CLIN 24 Data Security Analyst Intermediate

$99.93 / Per Hour

Data Security Analyst Intermediate on GSA STARS II Small Business IDIQ under general supervision, performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Interfaces with user community to understand their security needs and implements procedures to accommodate them. Ensures that user community understands and adheres to necessary procedures to maintain security. Conducts accurate evaluation of the level of security required. Provides management with status reports. Frequently reports to a Data Security Administration Manager.

SKU: CLIN024 Categories: , Tags: , ,

Data Security Analyst Intermediate on GSA STARS II Small Business IDIQ ensure that information stored on computers or networks is not disclosed to unwanted parties or inadvertently modified and may establish and maintain data security systems. If the data is compromised, security analysts repair the damage and take measures to close the security gap that enabled the data to be compromised. Intermediate data security analysts usually work under the supervision of an IT manager. Data security analysts work with enterprise personnel and user community to ensure they are taught data security protocols and put in place mechanisms that will ensure they adhere to these protocols. They play vital roles in maintaining the security and integrity of enterprise data. Knowledgeable about information security needs within the organization and work across departments to identify and correct defects in business security systems. Have degrees in cyber security, computer science or any other related field. Proficient in database programming languages such as ORACLE, SQL, Postgre-SQL, Transact-SQL, SYBASE, MySQL, Microsoft SQL Server, SQL Server Integration Services (SSIS); and other relevant computer programming languages such as MySQL, jQuery, Oracle, Java Script, Angular, CSS, HTML 5, Apache, Node.js, Beans, Postgre, Python, C, C++, and so on. Expert and experienced in IT infrastructure, IT security, information security policies and procedures, data analysis, security testing and auditing, cybersecurity, security intrusion detection, security risk management, security maintenance, and so on. Analyze information security hardware and software infrastructure, as well as security system records, security tools, and data. Facilitate communications up, down, and across all levels of the organization. Create, modify, and update intrusion detection systems (IDS) and undertake SIEM management. Frequently reports to Data Security Administration Manager. Design and implement IT security systems to protect the organization’s computer networks from cyber attacks. Monitor computer networks for security problems, install security software and document all security problems or breaches. Install safety measures, run programs, and upgrade systems to enhance system security. Analyze IT security needs and provide objective advice on securing them, relying on the feedback gotten from other end users to further improve security systems.

Brand

Cloud Computing Technologies

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.