FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Securities Analyst

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Securities Analyst Skills

Below we've compiled a list of the most important skills for a Securities Analyst. We ranked the top skills based on the percentage of Securities Analyst resumes they appeared on. For example, 8.7% of Securities Analyst resumes contained Security Procedures as a skill. Let's find out what skills a Securities Analyst actually needs in order to be successful in the workplace.

These are the most important skills for a Securities Analyst:

1. Security Procedures

demand arrow
high Demand
Here's how Security Procedures is used in Securities Analyst jobs:
  • Provided consulting services for small and medium size medical practices concerned about implementing computer security procedures designed to protect client data.
  • Reviewed violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Develop and implement security procedures in coordination with government agencies and management personnel.
  • Developed desktop security scenarios according to Mercy security procedures and documentation.
  • Helped analyze and develop security procedures and perform routine security checks.
  • Developed and documented global and variable rate security procedures.
  • Review and edit corporate security procedures and technical manuals.
  • Reconciled divergent security procedures of two sectors merging together.
  • Documented and maintained security procedures and system configurations.
  • Develop and administer security procedures for special programs.
  • Develop and write internal security procedures.
  • Liaised with government and contractor personnel to ensure proper security procedures are an integral part of National Missile Defense.
  • Assisted ISSO in recommending security procedures based on NIST SP 800-37 security guidelines.
  • Authored sector security procedures on DD-254s and contact closeouts that are published.
  • Work with subject matter experts in communicating flaws in security procedures.
  • Assist with development of security procedures, and policies.
  • Developed the security procedures and policies for PCI compliance.
  • Documented procedures on Sygate security for 3rd party vendors * Documented E-business Web security procedures
  • Conceived, developed, and implemented official Marine Corps web site policies and security procedures.
  • Implemented security procedures according to the NISPOM, DCIDs, and ICDs.

Show More

2 Security Procedures Jobs

No jobs at selected location

2. Ensure Compliance

demand arrow
high Demand
Here's how Ensure Compliance is used in Securities Analyst jobs:
  • Reviewed existing standards and procedures related to the security framework to ensure compliance and accuracy with current policies/procedures via FISMA/NIST standards.
  • Coordinate and monitor sensitive aspects of the industrial security program to ensure compliance with government and company security policies and procedures.
  • Interpret government and company policy to ensure compliance; interpret policy and provide security guidance to program management and participants.
  • Managed internal municipal bond inventory levels to ensure compliance with firm capital limits.
  • Reviewed accounts on a regular basis to ensure compliance with internal and external policies, guidelines, rules, and regulations.
  • Provide research and investigative support for the Company's Ethics and Compliance division to ensure compliance with Company Trade Sanction policies.
  • Served as contact between 12,000 DoD industry contractors and 38 foreign embassies to ensure compliance prior to oversees business travels.
  • Conducted ST&E for DoD government agencies network to ensure compliance to FISMA and NIST SP-800-53 recommended security controls.
  • Review property loss claims to ensure compliance with in the allowable for reimbursement after REO property has sold.
  • Conducted security inspections in over 26 major U.S. airports to ensure compliance to all FAA and TSA regulations.
  • Inspected security design features, installations, or programs to ensure compliance with applicable standards or regulations.
  • Interfaced with USAF and contract personnel to ensure compliance with visit control procedures and other security practices.
  • Assisted with audits to ensure compliance with internal security standards and regulatory requirements (PCI-DSS).
  • Audit and examine mortgage loss claims to ensure compliance with contractual obligation.
  • Evaluated servicer performance to ensure compliance with stated agreements and participated in system enhancements by attending user group and testing.
  • Monitor servicer performance to ensure compliance with contractual obligations.
  • Performed 15 monthly evaluations of servicer performance to ensure compliance with stated agreements.
  • Communicate Security requirements and best application\systems security practices to IT and Business teams.. Update technical documentation to ensure compliance.
  • Review, change and assist with new system access request Monitor SLA to ensure compliance Analyze data to prevent audit findings
  • Work with application / system owners to ensure compliance with the Sarbanes Oxley, and COBIT security audits.

Show More

2 Ensure Compliance Jobs

No jobs at selected location

3. Vulnerability Assessments

demand arrow
high Demand
Here's how Vulnerability Assessments is used in Securities Analyst jobs:
  • Conducted manual and automated vulnerability assessments of new source code and associated system configurations in support of the security review team.
  • Serve as a Security Analyst supporting numerous other projects related to security risk analysis and threat & vulnerability assessments.
  • Performed vulnerability assessments, patch audits, and baseline configurations on servers in the enterprise environment.
  • Supported customer requests from deployed forces in Iraq to include activities analysis and vulnerability assessments.
  • Develop and maintain a program of regularly scheduled network vulnerability assessments and reports.
  • Provided computer network risk mitigation and network vulnerability assessments and incident response/reconstruction.
  • Conducted periodic vulnerability assessments and penetration testing of internal and external facing servers
  • Coordinated annual penetration testing and vulnerability assessments with 3rd party vendor.
  • Conducted third party vulnerability assessments of BMW network and applications.
  • Established methodology for system vulnerability assessments and testing techniques.
  • Perform network scanning and vulnerability assessments.
  • Performed initial vulnerability assessments and monitoring for sustained Payment Card Industry (PCI), MasterCard, and VISA compliance.
  • Developed and tested scanning policies including FDCC compliance checks to be used by the VA during vulnerability assessments.
  • Conduct vulnerability assessments on organizations DoD systems utilizing VRAM, ACAS tools, CVE and IAVM guides.
  • Conduct vulnerability assessments to identify weaknesses in hardware and software used on the network.
  • Improved the Vulnerability Assessments program by greatly reduce risk to the business.
  • Conducted vulnerability assessments and audits of enterprise network Infrastructure using nCircle IP360 software.
  • Conduct vulnerability assessments and recommend mitigation strategies on various networks and topologies.
  • Performed periodic vulnerability assessments for Polito customers.
  • Performed vulnerability assessments using nmap, nessus, Backtrack, Qualys, Nexpose, Acunetix, W3AF, and other tools.

Show More

22 Vulnerability Assessments Jobs

No jobs at selected location

4. Firewall

demand arrow
high Demand
Here's how Firewall is used in Securities Analyst jobs:
  • Analyzed and improved firewall rules for efficiency, effectiveness, clarity of purpose, and maintainability.
  • Monitor Security Events on managed security firewalls for device outages.
  • Administrated and managed multiple CheckPoint Firewall appliances.
  • Reached out to the Line of Business when there were questions about an application associated with firewall rules.
  • Conducted Firewall change review, changes to application proxies, and sensitive web application configurations.
  • Managed and implemented new firewalls leading to a reduction in successful system attacks.
  • Perform tasks of providing support in the administration of firewalls day to day.
  • Worked on the migration of Juniper SSG firewalls to SRX firewalls.
  • Configure Cisco Switches to support firewall, BigIP, server installations.
  • Implement production service requests as required to the firewalls.
  • Created firewall rules to the requirements of our clients.
  • Maintain switches, routers, servers, firewalls.
  • Block unknown IP addresses going through firewalls.
  • Review and recommend corrections for firewall, authentication, anti-virus, security logging/monitoring, and data classification.
  • Managed and upgraded Imperva web application firewall for web application security.
  • Removed (45) un-needed firewall rules and (175) inactive IP servers, to improve security and lower risk.
  • Lead project to switch out Cisco ASA firewalls to Palo Alto Next Generation firewalls.
  • Reviewed the Qwest firewall logs to ensure the quality of the corporate network.
  • Configured and managed policies on Palo Alto firewalls using Panorama GUI.
  • Performed firewall log analysis. '

Show More

30 Firewall Jobs

No jobs at selected location

5. Security Policies

demand arrow
high Demand
Here's how Security Policies is used in Securities Analyst jobs:
  • Worked hand-in-hand with the International/Foreign Disclosure division to provide advice/assistance in the development and implementation of security policies and procedures.
  • Worked with security SME, software and hardware technology architects concerning infrastructure operations, access compliance and security policies.
  • Serve as an industrial security analyst providing security customer service and expertise on security policies and procedures.
  • Developed, updated and published corporate security policies, standards and procedures.
  • Prepared and maintained documentation on Security policies and procedures.
  • Monitored post compliance with Department computer security policies.
  • Reviewed and analyzed security policies and procedures.
  • Create, maintain and ensure adherence to baselines, security policies, procedures, guidelines and control standards.
  • Provide feedback and the methodologies to the end user for maintaining security policies and a secure environment.
  • Update IT security policies, procedures, standards, and guidelines according to department and federal requirements.
  • Develop reports to share with administrators about the efficiency of security policies and recommend any changes.
  • Developed and implemented safety and security policies and procedures for the distribution center and 76 branches.
  • Developed methods to improve security policies, processes and practices, and recommend changes to management
  • Advise departments on the ministry's security policies, standards, and processes.
  • Create security policies for the enterprise and implement them with at most precision.
  • Assist with creating, updating, and enforcing Information Technology security policies.
  • Verify all security policies are current and up to date.
  • Develop and write security policies and guidelines.
  • Provided consultation in regards to security policies practices and procedures to State Farm internal and external clients.
  • Reviewed the current security policies and physical security measures. '

Show More

65 Security Policies Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary

6. Security Audits

demand arrow
high Demand
Here's how Security Audits is used in Securities Analyst jobs:
  • Conducted 4 security audits per month to identify potential problems related to physical security, staff safety and asset protection.
  • Conducted security audits to identify potential vulnerabilities related to physical security, staff safety, or asset protection.
  • Performed security audits, evaluations, and risk assessments of complex operational data processing and communications systems.
  • Performed security audits on all systems, end-user testing, create/maintain security documentation.
  • Conducted technical and physical security audits for government networks and call centers.
  • Review security audits to determine and adjust clients correct access level
  • Created and organized materials for frequent security audits.
  • Conduct security education classes and security audits.
  • Conduct risk-based information security audits and assessments.
  • Supported internal and external security audits.
  • Perform security audits on the network and generate reports UAEM responsible for each network segment to prevent attacks on infrastructure.
  • Review, analyze, and report to the client the status of systems vulnerability scans and network security audits.
  • Conduct regular IT security audits of applications and infrastructure, both internal and 3rd party partners.
  • Install patches and hot fixes to ensure compliance with security audits from (OCC).
  • Participate in security audits, including SAS70, by partners and outside auditing firms.
  • Perform security audits, track and resolve issues and mitigate risk.
  • Conduct security audits for the 30 Global sites,
  • Performed Configuration Review and Network Architecture Review, Data Center Review, Firewall rule-based review, Physical security Audits.
  • Conducted periodic security audits and training to enforce company expectations and security procedures.
  • Participate in pre and post sales customer security audits and assessments.

