• Mcpc
  • Cairo, OH, USA
  • Nov 09, 2020
[Information Technology]

Job Description

MCPc is a global data protection company dedicated to helpingourclients minimize business disruption, ensure operational continuity and, ultimately,achieveSecurityCertaintySM.

We achieve this through acomprehensive, holistic, and integrated suite of servicesstructured asAdvisory Services: Global Consulting & Alliance Partnerships, IT Asset Management,and Talent Solutions, andTechnical Solutions:Asset Procurement, Configuration &Distribution,Security Risk Management, andIT Asset Disposition.

With headquarters in theCleveland, OHweve meticulously built a global network of partners that provide our services nationally and internationally in over 80 countries.

  • SkyParkis our Secure Technology Logistics Center
  • Link59 is our main Security Operations Center (SOC) in Midtown.
  • Our newest facility in Old Brooklyn is our Secure Technology Asset Disposition facility
  • Additional sales, configuration, security operations and asset disposition operationslocated inGrand Rapids, MI and Erie, PA

MCPc and our associates are dedicated to the communities in which we serve and actively participate on numerous nonprofit boards and tirelessly donate our time tomanycharitableorganizations.

MCPc is proud to be an equal opportunity employer, focused on recruiting and retaining top talent at every level. We employ premier associates in the industry who deliver value and support to our growing clientbase.We believe in training and career development for all associates. As you may imagine, as a trusted global data protection and endpoint solutions company, weholdourselvesto the highest level of security.As such, all new employees must undergo our standard background check and drug screen test for pre-employment purposes

The Cybersecurity Analyst is a key member of the cybersecurity team responsible for maintaining the security posture of the enterprise network.

This position will be focused on many aspects of information security with emphasis on data loss prevention, SIEM development, next-gen endpoint protection, network edge protection, managed services and incident response. This position will take primary responsibility of incident response activities. This person will help in the development of incident response, security engineering and cyber training processes and procedures. This person will work on related cyber security projects, including conceptual design, solution development, deployment, technical support and documentation. Serves as the primary technical resource for supporting security applications. This person will work closely with the CISO & CIO to communicate and prioritize the remediation of identified vulnerabilities, as well as track the status of these activities. This person will assist to mature features in existing security technologies and/or assist in the review of vendor products to fill security gaps. This person will assist with internal security monitoring, alerting, incident management and other business as usual security tasks.

Strong conceptual knowledge of networking concepts and terminology, proven analytical and troubleshooting abilities, and a high level of self-motivation and organizational skills are required. Must demonstrate the ability to effectively prioritize and execute tasks in a high-pressure environment. Strong written and oral communication skills and exceptional customer service skills are required.Ability to keep up with the threat landscape and have security solution and deployment experience. Microsoft Windows experience required, Linux experience is a plus. Log aggregation and SIEM experience is preferred. Network security experience required. Experience working in a team-oriented, collaborative environment are also preferred.

  • Bachelors degree in an information technology field required with minimum 4 years of technical and hands on experience in cyber/information security.
  • Security+ or equivalent technical certification
  • Desired Technical skills:
    • Access Control (Authorization, Authentication, Accountability)
    • Encryption (data at rest and transit)
    • Vulnerability and Remediation
    • Next Gen Firewalls and Anitvirus
    • SIEM
    • Endpoint Detection and Response
    • Application Whitelisting
    • Password Management
    • IPS/IDS
    • Malware Prevention
    • Threat Intelligence
    • Mobile Security
    • Web, Application and Cloud Security
    • Wireless Security
    • Social Engineering Tactics

Associated topics: chief program officer, cpo, manage, manager, management, monitor, product manager, project manager, relationship manager, task