Security Analyst (WISCJP00018074) Madison, WI 6+ Months Contract
Research vendor offerings and conduct POCs.
Coordinate with other teams to implement new technologies and remediate issues.
Monitor asset inventory, installed agents, and status of devices.
Review vulnerability dashboards and organizational impact of changing threat landscape.
Monitor data inventories, policy violations. Produce reports and metrics.
Monitor and process incident response queues.
Monitor SIEM logs and investigate incidents.
Monitor content filter dashboards and investigate anomalies as appropriate.
Manage endpoint firewall operation and adjust as necessary.
Teach, train or advise staff on information security related topics
Security Analyst capabilities with 8 or more years of experience. Familiar with a variety of the security concepts, practices, and procedures. Relies on extensive experience and judgment to plan and accomplish goals. Performs a variety of tasks. May lead and direct the work of others. A wide degree of creativity and latitude is expected. Must Have Information Technology
Monitor asset inventory, installed agents, and status of devices
Thanks & Regards, Lavanya Chinnasamy Senior Technical Recruiter Swift Pace Solutions | Agneto 5525 N MacArthur Ste 160, Irving TX 75038 E: D:
Security Risk and Compliance Analyst will operate within a divisional security team reporting to the Director of Information Security. Analyst will be responsible for risk assessment, reporting and audit of Customer facing applications supporting the Tax and Accounting (TAA) and Corporate Performance (CP&ESG) application portfolio. Primary responsibilities will include maintaining compliance and assurance against established security frameworks including SO2 and ISO27001. Analyst will work on annual certification requirements and daily IT security tasks. IT Risk assessment and documentation and assessment of implemented security policies and standards will be a core focus of this position. Analyst will perform a wide range of security tasks to monitor and support the Confidentiality, Integrity, and Availability of applications.