Show More

38 Security Audits Jobs

No jobs at selected location

7. Information Security

demand arrow
high Demand
Here's how Information Security is used in Securities Analyst jobs:
  • Analyzed the information security environment for security anomalies and escalated security violations to the appropriate corporate security channels.
  • Handle tasks of defining and reviewing technology implementations, information security policy, and guidelines for business operations.
  • Applied engineering principles and management techniques to develop operational policy for customer technical and information security challenges.
  • Create information security documentation related to work area and complete requests in accordance with company requirements.
  • Provided technical expertise to the design, development and implementation of information security policies and procedures.
  • Documented security-related standards and procedures in conformance with Company policy and information security goals.
  • Authored the CalWORKS information security manual for County of Sacramento-Department of Human Assistance.
  • Reviewed plans for providing adequate information security for domestic and overseas posts.
  • Gather forensic evidence and assist other information security teams with internal investigations
  • Participate in all aspects of Information Security Operations including on-call duties.
  • Research new information security shortfalls and defensive strategies in addition to new technological advances in software and tools.
  • Worked effectively as part of the Information Security team to address team objectives and priorities.
  • Provided Federal Information Security Management Act (FISMA) and OMB matter expertise.
  • Act as staff representative at conferences and special meetings on Information Security matters.
  • Assisted in the development of global information security policies, standards and procedures.
  • Provided Information Security services on a global scale.
  • Created standard enterprise-wide processes and documentation for information security processes.
  • Create updated information security plan Policy.
  • Engage with Business Information Security to provide guidance on best approach to identify and remediate issues within applications.
  • Manage the policy, standards and procedures framework for Information Security & IT Risk/Compliance.

Show More

71 Information Security Jobs

No jobs at selected location

8. Database

demand arrow
high Demand
Here's how Database is used in Securities Analyst jobs:
  • Submit suggested changes/improvements for consideration and implement approved changes that would improve the fidelity and responsiveness of the international security database.
  • Evaluate and implement process improvement strategies to enhance reporting while maintaining departmental Access databases and Excel macros.
  • Assisted in the development of databases used for measuring department efficiency and production.
  • Managed Enterprise readiness and patch status through database application reporting.
  • Utilized and maintained personnel security database.
  • Analyzed intelligence and updated database diligently.
  • Assisted clearance applicants with entering information into e-QIP database, answering questions, and resolving system issues as necessary.
  • Maintained all process documentation pertaining to database reporting, compliance, patch distribution, and security policies.
  • Trained on scanning material and records into digital form and organized them into a computer database.
  • Collaborated with Client firms to update their Database while effectively updating common clients.
  • Analyzed ACF2 databases for inconsistencies prior to actual migration (Vanguard RACF).
  • Train fellow employees on database operations and usage for the security process.
  • Use Access Databases to prepare annual K-1 investor statements.
  • Supported the JPAS database and related files as needed.
  • Joint Personnel Adjudication System (JPAS) database inquires.
  • Create and maintain database tracking systems in JPAS.
  • Provided end user support of Oracle database accounts.
  • Created and maintained database matrix for all projects.
  • Maintain JSF PSO and collateral security databases.
  • Establish or utilize appropriate databases and procedures to perform as the administrative POC for a set of compartmented programs.

Show More

18 Database Jobs

No jobs at selected location

9. Risk Assessments

demand arrow
high Demand
Here's how Risk Assessments is used in Securities Analyst jobs:
  • Shared responsibility with Manager on filling out client risk assessments and other security questions.
  • Perform Risk Assessments and develop security architecture solutions to minimize security risks.
  • Performed risk assessments, provided recommendations and presented findings.
  • Conduct security risk assessments of applications and infrastructure components.
  • Conducted risk assessments and prioritized remediation and mitigation activities.
  • Create security risk assessments and communicate risks with customers
  • Conduct risk assessments and vulnerability studies.
  • Conducted risk assessments during contract negotiations.
  • Collaborated with other analysts in Europe to perform web application pen tests, risk assessments, and code reviews.
  • Developed detailed, comprehensive communication plans, change management plans, risk assessments, and standard operating procedures.
  • Restructure DTRA's Passport/Visa office, establish and implement security and risk assessments for the agency processing system.
  • Manage risk assessments of applications, systems and networks to identify control weaknesses.
  • Conducted network and physical penetration tests, risk assessments, and security assessments.
  • Perform risk assessments of applications, servers and buildings.
  • Perform risk assessments and develop risk-based annual plans.
  • Performed Risk Assessments and developed Risk Assessment Reports.
  • Performed risk assessments to ensure corporate compliance.
  • Conducted risk assessments and remediation plans.
  • Compose requisite documentation (security categorizations, risk assessments, contingency planning, configuration management plans, etc.
  • Conducted risk assessments for data protection, storage, and data integrity and facility infrastructures.

Show More

14 Risk Assessments Jobs

No jobs at selected location

10. Active Directory

demand arrow
high Demand
Here's how Active Directory is used in Securities Analyst jobs:
  • Provided contract security support for distributed computer systems using Active Directory and LDAP.
  • Created new user Windows accounts utilizing Active Directory.
  • Provisioned adds/moves/changes in Active Directory.
  • Sound understanding of Group Policy, DNS, Active Directory, site replication, and other Windows server utilities.
  • Manage and maintain active directory organizational units, create users, provide rights permissions, group policies when applicable.
  • Review and validate the privileged users and groups at Active Directory, Databases and application on a periodic basis.
  • Analyzed Active Directory to identify and remove (260) unused accounts to improve security and lower risk.
  • Managed AD Janitor to clean up users and computers accounts in Active Directory.
  • Audit User Groups in CATS, Active Directory and all other systems.
  • Add and modify new accounts using active directory.
  • Created users account in Microsoft Active Directory.
  • Created and maintained Active Directory global groups.
  • Provisioned accounts and access in Active Directory.
  • Worked with Active Directory for multiple products.
  • Enabled and modified access to internal IT network applications including managing including Active Directory access.
  • Maintained and created service and user accounts for users of Auto Nation using Active Directory and Citrix.
  • Created and managed access for Active Directory and Novell user and group accounts.
  • Use Active Directory to unlocked account, verify usernames, and reset passwords.
  • Handle Account Management Technology Purchasing Active Directory Management
  • Design and implementation of companywide desktop security scenarios through active directory utilizing VMware virtualization software.

Show More

5 Active Directory Jobs

No jobs at selected location

11. Incident Response

demand arrow
high Demand
Here's how Incident Response is used in Securities Analyst jobs:
  • Escalated incidents directly to Account Security Leads and Security Incident Response teams.
  • Involve in threat and vulnerability management and security incident response activities.
  • Handle the security operations for monitoring and coordinating security incident response.
  • Maintained meticulous records of security monitoring and incident response activities.
  • Provided end user incident response using industry accepted troubleshooting procedures.
  • Researched and recommended threat mitigation / incident response techniques.
  • Participated on Incident Response Teams as necessary.
  • Monitored and interpreted McAfee Virus Scan Enterprise on demand and on-access scan result as part of overall incident response investigation process.
  • Assisted local government entities with Incident Response and risk mitigation in the event of compromise or discovery of vulnerabilities.
  • Provided Security Incident Response Handling in a timely and proactive manor to ensure proper mitigation of those issues.
  • Write, review, and approve Standard Operating Procedures for the Security Incident Response Team.
  • Performed assessments, audits, incident response, forensics, and penetration testing.
  • Researched possible attack scenarios and suggested new alerts to improve incident response.
  • Team member of the Computer Security Incident Response Team (CSIRT).
  • Provided research and logistical support to level 2 incident response teams.
  • Handled incident response for network, host and security events.
  • Maintain, review and update the USARC Incident Response Plan (IRP).
  • Led incident response team in replicating and remediating a vulnerability disclosed by a security researcher.
  • Implemented MalwareBytes breach remediation tool and developed the Malware Incident Response plan for the organization.
  • Contract) Responsible for incident response, analysis, and forensics.

Show More

61 Incident Response Jobs

No jobs at selected location

12. Security Assessment

demand arrow
high Demand
Here's how Security Assessment is used in Securities Analyst jobs:
  • Review, edit and deliver technical and executive security assessment reports to business management, asset owners and executives.
  • Performed web application security assessments, tracked identified vulnerabilities and coordinated the remediation and validation.
  • Performed security assessments on network, application, physical and wireless environments.
  • Conduct audits to system and technology security assessments to identity security vulnerabilities.
  • Travel to program identified locations and conducts security assessments and inspections.
  • Evaluated the appropriateness of specific System Security Assessment solution components.
  • Developed internal procedures for security assessments and penetration testing.
  • Conducted security assessment of PKI Enabled Applications.
  • Performed monitoring using security assessment tools.
  • Identify system vulnerabilities and develop assessment plans, Security Assessment Report (SAR), and mitigation and remediation recommendations.
  • Develop Security Assessment Plan (SAP) to initiate Security Assessment for low, moderate and high control information systems.
  • Prepare Security Assessment Reports (SAR) from Security Checklists performed against Building Management System (BMS) devices.
  • Employed both manual and automated methods to conduct security assessments against Web Applications and desktop systems.
  • Used the prescribed IBM Intellectual Capital associated with the System Security Assessment solution.
  • Understand the overall sizing and scoping of the System Security Assessment infrastructure.
  • Understand the method used to deliver the System Security Assessment.
  • Understand the benefits provided by the System Security Assessment solution.
  • Analyze the application for Security Assessment both manual & automation.
  • Conduct Physical Security Assessment's (PSA).
  • Developed Security Assessment Report (SAR).

Show More

8 Security Assessment Jobs

No jobs at selected location

13. Nist

demand arrow
high Demand
Here's how Nist is used in Securities Analyst jobs:
  • Worked with other Application Coordinators, Analysts, and System Security Administrators to maintain an integrated medical record.
  • Managed delegated administration, Password Policies, Authorization process, Complex approval process.
  • Manage and administratively close all incidents that do not require extensive investigations.
  • Worked with all administrators forwarding logging to collectors with verification.
  • Mitigate risk to WFB resulting from decisions, actions, and general administration of daily production assignments that may cause overdrafts.
  • Acted as Data Courier administrator and was responsible for the build and maintenance of the Data Courier interfaces.
  • Trained two staff members to perform assessments implementing NIST 800-53A methodology and the proper use of CSAM.
  • Reported directly to the TSA Office of the Acting Deputy Administrator (Deputy Assistant Secretary).
  • Negotiated and administered repair contracts for purchase, installation and upgrades to the security network system.
  • Lead Systems Administrators and Operations staff in the remediation of vulnerabilities identified through network scans.
  • Bulk uploads of external users into LDAP using LIDF, Groups creation and Administration.
  • Risk Assessment (RA) - Developing RA documentation compliant with NIST guidance.
  • Developed Security Plans in accordance with NIST SP 800-18, Second Public Draft.
  • Influenced the administration of Chemical Facility Anti-Terrorism Standards (CFATS) rule.
  • Developed Security Test & Evaluation Reports per NIST SP 800-53/800-53A.
  • Administered patches and Service Packs as needed for system updates.
  • administered payments and taxes on various asset-backed security products using Microsoft Excel spreadsheets to verify the automated payment and tax models.
  • Worked with server administrators to ensure all systems attained minimal requirements to pass into centrally managed datacenters.
  • Administered domain name change for Syneren.
  • Provided third level support to the operations administration team, helpdesk and Security Points of Contacts (SPOC).

