BroomfieldRecruiter
the smart solution for Broomfield jobs

Infrastructure Security Analyst in Broomfield CO

Location: Broomfield
Posted on: September 9, 2018

Job Description:

Unison Systems is looking for a highly motivated and accomplished “Infrastructure Security Analyst” for one of our clients in Broomfield, CO. This consultant will be responsible for enforcing and reporting on the client’s infrastructure security program that includes information security policies, and compliance. We are looking for a true consultant who will develop long-term security strategies and ensure that the company meets all mandated security standards and client needs. Consultant will also be responsible for developing and implementing a corporate culture of compliance and information security (they’ll maintain and reinforce this culture throughout the organization via employee training, so that the culture underpins all business decisions and choices made on a daily basis).



RESPONSIBILITIES WILL INCLUDE:



-

The consultant is responsible for monitoring client networks to detect suspicious and hostile activity that would jeopardize the integrity of information systems. The consultant is responsible for reviewing logs from various security tools and network traffic analyzers. Consultant must be able to compile information and prepare computer security incident reports based on intrusions, events, and incidents that are detected. Consultant will work closely with other infrastructure functions to ensure mitigation of all activity detected. In addition, consultant must assist in the evaluation, research and development of computer and network security tools.





-

Constant monitoring of intrusion detection systems.





-

Creation of technically detailed reports based on intrusions and events.





-

Provides assistance in computer incident investigations.





-

Analyze and evaluate anomalous network and system activity.





-

Assist in troubleshooting and problem solving a wide variety of client issues.





-

Provide quality customer service with excellent communication skills.





-

Recommend modifications to security tools to detect, prevent, and mitigate intrusions.





-

Initiative and a personal interest in Information Technology Security.





-

People skills and the ability to communicate effectively with various clients with the ability to explain and elaborate on technical details.





-

Prior experience with data correlation tools such as LogRhythm, ArcSight, QRadar, Splunk, Quest, CyberArk, LogLogic log management systems, etc.





-

Prior experience with Websense and Palo Alto Wildfire security solutions is required.





-

Prior experience with DLP solutions such as websense, Fidelis, Symantec DLP, and Interguard.





-

Have used network security analysis tools such as Snort, TCPDUMP, WireShark, Inetwork observer, and other Host or Network based Intrusion Detection Systems.





-

Experience with system vulnerability assessment.





-

Familiar with computer forensic tools Netwitness, FTK, EnCase or other network forensic applications.





-

Knowledge of Linux/UNIX and Windows OS security.





-

Knowledge of computer programming languages and scripting languages.





-

An understanding of DOD information assurance policy and regulations.





-

Security Operations Center (SOC) experience.





-

Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience.









-

Excellent written and verbal communication skills.





-

Excellent problem solving skills.





-

Policy and Procedure: Implement and maintain IT security policies, standards, guidelines and procedures to ensure ongoing security compliance; recommend security improvements; ensure that technology decisions made are compliant with Enterprise Security Architecture; develop, analyze and maintain Emergency Operations Plans; research, develop, document and implement tracking and inventory methodologies for maintaining inventory of critical assets.





-

Investigative: Perform vulnerability scans and penetration tests; develop and maintain scripts, routines and software to perform vulnerability threat assessments; coordinate disaster recovery and business continuity tasks; participate as a member of the security incident response team; evaluate security incidents, developing solutions and communicating results to management; manage a computer crime or incident scene, including recognition of the proper investigative approach, conducting a field of search to establish probable cause for seizure, proper collection methods, evidence preservation, transportation, computer forensic analysis, and case management; use various security tools and prepare reports on findings.





-

Technical: Monitor and review intrusion detection systems and firewall logs, analyzing events and patterns and coordinating mitigation responses; review firewall and router rules and access control lists; research technical and security topics and maintain information on industry trends; review and analyze system logs and access lists; perform design review and analysis; perform threat and risk analysis; develop and evaluate plans, principles and procedures for accomplishing customer security studies and provide professional analysis of methods and objectives; develop and analyze information security models, maintaining methodology to track Security Plans for each sensitive and critical application and general support system within the organizations.





-

Customer Support: Respond to and assist in information security assessment requests; evaluate vendor products and services; advise management of risks and best security practices; coordinate implementation and modification of enterprise and departmental 'DMZ's; perform design review and analysis; collaborate on security solutions with departments.





-

Provides "Help Line" support, as assigned.





-

Performs related duties as required.





-

Maintains confidentiality.





-

Ability to work cooperatively with all levels of staff.





-

Effective interpersonal skills.





-

Demonstrates capacity for organization, prioritization, and management in a dynamically changing environment.





-

Establishes rapport with users and promotes independent computing skills.





-

Writes and speaks clearly and concisely.





-

Demonstrates enthusiasm and commitment toward the job and mission of the Company.









