Job Description
Position: Cybersecruity Analyst (1487)
Location: Onsite - San Antonio, TX - LOCAL CANDIDATES ONLY
**NO 3rd PARTIES or C2C CONSULTANTS** W2 ONLY APPLICANTS
Company Overview
Bridgewater Consulting Group, Inc. is a full-service management consulting company dedicated to serving clients in the Utilities industry. We pride ourselves on delivering dynamic solutions through a team of highly experienced consultants and robust technology.
Position Summary
The Cyber Security Analyst will help plan and carry out security measures to protect our Clients’ information systems. Tasks include but are not limited to the following areas: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communications and Network Security, Identify and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security.
Tasks & Responsibilities
· Serves as an internal information security consultant to the organization.
· Lead the development and implementation of security policies and procedures
· Initiates, facilitates and promotes activities to create information security awareness within the organization.
· Performs information security risk assessments and serves as an internal expert for information security related issues.
· Reviews all system-related security plans throughout the organization's corporate network.
· Monitors compliance with information security policies and procedures, referring problems to the appropriate department manager or business area.
· Supports the security incident response process.
· Provides input in selection of system software & hardware, with emphasis on security and compliance requirements.
· Provides incident and problem resolution.
· Supports development of security deliverables for enhancements to production systems and new development.
· Implements ongoing improvements to security configurations and operating procedures.
Required Education, Knowledge & Experience
· Bachelor’s Degree in Business Administration, Information Systems, Information Technology, Information Technology Security, Computer Science, Management Information Systems OR Information Security experience will be considered as a substitute for degree. Additionally, member must possess at least one active certification from the required certifications listing below.
· Strong knowledge of signature implementation impact for viruses, malware, and cyber attacks
· Significant experience with malware analysis concepts and methodologies including countermeasure/mitigation design of identified security risks
· In depth knowledge of information technology security principles, methods and key concepts in security management (vulnerability management, patch management, incident response)
· Knowledge of vulnerability information dissemination sources (alerts, advisories, bulletins)
· Demonstrated skill in assessing security controls based on cybersecurity principles and frameworks and experience preserving evidence integrity according to standard operating procedures or industry best practices
· Demonstrated understanding of collecting data from a variety of cyber defense resources and recognizing and categorizing various types of vulnerabilities and associated attacks
· Demonstrated experience using security event correlation tools (SIEM)
· Strong ability to conduct vulnerability scans, recognize vulnerabilities in information systems and apply techniques for detecting host and network-based intrusions using various detection technologies
· Ability to interpret information collected by network tools and accurately and completely source all data used in intelligence, assessment and or planning products
· Ability to design incident response for cybersecurity incidents not covered by existing plans or procedures
REQUIRED – Certifications: Candidate MUST possess at least ONE of the below certifications, others may be substituted depending on experience
· CASP+ CE – CompTia Advanced Security Practitioner – Continuing Education
· CCNP-Security – Cisco Certified Network Professional - Security
· CISA – Certified Information Systems Auditor
· GCIH – GIAC Certified Incident Handler
· CISSP (or Associate) – Certified Information System Security Professional
Preferred Qualifications
· Master’s Degree, Information Systems, Information Technology, Information Technology Security, Computer Science, Management Information Systems OR Information Security
· Previous experience in information technology or security (System Administration or Help Desk)
· Previous experience in at a utility company in various IT/OT roles
· Strong communications skills, both written and oral
· Organized, responsive and highly thorough problem solver
Job Types: Full-time, Contract
Pay: Up to $64.00 per hour
Expected hours: 40 per week
Benefits:
• 401(k)
• Dental insurance
• Health insurance
• Vision insurance
Education:
• Bachelor's (Required)
License/Certification:
• CCNP Security (Required)
• CompTIA A+ (Required)
• GCIH (Required)
• CISSP-ISSAP (Required)
Work Location: In person