Show More

34 Nist Jobs

No jobs at selected location

14. Intrusion Detection

demand arrow
high Demand
Here's how Intrusion Detection is used in Securities Analyst jobs:
  • Provide Intrusion Detection System (IDS) monitoring, analysis and incident response to information security alerts/events.
  • Performed daily monitoring, maintenance of firewalls and intrusion detection sensors.
  • Developed firewall and intrusion detection metrics for corporate SOX compliance.
  • Monitor intrusion detection systems for illegal network activities.
  • Established secure network connection of Intrusion Detection Servers.
  • Performed duties as a Security Operations Center (SOC) analyst including Intrusion Detection Systems (IDS) and Security Incident.
  • Research and work with vendors to implement security solutions such as Intrusion Detection, E-mail encryption, Firewall solution, etc.
  • Perform vulnerability management scans and evaluate logs from IDS routers, firewalls, and intrusion detection systems.
  • Monitor intrusion detection and prevention systems and other security event data sources in a 24x7x365 SOC.
  • Monitored real-time intrusion detection systems (IDS) for the detection of external and internal threats.
  • Provide ongoing monitoring of intrusion detection systems and newly developed exploits for Windows and UNIX systems.
  • Designated a project lead to configure and install Manhunt, a network base intrusion detection system.
  • Worked with Microsoft Windows 2003/2008, Active Directory, UNIX/Linux, intrusion detection systems.
  • Applied Cisco Intrusion Detection Systems and Intrusion Prevention Systems.
  • Apply new intrusion detection signatures.
  • Gained experience in facility intrusion detection systems and review of security clearance verification system JPAS.
  • Perform 24/7/365 network monitoring review and analyze Intrusion Detection and Prevention Systems (IDS/IPS) sensors data.
  • Monitor and analyze Intrusion Detection Systems (IDS) to identify security events triggering on Malware.
  • Provided intrusion detection support for Dell SecureWorks' global customer base.
  • Page 2 Monitor Network Intrusion Detection Systems using ISS Site Protector and Black Ice with Proventia network sensors.

Show More

46 Intrusion Detection Jobs

No jobs at selected location

15. Network Security

demand arrow
average Demand
Here's how Network Security is used in Securities Analyst jobs:
  • Conducted overall security assessments of network security posture and provide guidance on reducing network vulnerabilities in support of Certification and Accreditation.
  • Reviewed and provided feedback of system specifications, development, test, network security documents for completeness and accuracy.
  • Resolve user request without violating security protocols and maintaining the integrity of the network security.
  • Profile: Managing and implementing & maintaining network security through methodical approach and security tools.
  • Perform responsibilities of installing, configuring, and monitoring network security system of the organization.
  • Provided outstanding technical support including first, second and third level network security troubleshooting.
  • Own and maintain Microsoft network security and regulatory compliance management.
  • Administered Cisco and Juniper firewalls for network security unit.
  • Assist in the documentation of security policies, procedures, standards and guidelines related to application and network security.
  • Maintained a strong passion for IT and Network Security, continuous learning, training others, and knowledge sharing.
  • Network security: Active Directory, NT Domain Manager, NetWare Admin, Console One, and N4pass.
  • Planned, coordinated, and implement network security measures to protect data, software, and hardware.
  • Provide working knowledge of network security within NRL internal and external Enclave /Domains and systems boundaries.
  • Point of contact for Network Security operations for various divisions, departments.
  • Configured Cisco routers and switches for support of the network security infrastructure.
  • Analyzed and blocked raw data streams for network security violations.
  • Maintain up to current knowledge of network security best practices.
  • Facilitated network security changes on change control board.
  • Monitor and maintain network security by running vulnerability and penetration tests followed by documenting and remediating the weaknesses.
  • Project: Data Center and Network Security - Mexico Responsibilities: Testing software to install on SITE Servers.

Show More

67 Network Security Jobs

No jobs at selected location

16. Security Systems

demand arrow
average Demand
Here's how Security Systems is used in Securities Analyst jobs:
  • Engineered, installed, maintained, and repaired security systems, programmable logic controls, or other security-related electronic systems.
  • Worked with security systems as a corporate security analyst in monitoring and maintaining good communications with banking security monitoring systems.
  • Research assigned IT security systems to provide insights on IT security architectures and IT security recommendations for assigned systems.
  • Analyzed information security systems, applications and developed security measures to protect information against unauthorized modification or loss.
  • Subject inspection areas included computer security, TEMPEST, red/black installation criteria, and physical security systems.
  • Restructured performance-based designs for integrated security systems to protect significant national security assets and national security missions.
  • Managed facility physical security initiatives such as card readers, photo and finger print security systems.
  • Managed information security systems and computer network defense to provide detection and escalation services.
  • Reviewed all related IT security systems & equipment discrepancies and establish remedy report.
  • Implemented security systems to computer networks in compliance with company's security policies.
  • Monitor and troubleshoot physical security systems and networks.
  • Recommend improvements in security systems or procedures.
  • Explored, analyzed and implement Wells Fargo company's security systems and developed solutions to keep them safe from threats.
  • Ensured compliance with all aspects of the program including personnel, physical and administrative security systems and procedures.
  • Improved security systems with in-depth programming in UNIX systems.
  • Utilize sophisticated security systems and technologies for intrusion analysis, subtle event detection, video analytics, and incident management.
  • Perform daily operations support, maintenance and troubleshooting for assigned security systems.
  • Managed and monitored security systems for Genworth.
  • Monitored and responded to security systems of client's 1500+ Citizen's Bank locations protecting from burglary, vandalism and Skimming.
  • Assisted with diagnosing and resolving issues with client's security systems with local security technicians.

Show More

6 Security Systems Jobs

No jobs at selected location

17. Access Control

demand arrow
average Demand
Here's how Access Control is used in Securities Analyst jobs:
  • Provide technical advice on access control, security models, disaster recovery, business continuity planning, and security awareness training.
  • Provided facility security support to include badge creation, access control database, and physical security management of facilities.
  • Defined, implemented and maintained access control parameters and performed system identification processing.
  • Created and improved security processes to securely handle data, according to risk level, access controls, and regulatory/compliance standards.
  • Access control check to identify the privilege escalation issues on various roles and ensuring the closure by overall framework implementation.
  • Manage network and security infrastructure including network access control, firewalls, web content filtering, and traffic shaping.
  • Managed access using role based access control, administer user accounts, passwords, and password aging.
  • Define access control systems, types of locks and safes for assessed locations and ensures proper implementation.
  • Manage the access control database and responsible for system installations, removals, upgrades and troubleshooting.
  • Access Control for Main Frame, Email, Microsoft network, Banking/Financial Applications.
  • Manage the Access Control process and updates to the Access Control form.
  • Provide assistance to Access Control regarding PIV cards and suitability paperwork.
  • Maintained and managed the physical access control systems for corporate facilities.
  • Establish access control lists for all OSS spaces.
  • Created protective measures against exploitable vulnerability after testing for such on VHA workstations and servers Evaluated the effectiveness of access controls
  • Access Control over 180 banking applications Assisted with Security reviews to monitor and control associate access to sensitive information.
  • Managed the access control and video surveillance for all of the AIG sites in America and across the world.
  • Worked at Access Control performing all office duties, supporting clients and providing entrance passes for in-house employees.
  • Maintained alarm monitoring system, badge control, and access control systems.
  • Network scanning using tools like NMap and Nessus Initiative to stream line the access control mechanism of various applications.

Show More

9 Access Control Jobs

No jobs at selected location

18. Security Issues

demand arrow
average Demand
Here's how Security Issues is used in Securities Analyst jobs:
  • Provided knowledge of security issues around integrating PeopleSoft with other applications using an integration broker.
  • Consulted with business units on security issues related to e-business planning and risk assessment.
  • Functioned as an internal consulting resource on information security issues.
  • Provided recommendations on security issues regarding security policies and procedures.
  • Participate in the system development cycle to ensure that security issues are taken in the account and addressed early.
  • Recommend approach to address database security issues and regulatory compliance challenges such as PCI, HIPPA and SOX.
  • Provided full-time support to the DOE's Defense Programs' Headquarters Security Officer on computer security issues.
  • Responded to a wide variety of security issues from armed robberies to ATM thefts, vagrants.
  • Interfaced with Human Resources and Legal on various safety and security issues related to personnel.
  • Worked independently with clients and Sr. Management on information Security issues and strategies.
  • Provided 3rd level phone support for all client software and security issues.
  • Identified security issues on DOM (Document Object Model) based environments.
  • Train QA Team to identify and acknowledge security issues in their projects.
  • Research difficult security issues to better solve dilemmas at hand.
  • Produce monthly bulletin for Developers and project engineers about security issues or common security questions.
  • Access a web-based collaborative environment to rapidly resolve security issues in software code using HPwebinspect.
  • Monitor and advise on information security issues related to the systems and workflow for Best Buy.
  • Make strong use of Sophos Enterprise Console to solve many security issues.
  • Helped team to remediate security issues with sample code Performed Automated scanning for dynamic assessment using HP Web Inspect.
  • Contracted until 2016) In a Senior Supervisory capacity, serves as expert Consultant and Advisor to superiors regarding security issues.

Show More

64 Security Issues Jobs

No jobs at selected location

19. Security Incidents

demand arrow
average Demand
Here's how Security Incidents is used in Securities Analyst jobs:
  • Communicate security incidents to clients regarding intrusions and degradation of their network infrastructure, applications and operating systems within customer expectations.
  • Identified computer security incidents by characterizing the nature and severity of incidents among the Firm's community both internally and externally.
  • Analyze and assess security incidents and escalate to client resources or appropriate internal teams for additional assistance.
  • Worked with customers to investigate security incidents, enhance detection capabilities, and improve their security posture.
  • Analyzed customers security logs in real-time to identify incidents and escalate validated security incidents to customers.
  • Collected, analyzed, investigated and escalated security incidents to regional response teams.
  • Utilized developed processes for security incidents and assessments for domestic and foreign sites.
  • Reviewed and analyze audit logs for potential security incidents on a periodic basis.
  • Monitored, Analyzed and responded to security incidents in the infrastructure.
  • Document security incidents as identified in the ticketing system.
  • Develop and implement security incidents utilizing ticketing systems (HP Service Manager) & Resilient Systems.
  • Evaluated security incidents and defined appropriate responses for all BMW locations in the Americas.
  • Detect, research and respond to security incidents quickly and accurately.
  • Analyze and assess security incidents and escalate to Tier 2.
  • Managed all security incidents, including escalation in a professional manner with an emphasis on customer satisfaction.
  • Ensured security incidents and other customer deliverables adhere to the established procedures and guidelines.
  • Respond in a timely manner to information security incidents.
  • Analyze new exploits to identify if it impacts current products -Respond to security incidents from customers.
  • Monitored and documented security incidents by running ad hoc queries using Toad for Oracle.
  • Executed and maintained appropriate control techniques Responded to Security Incidents in a timely manner (i.e.

