Security Analyst
Listed on 2026-02-28
-
IT/Tech
Cybersecurity, IT Consultant
Overview
vTech can help you avoid the daunting task of writing and posting job offers, shifting through resumes and laboring through the lengthy interview process. Our Staffing solutions will allow you to elude those tasks and place topnotch, high-caliber professionals in the position you need to fill.
We use our expertise, knowledge, and global resources to deliver top-quality candidates and tailor our IT and Non-IT recruitment services to your needs. This allows us to deliver the required results in a timely manner that meets your schedule at a substantially reduced cost.
We pride ourselves for having one of the fastest growth
rate and also the lowest
turnover rates in the industry just 2.5 percent annually
. We focus on the training and retaining qualified professionals with high personal and work ethics. With the help of our extensive database of internal candidates and CATS applicants tracking system, we can provide quality resources within the limited time frame.
We have also successfully placed hundreds of candidates in the areas related to Information Technology, Engineering, professional, Scientific & Clinical, etc. for both our commercial and government clients.
Recruitment Process- Source: A recruiter sources candidates from various sources; the search starts from our proprietary database. Using advanced sourcing methods like social media, professional networking media, internal, and 3rd party job boards, we identify qualified candidates.
- Validate: A recruiter validates the candidates’ experience and skill sets against our client’s position.
- Initial Screening: Based on the position and the client’s work culture, the recruiter uses initial screening questions to determine the most suitable candidates.
- Submit: the recruiter will submit to the technical team qualified candidates who have passed the initial screening.
- Technical Screening: The technical team then prepares a matrix of the particular requirements and required experience for the position and using a list of questions and the results, re-validates the candidates’ technical skills.
- Background Check: Administrative personnel will provide a detailed background check, as required, per client agreement.
- On board: On successfully completing the above steps, the candidates are welcomed on board and assisted to ensure a smooth integration at the client’s location.
• Develops and manages security for more than one IT functional area (e.g., data, systems, network and/or Web) across the enterprise.
• Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines). Prepares status reports on security matters to develop security risk analysis scenarios and response procedures. Responsible for the tracking and monitoring of software viruses.
• Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls. Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness.
• Provides direct support to the business and IT staff for security related issues.
• Educates IT and the business about security policies and consults on security issues regarding user built/managed systems. Represents the security needs of the organization by providing expertise and assistance in all IT projects with regard to security issues. Must have extensive knowledge in networking, databases, systems and/or Web operations.
• More junior level position primarily focuses on security administration; a more senior level position is involved in developing enterprise security strategies, management of security projects and the most complicated security issues.
Scope of Services:
• The primary function of this position is to provide technical expertise and analysis to assist the Information Security Management Office in their work to establish, implement and monitor the security strategy of the…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).