Information Security Analyst (Ethical Hacker) Job Number: 19-07358 Eclaro is looking for an Information Security Analyst (Ethical Hacker) for our client in Pittsburgh, PA . Eclaro s client is a major technology firm with a prominent presence in large and fast-growing markets, providing products and services that enable businesses and economies to thrive. If you re up to the challenge, then take a chance at this rewarding opportunity Position Overview: This job implements and administers information security policies and procedures as well as develops and maintains information systems used to uphold those security policies. Performs various investigations into potential and existing security threats. Enforces security policies and ensure compliance. Troubleshoots security issues. Evaluates security risk assessments and presents security information to workforce and management. Assists workforce with security based questions and problems. Responsibilities: Perform operational support of information security technology Perform analysis and resolve problems regarding information security Complete project tasks to enable the on time, within budget and scope delivery of information security projects Present new and existing information security information to workforce and management Assist in incident response procedures Assist Change Management Assist in conducting application risk assessments against Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry (PCI) Assure compliance to required standards, procedures, guidelines and processes. Required Qualifications: Bachelor's Degree - Information Security, Information Systems, Information Assurance, Computer Science or related field or 5 years of Information Security, Governance, Risk and/or Compliance, Information Technology or Business Analysis 3 - 5 years of experience with Information Security and Systems Analysis 3 - 5 years of experience with Information Security and/or Information Risk Management and/or Information Technology 3 - 5 years of experience with Information Security Governance, Risk and/or Compliance functions and activities 3 - 5 years of experience developing, communicating and presenting Information Security and Risk Management concepts to varying audiences 3 - 5 years of experience with technologies such as Intrusion Prevention Systems (IPS), firewalls, endpoint protection, web/email filtering, Data Loss Prevention (DLP), digital rights management, encryption, Security Event and Incident Management (SEIM), and virtualization platforms Preferred Qualifications: 5 - 7 years of experience with information security and systems analysis Experience working within an information security function using the HITRUST Common Security Framework (HITRUST CSF), or the NIST 800-83 cyber security framework Experience supporting SSAE 16 or SOC 2 Security Trust Principle audits Experience in third party penetration tests Experience providing guidance and recommendations on vulnerabilities/findings Experience tracking and managing remediation of vulnerabilities/findings Experience performing offensive security activities on company networks and assets IT/information security risk advisory experience Governance Risk and Compliance (GRC) tool experience such as ARCHER In-depth understanding of network security architecture, network and networking protocol Certified Information Systems Security Professional (CISSP) Security Offensive Security Certified Professional (OSCP) Knowledge of HITRUST CSF, NIST 800-83 cyber security framework, PCI, HIPAA, HITECH, COBIT, ISO 27001/2, and ITIL 3 Knowledge of NIST Risk Assessment methodology Familiarity with secure SDLC best practices Knowledge of Microsoft Apps and Suites, Windows server, SharePoint, etc. Strong teamwork and inter-personal skills Kali Linux, MetaSploit, nmap, BurpSuite, Wireshark If interested, you may contact: Ashly Velasco ashly.velascoeclaro.com 646####### Ashly Velasco - LinkedIn Equal Opportunity Employer: Eclaro values diversity and does not discriminate based on Race, Color, Religion, Sex, Sexual Orientation, Gender Identity, National Origin, Age, Genetic Information, Disability, Protected Veteran Status, or any other legally protected group status. - provided by Dice
Associated topics: attack, cybersecurity, forensic, identity access management, information security, protect, security, security analyst, violation, vulnerability
* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.
Loading some great jobs for you...