Home

Security Analyst || 18 Months || Tallahassee, Florida Onsite || Skype + F2F at Tallahassee, Florida, USA
Email: [email protected]
From:

Neha,

Tek Inspiration LLC

[email protected]

Reply to:   [email protected]

Hello,

Hope you are doing well,

Please check the below job description and let me know if you are interested for the same:

Job Description -

We are working with one of the State of Florida agencies who is adding a Security Analyst to their team. This is an onsite 1.5-year contract opportunity. 

The agency name will be shared if our client requests an interview with your consultant.

Please also let consultants know the following:

Interviews will take place in November 2024.

Our client is anticipating a start date of 12/1/24.  

Security Analyst Position

Work location

Onsite in Tallahassee, FL 

Duration

1.5 years

Start Date  

12/1/24 

Work Hours

Monday Friday 8 am 5 pm eastern time

Interview Method

Video

Resume Self-Certification, Skills Matrix and Professional References

Attached Self-Certification

 - Please send with resumes. The forms must be fully completed and signed by the candidate for us to send their resume to our client.

Skills Matrix 

Please complete and send to us when submitting resumes.

Attached

 - Professional References - In addition, we will need three (3) Professional References (managers over peers) for each candidate we submit. References will be contacted by our client if selected for the role. 

Communication

Excellent Will be working with various team members at all levels

Deadline for submission

Wednesday, October 30, 2024

Background Check Required

Prior to hire, applicants must pass a Criminal Background check including fingerprinting.

Intermediate level (4-6 years experience) 

Advanced level (6+ years experience)  Must Have 

Required Qualifications

4+ years of combined IT and security work experience with a broad range of exposure to systems Analysis.

4+ years of experience with information technology security.

4+ years of experience with Firewall policies, implementation, and best practices.

2+ years of experience with cloud computing and cloud computing security.

Knowledge of security issues, techniques, and implications across all existing computer platforms.

Good understanding of NIST cybersecurity Framework.

Good understanding of NIST RMF.

Good understanding of MITRE framework.

Must CJIS certified or can become CJIS certified.

Education

Bachelors Degree in Computer Science, Information Systems, or other related field or equivalent work experience.

Cyber Security Certifications(examples: CISSP, Security +, OSCP, CISA).

Responsibilities 

Develop and Manage Security Best Practices

: Establish and maintain security best practices aligned with clients objectives.

Assist with Development and Implementation of Security Policies and Procedures

: Contribute to creating, deploying, and enforcing comprehensive security policies and procedures.

Prepare Security Documentation:

 Create and maintain detailed security documentation to ensure accuracy and compliance with industry standards.

Develop Risk Analysis and Security Reporting

: Conduct risk assessments, develop mitigation strategies, and generate security reports to support informed decision-making.

Monitor and Remediate Software or Hardware Vulnerabilities

: Identify, monitor, and address vulnerabilities in software and hardware to safeguard clients assets.

Evaluate Current and Future Security Tools and Systems

: Assess existing and potential security tools and systems, providing recommendations for enhancements or new implementations.

Respond to Security Incidents

: Act as a primary responder to security events, executing incident response protocols and ensuring timely resolution.

Conduct After-Action Reviews

: Thoroughly review and analyze security incidents to identify root causes and lessons learned, producing after-action reports as needed.

Mitigate Identified Risks

: Implement strategies to mitigate risks identified through assessments and incident analyses.

Educate IT and Program Areas About Security Policies

: Train and inform IT teams and program areas on security policies to ensure widespread understanding and adherence.

Submit and Oversee Change Control Process

: Manage the change control process, ensuring all modifications are documented and compliant with Clients standards.

Document Hours Worked by Task(s):

 Accurately record hours spent on each task for accountability and project management purposes.

Regards

KM. Neha

IT Recruiter

TEK Inspirations LLC :

13573 Tabasco Cat Trail, Frisco, TX 75035

Direct: +

1 4698428938

Email:

[email protected]

LinkedIn URL:

https://www.linkedin.com/in/km-neha-34b558229/

Email is the best way to reach me.

Disclaimer:

If you are not interested in receiving our e-mails then please reply with a

"REMOVE"

in the subject line to

[email protected]

.

And mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e-mails to you. We are sorry for the inconvenience.

Keywords: access management information technology Florida Texas
Security Analyst || 18 Months || Tallahassee, Florida Onsite || Skype + F2F
[email protected]
[email protected]
View all
Tue Oct 29 23:33:00 UTC 2024

To remove this job post send "job_kill 1888790" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 39

Location: , Indiana