GreeleyRecruiter Since 2001
the smart solution for Greeley jobs

Infrastructure Security Analyst in Broomfield CO

Location: Broomfield
Posted on: October 20, 2024

Job Description:

Unison Systems is looking for a highly motivated and accomplished “Infrastructure Security Analyst” for one of our clients in Broomfield, CO. This consultant will be responsible for enforcing and reporting on the client’s infrastructure security program that includes information security policies, and compliance. We are looking for a true consultant who will develop long-term security strategies and ensure that the company meets all mandated security standards and client needs. Consultant will also be responsible for developing and implementing a corporate culture of compliance and information security (they’ll maintain and reinforce this culture throughout the organization via employee training, so that the culture underpins all business decisions and choices made on a daily basis).



RESPONSIBILITIES WILL INCLUDE:



-


The consultant is responsible for monitoring client networks to detect suspicious and hostile activity that would jeopardize the integrity of information systems. The consultant is responsible for reviewing logs from various security tools and network traffic analyzers. Consultant must be able to compile information and prepare computer security incident reports based on intrusions, events, and incidents that are detected. Consultant will work closely with other infrastructure functions to ensure mitigation of all activity detected. In addition, consultant must assist in the evaluation, research and development of computer and network security tools.




-


Constant monitoring of intrusion detection systems.




-


Creation of technically detailed reports based on intrusions and events.




-


Provides assistance in computer incident investigations.




-


Analyze and evaluate anomalous network and system activity.




-


Assist in troubleshooting and problem solving a wide variety of client issues.




-


Provide quality customer service with excellent communication skills.




-


Recommend modifications to security tools to detect, prevent, and mitigate intrusions.




-


Initiative and a personal interest in Information Technology Security.




-


People skills and the ability to communicate effectively with various clients with the ability to explain and elaborate on technical details.




-


Prior experience with data correlation tools such as LogRhythm, ArcSight, QRadar, Splunk, Quest, CyberArk, LogLogic log management systems, etc.




-


Prior experience with Websense and Palo Alto Wildfire security solutions is required.




-


Prior experience with DLP solutions such as websense, Fidelis, Symantec DLP, and Interguard.




-


Have used network security analysis tools such as Snort, TCPDUMP, WireShark, Inetwork observer, and other Host or Network based Intrusion Detection Systems.




-


Experience with system vulnerability assessment.




-


Familiar with computer forensic tools Netwitness, FTK, EnCase or other network forensic applications.




-


Knowledge of Linux/UNIX and Windows OS security.




-


Knowledge of computer programming languages and scripting languages.




-


An understanding of DOD information assurance policy and regulations.




-


Security Operations Center (SOC) experience.




-


Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience.






-


Excellent written and verbal communication skills.




-


Excellent problem solving skills.




-


Policy and Procedure: Implement and maintain IT security policies, standards, guidelines and procedures to ensure ongoing security compliance; recommend security improvements; ensure that technology decisions made are compliant with Enterprise Security Architecture; develop, analyze and maintain Emergency Operations Plans; research, develop, document and implement tracking and inventory methodologies for maintaining inventory of critical assets.




-


Investigative: Perform vulnerability scans and penetration tests; develop and maintain scripts, routines and software to perform vulnerability threat assessments; coordinate disaster recovery and business continuity tasks; participate as a member of the security incident response team; evaluate security incidents, developing solutions and communicating results to management; manage a computer crime or incident scene, including recognition of the proper investigative approach, conducting a field of search to establish probable cause for seizure, proper collection methods, evidence preservation, transportation, computer forensic analysis, and case management; use various security tools and prepare reports on findings.




-


Technical: Monitor and review intrusion detection systems and firewall logs, analyzing events and patterns and coordinating mitigation responses; review firewall and router rules and access control lists; research technical and security topics and maintain information on industry trends; review and analyze system logs and access lists; perform design review and analysis; perform threat and risk analysis; develop and evaluate plans, principles and procedures for accomplishing customer security studies and provide professional analysis of methods and objectives; develop and analyze information security models, maintaining methodology to track Security Plans for each sensitive and critical application and general support system within the organizations.




-


Customer Support: Respond to and assist in information security assessment requests; evaluate vendor products and services; advise management of risks and best security practices; coordinate implementation and modification of enterprise and departmental 'DMZ's; perform design review and analysis; collaborate on security solutions with departments.




-


Provides "Help Line" support, as assigned.




-


Performs related duties as required.




-


Maintains confidentiality.




-


Ability to work cooperatively with all levels of staff.




-


Effective interpersonal skills.




-


Demonstrates capacity for organization, prioritization, and management in a dynamically changing environment.




-


Establishes rapport with users and promotes independent computing skills.




-


Writes and speaks clearly and concisely.




-


Demonstrates enthusiasm and commitment toward the job and mission of the Company.






MUST HAVE:



-


Bachelor’s Degree in Computer Science or related technical discipline, or the equivalent combination of education, professional training, or work experience.



-


MBA Preferred.





-


CISSP certification or equivalent work experience and knowledge.




-


Extensive experience and knowledge of Microsoft operating systems;




-


Cisco network infrastructure;




-


General business processes and standards associated with areas of assignment; risk and threat assessment process and practices;




-


Project planning and management; business continuity planning, documentation and evaluation; managing the evidentiary process; strong customer service skills.




-


Computer network surveillance/monitoring.




-


Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures.




-


System log analysis.




-


Experience with current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks.




-


Experience in the following technologies: Security Information and Event Management (SIEM), Network Based Intrusion Prevention System (IPS), Host Based Security System (HBSS), Enterprise Firewall, and Data Loss Prevention (DLP).




-


Experience in developing, refining, and performing advanced analysis to uncover new or potential incidents and report on results.




-


Experience in assessing threat indicators (e.g. Malware/Malicious Anomalies/Abnormal network Activity/Root Level Compromise, etc).




-


An advanced understanding of current threats and trends present in the Information Security and Technology field.






LOCATION: Broomfield, CO



DURATION: 6-12 months



HOURLY RANGE: Pending experience





Unison Systems Inc. is a full-service IT consulting firm that specializes in both IT contingency based staffing and end-to-end IT Business and Software solutions. As an independent, locally owned consulting firm that has been in business since 1997, we have 3 main areas of expertise: Software Life Cycle Support, Data Warehouse Support, and Infrastructure Support.

Keywords: , Greeley , Infrastructure Security Analyst in Broomfield CO, IT / Software / Systems , Broomfield, Colorado

Click here to apply!

Didn't find what you're looking for? Search again!

I'm looking for
in category
within


Log In or Create An Account

Get the latest Colorado jobs by following @recnetCO on Twitter!

Greeley RSS job feeds