Epicareer Might not Working Properly
Learn More

W2 - Security Analyst IV (IT Security, Project leadership, Vendor security) - Local/Remote

Salary undisclosed

Apply on


Original
Simplified
Description:
The client is looking for a Security Analyst IV.
Will close to submissions on 10/17/2024 4:00PM CST.
Top Required Skills & Years of Experience:

IT Security 5 years
IT Professional 8 years
Project leadership experience 4 years
Experience evaluating and implementing vendor security offerings 4 years
Strong attention to detail
Excellent communication skills (written and verbal)
Nice to Have Skills:
CISSP or equivalent 1 year
Interview Process: 2 rounds via Microsoft Teams
Duration: 6/30/25, likely to extend
Onsite or Remote: All candidates must be CURRENT WI residents. No relocation is allowed. This position will be mostly remote, however, the selected hire will need to be onsite once a quarter or as operational needs dictate.

Position Information:

This position is responsible for providing advanced security analysis to manage the design, implementation, and monitoring of security for ETF's computer platforms and systems, both at ET F and hosted by DET. The computer platforms include network, server/storage/backup, application platform (mainframe, client/server, web) and application architectures. This position specializes in information and network security. It analyzes security risks and plans controls, develops policies and procedures to implement security practices, and coordinates implementation of security controls. This position may lead projects to implement new security controls. This position will also have daily, weekly, and monthly duties operating security control systems in place at ETF. It will monitor compliance with security policies and procedures.
Regular duties may include the following representative tasks:
Research vendor offerings and conduct POCs.
Coordinate with other teams to implement new technologies and remediate issues.
Monitor asset inventory, installed agents, and status of devices.
Review vulnerability dashboards and organizational impact of changing threat landscape.
Monitor data inventories, policy violations. Produce reports and metrics.
Monitor and process incident response queues.
Monitor SIEM logs and investigate incidents.
Monitor content filter dashboards and investigate anomalies as appropriate.
Manage endpoint firewall operation and adjust as necessary.
Work independently as well as within a team environment
Pay range: $44 to $49 per hour on W2.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job