bull Perform Vulnerability scans using various security technologies such as Nexpose, Tenable, Qualys bull Work with other ITS teams and business users to identify and develop security solutions. bull On a day to day basis, the Security specialist is expected to ensure that tools and processes assigned to himher are managed properly. bull Prepares system security reports by collecting, analyzing, and summarizing data and trends. bull Keep up with emerging threats, tools and technologies bull Understand advanced threats and identify solutions to mitigate these risks bull Manage the day to day threats including but not limited to phishing, malware, unauthorized access and other types of security violations. bull Review logs, alerts and all types of violations and identify ways to contains and mitigate the issues. bull Work with Helpdesk and other ITS groups to ensure that threats are mitigated in a timely fashion bull Document these threats and communicate to the Security leadership bull 5 years of Kali Linux experience or at least 5 years working in security-related areas bull CEH certification preferred bull Knowledge in networking (routing and switching), systems administration for Windows and Linux bull Ability to communicate clearly and effectively, both orally and in writing, at all levels within and outside the organization. bull Experience in Penetration Test Assessment Ability to evaluate and recommend preventative and corrective controls to mitigate risk to the Board
Associated topics: forensic, identity, identity access management, information security, leak, protect, security engineer, threat, violation, vulnerability
* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.