ARCHIVED
This job listing has been archived and is no longer accepting applications.
MisuJob - AI Job Search Platform MisuJob

IT Security Analyst

IntegratedResourcesINC

Parsippany-Troy Hills, NJ, United States permanent

Posted: November 5, 2015

Interested in this position?

Create a free account to apply with AI-powered matching

Quick Summary

A few words about us. Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996.

Job Description

A Few Words About Us
Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing.

Role: IT Security Analyst

Duration: Full Time 

Location: Parsippany NJ 

Position Summary: 

The core responsibility of the IT Security Analyst is operating and maintaining all operational security solutions. That includes vendor updates and upgrades, health and performance monitoring, configuration management and identification, investigation and resolution of security breaches detected by those systems. 

Additional responsibilities include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines and procedures as well as conducting vulnerability audits and assessments. The IT Security Analyst is expected to be fully aware of the enterprise’s security goals as established by its stated policies, procedures and guidelines and to actively work towards upholding those goals.

ESSENTIAL DUTIES AND RESPONSIBILITIES

Include the following:

Operational Management

• Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).

• Maintain operational configurations of all in-place security solutions as per the established baselines.

• Monitor all in-place security solutions for efficient and appropriate operations.

• Analyzing and evaluating data from multiple sources to gain awareness of potentially suspicious and anomalous activity. 

• Following detailed operational processes and procedures to appropriately analyze, escalate, and assist in remediation of critical information security incidents.

• Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution.

• Participate in investigations into problematic activity.

• Participate in the design and execution of vulnerability assessments, penetration tests and security audits.

Acquisition & Deployment

• Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.

• Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.

• Perform the deployment, integration and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.

• 

Strategy & Planning

• Participate in the planning and design of enterprise security architecture 

• Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines and procedures)

• Participate in the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan

EDUCATION/EXPERIENCE/PERSONAL REQUIREMENTS

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The core competencies listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Formal Education & Certification

• Bachelor's degree in Information Technology. An equivalent combination of education and work experience may be taken into consideration in lieu of a degree. 

• 3-5 years of technical experience in the security aspects of multiple computer platforms, operating systems, products, network protocols and system architecture. 

• At least one or more of the following certifications:

• GCIA

• GPEN

• GCIH

• CEH

• CISSP 

Knowledge & Experience

• Strong knowledge of information security, client/server architectures, and networking

• Strong knowledge of current and evolving cyber threat landscape

• Significant theoretical and practical knowledge in the following areas:

Unix, Linux, Windows, etc. operating systems, well-known networking protocols and services (FTP, HTTP, SSH, SMB, LDAP, etc.), exploits, vulnerabilities, network attacks

• Proficiency, and experience, using information security tools and related methodologies. 

• Experience investigating security incidents. 

• Knowledge of specialized telecommunication techniques such Virtual Private Networks, encryption methodology and their associated technologies. 

• Knowledge of industry standards including SSAE 16, ISO 27001, etc.

Regards,

Sweta Verma

IT Recruiter

Integrated Resources, Inc.

Inc. 5000 – 2007-2014 (8th Year)

Certified MBE I GSA - Schedule 66 I GSA - Schedule 621I I GSA - Schedule 70

(Direct) 732 549 5907 | (W) 732 -549 - 2030 x 210| (F) (732) 549 5549

Why Apply Through MisuJob?

AI-Powered Job Matching: MisuJob uses advanced artificial intelligence to analyze your skills, experience, and career goals. Our matching algorithm compares your profile against thousands of job requirements to find positions where you have the highest chance of success. This saves you hours of manual job searching and ensures you only see relevant opportunities.

One-Click Applications: Once you create your profile, applying to jobs is effortless. Your resume and cover letter are automatically tailored to highlight the most relevant experience for each position. You can apply to multiple jobs in minutes, not hours.

Career Intelligence: Beyond job matching, MisuJob provides valuable career insights. See how your skills compare to market demands, identify skill gaps to address, and understand salary benchmarks for your experience level. Make data-driven decisions about your career path.

Frequently Asked Questions

How do I apply for this position?

Click the "Register to Apply" button above to create a free MisuJob account. Once registered, you can apply with one click and track your application status in your dashboard.

Is MisuJob free for job seekers?

Yes, MisuJob is completely free for job seekers. Create your profile, get matched with jobs, and apply without any cost. We help you find your dream job without any hidden fees.

How does AI matching work?

Our AI analyzes your resume, skills, and experience to understand your professional profile. It then compares this against job requirements using natural language processing to calculate a match percentage. Higher matches mean better fit for the role.

Can I apply to jobs in other countries?

Absolutely. MisuJob features jobs from companies worldwide, including remote positions. Filter by location or look for remote opportunities to find jobs that match your preferences.

Ready to Apply?

Join thousands of job seekers using MisuJob's AI to find and apply to their dream jobs automatically.

Register to Apply