Dutech’s Job
Network Security Analyst
Austin,TX
DatePosted : 3/26/2024 7:16:55 AM
JobNumber : DTS101765696JobType : Contract
Skills: networking concepts and protocols, and network security methodologies,cybersecurity,cyber threats and vulnerabilities
Job Description
- CANDIDATE SKILLS AND QUALIFICATIONS
Minimum Requirements: |
||
Years |
Required/Preferred |
Experience |
2 |
Required |
Knowledge of computer networking concepts and protocols, and network security methodologies. |
2 |
Required |
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
2 |
Required |
Knowledge of cyber threats and vulnerabilities. |
2 |
Required |
Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). |
2 |
Required |
Knowledge of systems diagnostic tools and fault identification techniques. |
2 |
Required |
Knowledge of system administration, network, and operating system hardening techniques. |
2 |
Required |
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). |
2 |
Required |
Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. |
2 |
Required |
Knowledge of penetration testing principles, tools, and techniques. |
2 |
Required |
Knowledge of an organization’s threat environment. |
2 |
Required |
Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems. |
2 |
Required |
Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort). |
2 |
Required |
Skill in the use of penetration testing tools and techniques. |
2 |
Required |
Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.). |
2 |
Required |
Skill in conducting application vulnerability assessments. |
2 |
Required |
Conduct and/or support authorized penetration testing on enterprise network assets. |
2 |
Required |
Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions. |
2 |
Required |
Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas. |
3 |
Preferred |
Tenable/Nessus administration, operation and vulnerability management. |
SHARE THIS JOB