BroomfieldRecruiter Since 2001
the smart solution for Broomfield jobs

Infrastructure Security Analyst in Broomfield CO

Location: Broomfield
Posted on: January 14, 2021

Job Description:

Unison Systems is looking for a highly motivated and accomplished “Infrastructure Security Analyst” for one of our clients in Broomfield, CO. This consultant will be responsible for enforcing and reporting on the client’s infrastructure security program that includes information security policies, and compliance. We are looking for a true consultant who will develop long-term security strategies and ensure that the company meets all mandated security standards and client needs. Consultant will also be responsible for developing and implementing a corporate culture of compliance and information security (they’ll maintain and reinforce this culture throughout the organization via employee training, so that the culture underpins all business decisions and choices made on a daily basis).



RESPONSIBILITIES WILL INCLUDE:



-


The consultant is responsible for monitoring client networks to detect suspicious and hostile activity that would jeopardize the integrity of information systems. The consultant is responsible for reviewing logs from various security tools and network traffic analyzers. Consultant must be able to compile information and prepare computer security incident reports based on intrusions, events, and incidents that are detected. Consultant will work closely with other infrastructure functions to ensure mitigation of all activity detected. In addition, consultant must assist in the evaluation, research and development of computer and network security tools.




-


Constant monitoring of intrusion detection systems.




-


Creation of technically detailed reports based on intrusions and events.




-


Provides assistance in computer incident investigations.




-


Analyze and evaluate anomalous network and system activity.




-


Assist in troubleshooting and problem solving a wide variety of client issues.




-


Provide quality customer service with excellent communication skills.




-


Recommend modifications to security tools to detect, prevent, and mitigate intrusions.




-


Initiative and a personal interest in Information Technology Security.




-


People skills and the ability to communicate effectively with various clients with the ability to explain and elaborate on technical details.




-


Prior experience with data correlation tools such as LogRhythm, ArcSight, QRadar, Splunk, Quest, CyberArk, LogLogic log management systems, etc.




-


Prior experience with Websense and Palo Alto Wildfire security solutions is required.




-


Prior experience with DLP solutions such as websense, Fidelis, Symantec DLP, and Interguard.




-


Have used network security analysis tools such as Snort, TCPDUMP, WireShark, Inetwork observer, and other Host or Network based Intrusion Detection Systems.




-


Experience with system vulnerability assessment.




-


Familiar with computer forensic tools Netwitness, FTK, EnCase or other network forensic applications.




-


Knowledge of Linux/UNIX and Windows OS security.




-


Knowledge of computer programming languages and scripting languages.




-


An understanding of DOD information assurance policy and regulations.




-


Security Operations Center (SOC) experience.




-


Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience.






-


Excellent written and verbal communication skills.




-


Excellent problem solving skills.




-


Policy and Procedure: Implement and maintain IT security policies, standards, guidelines and procedures to ensure ongoing security compliance; recommend security improvements; ensure that technology decisions made are compliant with Enterprise Security Architecture; develop, analyze and maintain Emergency Operations Plans; research, develop, document and implement tracking and inventory methodologies for maintaining inventory of critical assets.




-


Investigative: Perform vulnerability scans and penetration tests; develop and maintain scripts, routines and software to perform vulnerability threat assessments; coordinate disaster recovery and business continuity tasks; participate as a member of the security incident response team; evaluate security incidents, developing solutions and communicating results to management; manage a computer crime or incident scene, including recognition of the proper investigative approach, conducting a field of search to establish probable cause for seizure, proper collection methods, evidence preservation, transportation, computer forensic analysis, and case management; use various security tools and prepare reports on findings.




-


Technical: Monitor and review intrusion detection systems and firewall logs, analyzing events and patterns and coordinating mitigation responses; review firewall and router rules and access control lists; research technical and security topics and maintain information on industry trends; review and analyze system logs and access lists; perform design review and analysis; perform threat and risk analysis; develop and evaluate plans, principles and procedures for accomplishing customer security studies and provide professional analysis of methods and objectives; develop and analyze information security models, maintaining methodology to track Security Plans for each sensitive and critical application and general support system within the organizations.




-


Customer Support: Respond to and assist in information security assessment requests; evaluate vendor products and services; advise management of risks and best security practices; coordinate implementation and modification of enterprise and departmental 'DMZ's; perform design review and analysis; collaborate on security solutions with departments.




-


Provides "Help Line" support, as assigned.




-


Performs related duties as required.




-


Maintains confidentiality.




-


Ability to work cooperatively with all levels of staff.




-


Effective interpersonal skills.




-


Demonstrates capacity for organization, prioritization, and management in a dynamically changing environment.




-


Establishes rapport with users and promotes independent computing skills.




-


Writes and speaks clearly and concisely.




-


Demonstrates enthusiasm and commitment toward the job and mission of the Company.






