Request ID:595603
Title: -Enterprise IT Security Specialist
Location: Raleigh, NC
JOB Description:
Roles and responsibilities
· Work within our existing security technology portfolio to report violations, implement security improvements, evaluate trends and anticipate requirements.
• Engage in day-to-day support of the customers, partners, and systems involved in various organizational processes.
• Responsible to monitor and detect risks to the organization, identify sources and methods of attack, locate and preserve electronic evidence as needed.
• Will analyze, recommend, develop, implement and maintain systems and processes that protect business and client information.
• Ensures that the Antivirus platform is properly maintained and that all enterprise computers and devices have proper protection, signatures, and revisions. This includes evaluation of current policy sets and modification where needed to improve security posture or system performance.
• Configure and maintain email security settings. This includes the profiles that dictate permitted flows, including blocked domains, blocked file types, and banner / appended messages.
• Work within Cisco Umbrella to manage policies and evaluate effectiveness related to client and server DNS protection.
• Develop, implement, and operate access management technology and processes as part of an enterprise cyber security program.
• Develop and maintain access management reports and processes to identify access events, exceptions, or trends which require investigation, remediation, or mitigation
Required skills:
· Knowledge of Active Directory, DNS, DHCP, GPO, PKI.
· Understanding of varying networking protocols (TCP, UDP, SSH, SSL, etc.).
· Demonstrated knowledge in SIEM solution(s) (LogRhythm, Splunk, ArcSight, etc.).
· Expert understanding of varying security applications (WireShark, MetaSploit, etc.).
· Understanding of common security frameworks (ISO, NIST, HiTrust).
· Understanding of varying industry data standards (PCI, HIPAA, etc.).
· Understanding of networking concepts and configurations.
· Demonstrated knowledge with Endpoint protection solutions.