Sorry, this job is no longer accepting applications. See below for more jobs that match what you’re looking for!

Operations Manager/Infrastructure Analyst

Expired Job

Robert Half Technology Laurel , MD 20707

Posted 3 months ago

SENIOR INFRASTRUCTURE ANALYST, IS OPERATIONS

Robert Half Technology has an immediate opening for a full-time Senior Infrastructure Analyst to join our team in the greater Laurel, MD location!

SUMMARY OF POSITION: This position is responsible for playing a leadership role in supporting and maintaining the company's infrastructure and software systems. The Senior Analyst demonstrates an expertise in PC and server hardware, network application software, core processing, and PC/Server-based applications.

The ideal candidate will have a Help Desk/Service Desk Management background coupled with a Network/Applications monitoring background!

RESPONSIBLITIES:

1.Coordinate the daily work of the IS Operations area to include helping to prioritize tasks and determine work assignments. Also work closely with other IS areas and user departments to coordinate stable rollout of new hardware, software programs and releases. Contribute to performance evaluations for the IS Operations staff.

2.Provide direction and guidance on problem resolution to the IS Operations team. Includes overseeing the support of system problems and the answering of user questions relative to application, database, network, servers and endpoint issues.

3.Ensure that helpdesk tickets are being resolved in accordance with the appropriate ITS Service Level Agreement. Acts as primary liaison and escalation point on all infrastructure related incidents.

4.Oversee implementation of initiatives approved by the ITS Change Management Committee. Performs application installs, production updates, and system upgrades in conjunction with other teams across the organization.

5.Administer maintenance phase of System Lifecycle including obtaining maintenance requests, transforming requests into changes, designing, and implementing changes.

6.Manage enterprise-wide software updates using LANDesk Management Suite.

7.Coordinate and provides cross training and development opportunities for IS Operations staff to develop their skills and knowledge.

8.Review open and closed issues to identify improvements in workflow, process and/or infrastructure to reduce reoccurring issues. Validates changes coming into the environment to ensure standards are met and consistent practices are employed

QUALIFICATIONS:

Bachelor's degree plus 5 years related professional experience (without degree minimum 7 years is required) as outlined below:

  • A desired candidate for Senior Analyst, Infrastructure has one or more of the following Certifications. Comp TIA A+, MDCST, MCTS for Windows Server, MCITP: Windows 7 Enterprise Desktop Support Technician, Network +.

  • Must be able to enter data, sort and extract information from data base systems through query development.

  • Must possess expertise in current version of Microsoft Access, Excel, Outlook, and Word (certification is a plus).

  • Must possess a minimum of 2 years experience in a LAN environment, preferably with Windows Server 2008/2012 and Windows 7 in an Active Directory environment.

  • Must possess knowledge and demonstrate proficiency in PC support and configuration, specifically with Windows 7 in an Active Directory network environment.

  • NICE TO HAVE:

Experience with SolarWinds highly desired

For immediate consideration, please e-mail your resume directly to Ted Keigler at and/or call him directly at .

Job Requirements

Audit - Information Systems, Database Monitoring

Skills:
Analyst, Change Management, Database, Desktop Support, Development, Excel, Hardware, Help Desk, LAN, Lifecycle, Manager, Management, Microsoft Access, Outlook, PC, Technician, Windows, Windows 7
Permanent
Full Time


See if you are a match!

See how well your resume matches up to this job - upload your resume now.

