[Close] 

Info tech spec 3 , network

Company Name:
State of Minnesota
INFO TECH SPEC 3 , Network$ 24.00-$ 39.45 hourly, $ 50,112-$ 82,372 annually
Date Posted: 03/21/2014
Closing Date: 04/11/2014
Working Title: Information Security Analyst
Hiring Agency: Office of MN.IT Services
Division/Bureau: MN.IT Central
Location: St. Paul
Who May Apply: Open to all qualified job seekers
Posting Number: 14MNIT000084
Employment Conditions: Permanent, Full-time
Work Shift: Day Shift
Days of Work: Monday-Friday
Travel Required: no
Job Grouping: Information Technology
Classified Status: Classified
What''s Great About This Job:
Innovation Opportunity Work that Matters
Join the 2,000+ professionals who are bringing strategic vision to state government as part of Minnesota''s newly-consolidated information technology agency. Work for MN.IT Services and be part of a cutting-edge organization that is emerging as a national leader in government IT. Our culture promotes collaboration, demands continuous improvement and encourages innovation in IT delivery. Be a part of something bigger than yourself, something to be inspired by; come to work for MN.IT Services.
Job Description: This vacancy announcement is for a Limited, Full-Time position; this position is anticipated to be a 2 year appointment.
As an Information Security Analyst, your primary job responsibilities include:
-Collaborate with county technical teams to configure, install, test and implement checkpoint intrusion detection blades and tune for false positives and known configurations
-Provide support in response to trouble tickets queues, where immediate response is required to resolve customer reported network problems. The candidate must be capable of coordinating multiple open issues and interfacing with customers at all levels
-Configuring, troubleshooting and maintaining Checkpoint Intrusion Detection (IDS) and Intrusion Prevention Services (IPS). Must be able to detect security policy violations, infections, information leakage, configuration errors and unauthorized clients and servers
-Deploying and providing ongoing support for Checkpoint IDS
-Perform second level security monitoring support and assist security analyst with validating security events
-Serve as a technical subject matter resource for security incident management, mainly with the intrusion detection tools
Minimum Qualifications: The following knowledge, skills, ability, and experience are minimum requirements for this position. To be considered, your resume must clearly demonstrate all of the following:
- At least 3 years of professional level information technology work experience;
a Bachelor''s degree in Computer Science or closely-related field may be substituted for 1 year of professional work experience
-1 or 2 years of experience with an intrusion detection system (ex: Checkpoint, Sourcefire, McAffee, Palo Alto, TippingPoint, Snort)
-Understanding and experiencing of network protocols including switches, routers and routing technologies, including understanding of command line syntax.
-Strong understanding of vlans. Experience configuring and troubleshooting IPsec vpn tunnels.
-Familiar with packet capture tools like TCP Dump and FW Monitor using Wireshark
-Understanding and experience with Doman Name Service (DNS), Dynamic Host Configuration Protocol (DHCP), Radius and Network Address Translation (NAT)
-Possess strong knowledge of technologies used for enterprise security (Virtual Private Network (VPN), Firewalls, Intrusion Detection/Prevention, and Anti-Virus)
-Deliver succinct and fact-based communications, both verbally and in writing
PRE-EMPLOYMENT SCREEN
Successful candidate must pass past-employer reference checks and a criminal history verification
It is the policy of the MN.IT Services that all employees submit to a background investigation prior to employment. The background check may consist of the following components:
SEMA4 Records Check
Criminal History Check
Employment Reference Check
Social Security and Address Verification
Education Verification
Preferred Qualifications: -Experience with Checkpoint IDP blades configuring and tuning
-Bachelor''s degree in Computer Science or related field
-Checkpoint and Cisco Security certifications
-Load balancing experience, including experience with F5
-Experience configuring and troubleshooting Checkpoint and Cisco ASA firewalls
Selection Process: The selection process is a resume-based, skill-matching process. Resumes of all applicants to this posting will be evaluated against the Minimum Qualifications stated above.
How to Apply: Most State selection processes utilize a resume-based screening process. You will be contacted by agency staff if your background best matches the selection criteria on this job posting. To apply for this position, click the APPLY box found at the bottom of this job announcement. For additional information about the State?s selection process, go to .
Contact for More Information: Jenny Hickey, jennifer. .us.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.