here is an urgent set of 3 positions, with my Client,
End Client : Is a Global Medical Technology Company,
Location: Franklin Lakes, NJ.
On all 3 positions we can pay $70-75/- an hr on W2
I also have a Sr. Security Monitoring Analyst position that I can pay a little more (upto $80-85/- an hr on W2)
All positions : 12 + months to start with with very long term scope
Position 1: Security Monitoring Analyst- need two people
Qualifications:
• 2-4 years of Security monitoring and analysis experience in an Enterprise environment, configuring or tuning systems such as RSA NetWitness and Cisco StealthWatch • Understanding of security monitoring concepts including NetFlow, Syslog, and full-packet capture. • Experience in developing and implementing security use cases using enterprise security monitoring tools (RSA NetWitness and Cisco StealthWatch preferred). • Knowledge of incident response and handling methodologies. • Knowledge of host and network access control mechanisms (e.g., access control list), Intrusion Detection System (IDS) tools and applications, and Virtual Private Network (VPN) security. • Ability to automate various aspects of security monitoring or analysis using Python such as API integration or data transformation. EDUCATION:
• 2-4 years of Security monitoring and analysis experience in an Enterprise environment, configuring or tuning systems such as RSA NetWitness and Cisco StealthWatch • Understanding of security monitoring concepts including NetFlow, Syslog, and full-packet capture. • Experience in developing and implementing security use cases using enterprise security monitoring tools (RSA NetWitness and Cisco StealthWatch preferred). • Knowledge of incident response and handling methodologies. • Knowledge of host and network access control mechanisms (e.g., access control list), Intrusion Detection System (IDS) tools and applications, and Virtual Private Network (VPN) security. • Ability to automate various aspects of security monitoring or analysis using Python such as API integration or data transformation. EDUCATION:
GIAC certification such as Continuous Monitoring Certification (GMON) or Certified Intrusion Analyst (GCIA), or equivalent • Bachelor’s degree in Computer Science or Cybersecurity (from a designated National Center of Academic Excellence in Information Assurance/Cyber Defense)
Position 2: Cyber Threat Analyst
Qualifications:
• 3-5 year experience in cyber threat hunting or analysis • Knowledge of attack methods, network/endpoint forensic analysis, and malware analysis. • Specialized knowledge of threat actors and campaigns related to healthcare industry. • Experience analyzing host or network intrusions based on forensic artifacts. • Understanding of intelligence techniques such as Analysis of Competing Hypothesis and mitigation of cognitive bias. • Experience with writing or using detection logic and threat detection strategies, including endpoint or network signatures. • Ability to automate various aspects of security monitoring or analysis using Python.
• 3-5 year experience in cyber threat hunting or analysis • Knowledge of attack methods, network/endpoint forensic analysis, and malware analysis. • Specialized knowledge of threat actors and campaigns related to healthcare industry. • Experience analyzing host or network intrusions based on forensic artifacts. • Understanding of intelligence techniques such as Analysis of Competing Hypothesis and mitigation of cognitive bias. • Experience with writing or using detection logic and threat detection strategies, including endpoint or network signatures. • Ability to automate various aspects of security monitoring or analysis using Python.
EDUCATION: • GIAC Certified Forensic Analyst (GCFA) or GIAC Network Forensic Analyst (GNFA), or equivalent • Bachelor’s degree in Computer Science or Cybersecurity (from a designated National Center of Academic Excellence in Information Assurance/Cyber Defense)
Position 3: Vulnerability Risk Analyst-
Qualifications:
• 3-5 year experience in vulnerability scanning and risk management • Ethical hacking principles, general attack stages; specific operational impacts of cybersecurity lapses. • Experience with risk management processes such as methods for assessing and mitigating risk. • Prior experience performing vulnerability scans using Qualys or similar enterprise scanning technology
• 3-5 year experience in vulnerability scanning and risk management • Ethical hacking principles, general attack stages; specific operational impacts of cybersecurity lapses. • Experience with risk management processes such as methods for assessing and mitigating risk. • Prior experience performing vulnerability scans using Qualys or similar enterprise scanning technology
EDUCATION: • Certified in Risk and Information Systems Control (CRISC), Certified Ethical Hacking (CEH), GIAC Penetration Tester (GPEN), or equivalent • Bachelor’s degree in Computer Science or Cybersecurity (from a designated National Center of Academic Excellence in Information Assurance/Cyber Defense)
[email protected]; 201-448-8165