Info Technology Professional - Cyber Security Analyst

Company Name:
Michigan State University (MSU) seeks a dynamic Information Technology Professional to serve as Cyber Security Analyst. This is an exceptional opportunity to join a vibrant public research university and perform cyber security analysis across a $2 billion enterprise; the analyst will help protect MSU systems and data through constant monitoring and analysis of cyber threats; will report to the Chief Information Security Officer of MSU and will specialize in security information event monitoring; will determine the potential impact of specific identified threats; assess and mitigate risks; perform system and network log collection and analysis; create and support automated processes for process and workflow integration with ticketing systems; and develop appropriate metrics (key risk and key performance indicators).
Minimum Requirements;
Bachelor's degree in computer technology or information systems, with coursework in an information technology specialization related to the area of employment; up to six months of related work experience with: IT system administration or a related role requiring analysis, prioritization, and problem solving; Security Event and Incident Management (SEIM) systems such as Splunk; enterprise, Q1 Labs QRadar, and HP ArcSight; monitoring corporate and enterprise networks for Indicators of Compromise (IOC's); programming in C++, Visual Basic, Javascript, shell scripting such as BASH and Powershell; diagramming technical systems architecture, conducting technical research and communicating findings to colleagues and supervisors; implementing and testing custom applications; data analysis using SQL and parallel distributed computing such as NVidia CUDA; Linux operating systems including system administration and CLI; or an equivalent combination of education and experience.
Desired Qualifications;
Knowledge of computer networking, including TCP/IP, IPSec, and communication protocols in LAN/WAN deployments; knowledge of vulnerability management systems such as QualysGuard and Rapid7 Nexpose; knowledge of project management and in the use of project management tools (e.g. Microsoft Project); demonstrated pursuit of excellence and mastery in the field of information security, such as participation and/or winning placement in Capture-the-Flag (CTF), Hackathons, and cryptographic code breaking contests; dedication to advancing the field of information security through community service such as volunteer work for philanthropic or nonprofit organizations; general security certifications, such as: Certified Information Systems Auditor (CISA), Certified Information Systems Manager (CISM), Certified Information Systems Security Professional (CISSP); excellent interpersonal/communication skills (both verbal and written); ability to understand, discuss, and explain technical issues with diverse audiences; strong problem solving and technical skills; strong critical thinker who is detail oriented; ability to analyze and process large data sets; ability to be responsive and biased towards speed and execution; ability to work under pressure across multiple roles and hierarchies; ability to be highly collaborative, to work independently, and be innovative.
How to Apply
All candidates must submit an application and resume through the Michigan State University Human Resources web-based system (MAP). The URL for this website is www.jobs.MSU.edu. Please indicate the position number 0593 when submitting your application.
MSU is an affirmative action, equal opportunity employer.
MSU is committed to achieving excellence through cultural diversity. The university actively encourages applications and/or nominations of women, persons of color, veterans and persons with disabilities.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Cyber Security Analyst
Troy, MI Ascension Health
Senior Analyst, Global Information Systems (Cy...
Benton Harbor, MI Whirlpool
Senior Analyst, Global Information Systems (Cy...
Benton Harbor, MI Whirlpool
Security Analyst and Account Manager (JoinOCI-...
Troy, MI Oracle
Cyber Security Engineer
Dearborn, MI Ford Motor Company