Remember, if you do disable or delete cookies, you may not have access to the full functionality of our website.
This cookie is automatically generated by applications based on the PHP language. This cookie is a general purpose identifier used to maintain user session variables.
_ga, _gcl_au, _gid
Universal Analytics (Google)
These cookies are used to collect information about how visitors use our website. We use the information to compile reports and to help us improve the website. The cookies collect information in an anonymous form, including the number of visitors to the website and blog, where visitors have come to the website from and the pages they visited.
BizoID, bcookie, lang, UserMatchHistory, lidc
These are browser ID cookies dropped on our site by LinkedIn. They allow us to track visitor behavior on the LinkedIn campaigns, together with the interactions on our web pages including time spent on the site, how far users scroll down and where they go after this site.
This cookie is set by Marketo. This allows a website to track visitor behavior on the sites on which the cookie is installed and to link a visitor to the recipient of an email marketing campaign, to measure campaign effectiveness. Tracking is performed anonymously until a user identifies himself by submitting a form.
Used in conjunction with the Twitter social plugins in order to allow to help Twitter improve and understand how people use its services, including Twitter buttons and widgets, and Twitter Ads.
Are you someone who enjoys working with next generation technology, interacting with best in class global teams, and working with the largest digital transformations in the world? This opportunity will combine them all while offering a competitive salary and accelerated career growth opportunities.
Join Netcracker Technology to work for a forward-looking software company, offering mission-critical solutions to service providers around the globe. Our comprehensive portfolio of software solutions and professional services enables large-scale digital transformations, unlocking the opportunities of the cloud, analytics, virtualization and 5G mobile networks. With an unbroken service delivery track record of more than 25 years, our unique combination of technology, people and expertise helps companies transform their networks and enable better experiences for their customers.
As an Information Security Analysts to be based out of our downtown Cincinnati office. This role will require you to continually stay adapt to be a step ahead of cyber-attacks. Staying up to date on the latest methods, would be cyber-attackers are using to infiltrate computer systems and on IT security. The role also involves plans to restore proper IT functioning after any major incident. Analysts continually test the steps within the enterprise systems recovery plans. This team will be part of a 24/7 operation and shift work will be involved. At times, may require to be on call outside of normal business hours.
Role and Responsibilities:
Monitoring logs from various systems, looking for security breaches indicated by abnormal patterns, direct warning alerts or unusual down times.
Run the Access Management process for provisioning and de-provisioning access to the protected enclave.
Perform assessments of systems and networks within the enclave and identify where those systems/networks deviate from acceptable configurations, enclave policy, or local policy.
Conduct passive evaluations (compliance audits) and active evaluations (penetration tests and/or vulnerability assessments).
Monitor their organization’s networks for security breaches and investigate a violation when one occurs
Install and use software, such as firewalls and data encryption programs, to protect sensitive information
Prepare reports that document security breaches and the extent of the damage caused by the breaches
Research the latest information technology (IT) security trends
Help plan and carry out an organization’s way of handling security
Develop security standards and best practices for their organization
Recommend security enhancements to management or senior IT staff
Help computer users when they need to install or learn about new security products and procedures
Experience & Requirements:
1-2 years of experience working with Information Security, specifically with SIEM products at a corporate environment.
Advanced Degree with concentration in Information Security or Cyber Security (preferred)
Security + Certification (preferred)
Bachelor’s Degree in Computer Science or other Technical Engineering discipline, with a concentration in Information Security or Cyber Security.
Apply for this job
Please submit a detailed CV and fill out all the fields in the form.
We help you focus on the most important step you'll take. Your next one.
Take your strategy, your operations, and your business forward today.