Sr. Security Analyst Information Technology (IT) - Columbia, SC at Geebo

Sr. Security Analyst

Company Name:
Expinfo Inc.
Job Code : EXP_4664
Title : Sr. Security Analyst
Job Location : Columbia, SC
Mandatory Requirements : Hands on experience documenting, deploying, and managing all aspects of security within an enterprise organization, including but not limited to: Active directory Publically accessible assets User access policies Anti-Virus management Security compliance for third party and/or in house developed applications Virtualization and Storage area networking security Experience Preparing and submitting a Security Program evaluation and compliance report Conducting continual surveys of all offices, departments and functions to determine the need for additional security
services
, and making appropriate recommendations. Highly-developed and proven oral and written communication skills Experience supervising and directing personnel from other departments when conducting investigations. Proven experience developing, implementing and administering all aspects of a successful Security Program, including physical, technical, personnel, procedural and electronic security. Providing continual consultation and written reports to senior management and to the board of directors concerning security issues Experience defining processes to maintain security equipment, test intrusions, and the ensure alerting of threats. Developing and maintaining company security practices and processes on investigating and documenting suspicious incidents and policy violations. Creating documentation library and reporting processes for all investigations and Security Program operations. Working with other department leaders, designing security components for operations and other strategic processes, and supervising the development and implementation of required security reporting devices and processes at all levels.
Desirable Requirements : Experience and working knowledge of backup products and methodologies. Ability to craft proactive and automated scripts and tools Knowledge of Virtual Machine operation, strengths, and weaknesses. Experience with VMware ESX administration Support of web-based applications for internal (intranet) sites and external (Internet) sites. Knowledge of software development lifecycles and migrations from different environments, such as development, production, etc Expert on Windows Server 2008, SharePoint 2010, Project 2010, SCCM 2012 Expert with Active Directory administration Hands-on technical knowledge of network and server operating systems Working technical knowledge of current network hardware, protocols, and Internet standards, including TCP/IP, and DNS, DHCP. Experience in developing and maintaining documentation for policies, procedures, and best practices. Extensive working knowledge of Internet protocols, tools and techniques including but not limited to: ? Internet Information Server, ? Server operating systems installation and configuration, ? Internet security, ? Virtual Private Networking (VPN), ? TCP/IP, Local Area Networks (LAN), Wide Area Networks (WAN),
Education Required : Associate
Employment Type : Contract - Corp-to-Corp, Contract - Independent, Contract - W2
Interview Type : Face To Face
Salary($) : Negotiable
Travel Required(%) : None
Duration : 12 (in Months)
Remaining Duration : 12 (in Months)
Job Post Date : February 28, 2014
Job Expiration Date : March 5, 2014
No of Position : 1
Zip Code : 29210
Comments : Please send your resume to , Or Call on 518-533-4900 x 139 (Use our Job Code while applying)Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.