Show More

62 Security Incidents Jobs

No jobs at selected location

20. PCI

demand arrow
average Demand
Here's how PCI is used in Securities Analyst jobs:
  • Performed vulnerability and penetration tests to ensure annual PCI compliance.
  • Assist in the enforcement and oversight of PCI, ACH, FDIC, and other regulatory requirements impacting financial institutions.
  • Managed PCI-DSS Compliance, including coordinating with various organizational units as well as working directly with internal audit.
  • Investigated various software products to identify PII and credit card data (DLP) for PCI compliance.
  • Helped the business become PCI certified and establish a process to maintain that certification every year.
  • Project Manager for PCI compliance and Federal on Demand services in the On Demand environment.
  • Implemented patching policies based on PCI compliance and change control process for patching policies.
  • Assisted the Security Governance team in achieving PCI DSS and ISO 27001 certifications.
  • Perform compliance and audit services for SOX, PCI and HIPAA audits.
  • Performed gap analysis and monitored compliance with PCI DSS controls.
  • Ensured TWC met PCI compliance on a quarterly basis.
  • Provide technical expertise to ongoing PCI compliance effort.
  • Maintained and developed PCI compliance processes.
  • Manage PCI Compliance audit process.
  • Created a benchmark of best practices from industry (NIST SP 800-53, COBIT, ISO, and PCI).
  • Experience writing SOC1/SOC2/PCI/HIPAA reports for the AICPA.
  • Performed quarterly assessments of Qualys vulnerability scans to meet PCI compliance criteria.
  • Configured, Implemented, Tested, the following Logging devices to support PCI DSS requirements; 1.
  • Streamlined Trustwave feedback of external vulnerability scanning to retain First Data PCI compliance status.
  • Experience working with PCI-DSS Identity and Access Management experience.

Show More

1 PCI Jobs

No jobs at selected location

21. Siem

demand arrow
average Demand
Here's how Siem is used in Securities Analyst jobs:
  • Monitored and responded to SIEM generated incidents and other electronic notifications.
  • Served as active member of special project teams, including Security Information Event Management (SIEM) administration and intrusion.
  • Designed software with training and help from beginner to advanced SIEM analyst usage built directly into the application.
  • Completed administration functions on core SIEM devices and end-user training on the use and analysis of available information.
  • Researched threats then created and tuned IDS/IPS signatures and SIEM correlation rules to optimize intrusion analysis efforts.
  • Support all aspects of Security Information and Event Management (SIEM) initiative.
  • Analyzed, troubleshooted, engineered solutions and documented all issues with SIEM-Storm.
  • Analyze, troubleshoot, resolve and document all issues with SIEM.
  • Reviewed all analyst device lists in SIEM to ensure consistency.
  • Applied QRadar SIEM tuning methods for emerging threat patterns and the mitigation of false positive security alerts.
  • Project Description: Security Monitoring Project where we use a SIEM tool ArcSight for monitoring security events.
  • Write search queries on Splunk SIEM to carry out Log Analysis and Security Event Correlation.
  • Provide continual updates to Team Lead regarding Arcsight monitoring devices to maximize SIEMS effectiveness.
  • Own, manage and analyze tickets through to resolution using Splunk SIEM system.
  • Used Tripwire Log center and Qradar as a SIEM.
  • Managed VMware server for the SIEM support group.
  • Conducted QRadar SIEM correlation review meetings.
  • Generated network activity report using firewall log IPs via Intellitactics (SIEM).
  • Full Disk Encryption (Bitlocker) Evaluate and implement SIEM products.
  • Worked on McAfee Epo and McAfee End Point Siem Nitro

Show More

69 Siem Jobs

No jobs at selected location

22. SQL

demand arrow
average Demand
Here's how SQL is used in Securities Analyst jobs:
  • Performed extensive development with Perl+MySQL for managing security related data using web-clients.
  • Automated all the reports extracting process in the new system by using custom store procedures in SQL 2014.
  • Created scripts via SQL Plus and Data Mover to import and export data from one environment to another.
  • Develop Permission lists and roles using Oracle SQL in TOAD, saving time and leading to improved efficiency.
  • Imported and exported data to and from spreadsheets and ASCII files using SQL statements and extraction tools.
  • Experienced with providing quarterly reports from Remedy by filtering data, and running queries using SQL.
  • Maintained data in MySQL databases and performed routine imports of data into 3rd party systems.
  • Provided support for Oracle and SQL database systems and a variety of Government proprietary software.
  • Constructed complex SQL queries involving multiple tables inner and outer joins.
  • Created and managed access for SQL and FTP accounts.
  • Maintained user domain, Exchange email and SQL accounts.
  • Customize PeopleSoft applications using Application Designer, SQL & Security in production environment HR and Financials.
  • Increased database efficiency and reliability through index tuning and SQL Profiler analysis.
  • Implemented best practices to reduce maintenance overhead and complexity and Improved the performance of the application by rewriting the SQL queries.
  • Performed data analysis, as well as wrote custom reports and queries using SQL Query Analyzer, Cognos and Access.
  • Perform both manual and automation vulnerability assessment using tools like burp suite, SQLMap.
  • Developed in technologies such as PHP, MySQL, JavaScript, JQuery, HTML5, and CSS3.
  • Burp suite to identify issues like sql injection, XSS, CSRF etc.
  • Identified attacks like SQLi, XSS, CSRF, RFI/LFI, logical issues.
  • automated scanning and fuzzing (In- house, Burp-suite, SQLMap, Nikto etc.

Show More

3 SQL Jobs

No jobs at selected location

23. DOD

demand arrow
average Demand
Here's how DOD is used in Securities Analyst jobs:
  • Coordinated and participated in high-level meetings; with various DoD agencies; discussed facility, personnel and organizational security.
  • Implement the requirements of the (DoD) National Industrial Security Program Operations Manual to ensure compliance with DoD regulations.
  • Performed research, write and edit C&A documentation based on DoD's DIACAP 8500 IA requirements.
  • Create, edit, and review IT documentation to ensure client adherence to US DoD protocols and procedures.
  • Provided system and security support for a Department of Defense's (DoD) program user community.
  • Developed and wrote of plans and policies in support of DoD missions across Africa.
  • Process employees for DoD security clearances, perform duties of Classified Document Custodian.
  • Provide Knowledge and guidance of DOD/DISA/Navy policy and instructions to supported sites.
  • Research current vulnerabilities and techniques to maintain security on the DOD network.
  • Review analyzed and validated site documentation to meet DoD and TMA requirements.
  • Analyze and coordinate requests IAW DoD and MDA policies and guidelines.
  • Conduct alarm tests IAW DoD standards for the appropriate classification level.
  • HAVE completed DoD ENROL courses and qualify for a FSO position.
  • Supervised security inspections for DoD and SAP facilities.
  • Safeguarded information as mandated by the DoD.
  • Supported IATO & ATO C&A efforts for DoD DHHQ BRAC project.
  • Determined FISS threats to the USAF, DOD, and US interests.
  • Perform the DoD Instruction (DoDI) 8500.2 IA Control Checklist.
  • Provided security program support on all Classified and Unclassified contracts and overseeing compliance of security processing for all DoD Intelligence projects.
  • Provided advice and service to all program managers to assure compliance with DoD Regualtions and Air Force Instructions.

Show More

43 DOD Jobs

No jobs at selected location

24. IDS

demand arrow
average Demand
Here's how IDS is used in Securities Analyst jobs:
  • Developed customized IDS event reporting triggers based off current threat analysis.
  • Perform CERT/SOC operations to include IDS event monitoring and analysis, security incident handling, incident reporting, and threat analysis.
  • Conducted Web Application User ID access reconciliation and audit of the privileged Database and application user IDS on quarterly basis.
  • Perform Quarterly Audit Compliance and Re-validation activity supporting 20 different customer accounts and more than 50,000 user IDs.
  • Provide shadow backup support and Monitor and managed IDS detectors and security events on an operations console.
  • Created, modified, and updated IDS and Security Information Event Management (SIEM) tool rules.
  • Monitored and analyzed Intrusion Detection Systems (IDS) to identify security issues for remediation.
  • Monitored IPS (Intrusion Prevention System) and IDS (Intrusion Detection System).
  • Monitor security functionality (IDS/IPS and Endpoint) and report daily operational metrics.
  • Work on MIDS tickets based upon MIDS procedures to resolve customer issues.
  • Run trace and gather additional information on events using Tipping Point IDS/IPS.
  • Configure, Maintain, and Support CISCO IDS/IPS Sensors.
  • Generate trouble tickets and install new IDS signatures.
  • Monitor IDS/IPS feeds to identify possible enterprise threats.
  • Maintained technical aids, logs, and records.
  • Developed and maintained handbooks, working aids, and analytical references to ensure applicability and currency.
  • Contributed to a team of Cyber Security professionals working with Intrusion Detection System (IDS) software and hardware.
  • Monitor Qradar based SIEM IDS for possible security breaches for remote and locally installed snort sensors.
  • Perform first-level monitoring using Arcsight and related IDS/IPS tools.
  • Research and analysis of investment products through Bloomberg, S&P, DTC, IDSI, and ADP.

Show More

13 IDS Jobs

No jobs at selected location

25. Ips

demand arrow
average Demand
Here's how Ips is used in Securities Analyst jobs:
  • Develop training and educational materials for security officers related to VIPs, credentials, and visitor management.
  • Configured security policy within IPS and created security reports.
  • Developed and grew cooperative working relationships with other teams.
  • Maintain strong working relationships with internal departments.
  • Ensured FISMA compliance, thorough understanding of NIST SP, OMB and FIPS 199-200 requirements for civilian federal agencies
  • Designed, installed, and maintained IPS, firewall, VPN, and other security devices.
  • Use leadership abilities in managing client and/or supplier relationships, business processes and objectives.
  • Input and updated data into JPAS PIPS/CVS data system to close out investigations.
  • Developed strong relationships with the desk and other firms within the market.
  • Performed intrusion prevention using Snort (IPS), created by SourceFire.
  • Installed, configured and monitored firewalls, IDS, and IPS devices
  • Run forensics analysis on WIPS Sensors using Motorola Air Defense Server.
  • Configured, monitored, and managed AirMagnet and Airtight Wireless IPS.
  • Develop good relationships with clients, agents, and participants.
  • Served as the team lead for JPAS, PIPS, BITS, and E-Quip services.
  • Applied knowledge of Federal mandates NIST, FIPS, OMB, and NSA guidance.
  • Perform net flow queries on suspicious IPs using Arbor Networks Private Protect and review alerts.
  • Reviewed and updated some of the system categorization using FIPS 199.
  • Submit malicious URLs IPs for web filtering or DNS poisoning.
  • Open source research for malicious URLS IPs to block

Show More

25 Ips Jobs

No jobs at selected location

26. Information Technology

demand arrow
average Demand
Here's how Information Technology is used in Securities Analyst jobs:
  • Designed and conducted the Information Technology Contingency Plan full-scale functional exercise program, incorporating the Homeland Security Exercise Evaluation Program.
  • Developed and maintained Global Information Technology security processes/standards that are compliant with policies and best practices.
  • Document request into the databases to ensure efficient processing for Information Technology team members.
  • Supported the development of the Mitigation Division Information Technology Security Policy Handbook.
  • Developed Business Continuity plans for Global Information Technology Security Services.
  • Pursued findings with Information Technology staff to ensure accuracy.
  • Provide subject matter expertise for information technology projects.
  • Conducted audits to ensure information technology (IT) compliance with Sarbanes-Oxley Act (SOX) controls.
  • Advanced knowledge of Information Technology security principles, methods, security products and services.
  • Note: My career history in information technology extends back to 1994.
  • Acted as liaison between users and Information Technology Systems.
  • Documented thoroughly into the databases to ensure efficient processing of request and seamless communication with other information Technology team members.
  • Develop Information Technology Architecture models and artifacts for the healthcare arena, focused on information technology security and privacy.
  • Developed and maintained on-line Textron Security Manual and Bell Information Technology Security web page.
  • Participated in department level projects, including multi-factor authentication and decentralized information technology.