Find your dream job anywhere
with the LiveCareer app.
Download the
LiveCareer app and find
your dream job anywhere
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Security Operations Center Lead

Applylogic Consulting

Posted Yesterday

VIEW JOBS 11/18/2018 12:00:00 AM 2019-02-16T00:00 <strong>ApplyLogic</strong> is a fast-growing Veteran-Owned consulting firm, headquartered in Dunn Loring, VA. Our people are our greatest asset and our company culture is grounded on that belief. We offer challenging and interesting work in a friendly and supportive environment. We deliver best-in-class technical expertise to the Federal Government market through IT professional service contracts. <br /> <br /> We offer a competitive salary with a robust Fortune 500 type benefits package: employee assistance, employee adoption, 401K with match, medical, dental, vision, life, short-term and long-term disability, 15 paid time days off, 10 holidays, unlimited web-based training and up to $5K towards continuing education and/or professional development and more!<br />  <br /> Founded in 2004, ApplyLogic is a Veteran Owned Small Business, ISO9001:2015 certified with over $7M annual revenues and 35 employees. Our growth has been recognized in the Washington Technology Fast 50 and the INC. 5000. We have an immediate <strong>Security Operations Center Lead</strong> position available in <strong>Laurel, MD</strong>.<br /> <br /> <strong>Job Description and Responsibilities:</strong><br /> <br /> The Se<em>curity Operations Center Lead </em>will will report to the SOC Director and Deputy Directory and will possess in-depth knowledge on network, endpoint, threat intelligence, forensics and malware reverse engineering, as well as the functioning of specific applications or underlying IT infrastructure; SOC SOP development and maintenance; Develop customer and leadership presentations; thorough experience of incident management, root cause analysis; oversee  security assessment and incident response protocols; establish and maintain metrics that help provide a high level of productivity, supportability, and operational readiness while also participating in project planning activities; <div style="margin: 0px; padding: 0px;"> </div> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Lead the development of incident response plans, workflows, and SOPs in a 24/7 SOC</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Develop and maintain the SOC personnel shift schedules</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Provide technical guidance to the SOC team</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Develop and administer SOC SOPs/processes and review their application to ensure that SOC’s controls, policies, and procedures are operating effectively</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Provide management oversight for the identification, triage and response of events or incidents of apparent security breaches</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Produce and review aggregated performance metrics</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Manage and increase the effectiveness and efficiency of the SOC, through improvements to each function as well as coordination and communication between support and business functions</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Play a significant role in long-term SOC strategy and planning, including initiatives geared toward operational excellence</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Verify deployment and maintenance of security sensors and tools</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Monitor security sensors and review logs to identify intrusions</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Verify scripting/programming language to extract, de-obfuscate, or otherwise manipulate malware related data</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Think critically and creatively while analyzing security events, network traffic, and logs to engineer new detection methods</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Work directly with TI Security and SOC leadership on cyber threat intelligence analysts to convert intelligence into useful detection</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Collaborate with incident response team to rapidly build detection rules as needed</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Identify incident root cause and take proactive mitigation steps</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Perform lessons learned activities</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Mentor and provide training to SOC analysts and run brown bag training sessions</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Develop and maintain vulnerabilities and track resolution reports</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Develop and present threat intel reports</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Develop and implement detection use cases</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Develop and implement IDS signatures</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Assist with incident response efforts</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Create and brief customer reports</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Participate in on-call rotation for after-hours security and/or engineering issues</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Perform customer security assessments</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Develop and run table top exercises</li> </ul> <div style="margin: 0px; padding: 0px;"> </div> <strong>Requirements:</strong> <div> </div> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Fuse locally derived and externally sourced cyber threat intelligence into signatures, detection techniques, and analytics intended to detect and track the advanced threat</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Strong understanding of root causes of malware infections and proactive mitigation</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Strong understanding of lateral movement and footholds</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Strong understanding of data exfiltration techniques. Demonstrated ability in critical thinking, problem solving, and analytics</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Enjoy analyzing patterns looking for outliers</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Have real world experience