Cybersecurity Analyst - Contract to Hire
Austin, TX
This will be a six-month contract with the potential of a permanent position at the end. You will need to be and will be based in Austin, or commutable to downtown. This position is two days remote and three on-site in Austin working with the team.
We are working with a successful Agency in Austin Texas to find a Cybersecurity Analyst reporting to the CISO.
Responsibilities:
- Technical risk assessments and reviews of account permissions, computer data access needs, security violations, programming changes, and new and existing applications and systems, including data center physical security and environment.
- Cybersecurity incident detection, analysis, and prevention.
- Vulnerability scans of networks and applications to assess effectiveness and identify weaknesses.
- Forensic analysis of information systems and portable devices and forensic recovery of data using assessment tools.
- Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems.
- Develops plans to safeguard computer configuration and data files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Modifies and monitors computer configuration and data files to incorporate new software and virus protection systems, correct errors, or change individual access status.
- Researches and analyzes cybersecurity threat indicators and their behaviors for the prevention, detection, containment, and correction of data security breaches, and recommends threat mitigation strategies.
- Trains users and promotes security awareness to ensure system security and improve application, server, and network efficiency.
- Coordinates agency policies for encryption of data transmissions and the definition of firewall configuration to protect confidential information in transit.
- Designs, develops, modifies, tests, and integrates database or computer hardware systems to protect against cyber threats.
- Participates in the development of information technology disaster recovery and business continuity planning.
Requirements:
- 5+ years of experience in Cybersecurity, and Information Technology Security.
Preferred Skills:
- Certifications such as Certified Ethical Hacker (CEH), GAIC Certified Incident Handler (GCIH), GCFE Certified Forensic Examiner (GAIC), Certified Information Systems Auditor (CISA), Security+, Certified Information Security Manager (CISM), and Certified Information Systems Security Professional (CISSP).
- Experience producing detailed intelligence analysis reports on cyber threats and presenting findings to technical and non-technical audiences.
- Vulnerability Management Systems (e.g., Rapid7, Tenable/Nessus Scanning, Qualys).
- Endpoint Detection and Response (e.g., EndGame, Crowdstrike, CyberReason).
- Email Threat Management (e.g., Proofpoint, MimeCast, Microsoft).
- Security Information and Event Management (e.g., Splunk, Rapid7, SumoLogic).
- Data Loss Protection/Cloud Access Security Brokers (e.g., Symantec, Microsoft, Bitglass, Netskope).
- Cloud Enterprise Network Security (e.g., Cisco Umbrella, Palo Alto, ZScaler).
- Skill in using application security standards, frameworks, attack methods, and mitigation best practices (e.g., OWASP, SANS, NIST, PCI DSS, HIPAA, CJIS, CIS Critical Controls).
#ZR