Unison Systems is looking for a highly motivated and
accomplished “Infrastructure Security Analyst” for one of our
clients in Broomfield, CO. This consultant will be responsible for
enforcing and reporting on the client’s infrastructure security
program that includes information security policies, and
compliance. We are looking for a true consultant who will develop
long-term security strategies and ensure that the company meets all
mandated security standards and client needs. Consultant will also
be responsible for developing and implementing a corporate culture
of compliance and information security (they’ll maintain and
reinforce this culture throughout the organization via employee
training, so that the culture underpins all business decisions and
choices made on a daily basis).
RESPONSIBILITIES WILL INCLUDE:
The consultant is responsible for monitoring client networks to
detect suspicious and hostile activity that would jeopardize the
integrity of information systems. The consultant is responsible for
reviewing logs from various security tools and network traffic
analyzers. Consultant must be able to compile information and
prepare computer security incident reports based on intrusions,
events, and incidents that are detected. Consultant will work
closely with other infrastructure functions to ensure mitigation of
all activity detected. In addition, consultant must assist in the
evaluation, research and development of computer and network
Constant monitoring of intrusion detection systems.
Creation of technically detailed reports based on intrusions and
Provides assistance in computer incident investigations.
Analyze and evaluate anomalous network and system activity.
Assist in troubleshooting and problem solving a wide variety of
Provide quality customer service with excellent communication
Recommend modifications to security tools to detect, prevent, and
Initiative and a personal interest in Information Technology
People skills and the ability to communicate effectively with
various clients with the ability to explain and elaborate on
Prior experience with data correlation tools such as LogRhythm,
ArcSight, QRadar, Splunk, Quest, CyberArk, LogLogic log management
Prior experience with Websense and Palo Alto Wildfire security
solutions is required.
Prior experience with DLP solutions such as websense, Fidelis,
Symantec DLP, and Interguard.
Have used network security analysis tools such as Snort, TCPDUMP,
WireShark, Inetwork observer, and other Host or Network based
Intrusion Detection Systems.
Experience with system vulnerability assessment.
Familiar with computer forensic tools Netwitness, FTK, EnCase or
other network forensic applications.
Knowledge of Linux/UNIX and Windows OS security.
Knowledge of computer programming languages and scripting
An understanding of DOD information assurance policy and
Security Operations Center (SOC) experience.
Understanding of network hardware devices and experience
configuring Access Control Lists or other Firewall or Router
Excellent written and verbal communication skills.
Excellent problem solving skills.
Policy and Procedure: Implement and maintain IT security policies,
standards, guidelines and procedures to ensure ongoing security
compliance; recommend security improvements; ensure that technology
decisions made are compliant with Enterprise Security Architecture;
develop, analyze and maintain Emergency Operations Plans; research,
develop, document and implement tracking and inventory
methodologies for maintaining inventory of critical assets.
Investigative: Perform vulnerability scans and penetration tests;
develop and maintain scripts, routines and software to perform
vulnerability threat assessments; coordinate disaster recovery and
business continuity tasks; participate as a member of the security
incident response team; evaluate security incidents, developing
solutions and communicating results to management; manage a
computer crime or incident scene, including recognition of the
proper investigative approach, conducting a field of search to
establish probable cause for seizure, proper collection methods,
evidence preservation, transportation, computer forensic analysis,
and case management; use various security tools and prepare reports
Technical: Monitor and review intrusion detection systems and
firewall logs, analyzing events and patterns and coordinating
mitigation responses; review firewall and router rules and access
control lists; research technical and security topics and maintain
information on industry trends; review and analyze system logs and
access lists; perform design review and analysis; perform threat
and risk analysis; develop and evaluate plans, principles and
procedures for accomplishing customer security studies and provide
professional analysis of methods and objectives; develop and
analyze information security models, maintaining methodology to
track Security Plans for each sensitive and critical application
and general support system within the organizations.
Customer Support: Respond to and assist in information security
assessment requests; evaluate vendor products and services; advise
management of risks and best security practices; coordinate
implementation and modification of enterprise and departmental
'DMZ's; perform design review and analysis; collaborate on security
solutions with departments.
Provides "Help Line" support, as assigned.
Performs related duties as required.
Ability to work cooperatively with all levels of staff.
Effective interpersonal skills.
Demonstrates capacity for organization, prioritization, and
management in a dynamically changing environment.
Establishes rapport with users and promotes independent computing
Writes and speaks clearly and concisely.
Demonstrates enthusiasm and commitment toward the job and mission
of the Company.
Bachelor’s Degree in Computer Science or related technical
discipline, or the equivalent combination of education,
professional training, or work experience.
CISSP certification or equivalent work experience and
Extensive experience and knowledge of Microsoft operating
Cisco network infrastructure;
General business processes and standards associated with areas of
assignment; risk and threat assessment process and practices;
Project planning and management; business continuity planning,
documentation and evaluation; managing the evidentiary process;
strong customer service skills.
Computer network surveillance/monitoring.
Knowledge and understanding of network protocols, network devices,
multiple operating systems, and secure architectures.
System log analysis.
Experience with current cyber threats and the associated tactics,
techniques, and procedures used to infiltrate computer
Experience in the following technologies: Security Information and
Event Management (SIEM), Network Based Intrusion Prevention System
(IPS), Host Based Security System (HBSS), Enterprise Firewall, and
Data Loss Prevention (DLP).
Experience in developing, refining, and performing advanced
analysis to uncover new or potential incidents and report on
Experience in assessing threat indicators (e.g. Malware/Malicious
Anomalies/Abnormal network Activity/Root Level Compromise,
An advanced understanding of current threats and trends present in
the Information Security and Technology field.
LOCATION: Broomfield, CO
DURATION: 6-12 months
HOURLY RANGE: Pending experience
Unison Systems Inc. is a full-service IT consulting firm that
specializes in both IT contingency based staffing and end-to-end IT
Business and Software solutions. As an independent, locally owned
consulting firm that has been in business since 1997, we have 3
main areas of expertise: Software Life Cycle Support, Data
Warehouse Support, and Infrastructure Support.