Experience:
0-1 years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Posted:
1/29/2018
Job Category:
Information Services
See more jobs for students and recent grads who studied:
Security Operations Analyst
Request Technology - Kyle Honn | Lake Forest, Illinois
Tell Us More About Your Job Preferences
By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this job isn't what you are looking for, click the frowny face. Learn More...

Follow This Company
Share

Job Description

This is a permanent full time role.

Security Operations Analyst

The Security Operations Analyst will support information security incidents end to end and provide advanced troubleshooting with security technologies. They will also assist in security project implementation for testing, monitoring and reporting.

Our client's expectations for a candidate

  • Check Point, Fortinet, Cisco, Palo Alto, Juniper.
  • SEIM, IDS/IPS, VPN, HIDS.
  • Malware analysis and protection, logical access controls, data loss prevention, etc.
  • GIAC or ISC2 certifications preferred.

Your responsibilities

  • Support information security incidents end to end.
  • Provide advanced troubleshooting with security technologies.
  • Support Legacy and third party security solutions with remote support providers and integration techniques.
  • Real Time monitoring to alerts and anomalies.
  • Evaluate new or updated security solutions via the engineering team.
  • Internal and external audit, risk and compliance, etc.

Position requirements

  • 3+ years of experience in IT with exposure to infrastructure/network and multi-platform environments.
  • College degree in Information Systems or related degree, or equivalent job experience.
  • 2+ years experience hands on knowledge of Firewalls (Fortinet, Cisco, Palo Alto, Juniper, Check Point).
  • 2+ years experience in VPN, IDS/IPS (TippingPoint, SourceFire, etc.), SEIM, HIDS.
  • 2+ years experience in Malware analysis and protection, logical access controls, data loss prevention, content filtering, application Firewalls, vulnerability scanners, security incident response and forensics software.
  • GIAC or ISC2 certifications preferred.

Please feel free to email your resume to me if this is an opportunity you're interested in.

Qualifications

Applicants must be eligible to work in the specified location

This company profile was created by AfterCollege and is about Request Technology - Kyle Honn. This page is not endorsed by or affiliated with Request Technology - Kyle Honn. For questions regarding company profiles, please email: care@aftercollege.com.