Show More

26 Information Technology Jobs

No jobs at selected location

27. Assurance

demand arrow
average Demand
Here's how Assurance is used in Securities Analyst jobs:
  • Established information assurance and security requirements based on the analysis of user's policy, regulatory, and resource requirement.
  • Managed development and evaluative enforcement methods and techniques to studies concerning the efficiency and effectiveness of quality assurance program operations.
  • Provided on-site Information Systems Security/Information Assurance expertise in support of customer security and technical staffs.
  • Participated in working groups responsible for developing a new Information Assurance processes.
  • Performed security, testing, and evaluation assessments of information assurance solutions.
  • Provided quality assurance of personal documents.
  • Participated regularly in quality assurance testing.
  • Edited documentation for quality assurance.
  • Execute all aspects of Information Assurance Support including Certification and Accreditation of federal information systems in accordance with OMB and FISMA.
  • Perform basic audit log reviews, and ensures compliance with approved plans under the oversight of Information Assurance Management.
  • Used the TMS system to transport the objects and roles from Development system to Quality Assurance system.
  • Supported DTRA/NSPO Program Manager and Information Assurance Officer in compliance with DoD Instruction 8500.2 roles and responsibilities.
  • Acted as the subject matter expert for all Information Assurance related issues during this process.
  • Defined the role of Information Assurance Manager (IAM) within the GMD program office.
  • Analyze all applications for credit card assurance in an effort to prevent fraudulent accounts.
  • Assisted in creating templates for the Information Assurance team to improve our processes.
  • Provided information assurance support to HP for the SPOT program under the DOD.
  • Implemented of Software Security Assurance framework in the whole project by conducting Sessions like Secure Programing practices to all the developers.
  • Participate in risk and positive assurance related initiatives including security monitoring and compliance for the NA IT Infrastructure team (e.g.
  • Drafted proposal for Coast Guard Military Sealift Command Information Assurance Operations, and DMI won this contract.

Show More

10 Assurance Jobs

No jobs at selected location

28. Security Personnel

demand arrow
average Demand
Here's how Security Personnel is used in Securities Analyst jobs:
  • Communicate effectively with all levels of management and maintain liaison with prime/subcontractor security personnel.
  • Trained junior level program security personnel as directed.
  • Managed background re-investigations for government security personnel.
  • Dispatch security personnel to reported locations.
  • Provided oversight of security initiatives and SCA annual reviews on behalf of CCIIO, and worked directly with CMS security personnel.
  • Communicated at all levels of the company and with Fortune 500 security personnel both verbally, and using documentation.
  • Coordinate with meeting staff to provide security personnel assistance and clearance for high volume conferences.
  • Supervised a team of (unspecified) security personnel during a given shift.
  • Created and managed a security training program for USAF security personnel.
  • Schedule security personnel work hours.

Show More

29. Troubleshoot

demand arrow
average Demand
Here's how Troubleshoot is used in Securities Analyst jobs:
  • Complete application support and troubleshooting application related issues and co-ordination with the client and development team.
  • Excelled at networking installations, configurations and troubleshooting to include TCP/IP connection analysis.
  • Network Configuration and Troubleshooting and Partitioning of file systems.
  • Performed application and OS installation, configuration and troubleshooting.
  • Identify issue trends, and ascertain successful completion of troubleshooting steps for recurring issues until a permanent solution has been identified.
  • Plan, install, configure, manage and troubleshoot Linux and Windows servers, and end systems.
  • Provide advice or guidance to customers regarding various processes and researching and troubleshooting issues with automated systems.
  • Work with different Wal-Mart (ISD) Information Systems Division Teams to troubleshoot security issues.
  • Trained staff in how to enroll, manage and troubleshoot devices using Good Dynamics.
  • Provide fixes for the problems encountered during the troubleshooting phase of the project.
  • Performed day to day troubleshooting of issues relating to QA and Production.
  • Resolved level3 PGP tickets; troubleshoot installation, encryption, and authentication.
  • Participated in bridge calls troubleshooting network and user's issues.
  • Network troubleshooting from physical to logical layers.
  • Troubleshooted and resolve failed upgrades.
  • Utilized Symantec Critical System Protection to audit and troubleshoot recorded events.
  • Provided support to clients Network Engineers and Network Administrators in regards to troubleshooting general network problems.
  • Collaborated with other Application analysts at the command centre to troubleshoot issues.
  • Developed troubleshooting flowcharts on broadband and dialup connectivity that addressed connectivity problems and the recommended solution in MS Visio.
  • Install and upgrade all Splunk infrastructure systems when necessary * Troubleshoot Splunk errors and crashes working with Splunk support and Splunk Answers

Show More

1 Troubleshoot Jobs

No jobs at selected location

30. Unix

demand arrow
low Demand
Here's how Unix is used in Securities Analyst jobs:
  • Provided account provisioning for UNIX accounts which includes adding accounts to UNIX servers, password resets and updating groups.
  • Provided on call support and picked up daily Unix Support access and security requests on the Corporate Ticket System.
  • Utilized ITO to monitor all UNIX systems to verify all CPU's and systems were running smoothly.
  • Created and Removed Individual and System Accounts on all distributed Unix and Linux servers, e.g.
  • Maintained user account security for applications running on Windows 20xx, UNIX and a/s 400 servers.
  • Diagnosed and troubleshot UNIX and Windows processing problems and applied solutions to increase client security.
  • Installed upgrades, kernel patches, systems configuration, performance tuning on Unix/Linux systems.
  • Maintained the security team lab environment which consisted of both Windows and UNIX systems.
  • Created, optimized and deleted user account in Windows/Unix using scripts.
  • Installed UNIX packages and modules as well as program updates.
  • Configured user accounts in UNIX (AIX, Solaris, Linux) in support of a bank loan application.
  • Created ad-hoc Unix scripts to support Audit requests to run on BoKS and PowerBroker Master Servers.
  • Participated in the Solaris client design and account migration portions of the Unix LDAP project.
  • Upgrade eTrust to version 8 CR2 to allow the installation on AIX UNIX systems.
  • Tested and installed patches on Windows and UNIX-based servers to ensure compliancy.
  • Streamlined migration and remediation efforts by executing Unix shell script.
  • Developed unix ad hoc scripts and processes to reconcile, modify and delete records in the corporate access database.
  • Configured and installed ISS Network Sensor software on Solaris Servers (UNIX), Ultra 10s and Netra T-1s.
  • Used the TPC-C benchmark simulation of Hammerora, along with a multiprocessor version of UnixBench and IOZone.
  • Key Technologies: Fortify 360, IntruShield, Splunk, Linux/Unix, Tcpdump, Wireshark

Show More

6 Unix Jobs

No jobs at selected location

31. Nessus

demand arrow
low Demand
Here's how Nessus is used in Securities Analyst jobs:
  • Managed network vulnerability management process using Nessus Vulnerability Scanner to produce actionable recommendations for IT teams.
  • Performed Nessus and/or Retina scans to provide security posture reporting as well as remediation and analysis.
  • Monitored security systems, and analyzed application and system threats and vulnerabilities utilizing Nessus.
  • Experienced in configuring, running, validating and contextualizing the findings of vulnerability discovery tools such as Nessus and NeXpose.
  • Review security controls using manual processes and automated tools (Nessus, WebInspect and AppDetective).
  • Performed Web Server and Network Infrastructure targets using Nessus local client & Tenable Security Center.
  • Scan networks utilizing Retina and Nessus and devices utilizing SCAP Compliance Checker.
  • Provide Enclave/Domain risk review and assessment of Retina / Nessus scans.
  • Performed security testing by analyzing outputs using Nessus vulnerability scanning tool to validate applications and information systems security configurations and compliance.
  • Experience conducting vulnerability scans using Nessus reviewing and analyzing results to identify and remediate potential gaps or risks.
  • Used Microsoft Baseline Security Analyzer and Nessus to perform vulnerability scans. '
  • Scheduled and executed monthly vulnerabilities scan using HP Webinspect and Nessus.
  • Used several security and auditing applications such as Bind view, Nessus, MBSA, Wire Shark.
  • Network scanning using tools like NMap and Nessus.
  • Performed scanning with MacAfee Foundstone and Nessus.
  • Performed vulnerability scans and penetration testing through use of security tools such as Nessus, Scuba, Acunetix, and nmap.
  • Perform vulnerability scans using Foundstone, DBProtect, Nexpose and Nessus scanning tools.
  • Utilized Metasploit, Nessus, Wireshark and Armitage within my research environment.
  • Conducted SAST and DAST with tools like HP Fortify, IBM Appscan, Webinspect, Nmap, Nessus.
  • Perform network and application vulnerability assessments utilizing AppScan, Qualys, Nessus , nmap and numerous other security tools on Backtrack.

Show More

14 Nessus Jobs

No jobs at selected location

32. Linux

demand arrow
low Demand
Here's how Linux is used in Securities Analyst jobs:
  • Monitored activity such as Windows and Linux system administration, AWS network management, and network device configuration.
  • Developed hardened servers based on various Linux distributions and Microsoft Windows platforms.
  • Administered Linux based Security Information Management system.
  • Used Linux to run scripts as required and worked with the Software Development Group on UNIX computers when needed.
  • Completed a two month project to replace the Linux-based Snort IDS systems with HP Tipping Point Intrusion Prevention appliances.
  • Performed Unix(AIX, HPUX and Linux) security analysis, including user administration, security investigation.
  • Worked on project to build secure bastion Linux systems on outside perimeter network.
  • Tested both security and forensics tools including Linux and Backtrack 5.
  • Specialized in securing resources on Windows Servers and Linux platforms.
  • Conduct QualysGuard vulnerability scans for all UNIX and Linux servers.
  • Experience in Windows and Linux networking hardware for assessment.
  • Created and managed user accounts, security, rights, disk space and process monitoring in Solaris and Red hat Linux.
  • Handled tasks in Red Hat Linux include upgrading RPMS using YUM, kernel, Multipathing and LVM file system.
  • Showed an overall performance gain with Linux/Intel over SPARC/Solaris of 100% at less than 1/3rd the cost.
  • Perform daily, weekly, and monthly backups of Linux Red Hat, and Unix Solaris systems.
  • Perform tape backups on Windows 2003, Solaris 10 and Red Hat Linux servers.
  • Ensured connectivity and availability of virtual VMware servers hosted on 2 Linux host servers.
  • Gather requirements for privileged access on Linux, Solaris, AIX, and HP-UX servers from multi-national application support teams.
  • Worked with onsite technicians to complete and troubleshoot Avaya SAL installations that ran on Red Hat Enterprise Linux.
  • Coordinated with Novell support team in recovering root password for Linux SUSE 10 serversdue loss of password.

