Home  Post Resume Quick IT Job Search  Advanced IT Job Search 
Skip Navigation LinksHome » Job Details
Verity Recruiting
  Company Profile
Verity Recruiting is committed to helping you. Whether you are a candidate looking for that challenging position or an Employer looking for that right person for you, we can help.

Verity Recruiting was formed by senior recruiters with multiple disciplines. Using their 20 years of experience, we can help you staff positions in Finance/Accounting, Sales/Marketing, Banking/Mortgage, Technical and Engineering.

  Job Details 

Information Security Administrator : Dallas, TX

Posted On:  11/10/2020 2:53:09 AM

Information Security Administrator

No. of vacancies:  1
Qualifications:  Bachelor Degree
Essential Skills: 
Not specified
Minimum Total Experience:  3
Job Tenure:  No Preference/Any
Salary Offered:  DOE
Job Location:  Dallas TX United States

  Job Description

Bachelor's Degree from an accredited college or university in a related field, or equivalent combination of education and experience
Three (3) to five (5) years of experience in the related field in a large corporation or consulting environment; or equivalent combination of education and experience
Three (3) to five (5) years working knowledge, production support, and configuration experience of relevant systems applications required
Ability to present ideas in user-friendly/non-technical language
Must posses a collaborative/team oriented work approach
Must have strong oral and written skills to effectively communicate ideas and processes
Excellent partnering, negotiating and communication skills
Ability to be flexible within a fast-moving work environment and juggle multiple priorities simultaneously
Strong experience deploying, upgrading and managing security tools such as intrusion prevention, antivirus, web filtering, email gateways, log aggregation, and file integrity, and DLP
Experience with the following technologies a plus:
Rapid7, SourceFire, Tripwire, McAfee SIEM, McAfee web gateway, email gateways, McAfee ePolicy Orchestrator, and Data Leakage Protection
Experience in designing secure network architectures
Experience in identity and access management principles
Experience with directory services technologies
Experience with security vulnerability scanning and penetration testing including assessment, evaluation, and priority assignment using risk-based criteria.
Experience with application security, web app scanners and/or firewalls, penetration testing techniques
Strong process and procedure ownership experience for system vulnerabilities and audits
Experience with log aggregation and SIEM tools, including advanced correlation rules
Experience with file integrity monitoring tools
Experience with anti-virus technologies and malware analysis
Solid working experience and knowledge of Windows and UNIX/Linux operating systems

  Contact Information
Reference Name (If Any): 

Terms and Conditions | Privacy Policy | FAQ | Contact Us | Why?? | Link to us