Randstad Cyber Security Risk Analyst/Tester in Merrimack, New Hampshire

Cyber Security Risk Analyst/Tester


Merrimack, NH

Date Posted:

Tuesday, October 4, 2016

Job Type:


Reference #:



Randstad Technologies

apply now


Cyber Security Risk Analyst/Tester

This is an opportunity to work with an advanced cyber security team that is operating on the cutting-edge of information security. The ideal candidate will have an extensive background in information security, preferably in the area of threat management and incident response. In addition to information security expertise, the candidate should have extensive knowledge of the various domains of information technology including but not limited to IP networking, network management, enterprise systems administration, storage systems and/or big-data solutions, and application development. The candidate will lead advanced incident response activities as well as partner with othe rganizations, collaborate with senior management to define requirements and influence security strategy.

Qualified candidate will be providing administration, hands-on operational support, design, engineering and consultation on global Infrastructures. Candidates requires cyber incident response activities through full incident life cycle, as well as develop requirements and collaborate with other organizations on new capabilities in the area of security event detection, analysis, incident response and investigations. Solutions will include the following technologies, among others:

· Firewall and packet inspection technologies

· Replicate the actual techniques and tools used by malicious attackers in an effort to model potential external threats.

· Analyze test results, draw conclusions from results, and develop targeted exploit examples

· Consult with operations and software development teams to ensure potential weaknesses are addressed

· Collaborate with other teams within Enterprise Cybersecurity to improve the overall security of Fidelity s applications and infrastructure

· Authentication and encryption technologies

· Coordinate Secure Code Reviews and Penetration Testing engagements for Applications

· Intrusion Prevention technologies

· Laptop/Server Platforms

· Application technologies

· Cloud computing

· Windows/Mac

· CyberArk

· Unix/Linux

· Malware

· SourceFire IPS

· Cisco ISE

· Syslog from servers and network devices

· DHCP, AD, 802.1x, NAT, and VPN logs

· SIEM/Log Management systems

Other responsibilities include:

· Perform analysis and make recommendations (e.g. in partnership with other organizations, evaluate vendor security products from an incident response life cycle perspective; review impact of information systems to determine if they add value in assessment of risk; review and comment on security architecture)

· Manage solutions to accommodate new event sources, automate event analysis, and correlate events for investigations

· Analyzing and assessing potential security risks, developing plans to deal with such incidents by putting measures in place such as monitoring and auditing systems for abnormal activity, and executing corrective actions.

· Industry and Customer Engagement (e.g. contribute in industry best practices in security operations; speak at industry conferences and participate on committees focused on security incident response; stay current on industry trends)

· Online troubleshooting, upgrades, and break/fix

· Produce high quality documentation (e.g. document design, code, and operationalize processes, standard operational procedures, operational "run books", etc... to ensure re-use / succession of ownership)

· Evaluate and integrate new event source

· Coordinate with teams to resolve issues, including escalation and tracking

· Discover and resolve problems involving security infrastructure

· Communicate status (e.g. report on progress against technical plan; timely escalation of issues and risks; ability to explain technical solutions to a non-technical audience)

· Automate routine tasks

Education and Experience

The successful candidate will have an operational knowledge of core security technologies, and demonstrate experience supporting priority enterprise deployments, including experience with network administration. The following skills must be demonstrated with verifiable examples:

· Bachelor Degree in Computer Science or Engineering

· 5+ years experience in Information Security

· Technology solution deployment

· Intermediate knowledge of security mechanisms such as authentication and authorization techniques, data validation, and the proper use of encryption

· Working with a global team to deliver

· Experience coaching/mentoring other engineers

· A proactive approach with the confidence to make decisions

· A methodical and well organized approach to work

· Ability to work under pressure and meet deadlines

· Communication skills and the ability to adapt communication styles to suit different recipients of information

· Understanding of confidentiality issues, and the law relating to them

· Candidates will be asked to demonstrate in-depth knowledge and technical problem solving skills as they pertain to the technologies listed above.

· Experience in management of monitoring tools (proactive, reactive and synthetic), Unix/Linux systems and scripting are desired.

· Participation in oncall rotation is required. Hours of coverage are generally 9:30AM-9:30PM with overnight support provided by an off shore extension of the team.

apply now