Job Summary
We are looking for customer-centric individuals who can provide white-glove treatment to clients that possess outstanding communication skills and are proactive in connecting the dots between their day-to-day job and the bigger organizational goals and initiatives. Demonstration of attention to detail, empathy, proactive creation and maintenance of documentation are essential for this role.
As a Security Analyst and Engineer specializing in Identity and Access Management (IAM), you will play a critical role in safeguarding our digital assets by ensuring secure and efficient management of user identities and privileges. You will be responsible for maintaining the health and integrity of our identity systems, identifying and remediating security risks related to access, and contributing to the overall security posture of the organization.
Location : Edison, New Jersey
Job Type : Solutions
Salary : $50 - 64 per hour
Work Hours : 9 am to 5 pm
Education : Bachelor's degree
Responsibilities
- Identity & Account Governance
Proactively identify and remediate expired or overdue passwords within our identity systems.
Perform regular Active Directory health checks and cleanup activities, including identifying and disabling stale user and computer accounts.Audit and optimize service accounts, ensuring they are appropriately permissioned, scoped to the correct machines, and adhere to password policies.Review and ensure Multi-Factor Authentication (MFA), such as Duo, is properly implemented for critical accounts.Prevent cross-contamination of environments by ensuring appropriate usage of accounts (e.g., development accounts not used in production).Access & Privilege ManagementIdentify and remediate local administrative privileges on workstations and servers, implementing least privilege principles.
Address duplicated credentials within Azure Active Directory to enhance security.Security Monitoring & AnalysisContribute to the development and refinement of security monitoring and detection capabilities within Splunk and other platforms.
Assist in the investigation and response to security alerts from various sources (e.g., Threat Command, Canary, ExtraHop, CrowdStrike Identity).Develop, implement, and refine security monitoring use cases in Splunk and other SIEM tools to enhance threat detection capabilities.Monitor and respond to security alerts from various detection systems (e.g., EDR, network anomaly detection, identity protection).Create and maintain response templates for identified security incidents and "red flags".Vulnerability ManagementAssist in identifying and addressing outdated applications that pose security risks.
Research and analyze threat intelligence to identify applicable vulnerabilities and emerging attack vectors.Utilize tools like BloodHound and PingCastle to identify and remediate Active Directory security weaknesses.Identify and manage the remediation of outdated or vulnerable applications across the enterprise.Qualifications
Strong written and verbal communication skills.Undergraduate degree (BS) in a technology-related field, e.g., computer science, EMIS, systems engineering, electrical engineering.Self-started with exceptional follow-through and time-management skills.1-3 years of relevant Information Security Experience (4+ years is a plus).Experience with On-Premise and AWS hosting environments.Understanding of security principles and network communication models and corresponding protocols.Familiar with ServiceNow and system-of-record / workforce management tool.Alert management experience.Accountable for conducting phishing analysis, web proxies, endpoint detection and response, database monitoring.Accountable for conducting security analysis or audits.Possess high-level knowledge of assessment of Active Directory Security Group lifecycle management.Experience in conducting industry and / or third-party threat intelligence for integration into our client's environment.Network operational knowledge and experience is required.Demonstrated ability to create information security runbooks, knowledge management, and other process documentation; in support of daily, weekly, monthly, and quarterly reporting cadences.Ability to adapt to the use of new tools and approaches to address continuously emerging information security threats.Security skills and tools : Carbon Black, Imperva, Varonis, Tripwire, Forescout, Symantec CASB, SecureMail, Symantec WebPulse, VMRay, Symantec Web Security Service.Desired Security Certificates : Security+ (CompTIA), GIAC Security Essentials (GSEC), Certified Ethical Hacker (CEH), or other related Information Security certificates.Desired Skills & Experience – ITIL-based training, experience, or certifications on SIEM are a plus.Network firewall knowledge is a plus.Familiar with Oracle Databases is a plus.Equal Opportunity Employer : Race, Color, Religion, Sex, Sexual Orientation, Gender Identity, National Origin, Age, Genetic Information, Disability, Protected Veteran Status, or any other legally protected group status.
At Randstad Digital, we welcome people of all abilities and want to ensure that our hiring and interview process meets the needs of all applicants. If you require a reasonable accommodation to make your application or interview experience a great one, please contact HRsupport@randstadusa.com.
Pay offered to a successful candidate will be based on several factors including the candidate's education, work experience, work location, specific job duties, certifications, etc. Randstad Digital offers a comprehensive benefits package, including medical, prescription, dental, vision, AD&D, life insurance offerings, short-term disability, and a 401(k) plan (all benefits are based on eligibility).
This posting is open for thirty (30) days.
J-18808-Ljbffr