Security Analyst

Madison, WI 53704
12 months
Rate- $50/hr W2, $55/hr C2C
Due date- 10/23
Local candidates preferred

Security Analyst
Basic Qualifications
• Strong knowledge of current security concepts, practices, and procedures.
• Strong experience in developing standard operating procedures to streamline and automate security processes.
• Strong requirements development (facilitation) and design skills in assessing security, business needs, risk and implementing solutions.
• Strong sense for controls – monitoring, auditing, logging, intrusion prevention and remediation strategies.
• Strong network, endpoint, and data protection knowledge.
• Outstanding verbal and written communication skills are essential.
• Experienced working in a deadline-driven environment, handling and prioritizing multiple tasks.
• Excellent conceptual, problem solving, and analytical skills.
• Ability to work independently or as a member of a team on complex tasks.
• Demonstrated competency in documenting solutions for both technical and functional audiences.
• Experienced with securing Microsoft products such as Active Directory, Exchange, SCCM, AV, and Group Policy.
• Experienced in using a variety of scripting languages including MS-DOS batch, VBScript, and PowerShell for automating security tasks.
• Strong knowledge and understanding of TCP/IP networking on an Ethernet network.
• Strong communication skills with customers through all phases of problem resolution.
• Experience in Project Management.

Duties and Responsibilities
• Provide consultation and advice to technical services staff on security and data safeguards.
• Evaluate current infrastructure and application security processes for security controls and risks. Assist in the remediation of these risks.
• Using current Madison College methods, inventory servers on the network, develop a risk categorization and associated minimum security controls for each category to mitigate risks.
• Develop a vulnerability scanning and mitigation process to ensure high risk devices are patched as part of a normal operating procedure. Monitor the process for effectiveness.
• Evaluate options, procure and implement log management and security event management solution.
• Develop a process to periodically scan and remediate PII and other sensitive data from network shares and other locations.
• Evaluate options, implement and develop processes for encryption of OSX, Windows 7 desktops and other removable media.
• Develop an anti-virus alert responses and mitigation processes to ensure response to possible malware is appropriate. Monitor the process for effectiveness.
• Work independently and with internal staff to assist them, guide them and mentor them to develop security controls and build secure solutions.
• Follow through with project staff, IT management and end-users to ensure consistent solutions and continuous improvement.
• Provide support to end-users, as needed.
• Communicate on status to management and teams.


Comments are closed.