We are looking for an individual with a strong interest in information security who is looking for a position with extreme opportunities for growth. The primary responsibilities for this position are monitoring and responding to security events, performing security assessments and supporting the PCI compliance and security initiatives at Cvent. This position is an excellent growth opportunity for an individual wishing to expand their information security skills set in a fast-paced environment. This is a hands-on position that involves day to day analysis of security events, researching the impact of events, determining the level of risk to the organization and responding appropriately. The Security Analyst will leverage state of the art tools to include SIEM, web application firewalls, intrusion detection systems, vulnerability and compliance management software and various monitoring infrastructures to accomplish these goals. The ideal candidate will have 1-4 years of experience, basic knowledge of information security principles, understanding of networks, operating systems, web applications and a level of familiarity with common techniques used by attackers and malicious code. A thirst for knowledge and the desire to continuously stay abreast of new developments in the dynamic security space is a must.
Monitor and report on network, system and application logs for security events
Perform vulnerability assessments and reporting. Liaison with other departments within the company to ensure any new vulnerabilities are remediated in a timely manner
Evaluate security products to ensure compatibility with information security success criteria
Perform routine audits to ensure compliance with security policy
At least 1-4 years of industry experience. Entry-level candidates with a strong, security-related educational background may also be considered
Understanding of TCP/IP, basic networking concepts and services such as DNS, SMTP
Basic understanding of HTTP and typical web application architectures
Vulnerability assessment tools such as nessus, nmap, metasploit, paros, burp
Understanding malware such as worms, virii, trojans
Some level of programming/scripting: Perl, python, ruby, java, shell scripting, etc
Excellent problem solving and analytical skills, outstanding oral and written communication skills
Self-motivation and the ability to work under minimal supervision are a must
4 year degree or equivalent experience; desired majors include Information Systems, Information Security, Computer Science, Computer Engineering, etc.