Show More

9 Linux Jobs

No jobs at selected location

33. Internet

demand arrow
low Demand
Here's how Internet is used in Securities Analyst jobs:
  • Provided design and access solutions for security and network issues associated with Internet and remote access, encryption and cryptography implementation.
  • Initiated defensive action through the router team to coordinate defensive action to malicious Internet activity/attacks.
  • Block and shun internet protocol addresses that propose a potential threat to State of Georgia trusted network via managed services provider.
  • Analyzed security data for repeating trends, attacks, malicious Internet Protocols (IP), and anomaly type events.
  • Recognize and identify potential threats to the network and systems connected to the network from the Internet and Intranet.
  • Plan, test, and deploy IronPort HTTPS Policies & proxy cleanup to augment existing internet monitoring solution.
  • Coordinated and conducted ISS Internet Scanner vulnerability assessment scans on web servers throughout the Marine Corps Enterprise Network.
  • Assess changes required to integrate RMS application with the identity management tool OID (Oracle Internet directory).
  • Prepare site surveys, conducts internet database research and perform system queries related to the department.
  • Designed and configure Lotus Notes email accounts, UNIX, mailboxes and internet accounts for users.
  • Served as product special specialist for the IBM ISS line of internet security appliance platforms.
  • Configured and maintained multiple Cisco ASA firewall pairs for internal to external and internet access.
  • Worked with Primary & Local Internet Complicate officers to enforce Compliance related activities.
  • Trained and mentored law enforcement officers on computer crime and Internet security issues.
  • Provide analytical support on high profile internet fraud enforcement cases including recent actions against high yield investment company, Profitable Sunrise
  • Assisted with investigations for HR and Compliance through computer forensics, log analysis, login reports and Internet activity reports.
  • Enabled required sensors, egress traffic enforcement policy and signatures in Sourcefire IPS to prevent attacks from the internet.
  • Worked with development in starting and stopping PIA (Peoplesoft Internet Architecture) in order to remove cache.
  • Worked with ISO (Internet Security Officers) to intercept Qualys data.
  • Uncovered high vulnerabilities at the infrastructure level for internet facing web sites .

Show More

34. Security Requirements

demand arrow
low Demand
Here's how Security Requirements is used in Securities Analyst jobs:
  • Reviewed statement of work for security requirements; revised classification; ensured accuracy; minimize delay of award and execution.
  • Developed agreements between vendors and corporate office in support of service offerings and government security requirements.
  • Tested system security requirements, created client policies, documented server security settings.
  • Assisted in the developing security requirements for products being considered for government purchase.
  • Researched and recommend operational and security requirements for system software and hardware upgrades.
  • Mastered and maintained the DoD/Navy computer security requirements/documentation and ensured personnel followed procedures.
  • Monitor controls post authorization to ensure continuous compliance with the security requirements.
  • Manage the electronic background investigation program using knowledge of administrative security requirements.
  • Drafted internal application security requirements standards including specific development controls.
  • Analyze current and future security requirements and confirm/identify security gaps.
  • Monitor controls post-authorization to ensure continuous compliance with security requirements.
  • Managed multiple responsibilities related to customer security requirements.
  • Verified compliance with company documented security requirements.
  • Define security requirements for new implementations.
  • Conduct re-assessment after mitigating the vulnerabilities found in the assessment phase * Provide Security requirements to project teams during design phase.
  • STRIDE assessment of the applications during the design phase, identifying the threats possible and providing security requirements.
  • Carried continuous monitoring after authorization (ATO) to ensure continuous compliance with the security requirements.
  • Analyze and define security requirements for local and wide area networks.
  • Elicited security requirements for the caBIG project at NCI.
  • Verify security requirements using built in web page login, telnet and SSH using Putty and HyperTerminal over Ethernet.

Show More

51 Security Requirements Jobs

No jobs at selected location

35. Cyber

demand arrow
low Demand
Here's how Cyber is used in Securities Analyst jobs:
  • Conducted planning activities and prepared associated documentation in support of cyberspace operations.
  • Identified and mitigated emerging security threats by working with Cyber Intel and reviewing company information security policy with end users.
  • Provided detailed status updates on existing cyber security incidents daily to include follow up with client/customer to ensure satisfactory resolution.
  • Help enhance overall cyber incident response program specifically in the area of incident categorization and incident mitigation.
  • Provided Cyber Security monitoring and incidents response expertise for large corporate customers in SOC operations.
  • Supported customer direct investigation of cyber activity targeting customer information and its information infrastructure.
  • Provide security guidance and oversight for various information technology and cyber security projects.
  • Trained in monitoring, analysis and front-line investigation of cyber security risks.
  • Coordinated Cyber Security Recruiting within local colleges and universities.
  • Worked as manager and senior member of team responsible for the design and implementation of a cyber security operations center.
  • Supported the internal assessment against the NIST Cybersecurity Framework for the entire company, which included both OT & IT.
  • Submitted system findings using the agency's official security reporting tool - Cyber Security Assessment Management (CSAM).
  • EnCase 6.19.2.10 Guidance Software recognized globally as a world leader in Digital Forensics, Cyber Security, and E-Discovery.
  • Maintain strong knowledge of cyber security for computer systems, business processes, and work flows.
  • Worked with cyber analysts on research projects that involve event analysis to determine trends.
  • Assisted the customer training department in the education of staff on the cyber threat.
  • Provide training on Standards and guidelines to the Cyber security and Development teams.
  • Assisted with Cyber threat intrusions by viewing alerts on McAfee SIEM dashboards.
  • Provide intrusion detection and incident response in a 24/7 secured datacenter based on cyber security events.
  • Identified TTPs and signatures used by cyber threat actors and incorporated IOCs into security appliances.

Show More

54 Cyber Jobs

No jobs at selected location

36. SOX

demand arrow
low Demand
Here's how SOX is used in Securities Analyst jobs:
  • Processed security requests and adhered to SOX requirements and documented processes to ensure appropriate authorization is followed for critical system access.
  • Prepared Risk Assessment for SOX application scoping and categorization.
  • Work with internal and external auditors in order to demonstrate compliance with SOX, JSOX, and any other applicable regulations.
  • Performed corporate wide audit and remediation of IBM I-series/AS400 user's in compliance with SOX and HIPAA regulations.
  • Analyze business needs and compliance requirements (SOX) to define and implement security solutions, primarily using.
  • Managed security initiatives and collaborated with Internal Audit to ensure (SAS 70 / SOX) compliance.
  • Advised the Chief Information Officer on planning to prepare for the upcoming SOX-based audit.
  • Oversee the conversion of earlier SOX control processes to the new ones.
  • Audited the project for SOX Compliance by collecting & reviewing the evidences.
  • Conducted EY auditing with information discovery and corrective actions for SOX compliance.
  • Tested and on boarded 24 applications for inclusion in SOX audits.
  • Performed SOX audits for file shares and UNIX servers.
  • Perform quarterly SOX audits and critical server access monitoring.
  • Developed quarterly SOX report for internal audit team.
  • Deploy new SOX control processes to database servers.
  • Earned SAIC and customer recognitions: Horizon Superstar, Team Member of the Month, Super SOX Award, R.O.R.D.
  • Mapped SOC1 reviews to SOX IT controls to identify CUECs and ensure compliance with Target SOX Controls.
  • Worked compliance reports to keeps applications within SOX and ASPR compliance.
  • Participated in creation of SOx documentation and policies.
  • Adhered to Sarbanes Oxley (SOX) auditing requirements consistently.

Show More

1 SOX Jobs

No jobs at selected location

37. Security Awareness

demand arrow
low Demand
Here's how Security Awareness is used in Securities Analyst jobs:
  • Developed and implemented information security awareness program
  • Developed and implemented Information Classification and Security Awareness programs, including designing and implementing an e-Learning security training for all employees.
  • Developed and presented Computer Security Awareness Training guidelines and objectives to hundreds of annual DOJ Security Conference attendees.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Trained and mentored technical support staff and Director and Branch-level training, providing security awareness.
  • Create Security Awareness training material including a video demonstration of an email phishing attack.
  • Created Security Awareness Training, Active Shooter Training and Foreign Travel Briefing PowerPoint Presentations.
  • Designed and implemented Information Security Awareness Training Program for Purdue University.
  • Conducted security awareness training and expected rules of behavior for end-users.
  • Developed internal security awareness testing process using phishing and social engineering.
  • Coordinated regional loss prevention and security awareness programs.
  • Promoted security awareness throughout the corporation.
  • Coordinate information security awareness training for employees, contractors, partners, and other third parties as appropriate.
  • Assist in developing, defining, and directing the information security awareness program.
  • Provide training during new hire Orientation to supports Security Awareness efforts.
  • Managed the online Information Security awareness training for the OPIC agency.
  • Promote security awareness and compliance at all sites.
  • Promote security awareness by coordinating required agency security training for offsite and remote employees.
  • Develop security awareness by providing orientation and assisting end-users with on-going communication.
  • Conduct initial security awareness, safety, and OPSEC training for new employees, consutants, and contractors.

Show More

21 Security Awareness Jobs

No jobs at selected location

38. VPN

demand arrow
low Demand
Here's how VPN is used in Securities Analyst jobs:
  • Verify VPN connected devices are authenticated with Active directory/domain and domain controller.
  • Monitor, manage, and troubleshoot frame-relay, MPLS, NMLI, and NetVPN networks for select State of Georgia agencies.
  • Trusted Agent for VPN accounts and maintains VPN database for active and inactive VPN accounts.
  • Implemented several versions of Checkpoint Firewall, VPN's and DMZ Networks designs and deployments.
  • Implemented and deployed the corporate VPN solution and authentication system for remote employee access.
  • Designed and implemented a VPN Knowledge Base used to support the VPN project.
  • Design customer firewall solutions, security policy, VPN, network design.
  • Created Road Runner (Client to Endpoint) VPN connection for clients.
  • Improved VPN and HR provisioning processes while aligning with security best practices.
  • Earned both JNCIA-IDP and JNCIA-SSL certifications with IDP and VPN technologies.
  • Reset Check Point password, VPN account and locked out accounts.
  • Approved digital certificates and VPN access for employees and customers.
  • Create VPN (virtual private network) user accounts.
  • Designed & implemented VPN connectivity for customer premise equipment to Cisco VPN 3000 series concentrator.
  • Assisted in Enrolling Symantec PKI certificates for VPN and enabling in email encryption.
  • Set up VPN access for Vendors off-site utilizing Sygate.
  • Configure, Maintain, and Support VPN Concentrator.
  • Managed Checkpoint and Cisco firewall appliances Reviewed and approved or denied firewall and VPN requests Performed Security reviews on in house applications
  • Extracted, compiled and analyzed Jabber, Exchange, Citrix, VPN, Spam and ePO stats for monthly metrics reports.
  • Migrated perimeter network exchange (firewalls, VPNs, DMZs, and all associated connections) during datacenter move.

