Post Job Free
Sign in

Cyber Security Analyst

Company:
A. Duie Pyle, Inc.
Location:
West Chester, PA
Posted:
April 21, 2024
Apply

Description:

A family-owned business since 1924, A. Duie Pyle provides a range of integrated transportation and distribution solutions throughout the Northeast. Supported by our vast network of Less-Than-Truckload (LTL) service centers, warehouse facilities, and dedicated locations, we have the ability to offer flexible and seamless integrated solutions tailored to our customer’s needs.

Simply put, when it comes to integrated supply chain solutions, Pyle People Deliver. Our promise is to provide outstanding service as it remains to be our first and foremost mission.

Position Summary:

We are seeking a driven Cybersecurity Analyst with a strong foundation in systems administration to join our dynamic security team. The ideal candidate will possess expertise in Microsoft Active Directory and Red Hat Linux environments, along with familiarity with CIS benchmarks and controls. Your responsibilities will encompass the protection of our critical systems and data through threat detection, incident response, vulnerability management, and security policy implementation.

The responsibilities of the position include, but are not limited to:

Incident Response: Analyze and respond promptly to security alerts, potential breaches, and incidents, conducting root cause analysis and driving remediation strategies

Threat Detection and Analysis: Proactively identify and assess emerging threats, utilizing SIEM, intrusion detection/prevention tools, log analysis, and applying your understanding of CIS benchmarks

Vulnerability Assessment and Management: Conduct regular vulnerability scans, prioritize risks, and implement remediation plans informed by CIS benchmarks and controls

Active Directory Management: Work closely with the Systems team to harden Active Directory infrastructure, managing user accounts, permissions, group policies, and security configurations, aligning with CIS recommendations

Security Policy and Compliance: Collaborate in the development and implementation of security policies, standards, and procedures, aligning with industry best practices, regulatory frameworks, and CIS controls.

Collaboration and Reporting: Work cross-functionally with IT teams, providing technical guidance and expertise on security-related matters. Prepare clear incident reports and security metrics

To be qualified for this position, you must possess the following:

Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field

Minimum of 3-5 years of experience in Cybersecurity and/or Systems Administration

Relevant cybersecurity certifications (CISSP, Security+, CEH, etc.)

Scripting or programming skills (Python, PowerShell, etc.)

Experience with cloud security (AWS, Azure, GCP)

Demonstrated proficiency in Microsoft Active Directory administration, including user/group management, group policy creation, authentication, and security best practices

In-depth knowledge of Red Hat Linux administration, security hardening, and troubleshooting

Hands-on experience with security tools such as SIEM, IPS/IDS, firewalls, vulnerability scanners, and endpoint protection solutions

Familiarity with common attack vectors, malware analysis techniques, cyber threat intelligence frameworks, and CIS benchmarks and controls.

Competence with core networking technologies, including TCP/IP routing, Ethernet switching, Wireless LAN technologies, SD-WAN concepts

Strong analytical, problem-solving, and incident response skills

Excellent written and verbal communication, ability to work in a fast-paced team environment

Physical Requirements:

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Sitting at desk for long periods of time

Viewing PC monitor and using keyboard for long periods of time

Using telephone headset / handset

We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or expression, pregnancy, age, national origin, disability status, genetic information, protected veteran status, or any other characteristic protected by law.

Apply