GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET
The Red Lobster Cyber Security Analyst will be involved in day-to-day operations of the in-place security solutions as well as the identification, investigation and resolution of security breaches detected by those systems. Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines and procedures as well as remediating vulnerabilities found by audits and assessments. The Cyber Security Analyst is expected to be fully aware of the enterprise’s security goals as established by its stated policies, procedures and guidelines and to actively work towards upholding those goals. In this role the Cyber Security Analyst will consistently demonstrate strong technical, initiative and communication skills. It is expected that this position provide other team members technical advice.
ROLES AND RESPONSIBILITES:
-Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.
-Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
-Perform the deployment, integration and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise??s security documents specifically
-Participate in the planning and design of enterprise security architecture, under the direction of the IT Security Manager, where appropriate.
-Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines and procedures) under the direction of the IT Security Manager, where appropriate.
-Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).
-Maintain operational configurations of all in-place security solutions as per the established baselines.
-Monitor all in-place security solutions for efficient and appropriate operations.
-Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution.
-Participate in investigations into problematic activity.
-Participate in the design and execution of vulnerability assessments, penetration tests and security audits.
-Provide on-call support for end users for all in-place security solutions
REQUIRED TECHNICAL SKILLS:
-Strong technical knowledge and ability to express complex technical concepts in terms that are understandable to the business.
-Understanding of how Cyber Security affects an organization and ability to link it to redesigned business processes.
-Experience in Vulnerability Assessment and Incident Response tools
-Experience in SIEM and Forensics Investigations tools
-In depth knowledge of Security Industry Best Practices.
-Experience with the implementation and administering of encryption solutions.
-Strong understanding in network segmentation and tiered infrastructure
-Understanding of Public and Private Cloud technologies
-Experience in implementing and maintaining single sign on and multifactor authentication applications.
-Understanding of Active Directory DC design, schema, OU design, AD replication topology, and DC backup/restore procedures
-Minimum of 5+ years of relevant experience in Cyber Security in Enterprise environment
-BS/BA in Computer Science or Electrical Engineering
OTHER KEY QUALIFICATIONS:
-Proven analytical and problem-solving abilities.
-Ability to effectively prioritize and execute tasks in a high-pressure environment.
-Good written, oral, and interpersonal communication skills.
-Ability to conduct research into IT security issues and products as required.
-Ability to present ideas in business-friendly and user-friendly language.
-Highly self-motivated and directed.
-Keen attention to detail.
-Team-oriented and skilled in working within a collaborative environment.
-Maybe required to lift network equipment up to 50 lbs.
PREFERRED SKILLS AND EXPIRENCE:
-GIAC Information Security Fundamentals
-Microsoft Certified Systems Administrator: Security
$65,000 – $85,000-