NikSoft

  • Hardware & Software Asset Analyst

    Job Locations US-NC-Morrisville
    Posted Date 1 month ago(1 month ago)
    ID
    2018-1492
    # of Openings
    1
    Category
    Information Technology
  • Overview

    NikSoft Systems Corporation is a recognized Information Technology solutions provider. Founded in 1998 and based in Reston, Virginia, NikSoft is a CMMI Level 3 Certified company with an established reputation for excellence and on-time delivery with a consistently high customer satisfaction rating from its Federal Government and private consulting contracts.

     

    USPS is looking for an individual who will join the security team of a major nationwide organization, with thousands of sites, to continually improve its complex multi-protocol nationwide network.  A network application security engineer who understands how the Hardware / Software Asset Management program of a large enterprise should work is needed to support the team. The ideal candidate for this job will be an experienced information security practitioner who is goal-oriented and strives to exceed expectations. 

    Responsibilities

    • Candidate will assess network threats such as computer viruses, exploits, and malicious attacks
    • Determine true threats, false positives and network system misconfigurations and provide solutions in a timely manner
    • Serve as a Subject Matter Expert in the analysis of tool outputs and providing recommendations for improving the overall security posture of the client
    • Conduct heavy analysis of asset data to aggregate multiple data inputs and put assets into context to identify vulnerabilities and potential gaps

    Qualifications

    • Requires Bachelor’s Degree in a related field, plus 5 years of relevant work experience
    • Strong Splunk experience in creating effective dashboards, hunting cyber threats using event correlation, and acting on machine intelligence to remediate vulnerabilities and risk to the enterprise
    • Netflow analytics for compliance and threat hunting
    • Work with suppliers of data (e.g., WonMug, Cisco ISE, StealthWatch) to maximize efficiency and accuracy of data feeds into Splunk. Advise suppliers of potential features in their tools that could be activated to improve security (e.g., TrustSec and Security Group Tagging in ISE)
    • Ability to map application components to identify security problems and provide solutions
    • Analyze data imports into Splunk for accuracy and completeness; compare data from the various network security tools to identify overlaps and search for gaps.
    • Conduct initial triage assessments of findings from network security tools
    • Engages with other internal and external forces to get and share information to improve processes and security posture
    • Troubleshoots application connectivity and performance through log analysis and network captures, etc.
    • Familiarity with Splunk, BMC Atrium, ServiceNow, and enterprise network infrastructure
    • Experience with ForeScout CounterACT, Cisco ISE, MobileIron, and Tanium
    • Project planning experience
    • Excellent writing skills
    • Microsoft office suite of applications
    • CISSP, Certified Ethical Hacker (C|EH), SFCP, GCIA, ISSEP, ISSMP, GCIH, GCFA, CSLC, CISM, CCNA, CCNP

    ** US Citizenship status and Active DoD Secret Clearance (preferred but not required), must successfully complete the government's security process (required). **

     

    BENEFITS:

     

    NikSoft’s competitive benefits program includes comprehensive medical and dental care, matching 401K, paid time off, flexible spending accounts, disability coverage, and other benefits that help provide financial protection for you and your family.

     

    NikSoft Systems Corp is fully committed to the concept and practice of equal opportunity and affirmative action in all aspects of employment.  NikSoft is an EOE M/F/Disability/Veteran employer. For more information about our other openings, please visit www.niksoft.com

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed