Security Analyst/Administrator Information Technology (IT) - Columbia, SC at Geebo

Security Analyst/Administrator

Company Name:
Software Specialists
Security Analyst/Administrator Are you a security systems expert? Are you ready to take your career to the next level? We have an exciting opening for a Security Analyst/Administrator position with our progressive client in the Columbia, SC area. This is a long-term contraction position. Excellent communication skills required. Opportunity, growth, and stability are all words that can be used when describing this company and our job openings. Come work for one of the largest IT departments in the State of
south carolina
. We are looking for people who want stability in their employment and who like working in a team environment. Job
Responsibilities: -- Develops and manages security for more than one IT functional area (eg, data, systems, network and/or Web) across the enterprise. -- Assists in the development and implementation of security policies and procedures (eg, user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of Firewalls and encryption routines). -- Prepares status reports on security matters to develop security risk analysis scenarios and response procedures. -- Responsible for the tracking and monitoring of software viruses. -- Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls. -- Involved in the evaluation of products and/or procedures to ensure appropriate security. -- Provides direct support to the business and IT staff for security related issues. -- Educates IT and the business about security policies and consults on security issues regarding user built/managed systems. -- Represents the security needs of the organization by providing expertise and assistance in all IT projects with regard to security issues. Candidate Requirements: -- Hands on experience documenting and managing all aspects of security within an enterprise organization, including but not limited to: -- Firewall and IDS/IPS experience -- Virtual Private Networking (VPN) -- Network access policies -- Web filters -- Publically accessible assets -- Active Directory -- Security compliance for third party and/or in house developed applications -- Virtualization and Storage area networking security -- Experience Preparing and submitting a Security Program evaluation and compliance report -- Conducting continual surveys of all offices, departments and functions to determine the need for additional security
services
, and making appropriate recommendations. -- Highly-developed and proven oral and written communication skills About Software Specialists, Inc: Software Specialists is a company with extensive consulting experience in the
information technology
Industry. Incorporated in the state of
pennsylvania
in 1998, we bring over a decade of experience in providing IT talent to Fortune 1000 companies. As a trusted partner, Software Specialists provides consulting solutions for our Clients that are not only flexible, but minimize risk while maximizing results and meeting their business goals. Recruiting and retaining the highest calibre resources ensures our consultants are capable of creating systems that our Clients can build upon to make their organizations more robust, agile and equipped for future shifts in the IT and global business world. Our Consultants enjoy:- Competitive hourly pay rates or salary option - Medical/Dental Insurance - Paid Holidays and Vacation - 401(k) MYK62683JREstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.