Info Tech I - Cyber Security Analyst Information Technology (IT) - East Lansing, MI at Geebo

Info Tech I - Cyber Security Analyst

Company Name:
MSU
Michigan State University seeks a dynamic information technologist to serve as Cyber Security Analyst; this is an exceptional opportunity to join a vibrant public research university and perform cyber security analysis across a $2 billion enterprise; will help protect MSU systems and data through constant monitoring and analysis of cyber threats; will report to the Chief Information Security Officer of MSU and will specialize in securing and maintaining firewalled networks across the university; the successful candidate will determine the potential impact of specific identified threats; will assess and mitigate risks; performs system and network log collection and analysis; creates and supports automated processes for process and workflow integration with ticketing systems; develops appropriate metrics (key risk and key performance indicators); this position will require a highly qualified individual who has strong problem solving and technical skills, is a strong critical thinker who is detail oriented, and can analyze and process large data sets; this individual should be able to be responsive and biased towards speed and execution; can work under pressure across multiple roles and hierarchies, is highly collaborative but can also work independently, and is innovative.
Minimum Requirements:
Knowledge equivalent to that which normally would be acquired by completing a bachelor's degree in computer science, information systems, or related field with coursework in an information technology specialization related to the area of employment; two years of experience in IT system administration or a related role requiring analysis, prioritization, and problem solving; experience interpreting and implementing change requests for managed security device platforms; experience with firewall technology such as Juniper NetScreen, SSG, SRX; experience with client dial-up VPN technology such as Juniper SSL VPN; experience with network analysis tools such as TCPDump and Wireshark; experience with Linux operating systems including system administration and CLI; or an equivalent combination of education and experience.
Qualifications:
Experience with vulnerability management systems such as QualysGuard and Rapid7 Nexpose; experience with Security Event and Incident Management (SEIM) systems such as Splunk Enterprise and Q1 Labs QRadar; experience with firewall technology such as Cisco FWSM and ASA; experience with Intrusion Detection Systems such as Juniper IPS or Snort; knowledge of computer networking, including TCP/IP, IPSec, and communication protocols in LAN/WAN deployments; knowledge of Microsoft Windows Server and Active Directory; knowledge of project management and in the use of project management tools (e.g. Microsoft Project) General security certifications, such as: Certified Information Systems Auditor (CISA), Certified Information Systems Manager (CISM), and Certified Information Systems Security Professional (CISSP); excellent interpersonal/communication skills (both verbal and written); ability to understand, discuss, and explain technical issues with diverse audiences.
All candidates must submit an application and resume through the Michigan State University Human Resources web-based system (MAP). The URL for this website is www.jobs.MSU.edu. Please indicate the position number 0327 when submitting your application.
MSU is an affirmative action, equal opportunity employer.
MSU is committed to achieving excellence through cultural diversity. The university actively encourages applications and/or nominations of women, persons of color, veterans and persons with disabilities.Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.