Aetos Systems, Inc. was founded in early 2007 to provide a unique work experience. Employees are the foundation of our business. Our leaders work hard every day to empower and support our employees in the development of their careers, giving back to their community and providing their expertise and innovations to our customers - solving real world business problems. Our culture focuses on our people -- our strongest asset -- ensuring they have an environment to provide best-in-class service and solutions to our customers. We always strive to do the right thing.
Have you imagined working for a dynamic small business where you are heard, highly regarded and able to do what you love all in one package? This is your opportunity! Join now!
Job Summary
The Cybersecurity Analyst (Senior) is responsible for proactively safeguarding organizational assets by monitoring computer networks for security issues, investigating security breaches, and documenting the extent of cyber attacks. This role involves collaborating with security teams to conduct vulnerability assessments, including penetration testing, and implementing remediation strategies to maintain a high-security standard. The Cybersecurity Analyst (MID) also plays a key role in recommending and implementing best practices for IT security and overseeing the deployment and management of security measures and software, such as firewalls and data encryption programs, to protect critical systems and information infrastructure.
Responsibilities may include:
Monitoring computer networks for security issues
Investigating security breaches and other cybersecurity incidents
Documenting security breaches and assessing the damage they cause
Working with the security team to perform tests and uncover network vulnerabilities, such as penetration testing
Fixing detected vulnerabilities to maintain a high-security standard
Recommending best practices for IT security
Installing security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs
Requirements
Required Minimum Education
Education should be consistent with experience. Relevant experience and professional certifications can outweigh the need for a formal college degree
Required Years Of Experience
8 years of relevant professional work experience
Required Skills, Qualifications, Technical Experience, Etc.
Fully Adjudicated Top Secret (TS) Security Clearance or greater
Splunk Enterprise Security
Preferred Skills, Qualifications, Technical Experience, Etc.