US
0 suggestions are available, use up and down arrow to navigate them
PROCESSING APPLICATION
Hold tight! We’re comparing your resume to the job requirements…

ARE YOU SURE YOU WANT TO APPLY TO THIS JOB?
Based on your Resume, it doesn't look like you meet the requirements from the employer. You can still apply if you think you’re a fit.
Job Requirements of IT Security Analyst 4:
-
Employment Type:
Contractor
-
Location:
Richmond, VA (Onsite)
Do you meet the requirements for this job?
IT Security Analyst 4
Careers Integrated Resources Inc
Richmond, VA (Onsite)
Contractor
Job Title: IT Security Analyst 4
Location: Richmond, VA (Hybrid)
Duration: 04+ Months
Job Description:
Note from Manager: For this position we are really looking for someone who is strong in Security Operations (Vulnerability Management, Penetration Testing, Incident Response, Identity Access Management, etc.) A few of the candidates were strong in Risk Management (Risk Assessment, Data Classification, Audits, etc.) but we already have those skills on our team. The remaining candidates mostly struggled to answer basic technical questions relating to security and seemed to mostly come from more IT Operations backgrounds. We are looking for an experienced person as this is not an entry level opening.
Role and Responsibilities:
Location: Richmond, VA (Hybrid)
Duration: 04+ Months
Job Description:
Note from Manager: For this position we are really looking for someone who is strong in Security Operations (Vulnerability Management, Penetration Testing, Incident Response, Identity Access Management, etc.) A few of the candidates were strong in Risk Management (Risk Assessment, Data Classification, Audits, etc.) but we already have those skills on our team. The remaining candidates mostly struggled to answer basic technical questions relating to security and seemed to mostly come from more IT Operations backgrounds. We are looking for an experienced person as this is not an entry level opening.
Role and Responsibilities:
- Analyze the security impact of application, configuration, and infrastructure changes to ensure compliance with the security standard as part of the change management lifecycle.
- Assess the configurations of applications, servers, and network devices for compliance with the security standard.
- Analyze and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.
- Assess and document the security impact and risks of newly discovered vulnerabilities in the environment.
- Coordinate resolution of application and infrastructure security vulnerabilities with System Owners, IT, and vendors.
- Track the resolution of vulnerabilities and provide regular updates to management.
- Coordinate resolution of endpoint security vulnerabilities with users and provide regular updates to management.
- Respond to and investigate security incidents and provide thorough post-event analyses.
- Perform internal application penetration testing, document findings, and recommend improvements to improve the organization s security posture.
- Complete annual password security audits and coordinate completion of agency-wide user access audits in compliance with the security standard.
- Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately.
- Created and maintained desk procedures and processed documentation for all responsibilities.
Get job alerts by email.
Sign up now!
Join Our Talent Network!