Interested working in an Information Security group with a good team atmosphere and support from management. I am most interested in a mid-level Security Analyst position that is non-consulting. I would be interested in a long term contract and would consider offers worldwide. Please reply with complete job descriptions. Security Analyst: Major online brokerage (January 2000 to current) (2 ½ years with same employer) Monitor, analyze and document information security advisories. Research and perform risk analysis of new applications, operating systems and technologies. Assess threat levels of new network, application and operating system vulnerabilities. Monitor, evaluate threat levels of new virus/worm/Trojan Horses, disseminate warnings and advisories to multi-state user base. Identify and remove hostile and unauthorized vulnerable applications on all internal networks. Conduct audits of network /application usage and access. Conduct intrusion detection using network and host based Intrusion Detection Systems (IDS). Investigate and respond to attempted intrusions, attacks and suspicious network activity. Administer Intrusion Detection Systems on all networks. Generate incident reports on all significant investigations and information security events. Analyze network traffic to identify usage patterns and suspicious traffic. Coordinate administrative and technical support groups in response to information security problems. Interface with and advise management, technical and user groups in regards to security threats, policies and advisories from both technical and non-technical perspectives. Analyze and advise management on potential information security threats. Perform information security awareness and education to user base. Conduct investigations regarding information security related misuse of any system or network among internal user base. Advise, recommend security changes and patches to network and systems administrators. Participate in the planning and deployment of Windows 2000 architectures, applications and operating systems. Conduct investigations into potential fraudulent customer activity. Liaison with law enforcement, other corporations/industries regarding fraudulent and information security related issues. Audit and participate in policy implementation and verification. Formal Training Computer Forensics Windows NT and Windows 98 Applied Hacking and Countermeasures Windows NT Network Administration Windows NT Server Administration Windows NT Technical Support Webtrends firewall analysis Introduction to network security Introduction to Unix Education Associate of Arts, Selected Studies, History and Political Science Completing Bachelor of Liberal Science, Psychology and Criminal Justice (senior year) Additional experience 16 months of law enforcement experience and 4 years served in the military. _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com
This archive was generated by hypermail 2b30 : Sat Apr 21 2001 - 08:44:01 PDT