Dutech-Systems-In

Network Analyst

United States

over 1 year ago
Save Job

Summary

Austin,TX DatePosted : 3/26/2024 7:16:55 AM JobNumber : DTS101765696 JobType : Contract Skills: networking concepts and protocols, and network security methodologies,cybersecurity,cyber threats and vulnerabilities Job Description CANDIDATE SKILLS AND QUALIFICATIONS Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. Years Required/Preferred Experience 2 Required Knowledge of computer networking concepts and protocols, and network security methodologies. 2 Required Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). 2 Required Knowledge of cyber threats and vulnerabilities. 2 Required Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). 2 Required Knowledge of systems diagnostic tools and fault identification techniques. 2 Required Knowledge of system administration, network, and operating system hardening techniques. 2 Required Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). 2 Required Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. 2 Required Knowledge of penetration testing principles, tools, and techniques. 2 Required Knowledge of an organization’s threat environment. 2 Required Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems. 2 Required Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort). 2 Required Skill in the use of penetration testing tools and techniques. 2 Required Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.). 2 Required Skill in conducting application vulnerability assessments. 2 Required Conduct and/or support authorized penetration testing on enterprise network assets. 2 Required Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions. 2 Required Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas. 3 Preferred Tenable/Nessus administration, operation and vulnerability management.

How strong is your resume?

Upload your resume and get feedback from our expert to help land this job

People also searched: