Job Description
Job Description
We are seeking an IT Security Specialist to join our team and play a key role in strengthening our cybersecurity posture. This position is focused on preemptive security measures, with an emphasis on vulnerability management and proactive risk mitigation. The ideal candidate is a hands-on professional who is developing their craft and eager to contribute to both the creation and maintenance of security improvements. Come join a great company as a IT Security Specialist! Apply now, call 319-362-8606, or email your resume direct to : Shawn M Troy - Technology Practice Director with Robert Half (email information is on LinkedIn). Key Responsibilities :
Vulnerability Management :
- Identify, assess, and remediate vulnerabilities across on-premises and cloud environments.
- Collaborate with internal teams to ensure timely patching and risk reduction.
Security Guidelines :
Assist in developing new security policies and procedures.Maintain and update existing security documentation to align with best practices.Security Tools & Monitoring :
Work with SIEM and endpoint protection tools, including Microsoft Defender , Microsoft Sentinel , and Arctic Wolf .Monitor alerts and assist in optimizing security tool configurations for better detection and prevention.Collaboration & Compliance :
Support compliance initiatives and coordinate with other business units as needed.Participate in internal and external audits / risk assessments.Apply now, call 319-362-8606, or email your resume direct to : Shawn M Troy - Technology Practice Director with Robert Half (email information is on LinkedIn).
Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, or a related field, or equivalent work experience.Minimum of 2 years of hands-on experience in cybersecurity engineering or security operations.Proficiency in utilizing security technologies such as firewalls, SIEM tools, and endpoint protection systems.Comprehensive understanding of network protocols, system hardening techniques, and threat mitigation strategies.Familiarity with regulatory standards and frameworks, including ISO 27001 and NIST controls.Strong knowledge of data privacy, database security, and cyber governance principles.Ability to analyze and resolve security vulnerabilities effectively.Excellent problem-solving skills and the ability to work both independently and in collaboration with diverse teams.