Dutech’s Job

Network Security Analyst

Austin,TX

DatePosted : 3/26/2024 7:16:55 AM

JobNumber : DTS101765696
JobType : Contract
Skills: networking concepts and protocols, and network security methodologies,cybersecurity,cyber threats and vulnerabilities
Job Description
  1. CANDIDATE SKILLS AND QUALIFICATIONS

 

Minimum Requirements:
Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.

Years

Required/Preferred

Experience

2

Required

Knowledge of computer networking concepts and protocols, and network security methodologies.

2

Required

Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

2

Required

Knowledge of cyber threats and vulnerabilities.

2

Required

Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).

2

Required

Knowledge of systems diagnostic tools and fault identification techniques.

2

Required

Knowledge of system administration, network, and operating system hardening techniques.

2

Required

Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).

2

Required

Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.

2

Required

Knowledge of penetration testing principles, tools, and techniques.

2

Required

Knowledge of an organization’s threat environment.

2

Required

Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.

2

Required

Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).

2

Required

Skill in the use of penetration testing tools and techniques.

2

Required

Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.).

2

Required

Skill in conducting application vulnerability assessments.

2

Required

Conduct and/or support authorized penetration testing on enterprise network assets.

2

Required

Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.

2

Required

Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas.

3

Preferred

Tenable/Nessus administration, operation and vulnerability management.

 

SHARE THIS JOB

;