Title: Junior Security Analyst
Location: Indianapolis, IN
Hybrid: 3 days onsite in a week
Duration: 12 months
Contract to Hire
Interview: In person only
Job Description
The Jr. Security Analyst in Security Operations will collaborate with the IT Security Operations department, as well as other Teams to help identify, and collaborate with IT Teams, and departments to reduce risk associated with the security posture. In addition, role will be the point of contact for one or more agencies the individual will be responsible for creating reports that assesses the agency’s current security posture across several subject areas including, but not limited to, policy compliance, asset/software management, vulnerability management, cloud operations, data security, and identity and access management. The individual will then be responsible for conducting meetings with other IT areas, leadership, and with their assigned departments to address issues found and assist with the remediation efforts. This role assists other engineers on the larger Security Team with the use of tools and their outputs to enhance the security of information.
A Day In The Life
The essential functions of this role are as follows:
- Provides routine security administration
- Professionally handle communications with internal and external stakeholders on compliance issues
- Educate control and system owners on compliance workflows and processes
- Gather and report on established metrics within the security compliance programs
- Maintain client security control framework's adherent to CIS, NIST, and policies
- Assist in defending systems against unauthorized access, modification and/or destruction
- Monitors and address security alerts, incidents and disasters
- Assists with supporting network, intrusion detection and prevention systems
- Delivers technical reports and work with agencies on findings
- Implements effective tools and processes to protect computers, networks, software, data and information systems against any possible attacks
- Assists senior staff with security upgrades, tools and countermeasures
- Uses outputs from security tools such as anti-virus software, security monitoring tools, vulnerability scanning, SIEM, IPS/IDS etc.
- Supports security standards, security systems and authentication protocols