back Back to Jobs

Security Threat Analyst (Engineer)- (IT) Information Technology

Location: New York City, NY, United States
Job # 10352368
We are searching for an experienced, threat analyst. As a threat analyst, you will use your technical experience and inquisitive nature, and the resources to profile new and emerging threats to clients Network and Security landscape. You will be analyzing and determining the scope of vulnerabilities in software, and determining how our clients will best defend themselves against these threats. You will be working both individually, and with other analysts, on both long-term projects and rapid response under tight deadlines.
 
The security analyst will monitor third party security related websites, forums, and mailing lists for information regarding vulnerabilities and exploits. The security analyst will verify the vulnerabilities; correlate and collate the information; and develop, edit, and deliver security reports to management. The analyst will on occasion replicate reported vulnerabilities in a lab environment and where appropriate develop proof of concept and/or exploit tools against these vulnerabilities.
 
REQUIREMENTS
  • Knowledge of current Cybersecurity technologies and practices and their relationship to Identity and Access Management. 
  • Awareness of multiple authentication techniques
  • Design and implementation knowledge of IAM protocols and architecture (SSO, SAML, OAuth, Federation, etc)
  • Experience with multi factor authentication platforms
  • Fundamental understanding of identity vs. authentication vs. access control elements and how they work together
  • An understanding of Public Key Infrastructure (PKI) concepts and technologies including asymmetric and symmetric cryptography.
  • Microsoft Windows Active Directory
  • Strong oral and written communication skills
  • BA/BS in Information Systems, Computer Science or related field and 4+ years’ experience in IT Security 
PREFERRED QUALIFICATIONS
  • Knowledge of current Cybersecurity technologies and practices and their relationship to IdAM 
  • An understanding of PKI concepts and technologies including asymmetric and symmetric cryptography. 
  • General understanding of supporting technologies and protocols including Linux administration, Hypertext Transfer Protocol (HTTP), XML, LDAP, SQL, and XACML
  • Strong understanding of IdAM in Windows environments
  • Some familiarity of iOS and Android ecosystems to support the credentialing of mobile devices.

 
 
this job portal is powered by CATS