MUST HAVE:



-


Bachelor’s Degree in Computer Science or related technical discipline, or the equivalent combination of education, professional training, or work experience.



-


MBA Preferred.





-


CISSP certification or equivalent work experience and knowledge.




-


Extensive experience and knowledge of Microsoft operating systems;




-


Cisco network infrastructure;




-


General business processes and standards associated with areas of assignment; risk and threat assessment process and practices;




-


Project planning and management; business continuity planning, documentation and evaluation; managing the evidentiary process; strong customer service skills.




-


Computer network surveillance/monitoring.




-


Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures.




-


System log analysis.




-


Experience with current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks.




-


Experience in the following technologies: Security Information and Event Management (SIEM), Network Based Intrusion Prevention System (IPS), Host Based Security System (HBSS), Enterprise Firewall, and Data Loss Prevention (DLP).




-


Experience in developing, refining, and performing advanced analysis to uncover new or potential incidents and report on results.




-


Experience in assessing threat indicators (e.g. Malware/Malicious Anomalies/Abnormal network Activity/Root Level Compromise, etc).




-


An advanced understanding of current threats and trends present in the Information Security and Technology field.






LOCATION: Broomfield, CO



DURATION: 6-12 months



HOURLY RANGE: Pending experience





Unison Systems Inc. is a full-service IT consulting firm that specializes in both IT contingency based staffing and end-to-end IT Business and Software solutions. As an independent, locally owned consulting firm that has been in business since 1997, we have 3 main areas of expertise: Software Life Cycle Support, Data Warehouse Support, and Infrastructure Support.

Keywords: , Broomfield , Infrastructure Security Analyst in Broomfield CO, IT / Software / Systems , Broomfield, Colorado

Click here to apply!

Didn't find what you're looking for? Search again!

I'm looking for
in category
within


Other IT / Software / Systems Jobs


Senior Software Engineer
Description: ExpediaSenior Software EngineerExpedia's Property Management Solutions team is looking for software engineers to demonstrate their analytical and problem-solving skills, hands-on programming experience (more...)
Company: Expedia
Location: Denver
Posted on: 01/18/2021

Lead Software Engineer
Description: Named as a Forbes Fintech 50 the last two years in a row, Marqeta powers innovative payment solutions for many of the apps and services you enjoy daily. Our modern card issuing platform, open API, and (more...)
Company: Marqeta, Inc
Location: Denver
Posted on: 01/18/2021

Software Development Engineer - TS/SCI
Description: Salary in the 140-200,000 range Comprehensive Benefit and Retirement Programs. The qualifying candidate will be a highly motivated individual with a strong background in C and Python development (more...)
Company: Great Bay Staffing Group
Location: Denver
Posted on: 01/18/2021


Java Software Engineer
Description: Spotlight Inc. is working with a software company in Denver on a contract-to-hire Backend Java Software Engineer job opportunity. Key Skills: 5-7 years Java/Groovy development experience Experience
Company: Spotlight Inc.
Location: Denver
Posted on: 01/18/2021

Senior Specialist Software Engineer
Description: Innovate. Collaborate. Build. Create. Solve. The KPMG Digital Lighthouse is KPMG's award-winning Analytics AI Center of Excellence recognized by clients and leading analyst firms in the US and globally. (more...)
Company: KPMG
Location: Denver
Posted on: 01/18/2021

Back End Developer
Description: Develop a state-of-the-art product. Make sense of the future. Use data to drive business. If you are a passionate coder who wants to make an impact working on a product that clients love, we---d want (more...)
Company: CB Insights
Location: Denver
Posted on: 01/18/2021

SAP Finance Technology Consultant
Description: Job DescriptionWe Are:Accenture---s SAP practice, and we bring the New to life using design thinking, agile development methodologies, and the latest smart tech like IoT, automation, and AI. We even built (more...)
Company: Accenture
Location: Denver
Posted on: 01/18/2021

Salesforce Developer
Description: We are currently conducting a search for multiple Sr. Salesforce Engineers Developers in the Denver area or remotley. This is a Direct
Company: Planet Technology
Location: Denver
Posted on: 01/18/2021

Lead Database Admin
Description: Looking to make a real difference You belong right here. Come build a rewarding career helping others achieve their financial dream at an organization that values your own long-term success. With your (more...)
Company: Empower Retirement
Location: Englewood
Posted on: 01/18/2021

Chief, Software Architect
Description: Job Description Sr. Principal Systems Engineer Colorado Springs CO or Huntsville AL The Sr Principle Systems Engineer will have the ability to produce creative design solutions that can be implemented (more...)
Company: RTX
Location: Monument
Posted on: 01/18/2021

Log In or Create An Account

Get the latest Colorado jobs by following @recnetCO on Twitter!

Broomfield RSS job feeds