Urgent Requirement: Cybersecurity Analyst @Dimondale, MI only Locals

2 views
Skip to first unread message

Sk Jaffar

unread,
Aug 28, 2024, 1:35:31 PM8/28/24
to
Hi Team,
This is Jaffar from XeroicTech Inc. I saw your profile in one of the job boards and feel that your skills and professional experience would be a good fit for a position with one of our premier clients. Please review the job description below, if you are interested in this position please forward your update resume for immediate consideration

IT Security Analyst 3 – Vulnerability Management
Location: Dimondale, MI
Work Mode :Onsite 
Face 2 Face interview 
Experience required - 12+ Years 
Any visa - locals or nearby.
Overview:
 Supports vulnerability management scanning and reporting tools (requires strong Linux, Windows and/or UNIX administrative knowledge for troubleshooting).
  • Automates processes with scripting such as bash, PowerShell, and Python. 
  • Parses logs in an automated fashion using Grep, AWK, Sed, etc. 
  • Creates integration of vulnerability management data with other State of Michigan enterprise services.
  • Conducts data analysis of vulnerability management data, often integrated with other data sources, to measure effectiveness of vulnerability remediation.  Data analysis tasks include large datasets, which include structured, semi-structured, and unstructured data.
  • Interfaces with other agencies to make recommendations on how to improve the security posture and reduce the number of security related vulnerabilities.
  • Conducts trend analysis, creates dashboards using data scripting to provide metrics on the performance of security responsibilities, controls, and creates new reports based on those collected metrics across multiple agencies.
  • Plans, schedules, implements, and maintains scalable vulnerability scans using modern vulnerability management scanning tools for high complexity devices.
  • While ensuring safe and timely scanning that has minimal/no impact on scan targets and provides troubleshooting of technical issues with scans. 
  • Conducts internal vulnerability audits of servers, network devices, applications, and other devices.
  • Reviews and validates security procedures to ensure adequate security procedures have been developed to identify and classify cyber events.
 Required Skills:
  • 5+ years’ experience in IT Security
  • Extensive experience with vulnerability management scanning and reporting tools. 
  • Experience with Linux, Windows, and Unix.
  • Experience with PowerShell and Python.
  • Experience with log parsing using - Grep, Sed and/or AWK. 
  • Preferred experience with SQL ETL.

--

Thanks J 

Shaik Jaffar
IT Recruiter | www.xeroictech.com

E: sh...@xeroictech.com

A: XeroicTech Inc, 2803 Philadelphia Pike, Suite B19703

facebook icon  twitter icon  youtube icon  linkedin icon  instagram icon  pinterest icon

Banner

The content of this email is confidential and intended for the recipient specified in message only. It is strictly forbidden to share any part of this message with any third party, without a written consent of the sender. If you received this message by mistake, please reply to this message and follow with its deletion, so that we can ensure such a mistake does not occur in the future.

Reply all
Reply to author
Forward
0 new messages