This job is closed

We regret to inform you that the job you were interested in has been closed. Although this specific position is no longer available, we encourage you to continue exploring other opportunities on our job board.

TEKsystems - New York, NY

posted 2 months ago

Full-time - Mid Level
Hybrid - New York, NY
10,001+ employees
Professional, Scientific, and Technical Services

About the position

The Endpoint Security Analyst at TEKsystems is responsible for maintaining and enhancing the organization's cybersecurity posture. This role involves protecting computer systems and networks from security breaches, analyzing vulnerabilities, monitoring for suspicious activities, and developing security protocols. The analyst will collaborate with cross-functional teams to implement effective security measures and assist in various security initiatives.

Responsibilities

  • Monitor and analyze security alerts and events to identify potential threats.
  • Conduct vulnerability assessments and penetration testing to identify weaknesses.
  • Implement security measures and best practices to protect data and systems.
  • Collaborate with IT teams to ensure compliance with security policies and regulations.
  • Respond to security incidents and conduct forensic investigations as needed.
  • Work with the Incident Response team to escalate and respond to potential or real threats.
  • Maintain up-to-date knowledge of the latest cybersecurity technologies, trends, and threat vectors.
  • Prepare and present reports on security status and incidents to management.
  • Provide training and awareness programs for employees on security practices.
  • Assist in the development and implementation of security policies and procedures.
  • Collaborate with vendors and engineers to improve the quality of security platforms and services.
  • Support various security platforms and rule management lifecycles.
  • Regularly audit and analyze user activity logs and privileged activities.
  • Recognize and respond to anomalous patterns of user and entity behavior.
  • Analyze anomalous traffic in cloud environments and validate threats.
  • Continuously monitor networks for security breaches and other anomalous activities.
  • Provide detailed records of security incidents and mitigation actions taken.
  • Maintain knowledge of common tactics, techniques, and procedures (TTPs) used by cyber adversaries.
  • Ensure security monitoring tools are registered, monitored, and audited.
  • Review opportunities to optimize Information Security controls and processes through automation.
  • Support IT Security and Cybersecurity Awareness campaigns.
  • Advise on Windows and non-Windows systems patching as required.
  • Support 3rd party risk assessments on vendors and partners.
  • Support external auditors and compliance teams to assure regulatory compliance.

Requirements

  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • Proven experience in an IT Security Operations, Risk Management, or a similar role.
  • Knowledge of security frameworks (e.g., NIST, ISO 27001) and compliance standards (e.g., GDPR, HIPAA).
  • Knowledge of the MITRE ATT&CK framework and basic concepts of threat hunting are a plus.
  • Experience with security assessment tools and software.
  • Strong analytical and problem-solving skills.
  • Excellent communication and interpersonal skills.
  • Highly organized, motivated, dedicated, and a team player.
  • Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA CySA+, Security+) are a plus.
  • Strong understanding of network protocols, firewalls, VPNs, IDS/IPS, and other security technologies.
  • Strong understanding of Identity Management and Active Directory / Azure Active Directory.
  • Knowledge of authentication protocols such as SAML and OAuth.
  • Proficiency with scripting languages and automation tools.
  • Strong IT skills with a deep understanding of cyber security and hacker methodology.
  • Experience in malware/software analysis, vulnerabilities, and incident response.
  • Experience with the Microsoft Defender Security Suite and cybersecurity tools such as CrowdStrike, Darktrace, Rapid7, SentinelOne, Qualys.

Nice-to-haves

  • Knowledge of the MITRE ATT&CK framework and basic concepts of threat hunting.
  • Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA CySA+, Security+) are a plus.
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service