14 Apr
Cyber Security Specialist
Texas, Houston , 77002 Houston USA

Vacancy expired!

Genuent is seeking a Cyber Security Specialist for our direct client in Houston, TX. This is an onsite position and candidates must be local to Houston. Qualified candidate should send their resume (Word format) to Nate Ackerman at . Cyber Security Specialist - Houston, TXDirect-Hire Summary:The Senior IT Security Specialist will work as part of the IT Security & Compliance team to manage risks to the information assets and systems of the organization by actively hunting for cyber threats, improving monitoring for such threats, and responding to these threats. They will also work with IT and other departments to promote secure practices and improve information security processes and policies. Responsibilities include, but are not limited to:

  • Threat hunting
  • Improve security monitoring and incident identification
  • Incident response and resolution
  • Improve enterprise-wide security log collection, correlation, and reporting
  • Work with the Security team to improve and automate processes
  • Monitor for changes in attack surface and risk related to attack surface
  • Identify areas for improved security controls and mitigations
  • Stay current on emerging threats and mitigation strategies
  • Identify actionable threat intelligence sources and integrate into monitoring process
  • Produce reports to communicate security risk and status to upper management
Qualifications
  • The successful candidate will meet the following qualifications:
  • Bachelor's degree is preferred
  • Security certifications (CISSP, CISA, Security+, GIAC) are preferred
  • 5+ years experience in a relevant, dedicated information security role
  • 5+ years experience with network administration, server administration, and/or workstation administration
  • Excellent verbal and written communication skills are required
  • Active member of one or more security associations (ISSA, ISACA, InfraGard, etc.)
The following skills and knowledge are desired:
  • Threat hunting
  • Log analysis and developing log correlation rules
  • Incident handling
  • Forensics
  • Malware analysis
  • Endpoint detection and response (EDR)
  • Intrusion detection
  • Vulnerability scanning and remediation
  • Risk assessment

Vacancy expired!


Related jobs

Report job