
Location: Columbia, SC
Duration: 2 Months+
Client: State of SC

Develops and manages security for more than one IT functional area (e.g.,
data, systems, network and/or Web) across the enterprise. Assists in the
development and implementation of security policies and procedures (e.g.,
user log-on and authentication rules, security breach escalation
procedures, security auditing procedures and use of firewalls and
encryption routines). Prepares status reports on security matters to
develop security risk analysis scenarios and response procedures.
Responsible for the tracking and monitoring of software viruses. Enforces
security policies and procedures by administering and monitoring security
profiles, reviews security violation reports and investigates possible
security exceptions, updates, and maintains and documents security
controls. Involved in the evaluation of products and/or procedures to
enhance productivity and effectiveness. Provides direct support to the
business and IT staff for security related issues. Educates IT and the
business about security policies and consults on security issues regarding
user built/managed systems. Represents the security needs of the
organization by providing expertise and assistance in all IT projects with
regard to security issues. Must have extensive knowledge in networking,
databases, systems and/or Web operations. More junior level position
primarily focuses on security administration; a more senior level position
is involved in developing enterprise security strategies, management of
security projects and the most complicated security issues.

SCOPE OF THE PROJECT:
Reporting to the Director of Incident Response within the Division of
Information Security (DIS), the consultant will perform computer forensics
investigations on Linux, OSX and Windows clients and servers according to
DIS standard practices. Investigations must be conducted using triage
collections, SIEM correlation as well as image-based forensics methods.
Additionally, this position will support the upgrade and expansion of
enterprise forensics over-the-wire technologies and associated reporting.
Assist the Security Operations Center (SOC) to validate and improve
checklists, policies, and procedures for all phases of incident response.

DAILY DUTIES / RESPONSIBILITIES:
Perform computer forensics investigations on Linux, OSX and Microsoft
clients and servers following processes defined in the state’s established
incident response procedure.
Work with SOC to identify and document improvements in incident response
processes. Disseminate incident response process revisions to stakeholders
within the Division of Technology (DT) and state agencies.
Validate that security and privacy controls and reporting meet established
standards.

REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
Experience with incident response, industry standard forensics tools and
processes, and SIEM log and flow correlation
Basic understanding of computer and network operating system fundamentals
(e.g. operating systems, applications, storage, networking)
Basic understanding of information security topics related to computers,
networks, and software.
Excellent written and oral communication skills, including document design
principles.

PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
Basic understanding of cyber/Internet infrastructure and operation.
Basic understanding of information security incident response processes,
including forensic analysis processes.
Understanding of triage collections and forensics over the wire in an
enterprise environment

REQUIRED EDUCATION:
Bachelor’s degree, plus 4 years of experience in information security.

Additional Skills:
Basic understanding of cyber/Internet infrastructure and operation.
Basic understanding of information security incident response processes,
including forensic analysis processes.
Understanding of triage collections and forensics over the wire in an
enterprise environment.

Thanks,

Raj Chouhan - IT Recruiter
201-546-3479Phone
r...@cncconsulting.com

-- 
You received this message because you are subscribed to the Google Groups "SAP 
BASIS" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-basis+unsubscr...@googlegroups.com.
To post to this group, send email to sap-basis@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-basis.
For more options, visit https://groups.google.com/d/optout.

Reply via email to