Recent Searches

You haven't searched anything yet.

14 Cyber Security Analyst Jobs in Harrisburg, PA

SET JOB ALERT
Details...
Movement8
Harrisburg, PA | Full Time
$126k-155k (estimate)
1 Week Ago
Digitek Software, Inc.
Harrisburg, PA | Full Time
$120k-151k (estimate)
10 Months Ago
TMH Solutions
Harrisburg, PA | Contractor
$127k-156k (estimate)
2 Weeks Ago
Agile Global Solutions
Harrisburg, PA | Full Time
$126k-155k (estimate)
3 Weeks Ago
Shineteck Inc
Harrisburg, PA | Full Time
$126k-155k (estimate)
3 Weeks Ago
Goli Technologies LLC
Harrisburg, PA | Contractor | Full Time
$127k-156k (estimate)
2 Weeks Ago
LingaTech
Harrisburg, PA | Contractor
$121k-150k (estimate)
3 Weeks Ago
Dew Softech Inc
Harrisburg, PA | Full Time
$127k-156k (estimate)
3 Weeks Ago
InterSources Inc
Harrisburg, PA | Full Time
$136k-166k (estimate)
2 Weeks Ago
Cygnus Professionals
Harrisburg, PA | Contractor
$126k-155k (estimate)
3 Weeks Ago
HHM Hotels
Harrisburg, PA | Full Time
$83k-104k (estimate)
3 Months Ago
PSECU_Default
Harrisburg, PA | Full Time
$79k-96k (estimate)
2 Months Ago
Cyber Security Analyst
LingaTech Harrisburg, PA
$121k-150k (estimate)
Contractor 3 Weeks Ago
Save

LingaTech is Hiring a Cyber Security Analyst Near Harrisburg, PA

On-Going contract role
Remote / Hybrid role - candidates needed on-site for equipment pickup, badging, meetings and trainings as requested in Harrisburg, PA
** Local candidates only **

Our client seeks a local Cyber Security Analyst whose strength is in firewalls with a minimum of 5 years' experience with at least 2 years in a large-scale enterprise Windows environment. 
Required Qualifications:
  • 5 years experience as a professional cyber-security / firewalls in large-scale Windows environments
  • Possesses proficient knowledge of layer 2 switching and layer 3 routing protocols, encryption protocols, communication protocols. Examples include but not limited to: TLS/SSL, IPsec, SSH, PGP, VLAN, LLDP, LACP, ARP, 802.1x, DNS, AES, etc.
  • Understanding of current threats and trends in information security.
  • Professional oral and written communication skills.
  • Excellent soft skills such as listening, presenting, and negotiating.
Desired Qualifications:
  • Active cyber-security certification from an accredited organization such as ISC2, CISA, CompTIA, EC-Council, ISACA, GSEC, etc.
  • Experience with Firewalls: AlgoSec, Checkpoint, CISCO ASA, SilverPeak, VMWare NSX
  • Experience with scripting languages – PowerShell, Python, etc. 
  • Experience with forensic tools, such as Network security monitoring: FireEye NX, AX, PX Endpoint, Splunk – ES 
  • Experience with Web vulnerability scanning: Tenable.IO, Rapid7 AppSpider 
  • Experience with Encryption: Globalscape Secure FTP, PGP - Nice to have
  • Experience with Penetration testing: Metasploit, Kali Linux, Netsparker, and Wireshark 
  • Experience with Network intrusion detection tools such as Snort, Security Onion, SolarWinds Security Event Manager 
  • Experience with Packet sniffers such as Tcpdump and Windump 
  • Familiarity with SAST and DAST tools such as Veracode, AppSpider and AppScan
Job Responsibilities:
  • Demonstrates good judgment and problem-solving skills. Reacts and adapts to changing circumstances rapidly. Technically proficient and experienced with Windows and Unix/Linux operating systems, enterprise class firewalls, network security, network traffic analysis, incident response, vulnerability analysis, packet analysis, and systems hardening. Possesses proficient knowledge of layer 2 switching and layer 3 routing protocols, encryption protocols, communication protocols. Examples include but not limited to: TLS/SSL, IPsec, SSH, PGP, VLAN, LLDP, LACP, ARP, 802.1x, DNS, AES, etc.
  • Assists in deterring, identifying, monitoring, investigating and analyzing network intrusions. Collects intrusion artifacts, indicators of compromise, correlates artifacts across systems, and gathers other relevant facts to enable mitigation of potential incidents within the enterprise.
  • Receives and analyzes network alerts from various sources within the enterprise. Determines the alert trigger, the severity of the alert, and prioritizes response accordingly. Track and document incidents from initial detection to final resolution.
  • Participates in the containment and neutralization of cyber threats based on the intelligence and indicators of compromise gathered. Assesses damage to services, systems, networks, data and other relevant assets. Participates in the restoration and reconstitution of systems and services. Makes recommendations to prevent the recurrence of cyber incidents and verifies that normal operations have resumed.
  • Manages, monitors, and analyzes several security technologies to include defensive and offensive security solutions on the perimeter and internal networks such as firewalls, intrusion detection/prevention systems (IDS/IPS), data loss prevention, etc.
  • Uses data from Security Information and Event Management (SIEM) and other logging solutions to conduct analysis, identify cyber trends, disseminate relevant findings, and recommend suitable security and/or compensating controls.
  • Participates in the design and implementation of security controls. Grants and revokes access to restricted resources, ensures that end-users are authorized to access requested resources, and participates in periodic system audits/cleanup initiatives.
  • Assists leadership in planning and implementing cybersecurity infrastructure or technology related projects, participates in the installation of equipment, related cabling, and conducts ongoing maintenance/repair of security infrastructure assets as needed.
  • Performs research, evaluates security technologies/services, to drive process improvements, integrate automation, increase efficiency, strengthen service delivery, and improve security posture.
  • Assists in maintaining an accurate and thorough knowledgebase. Creates and revises documentation, procedures, flowcharts, diagrams, etc.
  • Leverages client's incident tracking and ticketing systems to receive tasks from other units, delegate tasks to other units, prioritize daily tasks, document actions taken, and the final resolution for tasks completed.
  • Provides on-call and/or emergency support, including after-hours as needed.
  • Adheres to established service management processes and procedures.
  • Performs all other related duties as assigned.

