IT Security Analyst - Allied Consultants, Inc.
Austin, TX
About the Job
Overview
Allied Consultants, Inc. is an Austin-based firm which has for 32 years been a premier provider of technical and business professionals to clients in Texas. We are currently seeking an experienced Systems Analyst to be a key resource on a technical services team.
Allied Consultants offers its family of consultants excellent rates, a local support staff, and an attractive benefits package which includes medical insurance (Allied shares a percentage of the cost), life insurance, a matching 401(k) plan and a cafeteria plan.Candidates selected for interview will be required to undergo criminal background checks and may be required to complete a drug screen in accordance with Federal and State Law. Offers of Employment are contingent on a successful background checkAllied Consultants is an equal opportunities employer.
Responsibilities
Understands business objectives and problems, identifies alternative solutions, performs studies and cost/benefit analysis of alternatives. Analyzes user requirements, procedures, and problems to automate processing or to improve existing computer system: Confers with personnel of organizational units involved to analyze current operational procedures, identify problems, and learn specific input and output requirements, such as forms of data input, how data is to be; summarized, and formats for reports. Writes detailed description of user needs, program functions, and steps required to develop or modify computer program. Reviews computer system capabilities, specifications, and scheduling limitations to determine if requested program or program change is possible within existing system.
Infrastructure and Operations Support. Supports the TIERS Cloud Migration by providing system administration, security, and infrastructure support. Will perform analysis of on-prem and cloud security and monitor security operations including security architecture reviews. Our ideal candidate understands regulatory requirements, has in-depth knowledge of industry standards and trends, and is proficient with the latest cybersecurity software.
Qualifications
Minimum Requirements:Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.
Years
Required/Preferred
Experience
8
Required
Strong ability to identify problems/issues, analyze and evaluate alternatives and recommend/implement effective solutions.
8
Required
Experience providing Windows and Linux operating system and application support.
8
Required
High level knowledge and experience of network facilities and data processing techniques, of computer hardware and software, of network operating system and security software, and of performance monitoring and capacity management tools
8
Required
Orchestrate calls to include, but not limited to project kick-off calls, notification of high/critical findings during the testing process, and close out calls to review test findings, evidence, process steps to reproduce, and remediation recommendations.
8
Required
Ability to prepare concise written reports appropriate to the audience. Ability to communicate effectively verbally and in writing.
8
Required
Responsible for implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up to date on the latest intelligence, including hackers’ methodologies, in order to anticipate breaches.
8
Required
Responsible for ensuring all networks have adequate security to prevent unauthorized access. Also must ensure that all security systems are current with any software or hardware changes in the company.
8
Required
Perform proactive research to identify and understand new threats, vulnerabilities and exploits. Perform procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
8
Required
Extensive experience with working with and implementing NIST 800-37, NIST 800-53, MARS-E controls, POA&Ms, and developing Corrective Action Plans.
8
Required
Review violations of computer security procedures and discuss procedures with Client/TIERS Security team. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
8
Required
Experience providing Oracle, MSSQL, and Postgres database support.
5
Preferred
Experience working with Archer GRC, Dynatrace, Splunk, Imperva Web Application Firewall, Qualys and MS Office tools.
5
Preferred
Ability to training staff on network and information security procedures, processes and information safeguarding.
2
Preferred
Experience with ITIL methodology-ticketing using Remedy and ServiceNow.