Infojini logo

Security Analyst

Infojini
Contract
On-site
Austin, Texas, United States

Company Description

Infojini Consulting is a full service IT consulting, services, and staffing firm with offices in Linthicum Heights ,Maryland, Washington, DC and Mumbai, India.

Infojini Consulting is recognized as one of the fastest growing IT services and software development Companies. With a partnership of all major technology vendors, Infojini Consulting has built a strong Government and commercial customer base including fortune 100 companies and most state and federal agencies such as State of North Carolina, State of South Carolina, State of Maryland, State of California, State of Pennsylvania, State of Virginia, State of Washington and many others.

Infojini Consulting is an equal opportunity employer and considers all qualified individuals for employment irrespective of their race, gender, age, color, sexual orientation. We offer an excellent compensation package

Job Description

Duties and responsibilities will include:


• Responsible for the research, technical analysis, recommendation, configuration, and administration of systems and procedures to ensure the protection of information processed, stored or transmitted (25%).  

• Provides security design, consultation, and technology governance oversight for various projects and initiatives 

• Undertakes complex projects requiring additional specialized technical knowledge 

• Performs complex security analysis of existing systems for compliance with security requirements 

• Acts as information liaison and subject matter expert (SME) to various business units and information technology departments 

• Acts as a resource for direction, training and guidance for less experienced staff 


Qualifications

Minimum Requirements:


• Experience in monitoring and analyzing cybersecurity alerts from cybersecurity tools, network devices, and information systems.

• Experience in monitoring and maintaining cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use.

• Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses.

• Ability to resolve complex security issues in diverse and decentralized environments; to plan, develop, monitor, and maintain cybersecurity and information technology security processes and controls; to communicate effectively.

• Evaluates network and system security configuration for best practices and risk-based access controls.


Additional Information