Show More

1 VPN Jobs

No jobs at selected location

39. Mcafee

demand arrow
low Demand
Here's how Mcafee is used in Securities Analyst jobs:
  • Utilize McAfee Vulnerability Management appliance to monitor network threats and asset vulnerabilities.
  • Perform vulnerability scans using McAfee Vulnerability Manager and report on EPA servers.
  • Led the deployment of the new Intel/McAfee based web and email platforms and the Enterprise Random Password Management (ERPM).
  • Worked with McAfee HBSS SME to generate and interpret vital reports on security posture of DOD network.
  • Utilized McAfee Network Security Manager - 6.0.7.5 (McAfee IntruShield) to assist in traffic analysis.
  • Managed Virus checking (McAfee) and monitored Internet Groups for alerts of potential new threats.
  • Provide end-user and help desk support related to account maintenance VIA McAfee Endpoint Encryption.
  • Team lead for Security Monitoring and backup engineer for McAfee ESM SIEM tool.
  • Install the McAfee security management platform (McAfee Total Protection for Endpoint).
  • Project Manager for the McAfee Biometric Encrypted USB drive Enterprise project providing centrally managed encrypted mobile devices in an enterprise environment.
  • Managed McAfee Enterprise Antivirus and AntiSpyware including Rogue System Detection.
  • Pushed company software installs through McAfee ePO.
  • Create and manage HBSS policies and tasks for McAfee Agent, HIPS and Anti-Virus through ePO.
  • Build, implement and deploy End Point Security solutions such as FireEye, FireMon, ForeScout, McAfee ePO, Tanium.
  • Monitor end user web traffic through McAfee Web Reporter Collaborated with different departments to build an approved Application Whitelist.
  • Worked with McAfee ePolicy, Virus Scanner, Solidcore to maintain the expected program security standard.
  • Provide protection of servers and desktops against viruses and malware using McAfee E-policy Orchestrator.
  • Administered the enterprise antivirus solution (McAfee with ePO).
  • Involved with setting up McAfee ePolicy Orchestrator management suite.
  • Lead engineer for McAfee ePO and Antivirus Policies and procedures including vendor collaboration and malware remediation across 42,000+ Systems.

Show More

12 Mcafee Jobs

No jobs at selected location

40. Arcsight

demand arrow
low Demand
Here's how Arcsight is used in Securities Analyst jobs:
  • Developed actionable content using ArcSight Logger to review suspicious security events.
  • Analyzed security logs collected using ArcSight.
  • Develop content for ArcSight like correlation rules, dashboards, reports and filters, Active lists and Session list.
  • Monitor the DART (Detection Analysis Response Team) Console using HP ArcSight.
  • Developed content for DHS SNOC complex and growing ArcSight infrastructure.
  • Create and tune channels, rules and filters in ArcSight.
  • Configured 2000+ devices to ArcSight ESM for monitoring.
  • Correlate security event information through Arcsight.
  • Monitor the network and supporting systems to detect security compromise events including intrusions and virus incidents via Arcsight SIEM tool.
  • Created ArcSight asset modelling, it is used to populate asset properties in Correlation rules and reports.
  • Monitored Wal-Mart network traffic using Arcsight (ESM) Enterprise Security Management console.
  • Develop Flex Connectors for the ArcSight un supported devices and Business apps.
  • Analyze real time network activity utilizing ArcSight and Sourcfire IDS monitoring tools.
  • Monitor Security Alerts in Arcsight.
  • Involved with security-related projects including Arcsight Security Event Correlation, Snort Network IDS, and Safeword 2-factor authentication.
  • Run reports through Arcsight console and other applications for various ISD departments, Create filters within Arcsight for specific security events.
  • Received Arcsight events/traps from the numerous IDS system sensors from the multiple Arcsight channels being monitored.
  • Front line analyst engaged in security events using SIEM Arcsight and Splunk.
  • Utilized Arcsight Console and Logger, Netwitness Investigator, Proofpoint, and BMC Remedy.
  • Audit insider threat detection activities on monitoring tools such as Raytheon Innerview, ePO server, and HP Arcsight.

Show More

8 Arcsight Jobs

No jobs at selected location

41. Fisma

demand arrow
low Demand
Here's how Fisma is used in Securities Analyst jobs:
  • Reviewed CDC security certification policies and procedures to verify they adequately and effectively meant FISMA computer and network security requirements.
  • Verified documentation meets the requirements outlined in the Department of Homeland Security FISMA/NIST templates used for FEMA system authorization.
  • Conducted FISMA complaint security control assessments to ascertain the adequacy of management, operational, technical privacy controls.
  • Entered FISMA compliant tracking information into spreadsheets/database.
  • Validated FISMA requirements to include the Contingency Plan, Contingency Plan Test, Annual Security Control Assessments, etc.
  • Perform reviews and developed security policy plans and operating procedures in compliance with NIST and FISMA mandated policies.
  • Contribute to initiating FISMA metrics such as Annual Testing, POA&M Management, and Program Management.
  • Involved in Security planning, assessments, risk analysis, and maintenance of numerous FISMA systems.
  • Worked in conjunction with NIST SP 800 requirements, FISMA and IRS security requirements.
  • Developed a successful FISMA Tracking System Security Plan (CFACTS).
  • Participated in yearly FISMA annual security review project for multiple clients.
  • Create documentation in accordance to FISMA and NIST guidelines.
  • Ensured that enterprise was in compliance with FISMA standards.
  • Evaluate and document all FISMA controls.
  • Followed FISMA and NIST documentation standards.
  • Managed OMB FISMA Quarterly Reports.
  • Assisted the ISSO with the annual FISMA submittal to OMB.

Show More

16 Fisma Jobs

No jobs at selected location

42. User Access

demand arrow
low Demand
Here's how User Access is used in Securities Analyst jobs:
  • Managed system and network user access utilizing Microsoft User Manager and Server Manager.
  • Provide troubleshooting support for issues regarding user access when interruptions occur.
  • Modified Active Directory accounts for user access for software applications.
  • Performed analysis of Application List to remove any discrepancies including user access rights, roles and role descriptions, employee ID.
  • Review, administer, and reconcile user access application privileges governed by SOX utilizing Hitachi ID Management Suite.
  • Grant user access to approved share folder, application and other resources following corporate policies and procedures.
  • Highlight the user access and privileged user access risks to the organization and providing the remediation plan.
  • Audit all account changes, and annually audit user access against approved Access control forms.
  • Processed requests (SSR's) to add, change or terminate user access.
  • Grant, modify, and terminate user access for both internal and external end users
  • Create, assign, and communicate employee ID user access for Online Banking employees.
  • Maintain and control documentation of all end user access to Information Systems resources.
  • Administered user access requests for all Cedar Rapids network shares in Active Directory.
  • Create testing schedule to validate user access within the hospital and clinics.
  • Validated and analyzed user access for 30+ applications for 3Com WW users.
  • Managed user access in various application environments for AT&T Wireless.
  • Review and Validate the User Access Compliance on a quarterly basis.
  • Participated in user training and resolving of user access control issues.
  • Handled calls on a dedicated hotline for user access issues.
  • Respond to user access issues to ensure productive workflow.

Show More

11 User Access Jobs

No jobs at selected location

43. Sharepoint

demand arrow
low Demand
Here's how Sharepoint is used in Securities Analyst jobs:
  • Maintained Global Background and Substance Abuse SharePoint page and created outreach programs that advertised corporate security.
  • Created documentation standards for processes and procedures, updated documentation and created a SharePoint site.
  • Designed and implemented project reporting practices with SharePoint Services software.
  • Maintain access/permissions; create sites, sub-sites, web pages to adapt existing SharePoint MOS 2007software based on changing needs.
  • Supported day to day operations of enterprise wide systems such as SharePoint and the ESTT systems to facilitate information sharing.
  • Assist in managing content for DHS OEC SharePoint site, including managing document libraries, media updates and distribution lists.
  • Conduct extensive research to locate relevant information using a variety of databases using SharePoint 2010, and MS Excel.
  • Monitored, sorted, and scanned data files that were located on SharePoint sites and hard drives of employees.
  • Utilize and use SharePoint on a daily basis for overall communications between PBGC, SAIC and other Contractors tasks.
  • Managed EAC (SharePoint) website to ensure accurate, current, and easily accessible to internal audiences.
  • Document case findings in Archer and SharePoint and work with additional teams to mitigate incidents that have occurred.
  • Developed and maintained my teams SharePoint site to compile, edit and store all necessary documents.
  • Updated regional SharePoint site and performed administration duties on the local SharePoint site.
  • Utilized SharePoint and PowerPoint, creating training and knowledge sharing documents.
  • Serve as Microsoft SharePoint administrator for the DTRA Regional Engagement Division.
  • Managed POA&M items via the OPIC SharePoint site.
  • Collected and catalogued artifacts in SharePoint.
  • Maintain the Sharepoint portal to ensure the latest templates, forms and DSS communications are organized.
  • Designed and maintained Sharepoint dynamic views to support business needs Role consisted within DARM team.
  • Maintain minutes and post to Sharepoint portal.

Show More

44. Security Standards

demand arrow
low Demand
Here's how Security Standards is used in Securities Analyst jobs:
  • Provided direct training for Service Delivery Managers and Operations staff on Payment Card Industry Data Security Standards.
  • Performed code reviews for security standards and worked with application development teams to fix code vulnerabilities.
  • Developed normalization measurement and methodology to score program adherence against best practice security standards.
  • Utilized 25% of budget to provide recommendations surpassing industrial security standards.
  • Analyzed requirements for baseline security standards codified in Best Practices Guidepost Mapping.
  • Performed risk assessment as per industry security standards.
  • Assisted with implementation of security standards and guidelines.
  • Author database and company level security standards.
  • Defined and updated security standards and checklists.
  • Develop a comprehensive and systematic approach to implementing and meeting all security standards in compliance with FISMA, NIST 800-53 Rev.
  • Implemented NIST and ISO technical controls on Network and Security devices by following the security standards provided by DOD guidelines.
  • Worked with network team in implementing firewalls, network sniffers and email scanning systems as per company security standards.
  • Created and implemented external vendor access controls to assure compliance with AT&T Mobility National Security Standards.
  • Investigate and resolve any security issues found in the infrastructure according to the security standards and procedures.
  • Assist with establishing policies and procedures pertaining to network management, Access Control, and Security standards.
  • Reviewed business applications owned by LOB for compliance to BOA IT Security Standards and best practices.
  • Support and enforce Data Security standards and guidelines, processes and procedures to ensure DLP.
  • Reviewed new products and insured interference with our system meets security standards.
  • Worked on development of enterprise security standards and iReport generation.
  • Conducted interviews with key contacts and SMEs to assess compliance to IT security standards.

Show More

44 Security Standards Jobs

No jobs at selected location

45. Application Security

demand arrow
low Demand
Here's how Application Security is used in Securities Analyst jobs:
  • Developed and maintained application security instructional documentation for day-to-day administrators.
  • Created, implemented and monitored web-based application security residing on server and in a GUI-based web screen processing.
  • Performed Web Application Security /Penetration Testing in accordance with OWASP standards using manual techniques and also automated tools.
  • Subject matter expert in network security, wireless security, application security, and social engineering attacks.
  • Conducted and lead risk/vulnerability assessments and application security internal audits on behalf of agency clients.
  • Developed Risk Assessments for applications used in large-scale networks providing recommendations for improved application security.
  • Assess and design application architectures to provide application security recommendations to business units.
  • Created global security processes to facilitate closure of application security gaps.
  • Developed new processes to improve messaging and web application security.
  • Train in application security penetration testing.
  • Worked on several Application Security Assessment Projects to ensure the development and business processes are compliant with standard Risk Guidelines.
  • Perform web application security testing for each new application wanting to use the central authentication service.
  • Serve as one of the Web Application Security subject matter experts for other SOC teams.
  • Performed manual application security testing on the everyday changes carried out in the application.
  • Developed and delivered training program for application security based on OWASP Top 10.
  • Perform Web Application Security / Penetration Testing in accordance with OWASP.
  • Provide application security and support that reside on UNIX/Linux servers.
  • WOOSH (web application security project) involves identification of security vulnerabilities and recommendations to the vulnerabilities.
  • Provide security consulting to major applications initiatives Participate in internal security QA utilizing application security testing tools.
  • network, host, data and/or application security in support of C&A efforts.

