Sign up for our
weekly
newsletter
of fresh jobs
Insight Global is seeking an IT Cyber Security Specialist for a direct placement opportunity in the Glendale, KY area. The IT Cyber Security Specialist plays a crucial role in safeguarding information system assets by identifying and resolving potential and actual security problems. They protect the system by defining access privileges, control structures, and resources and are adept at recognizing problems by identifying abnormalities and reporting violations. This individual will work as part of the security team to protect important assets from attacks and maintain sensitive information. The IT Cyber Security Specialist is proactive in implementing security improvements by assessing the current situation, evaluating trends, and anticipating requirements. They determine security violations and inefficiencies by conducting periodic audits, upgrade the system by implementing and maintaining security controls, and keep users informed by preparing performance reports and communicating the system status. This individual will maintain quality service by adhering to organizational standards, stay updated with technical knowledge by attending educational workshops and reviewing publications, and contribute to the team effort by accomplishing related results as needed. They are skilled in security systems operation and management and are proficient in troubleshooting security systems. This specialist will test new security IT systems, install security systems, and maintain security IT systems. This is a permanent, direct placement opportunity with one of the most innovative and expansive companies in the area.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal. com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/ .Bachelor's degree in Computer Science or cybersecurity related field.Master's degree in cybersecurity, or related fieldHolds certifications such as: CISSP, CISA, ISO 27001, Palo Alto, or Cisco related certificationsAdvanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.Proficiency in problem-solving, analytical thinking, and penetration testing methodologiesExperience with enterprise SIEM platform (e. g. Nitro/McAfee Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk).Experience developing and deploying signatures (e. g. YARA, Snort, Suricata, HIPS)Experience with vulnerability scanning solutionsProficiency in problem-solving, analytical thinking, and penetration testing methodologiesExperience in manufacturing industry or experience with semantic productsBachelor's degree in computer science or closely related field3 + years direct hands-on experience with incident management and responseProficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security.Advanced certifications such as SANS GIAC/GCIA/GCIH, CISSP or CASP and / or SIEM -- specific training and certification. (Security+)Experience analyzing high volumes of logs, network data (e. g. NetFlow, FPC), and other attack artifacts in support of incident investigationsUnderstanding of mobile technology and OS (i. e. Android, iOS, Windows), VMware technology, and Unix and basic Unix commands.Experience in IT security solution operation, IT Network operation, or operating endpoint security solutions.