Network and Security Analyst II
2 days ago
Miami
The Information Security Analyst II will plan, implement, upgrade, and monitor security protocols for the protection of the organization’s computer networks and information. Essential Job Functions • Designing and implementing new network solutions and/or improving the efficiency of current networks., • Installing, configuring, and supporting network equipment, including routers, proxy servers, switches, Firewalls, VPN, WAN accelerators, DN,S and DHCP, • Procuring network equipment and managing subcontractors involved with network installation, • Configuring firewalls, VPN, routing, and switching to maximize network efficiency and security, • Maximizing network performance through ongoing monitoring and troubleshooting, • Leading and performing scheduled upgrades, • Investigating faults in the network, • Leads, Coordinates, and configures network equipment to the latest firmware releases, • Vulnerability Management - Leads, Coordinates, and Maintains inventories and inventory processes of information resources protected by security regulations so vulnerability assessments can be performed. Uses tools and processes to effectively carry out vulnerability testing. Monitors and improves vulnerability management processes and procedures. Interprets scanning or testing results and provides consultation to network, workstation, systems, or web-applications administrators regarding system and application weaknesses. Appropriately escalates issues presenting unacceptable risk to the IT leadership. Monitors risk mitigation progress., • Security Architecture, Consulting and Evaluation - Leads, Coordinates, and develops security architecture components for newly proposed information systems and technologies using diagrams and narratives. Assists in materializing security architecture into projects. Develops and maintains, and applies tools, processes, and procedures to evaluate the suitability of security configuration and feature offerings of proposed systems., • Information Security Risk Analysis - Leads, Coordinates, and develops, maintains, and applies tools, methods,s and processes to analyze risk from threats to confidential information. Writes appropriate recommendations that will bring risks to an acceptable level. Develops and delivers audience-appropriate information security assessment and recommendation presentations and reports. Establishes and maintains sound metrics to track and demonstrate information security improvement and risk management. Prepares risk assessment reports for technical and executive audiences., • Security Incident Prevention, Detection and Handling - Leads, Coordinates and Develops, maintains, communicates, and applies incident management policy, standards,s and procedures. Researches, evaluates, recommends, designs technical policies for and implements security technologies such as web content filtering systems, email filtering systems, end point protection systems, network firewall systems, intrusion prevention and detection systems (IDS/IPS), data loss protection (DLP) systems, security incident event management (SIEM) systems to prevent, detect and respond appropriately to threats to confidential information and information resources. Monitors security systems; recognizes anomalies of various systems, and handles or escalates appropriately. Writes professional and factual incident reports. Makes recommendations for recovery and prevention., • Data Analysis - Leads, Coordinates, and Analyzes security threat intelligence, tunes and calibrates security systems to improve effectiveness. Analyzes and correlates network dataflow logs, web logs, computer and application user activity logs, and security incident logs for information relevant to a real or potential information security or privacy breach or to support decision making and risk mitigation., • Project Management - Lead discovery and information gathering sessions. Perform alternatives analysis documenting pros and cons, cost, feasibility, risk, and other information to support a decision to select the best solution. Manage small to medium projects; assemble project participants to organize work to complete specific tasks on projects. Organize and facilitate meetings to identify and remove barriers, and to progress work. Follow up with assignees on incomplete tasks and open issues. Provide detailed communication between disparate teams to keep the project moving., • Leads, Coordinates, and Trains less experienced information security staff and IT staff regarding security methods for systems they support. Takes on-call for urgent security events. Performs other related duties as assigned., • Leads, Coordinates, and Collaborates with users to discuss computer data access needs, to identify security threats and violations, and to identify and recommend needed programming or process changes., • Uses data encryption, firewalls, and other appropriate security tools and applications to conceal and protect transfers of confidential digital information., • Leads, develops, and implements plans to safeguard digital data from accidental or unauthorized modification, destruction, or disclosure; adheres to emergency data processing needs., • Reviews violations of security procedures; provides training to ensure violations do not recur., • Monitors and restricts access to sensitive, confidential, or other high-security data., • Leads, Coordinates, and modifies security files and applications as able and necessary to provide specialized access, allow new software to be installed or integrated, or correct errors., • Leads, Coordinates, and performs risk assessments, audits, and tests to ensure proper functioning of data processing activities and security measures., • Safeguards system security and improves overall server and network efficiency by training users and promoting security awareness., • Determines when to update virus protection systems by monitoring current reports of computer viruses; facilitates or performs needed updates., • Reporting network and security status, • Other network and security projects as assigned Essential Required Competencies • Specific knowledge and skill-based competencies required to satisfactorily perform the functions of the job include:, • Demonstrated problem-solving and analytical skills., • Proficient, or able to gain proficiency with, a broad array of security software applications and tools., • Thorough understanding of computer-related security systems, including firewalls, encryption, and password protection and authentication., • Proficient in Microsoft Office Suite or related software., • Excellent verbal and written communication skills., • Organized with attention to detail., • An analytical mind, • An ability to learn new technologies quickly, • Good time management skills, • An ability to follow processes, • Strong documentation skills, • Commercial and business awareness Education, Experience, Skills, and Requirements • Associates' or Bachelor’s degree in computer science, Programming, or a related field., • 3 years of experience working with Cisco, SonicWall, Fortinet, Ubiquiti devices, switches, firewalls, VPN and network appliances is required., • At least three years of experience in computer systems with some specialization in computer security is required., • Knowledge of HIPAA Security preferred, • Hybrid rotation schedule or onsite as per need basis, • Travel to Data Center or Medical office on a need basis is required.