Security Analyst (security policies and procedure - Palo Alto Checkpoint security products at Tallahassee, Florida, USA |
Email: [email protected] |
From: kaleem, RBC [email protected] Reply to: [email protected] Title: Security Analyst (security policies and procedure - Palo Alto/Checkpoint security products) Location: Tallahassee, FL Length: Multi-Year Travel Required: none Telecommute: no Skills: "Security Analyst"; establishment of new integration methods and standards; "configure and document firewall infrastructure access rules"; security administration; Palo Alto, Checkpoint and Global Protect VPNs; Firewall deployments/rule migrations/administration; converting existing rule based policies onto new platforms; information security tools; NIST; Data Administration; schematic diagramming tools; security policies and procedure; networking, databases, systems and/or Web operations; Florida Cybersecurity Standards, MS Office/Sharepoint; Mentor; DOCUMENTATATION, Govt Description: Face to Face Interviews: At the hiring managers discretion, interviews may be conducted via Microsoft Teams or in person. Telecommuting: Limited telecommuting is currently an option for this position. Candidates are expected to work a minimum of three (3) full days per week in the office. The selected candidate is required to start their first day in the office. In the future, and at the Department's discretion, this option may return to full-time, in the office. Vendors shall ensure candidates are aware of the Department's policy on telework and agree to comply prior to responding to this RFQ/eQuote. Work Hours Flexibility to work hours between 7:00 AM & 7:00 PM and/or Saturdays, either on a rotation or as part of a regular and on call work schedule. Scope of Services Our Client Application Services is in search of an Integration Architect to play a key role in assisting the Office of Information Technology in the establishment of new integration methods and standards, along with implementing system integrations, according to those established methods and standards. Duties and Responsibilities will include but are not limited to: 1. Perform security administration to configure and document firewall infrastructure access rules and work with peripheral network components in the technology environment with Palo Alto, Checkpoint and Global Protect VPNs. 2. Firewall deployments, rule migrations, firewall administration and converting existing rule based policies onto new platforms. 3. Works with critical core network infrastructure devices like Firewall, VPNs, log collectors and monitors which play a crucial role in security for our IT environment. 4. Works with cloud network infrastructure to configure firewall, security policies and monitor network traffic. 5. Develop and maintain documentation following NIST guidelines. 6. Project Manager; 7. Data Administration; Education: Bachelors Degree in Computer Science, Information Systems or other related field. Or equivalent work experience. Experience 1. Typically has 10 years of combined IT and security work experience with a broad range of exposure to systems analysis, applications development, database design and administration 2. 2-4 years of experience with information security tools based on NIST standards. 3. Requires knowledge of security issues, techniques, and implications across all existing computer platforms. Preference given for experience with Palo Alto or Checkpoint security products. 4. Experience using schematic diagramming tools to map infrastructure layouts. Primary Job Duties/ Tasks 1. Develops and manages security for more than one IT functional area (e.g., data, systems, network and/or Web) across the enterprise. 2. Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines). 3. Prepares status reports on security matters to develop security risk analysis scenarios and response procedures. 4. Responsible for the tracking and monitoring of software viruses. Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls. 5. Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness. 6. Provides direct support to the business and IT staff for security related issues. Educates IT and the business about security policies and consults on security issues regarding user built/managed systems. 7. Represents the security needs of the organization by providing expertise and assistance in all IT projects with regard to security issues. 8. Must have extensive knowledge in networking, databases, systems and/or Web operations. More junior level position primarily focuses on security administration; a more senior level position is involved in developing enterprise security strategies, management of security projects and the most complicated security issues. Job Specific Skills and Abilities (KSAs): Intermediate professional level role. Works independently or on multiple IT security projects as a project team member, occasionally as a project leader. Works on small to large, complex security issues or projects that require increased skill in multiple IT functional areas. May coach more junior staff. General Knowledge Skills and Abilities (KSAs): The submitted candidate must be able to apply common knowledge, skills, and abilities in the following areas: 1. Communication: Have the ability to clearly convey information, in both written and verbal formats, to individuals or groups in a wide variety of settings (i.e.; project team meetings, management presentations, etc.). Must have the ability to effectively listen and process information provided by others. 2. Customer Service: Works well with clients and customers (i.e.; business office, public, or other agencies). Able to assess the needs of the customer, provide information or assistance to satisfy expectations or resolve a problem. 3. Decision Making: Makes sound, well-informed, and objective decisions. 4. Flexibility: Is open to change, new processes (or process improvement), and new information. Has the ability to adapt in response to new information, changing conditions, or unexpected obstacles. Ability to receive and give constructive criticism, and maintain effective work relationships with others. 5. Interpersonal: Shows friendliness, courtesy, understanding, and politeness to others. 6. Leadership: Motivates, encourages, and challenges others. Is able to adapt leadership styles in a variety of situations. 7. Problem Solving: Able to identify, evaluate, and use sound judgement to generate and evaluate alternative actions, and make recommendations as accordingly. 8. Team Building: Encourages, inspires, and guides others toward accomplishing the common goal. 9. Quality Assurance: Knowledge of the ideologies, techniques and tools for quality assurance and control. The ability to put the ideologies, techniques, and tools into practice. Keywords: access management information technology microsoft Florida Security Analyst (security policies and procedure - Palo Alto Checkpoint security products [email protected] |
[email protected] View all |
Mon Aug 26 18:40:00 UTC 2024 |