Home

Security Analyst |Onsite in Tallahassee, FL | F2F at Tallahassee, Florida, USA
Email: [email protected]
From:

Anurag,

tekinspirations

[email protected]

Reply to:   [email protected]

Hey

Check this urgent role

Job Description -

 who is adding a Security Analyst to their team. This is an onsite 1.5-year contract opportunity. The agency name will be shared if our client requests an interview with your consultant.

**We can submit 4 people for this bid. We will let you know who will be submitted on Wednesday October 29, 2024. 

Please also let consultants know the following:

Interviews will take place in November 2024.

Our client is anticipating a start date of 12/1/24. 

Please share DL Visa and LinkedIn at the submission time  

Security Analyst Position

Work location

Onsite in Tallahassee, FL 

Duration

1.5 years

Start Date  

12/1/24 

Work Hours

Monday Friday 8 am 5 pm eastern time

Interview Method

Video

Resume Self-Certification, Skills Matrix and Professional References

Attached Self-Certification - Please send with resumes. The forms must be fully completed and signed by the candidate for us to send their resume to our client.

Skills Matrix  Please complete and send to us when submitting resumes.

Attached - Professional References - In addition, we will need three (3) Professional References (managers over peers) for each candidate we submit. References will be contacted by our client if selected for the role. 

Work Authorization

If they are on an OPT-EAD please make sure they have a minimum of 24 months remaining without the need for renewal

Communication

Excellent Will be working with various team members at all levels

Deadline for submission

Wednesday, October 30, 2024

Background Check Required

Prior to hire, applicants must pass a Criminal Background check including fingerprinting.

Intermediate level (4-6 years experience) 

Advanced level (6+ years experience)  Must Have 

Required Qualifications

4+ years of combined IT and security work experience with a broad range of exposure to systems Analysis.

4+ years of experience with information technology security.

4+ years of experience with Firewall policies, implementation, and best practices.

2+ years of experience with cloud computing and cloud computing security.

Knowledge of security issues, techniques, and implications across all existing computer platforms.

Good understanding of NIST cybersecurity Framework.

Good understanding of NIST RMF.

Good understanding of MITRE framework.

Must CJIS certified or can become CJIS certified.

Education

Bachelors Degree in Computer Science, Information Systems, or other related field or equivalent work experience.

Cyber Security Certifications(examples: CISSP, Security +, OSCP, CISA).

Responsibilities 

Develop and Manage Security Best Practices: Establish and maintain security best practices aligned with clients objectives.

Assist with Development and Implementation of Security Policies and Procedures: Contribute to creating, deploying, and enforcing comprehensive security policies and procedures.

Prepare Security Documentation: Create and maintain detailed security documentation to ensure accuracy and compliance with industry standards.

Develop Risk Analysis and Security Reporting: Conduct risk assessments, develop mitigation strategies, and generate security reports to support informed decision-making.

Monitor and Remediate Software or Hardware Vulnerabilities: Identify, monitor, and address vulnerabilities in software and hardware to safeguard clients assets.

Evaluate Current and Future Security Tools and Systems: Assess existing and potential security tools and systems, providing recommendations for enhancements or new implementations.

Respond to Security Incidents: Act as a primary responder to security events, executing incident response protocols and ensuring timely resolution.

Conduct After-Action Reviews: Thoroughly review and analyze security incidents to identify root causes and lessons learned, producing after-action reports as needed.

Mitigate Identified Risks: Implement strategies to mitigate risks identified through assessments and incident analyses.

Educate IT and Program Areas About Security Policies: Train and inform IT teams and program areas on security policies to ensure widespread understanding and adherence.

Submit and Oversee Change Control Process: Manage the change control process, ensuring all modifications are documented and compliant with Clients standards.

Document Hours Worked by Task(s): Accurately record hours spent on each task for accountability and project management purposes.

                               Thanks and Regards,

Headquarters : 13573 Tabasco Cat Trail, Frisco, TX 75035

Anurag Singh

Sr. Technical Recruiter

TEK Inspirations Pvt. Ltd.
|

Email: 
[email protected]

Disclaimar
: This communication, along with

any documents, files or attachments, is intended only for the use of the addressee

and may contain confidential information. If you are not the intended

recipient, you are hereby notified that any dissemination, distribution or

copying of any information contained in or attached to this communication is

strictly prohibited, To remove your email address permanently from future

mailings, please send REMOVE to [email protected].

Keywords: access management information technology Florida Texas
Security Analyst |Onsite in Tallahassee, FL | F2F
[email protected]
[email protected]
View all
Wed Oct 30 04:20:00 UTC 2024

To remove this job post send "job_kill 1890038" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 29

Location: , Indiana