Hybrid: In Person Interview: Cyber Security

 

Hi

 

We have an immediate requirement with our direct client

 

 

Please fill the details below asap and send me

 

Please attach your latest word resume ,DL copy and Visa copy

 

 

Basic Details

Full Name:

Contact Number:

Email:

Visa Status:

Current Location:

Relocation:

Last 5 Digits of SSN:

Availability to join:          

Availability for In-person interview:

Best time to reach:

Employer details :

 

 

Title: Dimondale, MI – IT – DTMB – Cyber Security – CIP – IT Security Analyst 3 – Vulnerability Management Team
Posting ID: 132300

Project End Date: 1 Years from projected start date

State: Michigan

Worksite: Hybrid- In Person Interview

 

 

 

Top Skills & Years of Experience Required:

 

– 5+ Years' IT Security Experience

– Experience with vulnerability management scanning and reporting tools.

– Experience with trend analysis and creating dashboards using data scripting to provide metrics on the performance.

– Ability to work independently and efficiently.

 

 

 

IT Security Analyst 3 – Job Description

 

 

Short Job Description

The Security Analyst position works as a member of the Vulnerability Management Team.  The Senior Security Analyst position reviews and remediates cyber incidents and vulnerabilities found by IT level analysts to IT security specialists and managers to maintain the confidentiality, integrity, and availability of State of Michigan data.

 

 

Long Job Description

Technical Security Analyst performing duties related to the Vulnerability Management team. 

  • Plans, schedules, implements, and maintains scalable vulnerability scans using modern vulnerability management scanning tools for high complexity devices.
  • While ensuring safe and timely scanning that has minimal/no impact on scan targets, provides troubleshooting of technical issues with scans.
  • Supports vulnerability management scanning and reporting tools.
  • Conducts internal vulnerability audits of servers, network devices, applications, and other devices.
  • Interfaces with internal and external auditors, providing detailed information on remediation efforts.
  • Creates integrations of vulnerability management data with other State of Michigan enterprise services.
  • Conducts data analysis of vulnerability management data, often integrated with other data sources, to measure effectiveness of vulnerability remediation.  Data analysis tasks includes large datasets, which include structured, semi-structured, and unstructured data.
  • Interfaces with other agencies to make recommendations on how to improve the security posture and reduce the number of security related vulnerabilities.
  • Conducts trend analysis, creates dashboards using data scripting to provide metrics on the performance of security responsibilities, controls, and creates new reports for management based on those collected metrics across multiple agencies.
  • Escalates as appropriate.

 

 
 

 

Thanks and Regards

__________________________________________________________

Vijaya

Real World Technologies Inc  | 29105 Lorie Lane, Suite A | Wixom, Michigan 48393

OFFICE: 248-516-7335 | FAX: 248-779-1789  [email protected] | http://www.rwts.net

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Most Voted
Newest Oldest
Inline Feedbacks
View all comments