Type | 12+ months with potential to extend |
Location | Indianapolis, IN |
Exp required | 2+ years |
The Jr. Security Analyst in Security Operations will collaborate with the IT Security Operations department, as well as other Indiana Office of Technology Teams to help identify, and collaborate with IT Teams, and state agencies to reduce risk associated with the State of Indiana's security posture. In addition, role will be the point of contact for one or more agencies the individual will be responsible for creating reports that assesses the agency's current security posture across several subject areas including, but not limited to, policy compliance, asset/software management, vulnerability management, cloud operations, data security, and identity and access management. The individual will then be responsible for conducting meetings with other IT areas, leadership, and with their assigned agencies to address issues found and assist with the remediation efforts. This role assists other engineers on the larger Security Team with the use of tools and their outputs to enhance the security of state information.
The essential functions of this role are as follows:
Provides routine security administration
Professionally handle communications with internal and external stakeholders on compliance issues
Educate control and system owners on compliance workflows and processes
Gather and report on established metrics within the security compliance programs
Maintain State and Federal security control framework's adherent to CIS, NIST, and Indiana State policies
Assist in defending systems against unauthorized access, modification, and/or destruction
Monitors and address security alerts, incidents, and disasters
Assists with supporting network, intrusion detection and prevention systems
Delivers technical reports and work with agencies on findings
Implements effective tools and processes to protect computers, networks, software, data, and information systems against any possible attacks
Assists senior staff with security upgrades, tools, and countermeasures
Uses outputs from security tools such as anti-virus software, security monitoring tools, vulnerability scanning, SIEM, IPS/IDS etc.
Supports security standards, security systems and authentication protocols