", "identifier": { "@type": "PropertyValue", "name": "The Hertz Corporation", "value": "37813" }, "datePosted" : "2018-12-31", "employmentType" : "FULL_TIME", "hiringOrganization" : { "@type" : "Organization", "name" : "The Hertz Corporation" }, "jobLocation" : { "@type" : "Place", "address" : { "@type" : "PostalAddress", "addressLocality" : "Everglades City", "addressRegion" : "FL", "postalCode" : "33929", "addressCountry": "US" } } } }

Senior, IT Security Analyst

General Responsibilities
Job Purpose
The IT Security Analyst provides both technical leadership and business acumen to effectively support enterprise security solutions and principles. The Information Security Analyst is responsible for day-to-day interactions with monitoring of both internal and external security threats and risks, provide consultation to business partners regarding Information Security best practices and technical matters, provide in-depth incident analysis and remediation, continuous monitoring and resolution of security events, and assist with development and adherence to Information Security policies, processes, and procedures.
Skill and Knowledge Requirements of Sr. Security Analyst:
+ Monitors open source information feeds and threat actor activity to identify activity levels and indicators for cyber threats and cyber-attacks.
+ Mines open data sources to identify potential cyber threats, targets of interest, and timeframes for attack.
+ Current with industry related security compliance programs, such as SOX and PCI
+ Analyzes and researches known indicators, correlates events, identifies malicious activity, and discovers new sources to provide early warning related to a variety of cyber threats.
+ Strong knowledge of tools used for network security (Data Loss Prevention, Network Intrusion Prevention Systems, Host Intrusion Prevention Systems, Anti-Virus, Firewalls, etc.)
+ Experience with the Cyber Kill Chain framework.
+ Experience with the Network Security Monitoring methodologies.
+ Experience in Ethical Hacking or Red Team.
+ Experience with vulnerability scanners such as: Qualys, Nessus, Metasploit, Rapid7.
+ Experience with network analysis tools such as Wireshark and TCP Dump.
+ Experience with all-source intelligence analysis researching data from multiple intelligence sources and databases and analyzing findings.
+ Previous operational experience in a CSIRT, CIRT, SOC, or CERT.
+ Ability to Lead Security Incident response investigations
+ Ability to Lead Malware incidents and reviews
+ Capable of working under pressure in a continually changing fast paced environment
+ Good customer service skills
+ Ability to work in a global environment.
Mandatory Requirements
Professional Experience
+ Minimum 8 years of IT experience
+ Minimum 8 years of Information Security experience
+ Familiarity with UNIX and Windows operating systems, Active Directory, and SAML
+ Familiarity with security compliance programs such as PCI and Sarbanes Oxley
+ Knowledge of VPN, IPS/IDS, routing and switching technologies
+ Knowledge of TCP/IP networking
+ Experience with conducting Phishing/Malware/APT analysis
+ Experience with two or more programming languages (Python, Powershell, XML, etc.)
+ Experience using external vulnerability monitoring services and responding to incidents
+ Demonstrated problem solving and critical thinking skills
+ Ability to multitask in a fast-paced environment and to adjust to changing priorities
EEO Statement
Hertz is an equal opportunity affirmative action employer and administers all personnel practices without regard to race, color, religion, sex, age, national origin, sexual orientation, gender identity or expression, marital status or domestic partnership status, disability, protected veteran status or military status, genetic information, or any other category protected under applicable law. Hertz is committed to taking affirmative steps to promote the employment and advancement of minorities, women, persons with disabilities and protected veterans.
Job ID _145932_
\# Positions _1_
Category _Information Technology_
Division _OKC - Technology Center_
Position Type _Regular Full Time_

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.