LinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, and to show you relevant ads (including professional and job ads) on and off LinkedIn. Learn more in our Cookie Policy.
Select Accept to consent or Reject to decline non-essential cookies for this use. You can update your choices at any time in your settings.
Job Summary: The Information Security Analyst will be responsible for directly supporting one or more of the following programs: Vulnerability Management (VM), Digital Forensics and Incident Response (DFIR), Tool Administration.
Viable candidates must be willing to work onsite at GSI's headquarters in Palm Harbor, Florida daily.
Key Responsibilities
Understanding general network infrastructure concepts
Assisting with the configurations and deployments of new tools and features to existing toolsets
Monitor and/or administer one or more Information Security tools
Participates in the enforcement of Information Security policies, procedures and standard practices
Conducting routine log analysis
Analyzing and responding to findings appropriately, potentially during after-hours, based on the criticality
Documenting findings in documents and/or a ticketing system
Assisting in technical document creation, such as Standard Operating Procedures (SOPs)
Participating in regular meetings with internal stakeholders
Occasionally creating and presenting presentations relevant to Information Security
Work with auditors, both internal and external, to provide evidence of compliance
Know or be willing to learn Information Security frameworks
Participating in training events, seminars, and obtaining certifications
Supporting other internal stakeholders, such as the Security Operations Center (SOC) and Network Operations Center (NOC) as needed
Requirements
Work Experience / Knowledge:
1 – 2 years of relevant experience
Knowledge of various security methodologies and processes, and technical security solutions (SIEM, IDS/IPS, Firewall Solutions, etc.)
Knowledge of TCP/IP Protocols, network analysis, and network/security applications
Basic proficiencies in Forensics and Malware Analysis (file signatures, tool sets, recovering data, analyzing memory, analyzing binaries)
Familiarity with different Operating Systems
Knowledge of common Internet protocols and applications
General familiarity of industry compliance frameworks (NIST, ISO, HITRUST)
Qualifications / Certifications
Bachelor’s degree in Computer Science, Information Technology, or Cyber Security, or a related field OR High School diploma and relevant industry training and certifications
Relevant industry certifications are a plus, such as: