Network Security System Analyst jobs in Tennessee

Network Security System Analyst ensures the security of an organization's networks and systems. Performs network security assessments and risk analysis, and makes recommendations to improve network security. Being a Network Security System Analyst investigates security incidents and breaches. Recommends and deploys appropriate security products and solutions for various network platforms. Additionally, Network Security System Analyst configures and maintains firewalls and other network security tools and software. May conduct security trainings with employees. Typically requires a bachelor's degree. Typically reports to a manager or head of a unit/department. The Network Security System Analyst occasionally directed in several aspects of the work. Gaining exposure to some of the complex tasks within the job function. To be a Network Security System Analyst typically requires 2-4 years of related experience. (Copyright 2024 Salary.com)

G
System Security Analyst
  • GEM Technology
  • Ridge, TN CONTRACTOR,FULL_TIME
  • Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.

    • Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications.
    • Apply security policies to meet security objectives of the system.
    • Apply service-oriented security architecture principles to meet organization's confidentiality, integrity, and availability requirements.
    • Ensure all systems security operations and maintenance activities are properly documented and updated as necessary.
    • Perform security reviews of Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA), identify gaps in architecture, and develop an ICS/SCADA security risk management plan.
    • Ensure that the application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment.
    • Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.
    • Implement specific cybersecurity countermeasures for systems and/or applications.
    • Integrate automated capabilities for updating or patching system software where practical and develop processes and procedures for manual updating and patching of system software based on current and projected patch timeline requirements for the operational environment of the system.
    • Perform cybersecurity testing of developed applications and/or systems.
    • Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
    • Plan and recommend modifications or adjustments based on exercise results or system environment.
    • Properly document all systems security implementation, operations, and maintenance activities and update as necessary.
    • Provide cybersecurity guidance to leadership.
    • Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).
    • Verify and update security documentation reflecting the application/system security design features.
    • Assess the effectiveness of security controls.
    • Assess all the configuration management (change configuration/release management) processes.
    • Develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements.
    • Analyze and report organizational security posture trends.
    • Analyze and report system security posture trends.
    • Assess adequate access controls based on principles of least privilege and need-to-know.
    • Ensure the execution of disaster recovery and continuity of operations.
    • Implement security measures to resolve vulnerabilities, mitigate risks, and recommend security changes to system or system components as needed.
    • Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation.
    • Ensure the integration and implementation of Cross-Domain Solutions (CDS) in a secure environment.
    • Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance for the appropriate senior leader or authorized representative.
    • Assess and monitor cybersecurity related to system implementation and testing practices.
    • Verify minimum security requirements are in place for all applications.
    • Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities.
    • Work with stakeholders to resolve computer security incidents and vulnerability compliance.
    • Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans.

    Knowledge, Skillset, and Abilities (KSAs):

    • Knowledge of computer networking concepts and protocols, and network security methodologies.
    • Knowledge of Industrial Control System/Supervisory Control and Data Acquisition System threats, vulnerabilities, security controls and methods.
    • Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
    • Knowledge of cybersecurity and privacy principles.
    • Knowledge of cyber threats and vulnerabilities.
    • Knowledge of specific operational impacts of cybersecurity lapses.
    • Knowledge of encryption algorithms
    • Knowledge of cryptography and cryptographic key management concepts
    • Knowledge of installation, integration, and optimization of system components.
    • Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
    • Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, nonrepudiation).
    • Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
    • Knowledge of security system design tools, methods, and techniques.
    • Knowledge of software engineering.
    • Knowledge of the systems engineering process.
    • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
    • Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
    • Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
    • Knowledge of Personally Identifiable Information (PII) data security standards.
    • Knowledge of information technology (IT) risk management policies, requirements, and procedures.
    • Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.
    • Knowledge of configuration management techniques.
    • Knowledge of security management.
    • Knowledge of developing and applying user credential management system.
    • Knowledge of implementing enterprise key escrow systems to support data-at-rest encryption.
    • Knowledge of an organization's information classification program and procedures for information compromise.
    • Knowledge of countermeasure design for identified security risks.
    • Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs.
    • Knowledge of how to use network analysis tools to identify vulnerabilities.
    • Skill in designing the integration of hardware and software solutions.
    • Skill in developing and applying security system access controls.
    • Skill in evaluating the adequacy of security designs.
    • Skill in assessing security systems designs.
    • Skill in assessing security controls based on cybersecurity principles and tenets. (e.g., CIS CSC, NIST SP 800-53, Cybersecurity Framework, etc.).
    • Skill in recognizing vulnerabilities in security systems. (e.g., vulnerability and compliance scanning).
    • Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, nonrepudiation)

    Specific Requirements:

    Senior level experience in Security Information and Event Management (SIEM); Senior level experience as an Information System Security Manager (ISSM) and Security Control Assessments

    Education and Related Experience for Each Level:

    • Level 5 - PhD in a technical field and 2 to 5 years of related experience or Master’s degree in a technical field and 5 to 10 years of related experience or Bachelor’s degree in a technical field and 10 to 15 years of related experience or Associates degree in a technical field and 15 to 20 years of related experience. Requires demonstrated in depth knowledge and skills in a technical specialty. Recognized as an expert in their field.
    • Level 6 - PhD in a technical field and 5 or more years of related experience or Master’s degree in a technical field and 10 or more years of related experience or Bachelor’s degree in a technical field and 15 or more years of related experience or Associates degree in a technical field and 20 or more years of related experience. Requires demonstrated in-depth knowledge and skills in a technical specialty. This level should be limited to a small population. Recognized as an expert in their field.

    Clearance Requirement:

    • Desired Dept. of Energy Q, required Dept. of Energy L.

    Miscellaneous:

    • Must be a U.S. citizen, at this time we are not accepting applications from Visa or Green Card holders.

    Job Types: Full-time, Contract

    Pay: $130,000.00 - $140,000.00 per year

    Compensation package:

    • Yearly pay

    Schedule:

    • 8 hour shift
    • Monday to Friday

    Application Question(s):

    • Do you currently possess or have the ability to obtain a Dept. of Energy L or Q clearance?

    Education:

    • Associate (Required)

    Experience:

    • Cybersecurity: 2 years (Required)
    • Vulnerability management: 2 years (Required)
    • Threat detection & response: 2 years (Required)
    • designing the integration of hardware & software solutions: 2 years (Required)
    • developing & applying security system access controls: 2 years (Required)
    • assessing security systems designs: 2 years (Required)
    • Cybersecurity principles (CIS CSC, NIST SP 800-53): 2 years (Required)
    • recognizing vulnerabilities in security systems: 2 years (Required)
    • SIEM / ISSM: 2 years (Required)
    • IT Risk Management: 2 years (Required)

    Ability to Commute:

    • Oak Ridge, TN 37830 (Required)

    Ability to Relocate:

    • Oak Ridge, TN 37830: Relocate before starting work (Required)

    Work Location: Hybrid remote in Oak Ridge, TN 37830

  • 25 Days Ago

Y
Network Manager
  • Y-12 National Security Complex
  • Ridge, TN FULL_TIME
  • Location: Oak Ridge, TennesseeJob Title: IT Enterprise Secure Network Program Manager Career Level From: Senior AssociateCareer Level To: Senior Specialist Organization: Y-12 IT Infrastructure (511304...
  • 11 Days Ago

Y
System Development
  • Y-12 National Security Complex
  • Ridge, TN FULL_TIME
  • Location:Oak Ridge, TN Job Title: System Development Career Level From: Associate Career Level To: Senior Specialist Organization: Mission Applications (50992241) Job Specialty: System Development Wha...
  • 1 Month Ago

D
Network Analyst
  • Datawize Technologies LLC
  • Chattanooga, TN CONTRACTOR
  • Job Title: Network Analyst I Job Location: Chattanooga, TN 37402 Job Type: Contract Job Duration: 12 Month Job Description Summary The Network Analyst I assist with configuring, deploying, and maintai...
  • 9 Days Ago

C
Network Analyst
  • Conch Technologies, Inc
  • Memphis, TN PART_TIME
  • Hi,Greetings from Conch Technologies IncPosition: Reliability Network AnalystLocation: Memphis,TN (onsite from day 1 )Duration:12 monthsIdeal Candidate ProfileExperience in end-to-end application and ...
  • 22 Days Ago

H
System Analyst
  • HOUSE HASSON HDWE CO INC
  • Knoxville, TN FULL_TIME
  • Job Summary: The role of the System Analyst is to fully understand integrations with House-Hasson systems and support internal and external customers with these systems interfaces. Requires some perio...
  • 6 Days Ago

B
Network Security Analyst III
  • Battelle Memorial Institute
  • Chantilly, VA
  • Battelle delivers when others cant. We conduct research and development, manage national laboratories, design and manufa...
  • 6/11/2024 12:00:00 AM

U
Information Security Analyst 1, 2 or 3
  • University of Connecticut
  • Hartford, CT
  • CEN, through The University of Connecticut (UConn) Information Technology Services (ITS), has an amazing opportunity for...
  • 6/11/2024 12:00:00 AM

U
Telecommunications Analyst
  • UniFirst
  • Wilmington, MA
  • This is a hybrid position with an on-site requirement 2x per week in Wilmington, MA. The Telecommunication/Security Anal...
  • 6/11/2024 12:00:00 AM

I
Network Security Analyst
  • Insight Global
  • Rock Hill, SC
  • Title: OT/Network Security Specialist Required Experience: 5+ years in IT Security and Network Security, & additional 3+...
  • 6/10/2024 12:00:00 AM

S
Cybersecurity Operations Director
  • Steampunk
  • Mc Lean, VA
  • Overview: Are you a leader? Energetic? Know what an ISSO does? Ever worked as part of a program thats Agile? Know DevSec...
  • 6/10/2024 12:00:00 AM

U
Sr. Analyst, Information Security
  • U.S. Renal Care, Inc.
  • Plano, TX
  • Mission Diversity Inspiration Growth OUR MISSION At U.S. Renal Care, we're changing the lives of everyone living with ki...
  • 6/9/2024 12:00:00 AM

S
Network Security Analyst
  • System Soft Technologies
  • Seeking a Analyst - 100% onsite in Austin, TX A analyst ensures that information systems and computer networks are secur...
  • 6/8/2024 12:00:00 AM

M
Cyber Security Analyst
  • Movement8
  • Harrisburg, PA
  • Cyber Security Analyst / Network Security Analyst This is an ongoing contract working on a hybrid basis in Harrisburg, P...
  • 6/8/2024 12:00:00 AM

Tennessee borders eight other states: Kentucky and Virginia to the north; North Carolina to the east; Georgia, Alabama, and Mississippi on the south; Arkansas and Missouri on the Mississippi River to the west. Tennessee is tied with Missouri as the state bordering the most other states. The state is trisected by the Tennessee River. The highest point in the state is Clingmans Dome at 6,643 feet (2,025 m). Clingmans Dome, which lies on Tennessee's eastern border, is the highest point on the Appalachian Trail, and is the third highest peak in the United States east of the Mississippi River. The ...
Source: Wikipedia (as of 04/11/2019). Read more from Wikipedia
Income Estimation for Network Security System Analyst jobs
$82,608 to $108,987