Position OverviewType: Full-TimeLocation: Huntsville, ALTravel: NoneClearance: Active Secret ClearanceWork Authorization: U.S. Citizenship required
Summary/ObjectiveFive Stones Research Corporation (5SRC) is seeking energetic candidates to join our established and growing Huntsville-headquartered family.
Essential Functions
The Analyst probes the safety and effectiveness of computer systems and their related security components.Generates a detailed report that outlines the effectiveness of the system, explains any security issues, and suggests changes and improvements.Inspects and evaluates financial and information systems, management procedures and security controls.Evaluates the efficiency, effectiveness, and compliance of operation processes with corporate security policies and related government regulations.Develops and administers risk-focused exams for IT systems.Reviews or interviews personnel to establish security risks and complications.Executes and properly documents the audit process on a variety of computing environments and computer applications.Assess the exposures resulting from ineffective or missing control practices.Accurately interprets audit results against defined criteria.Weighs the relevancy, accuracy, and perspective of conclusions against audit evidence.Develops rigorous best practice recommendations to improve security on all levels.Works with management to ensure security recommendations comply with company procedure.Collaborate with departments to improve security compliance, manage risk, and bolster effectiveness.Reasonable Accommodations
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Required Education and Experience
Bachelors degree in Computer Science, Cyber Security, or a related fieldFive (5) years technical experienceExperience with Red Hat Enterprise LinuxExperience with UNIXExperience with IDS/IPS, penetration and vulnerability testingExperience with DLP, anti-virus and anti-malware TCP/IP, computer networking, routing and switchingExperience with firewall and intrusion detection/prevention protocolsExperience with Windows operating systemsExperience with network protocols and packet analysis toolsExperience with C, C++, C#, Java or PHP programming languagesExperience with Cloud computingExperience with SaaS modelsExperience with Security Information and Event Management (SIEM)Preferred Education and Experience
Three (3) to six (6) years of IT Security auditing experienceCertification (Need one technical and one CND Auditor): One Technical Level II or III: GIAC Security Essentials Certification (GSEC), CompTIA Security+ Certification (Security+), Security Certified Network Professional (SCNP), Systems Security Certified Practitioner (SSCP), Certified Information Systems Auditor (CISA), GIAC Information Security Expert (GSE), Security Certified Network Architect (SCNA), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP)One CND Auditor: Certified Ethical Hacker (CEH), GIAC Systems and Network Auditor (GSNA), Certified Information Systems Auditor (CISA)Professional user of MS Office 365 Suite (i.e. Outlook, Word, Excel, and PowerPoint)What we offer
401(k) MatchingDental InsuranceCompany EventsEmployee Health ClinicEmployee Recognition ProgramsHealth InsuranceLife InsurancePaid Time OffParental LeavePerformance IncentivesStudent Loan Repayment ProgramTuition ReimbursementVision InsuranceAll qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
QualificationsEducationPreferredBachelors or better.
ExperiencePreferred3-6 years: Three (3) to six (6) years of IT Security auditing experience.5 years: Five (5) years technical experience.Licenses and CertificationsPreferredCisco Cert Network AssocCompTIA Security +CompTIA CySA+Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information. 41 CFR 60-1.35(c)