analyzing complex attacks and understand TTPs of threat actors</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Define relationships between seemingly unrelated events through deductive reasoning</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Experience in network/host based intrusion analysis, malware analysis, forensics, and cyber threat intel</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Knowledge of advanced threat actors and complex attacks</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Possess excellent writing skills and the ability to communicate to technical and executive level staff</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Knowledge and experience with Splunk and other cyber tools</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Prior supervisory or technical team lead experience</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Track record of strong leadership</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Expert knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS)</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Deep technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as well as superior knowledge of technical operations process and procedures</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Knowledge of encryption, key management and cryptology</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Experience with the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800-35, and the Federal Information Security Modernization Act (FISMA) operating standards and applicable guidelines</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Practical knowledge of performing threat modelling, risk analysis, root cause analysis, risk identification, and risk mitigation</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Experience planning and implementing secure networking practices such as: application segmentation, network segmentation, NAC and other access control testing/validation, updating access control SOPs</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Ability to configure and develop an enterprise SIEM solution including signature tuning, development of correlation rules, reports, and alarms</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Experience with a variety of web application protocols, web services (components including JavaScript, XML, JSON), scripting capabilities (Power shell, Python) software development frameworks, operating systems, and networking technologies. Understanding of various web application frameworks such as J2EE, ASP.NET.</li> </ul>    <div><strong>Education and Certifications</strong></div> <ul> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;">Bachelor’s Degree and 14 years of experience</li> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;">Advanced training on anomaly detection and threat intelligence</li> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;">Preferred certifications <ul> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;"><span style="font-family: "Calibri",sans-serif; font-size: 11pt; mso-fareast-font-family: "Times New Roman"; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><font color="#000000">SANS SEC503</font></span></li> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;"><span style="font-family: "Calibri",sans-serif; font-size: 11pt; mso-fareast-font-family: "Times New Roman"; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><font color="#000000">SANS SEC504</font></span></li> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;"><span style="font-family: "Calibri",sans-serif; font-size: 11pt; mso-fareast-font-family: "Times New Roman"; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><font color="#000000">SANS SEC561</font></span></li> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;"><span style="font-family: "Calibri",sans-serif; font-size: 11pt; mso-fareast-font-family: "Times New Roman"; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><font color="#000000">SANS FOR610</font></span></li> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;"><span style="font-family: "Calibri",sans-serif; font-size: 11pt; mso-fareast-font-family: "Times New Roman"; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><font color="#000000">CCNA Cyber Ops</font></span></li> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;"><span style="font-family: "Calibri",sans-serif; font-size: 11pt; mso-fareast-font-family: "Times New Roman"; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><font color="#000000">Offensive Security Certified Professional (OSCP)</font></span></li> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;"><span style="font-family: "Calibri",sans-serif; font-size: 11pt; mso-fareast-font-family: "Times New Roman"; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><font color="#000000">Offensive Security Exploitation Expert (OSEE)</font></span></li> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;"><span style="font-family: "Calibri",sans-serif; font-size: 11pt; mso-fareast-font-family: "Times New Roman"; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><font color="#000000">Certified Expert Penetration Tester (CEPT)</font></span></li> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;"><span style="font-family: "Calibri",sans-serif; font-size: 11pt; mso-fareast-font-family: "Times New Roman"; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><font color="#000000">Certified Reverse Engineering Analyst (CREA)</font></span></li> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;"><span style="font-family: "Calibri",sans-serif; font-size: 11pt; mso-fareast-font-family: "Times New Roman"; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><font color="#000000">Certified Computer Forensics Examiner (CCFE)</font></span></li> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;"><span style="font-family: "Calibri",sans-serif; font-size: 11pt; mso-fareast-font-family: "Times New Roman"; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><font color="#000000">Splunk Certified User or Power User/Splunk Certified Admin</font></span></li> </ul> </li> </ul>  <br /> <strong>Clearance:</strong> <ul> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;">U.S. Citizenship</li> <li style="margin: 0px; padding: 0px;" style="padding: 0; margin: 0;">Public Trust, or must be able to obtain a Public Trust clearance</li> </ul> Applylogic Consulting Laurel MD

Operations Manager/Infrastructure Analyst

Expired Job

Robert Half Technology