Position: IT Security Analyst
Location: Logan, UT
Duration: 6 Month Contract-To-Hire
Salary: $93,600/Year
Required Skills and Experience:
-Extensive experience with Palo Alto Cortex, Global Protect, Splunk, Okta, Intune, and Jamf
-A working and fundamental knowledge of TCP/IP and other network administration protocols
-Must be proficient with Microsoft Windows server/desktop, linux, macOS and be platform-agnostic
-Experience running a security awareness program
-Working experience with Tenable Nessus, and other network tools is a plus
-Experience with a next generation endpoint detection and response system
Job Description:
-Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors
-Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security
-Perform the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically
-Support audit and compliance efforts including evidence collection
-Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices)
-Maintain operational configurations of all in-place security solutions as per the established baselines
-Monitor all in-place security solutions for efficient and appropriate operations
-Review logs and reports of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices). Interpret the implications of that activity and devise plans for appropriate resolution
-Participate in investigations into problematic activity
-Participate in the design and execution of vulnerability assessments, penetration tests, and security audits