Thoughtwave Software and Solutions ยท 6 days ago
Security Analyst II
Wonder how qualified you are to the job?
Insider Connection @Thoughtwave Software and Solutions
Responsibilities
Strong understanding of Modern Authentication, Authorization, and Accounting including Role-based and attribute-based access controls RBAC and ABAC.
Strong understanding of Security information and event management (SIEM) methods and tools.
Understand the purpose and structure of the National Vulnerability Database (NVD), Common Vulnerability Database (CVE), Common Weaknesses and Enumeration (CWE) and Common Attack Pattern Enumeration and Classification Database (CAPEC).
Strong understanding of Directory Services including Active Directory.
Understanding of Identity access systems (IAM) and network access control (NAC).
Basic understanding of Transact and ANSI Structure Query Language (SQL).
Knowledge of NIST Risk Management (RMF) and Cybersecurity Framework (CSF).
ZScaler Administration.
Incident Response Life Cycle.
Cyber Security Risk Management Principles.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Strong understanding of Modern Authentication, Authorization, and Accounting including Role-based and attribute-based access controls RBAC and ABAC. (5+ years)
Strong understanding of Security information and event management (SIEM) methods and tools. (5+ years)
Understand the purpose and structure of the National Vulnerability Database (NVD), Common Vulnerability Database (CVE), Common Weaknesses and Enumeration (CWE) and Common Attack Pattern Enumeration and Classification Database (CAPEC) (5+ years)
Strong understanding of Directory Services including Active Directory.
Understanding of Identity access systems (IAM) and network access control (NAC).
Basic understanding of Transact and ANSI Structure Query Language (SQL)
Knowledge of NIST Risk Management (RMF) and Cyber security Framework (CSF)
ZScaler Administration
Incident Response Life Cycle
Cyber Security Risk Management Principles
Preferred
Tenable Administration
MS Web Defender Administration
Zimperium (Mobile Device) Administration
PowerShell Scripting โ (Intermediate)