Information Security Price Analystother related Employment listings at Geebo

Information Security Price Analyst

TAD PGS, INC.
is currently seeking an Information Security Analyst for one of our clients in Seaside, CA.
Candidate must possess a secret security clearance.
Please click on this link if you have any questions on how to obtain a clearance https:
//news.
clearancejobs.
com/2016/06/12/obtain-security-clearance/ Position requires U.
S.
Citizenship.
Duties:
Architect, Implement, Administer, Maintain, Configure, and Optimize ArcSight products to monitor, detect, and respond to network threats and an anomaly in unclassified and classified systems.
Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.
Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
Evaluate firewall change requests and assess organizational risk.
Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems.
Assists with implementation of counter-measures or mitigating controls.
Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
Prepares incident reports of analysis methodology and results.
Provides guidance and work leadership to less-experienced technical staff members, and may have supervisory responsibilities.
May serve as a technical team or task leader.
Maintains current knowledge of relevant technology as assigned.
Participates in special projects as required.
Education:
Bachelors Degree in Computer Science or related technical discipline, or the equivalent combination of education, professional training or work experience.
Qualifications:
8-10 years of related experience in data security administration.
Proficient with ArcSight ESM, Logger, ArcMC, and Connectors Experience with DoD Risk Management Framework (RMF) Familiarity with and experience with Linux and Microsoft servers.
Preferred experience with IDS/IPS, HBSS, and ACAS.
Additional Requirements:
Must possess a Secret-level security clearance.
Up to 10% travel required.
CISSP required at contract start.
Desired Certifications:
CEH, GIAC TAD PGS, INC.
specializes in delivering secure, reliable and rapidly implemented workforce solutions to the U.
S.
Federal marketplace, including U.
S.
Government agencies and their prime contractors.
With more than 50 years of experience, TAD PGS, INC.
has earned a reputation for accountability, a value that government agencies and prime contractors both demand and deserve.
TAD PGS, INC.
sources professionals for the full spectrum of federal positions, from administrative to management, and those contracts requiring extremely niche-oriented technical skills and the highest levels of security clearance.
VEVRAA Federal Contractor / Request Priority Protected Veteran Referrals / EOE Protected Veterans/Disability.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.