Job Summary

JOB TYPE

Contractor

SALARY

$121k-150k (estimate)

POST DATE

05/24/2024

EXPIRATION DATE

08/19/2024

LingaTech
Contractor
$115k-138k (estimate)
2 Days Ago
LingaTech
Contractor
$99k-122k (estimate)
2 Days Ago
LingaTech
Contractor
$110k-136k (estimate)
2 Days Ago

The job skills required for Cyber Security Analyst include Cybersecurity, Analysis, Leadership, Network Security, Incident Response, SIEM, etc. Having related job skills and expertise will give you an advantage when applying to be a Cyber Security Analyst. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Cyber Security Analyst. Select any job title you are interested in and start to search job requirements.

For the skill of  Cybersecurity
Defense Information Systems Agency
Full Time
$94k-123k (estimate)
4 Days Ago
For the skill of  Analysis
New Story Schools
Full Time
$79k-94k (estimate)
3 Days Ago
For the skill of  Leadership
JLE Industries
Full Time
$47k-62k (estimate)
3 Days Ago
Show more

The following is the career advancement route for Cyber Security Analyst positions, which can be used as a reference in future career path planning. As a Cyber Security Analyst, it can be promoted into senior positions as a Cyber Security Architect IV that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Cyber Security Analyst. You can explore the career advancement for a Cyber Security Analyst below and select your interested title to get hiring information.

Goli Technologies LLC
Contractor | Full Time
$127k-156k (estimate)
2 Weeks Ago

If you are interested in becoming a Cyber Security Analyst, you need to understand the job requirements and the detailed related responsibilities. Of course, a good educational background and an applicable major will also help in job hunting. Below are some tips on how to become a Cyber Security Analyst for your reference.

Step 1: Understand the job description and responsibilities of an Accountant.

Quotes from people on Cyber Security Analyst job description and responsibilities

A cyber security analyst needs to have a broad range of skills to be able to handle malware and security breaches.

01/24/2022: Newport News, VA

Cyber security analysts need to think like a hacker to understand the hacking process.

02/10/2022: Sioux Falls, SD

As cyber attacks and threats become more frequent, the demand for cyber security analysts continue to grow.

03/15/2022: Montgomery, AL

Cyber security analysts help to protect an organization by employing a range of technologies and processes to prevent, detect and manage cyber threats.

01/19/2022: Burlington, VT

The program also emphasizes the business aspects of cloud security such as cloud uptime, uptime guarantee, availability, fault tolerance, failover policy, and how cloud security strengthens the business case for cloud adoption.

03/24/2022: Los Angeles, CA

Step 2: Knowing the best tips for becoming an Accountant can help you explore the needs of the position and prepare for the job-related knowledge well ahead of time.

Career tips from people on Cyber Security Analyst jobs

Secure systems and ensure business continuity.

01/09/2022: Cleveland, OH

Address legal and regulatory requirements.

01/12/2022: Asheville, NC

General Data Protection Regulation (GDPR).

03/12/2022: Fort Wayne, IN

Aftermath of WannaCry Ransomware.

03/26/2022: Springfield, IL

Threat Response Engineering Consultant.

03/02/2022: Riverside, CA

Step 3: View the best colleges and universities for Cyber Security Analyst.

Butler University
Carroll College
Cooper Union
High Point University
Princeton University
Providence College
Show more