Security Analyst || 18 Months || Tallahassee, Florida Onsite || Skype + F2F at Tallahassee, Florida, USA |
Email: [email protected] |
From: Neha, Tek Inspiration LLC [email protected] Reply to: [email protected] Hello, Hope you are doing well, Please check the below job description and let me know if you are interested for the same: Job Description - We are working with one of the State of Florida agencies who is adding a Security Analyst to their team. This is an onsite 1.5-year contract opportunity. The agency name will be shared if our client requests an interview with your consultant. Please also let consultants know the following: Interviews will take place in November 2024. Our client is anticipating a start date of 12/1/24. Security Analyst Position Work location Onsite in Tallahassee, FL Duration 1.5 years Start Date 12/1/24 Work Hours Monday Friday 8 am 5 pm eastern time Interview Method Video Resume Self-Certification, Skills Matrix and Professional References Attached Self-Certification - Please send with resumes. The forms must be fully completed and signed by the candidate for us to send their resume to our client. Skills Matrix Please complete and send to us when submitting resumes. Attached - Professional References - In addition, we will need three (3) Professional References (managers over peers) for each candidate we submit. References will be contacted by our client if selected for the role. Communication Excellent Will be working with various team members at all levels Deadline for submission Wednesday, October 30, 2024 Background Check Required Prior to hire, applicants must pass a Criminal Background check including fingerprinting. Intermediate level (4-6 years experience) Advanced level (6+ years experience) Must Have Required Qualifications 4+ years of combined IT and security work experience with a broad range of exposure to systems Analysis. 4+ years of experience with information technology security. 4+ years of experience with Firewall policies, implementation, and best practices. 2+ years of experience with cloud computing and cloud computing security. Knowledge of security issues, techniques, and implications across all existing computer platforms. Good understanding of NIST cybersecurity Framework. Good understanding of NIST RMF. Good understanding of MITRE framework. Must CJIS certified or can become CJIS certified. Education Bachelors Degree in Computer Science, Information Systems, or other related field or equivalent work experience. Cyber Security Certifications(examples: CISSP, Security +, OSCP, CISA). Responsibilities Develop and Manage Security Best Practices : Establish and maintain security best practices aligned with clients objectives. Assist with Development and Implementation of Security Policies and Procedures : Contribute to creating, deploying, and enforcing comprehensive security policies and procedures. Prepare Security Documentation: Create and maintain detailed security documentation to ensure accuracy and compliance with industry standards. Develop Risk Analysis and Security Reporting : Conduct risk assessments, develop mitigation strategies, and generate security reports to support informed decision-making. Monitor and Remediate Software or Hardware Vulnerabilities : Identify, monitor, and address vulnerabilities in software and hardware to safeguard clients assets. Evaluate Current and Future Security Tools and Systems : Assess existing and potential security tools and systems, providing recommendations for enhancements or new implementations. Respond to Security Incidents : Act as a primary responder to security events, executing incident response protocols and ensuring timely resolution. Conduct After-Action Reviews : Thoroughly review and analyze security incidents to identify root causes and lessons learned, producing after-action reports as needed. Mitigate Identified Risks : Implement strategies to mitigate risks identified through assessments and incident analyses. Educate IT and Program Areas About Security Policies : Train and inform IT teams and program areas on security policies to ensure widespread understanding and adherence. Submit and Oversee Change Control Process : Manage the change control process, ensuring all modifications are documented and compliant with Clients standards. Document Hours Worked by Task(s): Accurately record hours spent on each task for accountability and project management purposes. Regards KM. Neha IT Recruiter TEK Inspirations LLC : 13573 Tabasco Cat Trail, Frisco, TX 75035 Direct: + 1 4698428938 Email: [email protected] LinkedIn URL: https://www.linkedin.com/in/km-neha-34b558229/ Email is the best way to reach me. Disclaimer: If you are not interested in receiving our e-mails then please reply with a "REMOVE" in the subject line to [email protected] . And mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e-mails to you. We are sorry for the inconvenience. Keywords: access management information technology Florida Texas Security Analyst || 18 Months || Tallahassee, Florida Onsite || Skype + F2F [email protected] |
[email protected] View all |
Tue Oct 29 23:33:00 UTC 2024 |