Hi, we got a new job opening for Security Analyst in Piper Aircraft Inc
Details :
Company : Piper Aircraft Inc
Location : Vero Beach, FL 32960
position : Security Analyst
Description :
POSITION SUMMARY:
Responsible to monitor our computer networks for security issues, install security software, and document any security issues or breaches. Plan and implement security measures to protect computer systems, networks and data. Stay up-to-date on the latest intelligence, including hackers’ methodologies, in order to anticipate security breaches.
ESSENTIAL JOB FUNCTIONS:
Monitor computer networks for security issues.
Investigate security breaches and other cyber security incidents.
Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
Analyze security breaches to determine their root cause and document security breaches and assess the damage they cause.
Work with network and operations to perform tests and uncover network vulnerabilities.
Fix detected vulnerabilities to maintain a high-security standard.
Stay current on IT security trends and news.
Develop company-wide best practices for IT security.
Perform penetration testing.
Research security enhancements and make recommendations to management.
Stay up-to-date on information technology trends and security standards.
Plan, implement and upgrade security measures and controls
Protect digital files and information systems against unauthorized access, modification or destruction
Maintain data and monitor security access
Conduct internal and external security audits
Manage network, intrusion detection and prevention systems
Recommend and install appropriate tools and countermeasures
Define, implement and maintain corporate security policies
Security awareness training
SUPERVISORY RESPONSIBILITIES:
This job has no supervisory responsibilities. May be required to train and assist other employees.
QUALIFICATIONS:
Experience in information security or related field.
Experience with computer network penetration testing and techniques.
Understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts.
Ability to identify and mitigate network vulnerabilities and explain how to avoid them.
Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact
Excellent report writing and communication
The ability to work well independently or with a team
Capable of meeting deadlines and budgets
Optional Certifications
o CEH: Certified Ethical Hacker
o CISM: Certified Information Security Manager
o CompTIA Security+
o CISSP: Certified Information Systems Security Professional
o GSEC: SANS GIAC Security Essentials
EDUCATION AND EXPERIENCE:
Requires a Bachelors’ Degree in Computer Science and 3-5 years experience, or equivalent combination of education and experience.
General knowledge of computer technology and computer languages, working skills in system design and development, and basic project management skills are required to perform the duties of this position.
LANGUAGE SKILLS:
The employee must possess the ability to communicate effectively with all internal and external customers in both written and oral form.
WORK ENVIRONMENT:
The work environment characteristics described here are representative of those the employee encounters while performing the functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is frequently exposed to an office environment; and occasionally exposed to manufacturing environment and elements such as odor, noise, dust, heat, cold, chemicals, or some element present which makes conditions less desirable than usually found in an office.
Overtime is required when necessary.
SAFETY AND POLICY PRACTICES:
The employee in this job must be knowledgeable in regard to the safety policies and procedures of the Company as described in the Company safety manual. The employee must adhere to all said policies and procedures while supporting the goals and objectives of the organization and recognize the Company’s need to achieve its business objectives.
IND2