MUST HAVE:



-

Bachelor’s Degree in Computer Science or related technical discipline, or the equivalent combination of education, professional training, or work experience.



-

MBA Preferred.







-

CISSP certification or equivalent work experience and knowledge.





-

Extensive experience and knowledge of Microsoft operating systems;





-

Cisco network infrastructure;





-

General business processes and standards associated with areas of assignment; risk and threat assessment process and practices;





-

Project planning and management; business continuity planning, documentation and evaluation; managing the evidentiary process; strong customer service skills.





-

Computer network surveillance/monitoring.





-

Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures.





-

System log analysis.





-

Experience with current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks.





-

Experience in the following technologies: Security Information and Event Management (SIEM), Network Based Intrusion Prevention System (IPS), Host Based Security System (HBSS), Enterprise Firewall, and Data Loss Prevention (DLP).





-

Experience in developing, refining, and performing advanced analysis to uncover new or potential incidents and report on results.





-

Experience in assessing threat indicators (e.g. Malware/Malicious Anomalies/Abnormal network Activity/Root Level Compromise, etc).





-

An advanced understanding of current threats and trends present in the Information Security and Technology field.









LOCATION: Broomfield, CO



DURATION: 6-12 months



HOURLY RANGE: Pending experience







Unison Systems Inc. is a full-service IT consulting firm that specializes in both IT contingency based staffing and end-to-end IT Business and Software solutions. As an independent, locally owned consulting firm that has been in business since 1997, we have 3 main areas of expertise: Software Life Cycle Support, Data Warehouse Support, and Infrastructure Support.

Keywords: , Broomfield, Infrastructure Security Analyst in Broomfield CO, IT / Software / Systems, Broomfield, Colorado

Click here to apply!

Didn't find what you're looking for? Search again!


I'm looking for
in category
within


Other IT / Software / Systems Jobs


java developer Denver Colorado contract to perm $50 per hour w2 no corp
Description: Develop, create, and modify general computer applications software using coding practices and methods. Code will be written to accurately reflect written specifications supplied as part of each software (more...)
Company: Genuent
Location: Denver
Posted on: 09/19/2018

Back End Software Development Instructor
Description: Back End Software Development Instructor Web Application Development Program Turing's Web Application Development Program is a 27-week full-time intensive instructional program for adults desiring to (more...)
Company: Turing School of Software & Design
Location: Denver
Posted on: 09/19/2018

Web Developer (25% Profit Sharing)
Description: Job Description Who we are What Youll Get to Do: BIT Systems Inc. is a CACI company. The commitment of our employees to Engineering Results is the catalyst that has propelled BITS to becoming a leader (more...)
Company: CACI International
Location: Aurora
Posted on: 09/19/2018


Mobile Publisher Account Manager - Adperio
Description: Adperio is one of the premier mobile performance networks in the world. We look beyond the install to align quality and scale, leveraging data to deliver target users within predetermined KPIs. We proudly (more...)
Company: Adperio
Location: Denver
Posted on: 09/17/2018

Electronic Fulfillment & eCOM Lead - Software Licensing
Description: Description Xilinx develops highly flexible and adaptive processing platforms that enable rapid innovation across a variety of technologies - from the endpoint to the edge to the cloud. Xilinx is the (more...)
Company: Xilinx
Location: Longmont
Posted on: 09/17/2018

Business Process Consultant
Description: Please find my direct client requirement for your consideration. Title: Business Process Consultant Location: Denver CO Duration: 4 Months Job Description Researches and analyzes basic and complex issues (more...)
Company: Serenity Infotech
Location: Denver
Posted on: 09/17/2018

AWS DevOps Engineer
Description: Required Qualifications General consulting skills including: analysis and problem solving, written and verbal communication, and team collaboration. Excellent written and oral communication skills Ability (more...)
Company: JAMY INTERACTIVE, INC
Location: Denver
Posted on: 09/17/2018

Software Engineer #1615.32239
Description: Computer: Software Engineer Boulder, CO Design,
Company: Confidential
Location: Aurora
Posted on: 09/17/2018

Java Developer (Entry Level)
Description: Revature has partnered with a Fortune 500 company to find and develop a strong team of 20 Entry Level Software Engineers to work on next gen software solutions. This is an excellent opportunity for an (more...)
Company: Revature
Location: Colorado Springs
Posted on: 09/19/2018

Earn 800-1200 Weekly as a Health Rep working from Home. Computer and Phone are a must
Description: Comprehensive full training is provided and an excellent
Company: Jumpstart consult
Location: Greeley
Posted on: 09/17/2018

Log In or Create An Account

Username:
Password:
 

Forgot password?


Find us on Facebook

Find us on LinkedIn

Get the latest Colorado jobs by following @recnetCO on Twitter!

Broomfield RSS job feeds