Show More

45 Application Security Jobs

No jobs at selected location

46. Security Events

demand arrow
low Demand
Here's how Security Events is used in Securities Analyst jobs:
  • Determine if security events monitored should be escalated to incidents and follow all applicable incident response and reporting processes and procedures.
  • Assess incoming threat streams to develop accurate conclusions on security events at monitored sites across entire Dominion footprint.
  • Monitored network security events received from customers; took appropriate action based on security policy.
  • Recommend updates to policies and procedures contributing to security events and incidents.
  • Provided triage, response and mitigation assistance when necessary for security events.
  • Investigate, analyze and escalate security events triggered on Security Event Manager.
  • Created filters and correlation rules to analyze security events.
  • Use security tools to determine the nature and scope of security events to differentiate between potential intrusion attempts and false alarms.
  • Provided real-time security monitoring and incident reporting of IT security events on the customer's network and IT infrastructure.
  • Review and analyze security events & vulnerabilities, determine their severity, and author reports detailing the activity.
  • Monitored security events correlated by the Security Incident and Event Manager (SIEM) application.
  • Analyze and respond to security events and incidents from SIEM, SEP and IPS.
  • Provided senior level support to users for security events and questions.
  • Observed and analyzed security events and alerts reported by the SIEM.
  • Prevented security events which saved the company money.
  • Create and respond to tickets for security events.
  • Correlate and react to security events.
  • Developed a strong working knowledge of security events for, Linux, Windows, and application server activity.
  • Add security events to shift log, create and update procedures and documentation on Twiki web server.
  • Researched security events (examples: malware, botnets, network scanning for vulnerabilities, Blue Coat, exploits).

Show More

36 Security Events Jobs

No jobs at selected location

47. POA

demand arrow
low Demand
Here's how POA is used in Securities Analyst jobs:
  • Manage enterprise risk and vulnerability remediation efforts leveraging the Plan of Action & Milestone (POA&M) procedure.
  • Put together Authorization Packages (SSP, POA&M and SAR) for Information systems to the Authorization Officer.
  • Managed POA&M's (Plan of Actions and Milestones) for multiple business systems for Coast Guard.
  • Developed Plan of Action and Milestones (POA&M) resulting from vulnerabilities scans, and penetration tests.
  • Defined security procedures to ensure compliance with the plan of action & milestones (POA&M).
  • Developed Plan of Action and Milestone POA&M document in correcting results from System Test & Evaluation.
  • Meet with system owner and support personnel regularly to discuss POA&M remediation strategies and progress.
  • Develop and update security plan, plan of action and milestone (POA&M).
  • Assisted with the establishment of authorization boundaries and the validation of completed POA&M items.
  • Prepared and reviewed documentation to include SSP, SAP, SAR, POAM Packages.
  • Reviewed and commented on POAM's and RAF's submitted by system owners.
  • Conduct POA&M Validation, RMW Validations, and False Positive Validations.
  • Created DIACAP documentation (ST&E, POA&M, DIP etc) to support various government approvals.
  • Tracked and updated POA&Ms as well as other A&A documents as needed.
  • Analyze system Scans and provide weakness remediation and POA&M management planning.
  • Track, monitor and close POA&Ms based on remediation actions.
  • Created and manages POA&Ms for assigned system in CSAM.
  • Managed POA&Ms and provided continuous monitoring for multiple systems.
  • Documented and updated POA&Ms.
  • Key Deliverables: SSP, RA, SAR, POA&M

Show More

3 POA Jobs

No jobs at selected location

48. RSA

demand arrow
low Demand
Here's how RSA is used in Securities Analyst jobs:
  • Designed, performed, and/or oversaw periodic penetration testing of all systems in order to identify system vulnerabilities.
  • Leveraged impressive versatility as a back-up resource for Secretary, Payroll Coordinator, and Supervisor.
  • Utilized OPATCH utility/Universal installer to install security interim patches and patch sets.
  • Configured and deployed RSA and Quest regarding 2-factor authentication for secure implementation.
  • Analyzed network traffic using the RSA NetWitness and Iron Port security appliances to assist in network investigations and client support.
  • Develop and testing of content for RSA Envision like correlation rules, dashboards, reports and filters, list.
  • Conducted on the job training for new employees and oversaw their development to fully qualified analysts.
  • Implemented and educated users on the use of soft RSA tokens.
  • Support clients, using RSA/Ace Server/ Remote Access administration.
  • Deployed RSA authentication appliances for hard and soft tokens.
  • Created a long-range schedule for replacement of RSA compromised tokens
  • Installed and managed SIEM using RSA Envision.
  • Completed RSA Archer Administration Course.
  • Improved delivery of account administration services including universal naming conventions, ACDs and evaluating procedures among teams and users.
  • Installed multi-factor authentication implementation using RSA SecureID.
  • Worked closely with Financial controllers (Owners for SOX Compliance) to upgrade Virsa 4.0 to GRC 10.1 and define risks.
  • Develop and test UDS Connectors via XML for the RSA Envision un supported devices and Business applications.
  • Categorize and test the messages generated by security and networking devices into the multi-dimensional RSA Envision schema.
  • Develop content for RSA Security Analytics like correlation rules, dashboards, reports and filters.
  • Created and manage the RSA software tokens for Citrix platform.

Show More

49. Hipaa

demand arrow
low Demand
Here's how Hipaa is used in Securities Analyst jobs:
  • Evaluated system architecture including external connections, data flows, vulnerabilities and countermeasures for verification that they adhere to HIPAA/PCI standards.
  • Participated in HIPAA security review engagement.
  • Utilize NIST 800-53, FIPS and industry standard security white papers and SME interpretations for educating HIPAA Steering and WPS Leadership.
  • Focus on a holistic security approach while meeting regulatory requirements such as PCI-DSS, HIPAA, and other regulatory requirements.
  • Design the security framework risk assessment methodology and document the Risk Management practical approach to meeting this HIPAA standard.
  • Served as Information System department's HIPAA Data Security Compliance Officer and successfully passed all bi-annual audits.
  • Prepare a gap analysis with risk assessment in meeting the HIPAA privacy and proposed Security rules.
  • Implemented and Monitor compliance with policies and procedures established by the HIPAA Privacy and Security Rules.
  • Prepare and presented regular reports regarding HIPAA and HITECH compliance to the Board of Directors.
  • Develop and maintain information security policies and procedures, including those related to HIPAA/HITECH compliance.
  • Provide Security Awareness, ISO, and HIPAA also provide the training on the same.
  • Author database and company level security standards using PCI, HIPAA and NIST security frameworks.
  • Assist with NIST 800-4 training and understanding of metrics associated with HIPAA compliance standards.
  • Performed investigations regarding HIPAA violations; discovered and reported all known HIPAA violations.
  • Create role based access lists to define information availability (HIPAA compliance).
  • Led the Application Logging and Monitoring Program to fulfill HIPAA requirements.
  • Developed process and procedures to maintain HIPAA and HiTECH standards.
  • Performed HIPAA Audits, and risk assessments.
  • Review HITRUST and HIPAA policies.
  • Ensured employees handled patient data within the policies of Memorial Hermann as well as within the HIPAA guidelines.

Show More

1 Hipaa Jobs

No jobs at selected location

50. Technical Support

demand arrow
low Demand
Here's how Technical Support is used in Securities Analyst jobs:
  • Provide a broad range of administrative and technical support functions associated with program initiatives.
  • Provided technical support for moderately complex security and risk related issues with Active Directory.
  • Provide technical support for the Barracuda Reputation System.
  • Provided technical support for network accreditation and connectivity.
  • Provided technical support for overall network connectivity.
  • Provide consultation and technical support for Installing, maintaining, updating and deploying security products (hardware and software).
  • Provide technical support to Security Analysts and Customers escalating any issue outside the scope of the SOC to engineering.
  • Provided technical support for the internal Information Protection Commission (IPC) and external IAB efforts.
  • Dispatch system software technical support to various sites with the use of Paradigm Problem Tracking System.
  • Provided Levels 2 or Level 3 technical support and after hours on-call technical support.
  • Provided technical support for a global WBT program externally hosted by EasyI.
  • Respond to telephone calls, e-mails and personnel requests for technical support.
  • Maintain access by providing information, resources, and technical support.
  • Resolved issues and discrepancies and provided technical support to employees.
  • Supervised training of technical support staff and help desk staff.
  • Provided 2nd level technical support for the Web Security Team.
  • Provided technical support and instruction at voting precincts.
  • Provided technical support and guidance to users.
  • Implemented the IT Knowledge Base for the technical support tracking system.
  • Provide technical support for Windows XP and Windows 7 platforms as well as Citrix and VMware environments.

Show More

Securities Analyst Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For A Securities Analyst

Security Procedures

13.6%

Ensure Compliance

11.7%

Vulnerability Assessments

9.4%

Firewall

7.1%

Security Policies

6.4%

Security Audits

5.7%

Information Security

5.4%

Database

5.1%

Risk Assessments

4.1%

Active Directory

3.9%

Incident Response

3.6%

Security Assessment

3.1%

Nist

3.1%

Intrusion Detection

2.9%

Network Security

2.6%

Security Systems

2.6%

Access Control

2.5%

Security Issues

2.4%

Security Incidents

2.4%

PCI

2.3%
Show More

Typical Skill-Sets Required For A Securities Analyst

Rank Skill
1 Security Procedures 8.7%
2 Ensure Compliance 7.5%
3 Vulnerability Assessments 6.0%
4 Firewall 4.6%
5 Security Policies 4.1%
6 Security Audits 3.7%
7 Information Security 3.5%
8 Database 3.3%
9 Risk Assessments 2.6%
10 Active Directory 2.5%
11 Incident Response 2.3%
12 Security Assessment 2.0%
13 Nist 2.0%
14 Intrusion Detection 1.8%
15 Network Security 1.7%
16 Security Systems 1.7%
17 Access Control 1.6%
18 Security Issues 1.6%
19 Security Incidents 1.5%
20 PCI 1.5%
21 Siem 1.5%
22 SQL 1.5%
23 DOD 1.4%
24 IDS 1.4%
25 Ips 1.4%
26 Information Technology 1.4%
27 Assurance 1.4%
28 Security Personnel 1.4%
29 Troubleshoot 1.3%
30 Unix 1.3%
31 Nessus 1.3%
32 Linux 1.3%
33 Internet 1.3%
34 Security Requirements 1.3%
35 Cyber 1.3%
36 SOX 1.2%
37 Security Awareness 1.2%
38 VPN 1.2%
39 Mcafee 1.2%
40 Arcsight 1.0%
41 Fisma 1.0%
42 User Access 1.0%
43 Sharepoint 1.0%
44 Security Standards 0.9%
45 Application Security 0.9%
46 Security Events 0.9%
47 POA 0.9%
48 RSA 0.9%
49 Hipaa 0.9%
50 Technical Support 0.9%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

15,252 Securities Analyst Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.