Senior Cybersecurity Analyst-Qualified Staffing

Troy, MI
November 24, 2024
Apply Now
Average Pay*:
*average hourly rate for this position in your area
Deadline date:

Job Description

Rate this Job

Job Title: Senior Cybersecurity Analyst

Company: Qualified Staffing

Location: Troy, MI

Pay:

AI Pay Analysis: To assess the competitiveness of the hourly rate for a “Senior Cybersecurity Analyst” in Troy, MI, one must consider various factors including market trends, regional salary benchmarks, and the specifics of the job market as of 2023. Generally, the hourly rate for a Senior Cybersecurity Analyst in the United States ranges from approximately $45 to $75 per hour, depending on experience, certifications, and company size. Given that Troy, MI is part of the Detroit metropolitan area, which has a growing tech sector, the expected rate might lean towards the higher end of this spectrum. If the hourly rate in question falls within or above this range, it would be considered competitive and in line with industry standards; otherwise, it might represent a less attractive offer.

Job description:
The Senior Cybersecurity Analyst will be responsible for safeguarding the organization against cyber threats by continuously monitoring our information technology systems and assessing emerging threats. This role involves supporting the formulation and management of our cybersecurity program, implementing data loss prevention measures, conducting vulnerability assessments, handling incident management, and overseeing the deployment and maintenance of security tools.

Key Responsibilities:
– Develop and execute an information security program in alignment with the NIST-800-171/CMMC Framework.
– Oversee the System Security Plan (SSP), Plan of Action and Milestones (POAM), and maintain the Supplier Performance Risk System (SPRS) score.
– Lead the security and compliance implementation within Microsoft 365/O365, ensuring adherence to security requirements while adjusting policies as necessary.
– Manage the Security Information and Event Management (SIEM) solution, identifying and triaging cybersecurity alerts while aiding in remediation efforts.
– Establish technical and business processes and policies pertaining to data protection strategies, implementing Data Loss Prevention (DLP) solutions to ensure security, privacy, and data integrity.
– Conduct vulnerability assessments, assist with remediation efforts, and collaborate with technical teams to promote effective remediation responses.
– Audit endpoint and server patching processes to uncover gaps, working with technical teams to address and resolve issues.
– Perform network and host monitoring, as well as intrusion detection analysis utilizing various security tools such as Intrusion Detection/Prevention Systems (IDS/IPS), firewalls, SIEM solutions, Network Access Control (NAC), Endpoint Detection and Response (EDR), DLP solutions, and Cisco Umbrella.
– Spearhead security incident investigations, serving as a subject matter expert in cyber incident responses while ensuring collaboration among technical teams for effective resolution.
– Continuously monitor the corporate network for vulnerabilities, security threats, and breaches, addressing and remediating anomalies as they arise.
– Stay informed on the latest cybersecurity trends and apply this knowledge to enhance our practices.
– Facilitate cybersecurity training and simulated phishing exercises.
– Collaborate with third-party security vendors, including Managed Security Service Providers (MSSP).
– Engage with Cybersecurity and IT personnel across the organization.

Minimum Qualifications:
– U.S. Citizenship is required.
– Must be able to obtain and maintain a Department of Defense security clearance.
– Bachelor’s degree in Computer Science, Computer Engineering, or a related field.
– A minimum of five years’ experience managing SIEM systems or other cybersecurity monitoring solutions, with a proven track record of driving remediation based on SIEM outputs.
– At least five years’ experience in vulnerability management, patch management, and remediation.
– Minimum five years’ experience with cloud-delivered commercial and government solutions, including Microsoft 365-E5/Azure, alongside familiarity with IT backup and disaster recovery systems.
– Proficiency in NIST Framework, Microsoft 365 Security & Compliance, DLP, SIEM, CrowdStrike, Cisco Umbrella, incident management, and foundational networking protocols and systems such as TCP/IP, OSI Model, DNS, and DHCP.
– Experience with firewalls, switches, servers (Windows, Linux), and database management.
– Comprehensive understanding of SAN and NAS configurations along with networking concepts including LAN and WAN setups, routing, cabling, VPN, and ISP capabilities.
– Capability to serve as a technical resource during annual disaster recovery testing initiatives.
– Exceptional communication skills, with the ability to interact effectively with customers, vendors, and team members, complemented by strong leadership and organizational capabilities.

Preferred Qualifications:
– Master’s degree in Business, Information Technology, or a related field.
– Over five years of professional experience in supporting, securing, and maintaining networks, servers, and cloud environments.
– Relevant certifications in information security such as CISSP or CISM.
– Experience with system installation, configuration, analysis, capacity planning, and performance monitoring tools.
– Familiarity with network performance monitoring solutions like SolarWinds or Nagios.
– Knowledge of project management tools and diagramming applications such as Microsoft Project and Microsoft Visio.

Job Posting Date: Sat, 23 Nov 2024 23:23:43 GMT

Apply now!