Type
12+ months with potential to extend
Location
Indianapolis, IN
Exp Required
2+ years
The Jr. Security Analyst in Security Operations will collaborate with the IT Security Operations department, as well as other Indiana Office of Technology Teams to help identify, and collaborate with IT Teams, and state agencies to reduce risk associated with the State of Indiana’s security posture. In addition, role will be the point of contact for one or more agencies the individual will be responsible for creating reports that assesses the agency’s current security posture across several subject areas including, but not limited to, policy compliance, asset/software management, vulnerability management, cloud operations, data security, and identity and access management. The individual will then be responsible for conducting meetings with other IT areas, leadership, and with their assigned agencies to address issues found and assist with the remediation efforts. This role assists other engineers on the larger Security Team with the use of tools and their outputs to enhance the security of state information.
The Essential Functions Of This Role Are As Follows
- Provides routine security administration
- Professionally handle communications with internal and external stakeholders on compliance issues
- Educate control and system owners on compliance workflows and processes
- Gather and report on established metrics within the security compliance programs
- Maintain State and Federal security control framework's adherent to CIS, NIST, and Indiana State policies
- Assist in defending systems against unauthorized access, modification, and/or destruction
- Monitors and address security alerts, incidents, and disasters
- Assists with supporting network, intrusion detection and prevention systems
- Delivers technical reports and work with agencies on findings
- Implements effective tools and processes to protect computers, networks, software, data, and information systems against any possible attacks
- Assists senior staff with security upgrades, tools, and countermeasures
- Uses outputs from security tools such as anti-virus software, security monitoring tools, vulnerability scanning, SIEM, IPS/IDS etc.
- Supports security standards, security systems and authentication protocols