Greetings!
Hope you are doing good!!
I came across your profile on our resume database and wanted to reach out regarding a Job opportunity. If interested please reply with your updated resume, contact details, and the best time to discuss the opportunity.
HYBRID ROLE
Additional Job Information
Title: (Dimondale, MI - IT - DTMB - Cyber Security - CIP - IT Security Analyst 3)
Start Date: 10/28/2024
Interview Process: Virtual Interview via MS Teams with 2nd round interviews being held IN PERSON at the Dimondale, MI office.
Duration: 1 year with possible extension.
Candidates must be currently local within a commutable distance, no more than 1-1.5 hours. Position will be hybrid, in office 2 days a week upon start.
Job Description
The Senior Security Analyst position works as a member of the MiSOC Security Operatons Team. The Senior Security Analyst position reviews and remediates cyber incidents and vulnerabilities found by IT level analysts to IT security specialists and managers to maintain the confidentiality, integrity, and availability of State of Michigan data.
Reviews and validates security procedures to ensure adequate security procedures have been developed to identify and classify cyber events.
Ensures that all identified security operations tool issues are promptly and thoroughly investigated.
Identifies, reviews and validates specifications and implementation of security hardware and software. Implements corrective action as needed.
Performs administration of the proxy servers and information system.
Performs administration of the endpoint detection and response server and agent.
Performs administration of the intrusion protection and intrusion detection systems.
Provides excellent customer service.
- 5+ years of experience in IT Security.
- Experience with Linux, Windows, and Unix.
- Experience working with enterprise packet capture tools.
- Experience with daily administration, configuring, deploying and architecting security network tools and security hw.
- Configuration and administration of network taps.
- Engineering rules, employing best practices.
- Integrations with threat intelligence feeds.
- Subnetting.