Security Analyst |Onsite in Tallahassee, FL | F2F at Tallahassee, Florida, USA |
Email: [email protected] |
From: Anurag, tekinspirations [email protected] Reply to: [email protected] Hey Check this urgent role Job Description - who is adding a Security Analyst to their team. This is an onsite 1.5-year contract opportunity. The agency name will be shared if our client requests an interview with your consultant. **We can submit 4 people for this bid. We will let you know who will be submitted on Wednesday October 29, 2024. Please also let consultants know the following: Interviews will take place in November 2024. Our client is anticipating a start date of 12/1/24. Please share DL Visa and LinkedIn at the submission time Security Analyst Position Work location Onsite in Tallahassee, FL Duration 1.5 years Start Date 12/1/24 Work Hours Monday Friday 8 am 5 pm eastern time Interview Method Video Resume Self-Certification, Skills Matrix and Professional References Attached Self-Certification - Please send with resumes. The forms must be fully completed and signed by the candidate for us to send their resume to our client. Skills Matrix Please complete and send to us when submitting resumes. Attached - Professional References - In addition, we will need three (3) Professional References (managers over peers) for each candidate we submit. References will be contacted by our client if selected for the role. Work Authorization If they are on an OPT-EAD please make sure they have a minimum of 24 months remaining without the need for renewal Communication Excellent Will be working with various team members at all levels Deadline for submission Wednesday, October 30, 2024 Background Check Required Prior to hire, applicants must pass a Criminal Background check including fingerprinting. Intermediate level (4-6 years experience) Advanced level (6+ years experience) Must Have Required Qualifications 4+ years of combined IT and security work experience with a broad range of exposure to systems Analysis. 4+ years of experience with information technology security. 4+ years of experience with Firewall policies, implementation, and best practices. 2+ years of experience with cloud computing and cloud computing security. Knowledge of security issues, techniques, and implications across all existing computer platforms. Good understanding of NIST cybersecurity Framework. Good understanding of NIST RMF. Good understanding of MITRE framework. Must CJIS certified or can become CJIS certified. Education Bachelors Degree in Computer Science, Information Systems, or other related field or equivalent work experience. Cyber Security Certifications(examples: CISSP, Security +, OSCP, CISA). Responsibilities Develop and Manage Security Best Practices: Establish and maintain security best practices aligned with clients objectives. Assist with Development and Implementation of Security Policies and Procedures: Contribute to creating, deploying, and enforcing comprehensive security policies and procedures. Prepare Security Documentation: Create and maintain detailed security documentation to ensure accuracy and compliance with industry standards. Develop Risk Analysis and Security Reporting: Conduct risk assessments, develop mitigation strategies, and generate security reports to support informed decision-making. Monitor and Remediate Software or Hardware Vulnerabilities: Identify, monitor, and address vulnerabilities in software and hardware to safeguard clients assets. Evaluate Current and Future Security Tools and Systems: Assess existing and potential security tools and systems, providing recommendations for enhancements or new implementations. Respond to Security Incidents: Act as a primary responder to security events, executing incident response protocols and ensuring timely resolution. Conduct After-Action Reviews: Thoroughly review and analyze security incidents to identify root causes and lessons learned, producing after-action reports as needed. Mitigate Identified Risks: Implement strategies to mitigate risks identified through assessments and incident analyses. Educate IT and Program Areas About Security Policies: Train and inform IT teams and program areas on security policies to ensure widespread understanding and adherence. Submit and Oversee Change Control Process: Manage the change control process, ensuring all modifications are documented and compliant with Clients standards. Document Hours Worked by Task(s): Accurately record hours spent on each task for accountability and project management purposes. Thanks and Regards, Headquarters : 13573 Tabasco Cat Trail, Frisco, TX 75035 Anurag Singh Sr. Technical Recruiter TEK Inspirations Pvt. Ltd. | Email: [email protected] Disclaimar : This communication, along with any documents, files or attachments, is intended only for the use of the addressee and may contain confidential information. If you are not the intended recipient, you are hereby notified that any dissemination, distribution or copying of any information contained in or attached to this communication is strictly prohibited, To remove your email address permanently from future mailings, please send REMOVE to [email protected]. Keywords: access management information technology Florida Texas Security Analyst |Onsite in Tallahassee, FL | F2F [email protected] |
[email protected] View all |
Wed Oct 30 04:20:00 UTC 2024 |