Local to Florida || Security Analyst || USC & GC at Tallahassee, Florida, USA |
Email: [email protected] |
Attach DL of FL Security Analyst Location - Tallahassee Florida Term : Through June 30, 2024, with a possible one (1) year renewal term Location: The wo rk sha ll be cond uc ted o n -s i te wi th the De pa r t men t 's O IT in Ta llahassee, F lo r id a. The Advanced In f o r ma t ion Secu r i ty Ana lyst pos ition en ta il s: Lead ing the techn ical i mp le men ta t ion of secu r i ty p ro je c t s, focus ing on s ys tem hardening, network security, and identity management while collaborating with teams to meet law enforcement-specific security standards; Hands-on expertise in firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), encryption, and secure Microsoft configurations, along with conducting vulnerability assessments and developing remediation strategies; Manage security tools, support threat detection and incident response, and ensure integration of security platforms; Compliance with Criminal Justice Information Services (CJIS) and state regulations is critical, as is working with Governance, Risk, and Compliance (GRC) teams to ensure adherence and address audit gaps; Documentation and training on cybersecurity solutions and processes are required, with a focus on CJIS and state regulations; and Demands reengineering security processes for efficiency and compliance, providing support for cybersecurity issues, and staying informed on emerging threats and technologies. N O T E: I n add i t ion to t he above lis t, the se lec t ed Cand ida tes m ust suc cess fu lly c o mp le te a Le vel II Backg round Check and CJ IS sec u r i ty a wa reness t ra in ing. Scope of Work/Job Characteristics The Advanced In f o rm a t ion Secu r i ty Ana lys ts will se rve as the p r inc ipal line of co m mun ica t ion for the p ro je ct te a m. The d u t ies and respons ib ili t ies of th is pos i t ion a re as fo llo ws: P ro ject Imp l emen t a tio n: Lead the techn ical i mp le men t a t ion of sec u r i ty p r o jec ts, focus ing on sys t em h a rden ing, n e t wo rk secu r i t y, en c ry p t ion too l s, vu lne rab ili ty manag e m en t, secu r i ty mon i t o r ing, and iden t i ty and a ccess manage me nt (I A M) sy s te ms wi th in a M ic ros o ft and Azu re env i ro n men t; C o llabo ra te wi th c ros s -f unc t ional te a ms to dep loy secu r i ty so lu t ions that meet p ro je ct requ i r e men t s, wi th a focus on law e n fo rce men t -spec i f ic sec u r i ty s tanda rd s; a nd E nsu re t i me ly de live ry of secu r i ty p ro j ec ts a ligned wi th the o rgan iza t ion 's requ i re men ts, ma in ta in i ng adhe rence toscope, t i me line, and budg e t. Technical Expertise: P r ov ide hands -on exp e rt ise in a re as such as f i re wa lls, I DS, I P S, en c ryp t io n, endpo int p r o te c t ion, and secu reco n f igu ra t ion of M i c roso ft env i ron me n ts; Imp le me nt secu re sy s t em a rch i te c tu re and n e t wo rk ing so lu t ion s, p a rt icu la r ly wi th in M ic ros o ft Azu re; C onduct vu lne rab ili ty as sess me n ts and deve lop re med ia t ion s tr a teg ies, ensu r ing co n t inuous i mp rov e ment in sec u r i typos tu r e. Security Tools and Platforms: C on f igu re, dep loy, and manage s ecu r i ty too ls s uch as Sec u r i ty I n fo r m a t ion and Eve nt Manag e m ent ( S I E M) sys t e m s, M ic ros o ft Azu re Secu r i ty Cen t e r, and endpo int sec u r i ty s o lu t ions ta ilo red for a M ic ros o ft env i ro n men t; and Ensu re p roper in teg r a t ion of secu r i ty p la t f o rms a c ross IT sys t e ms and su ppo rt t h reat de te c t ion, p reven t ion, and inc ident response. Incident Response: D es ign and ma i n ta in inc ident response p roced u r es spec i f ica lly ta ilo red to a law en f o rce me nt se t t ing; and Conduct root cause ana lys is and deve lop and i mp le ment ap p rop r i a te re med ia t ion meas u res. Security Compliance: E nsu re adh e rence to C J IS, S t a te of F l o r ida regu l a t ions, and o ther re levant secu r i ty co mp liance s tanda rd s; Wo rk c lose ly wi th G RC tea ms to e nsu re the o rg an iza t ion r e ma ins in c o m p liance wi th s t a te and fede ral s ecu r i ty regu l a t ions; and A ss ist wi th secu r i ty aud its, inc lud ing CJ IS c o mp liance rev ie w s, and add r ess any iden t i f ied gaps to ma in ta in c o mp liance in M ic ros o ft and A z u re sys te ms. Documentation and Training: D eve lop and ma i n ta in u p -to -da te docu me n t a t ion of new and ex is t ing cyb e rsecu r i ty so lu t ions and p rocesses spec i f ic to law en f o rce me nt and C J IS requ i re men ts; and P r ov ide t ra in ing to IT s t a ff on secu r i ty p ro t oco ls a nd con t r ibu te to secu r i ty a wa reness in i t ia t ives f or the o rgan iza t ion, wi th a focus on co mp liance wi th CJ IS and s ta te regu la t i ons. Processes Implementation and Reengineering: E xpe r ience in des ign ing, i mp le me n t ing, and o p t i m iz ing secu r i ty p roces s es to enhance ope r a t ional e ff ic iency, a lign wi thc o mp liance requ i re me n ts ( e .g ., CJ I S ), and m i t iga te r isks a c ross IT and o rgan iza t ional fun c t ions; and P r oven ab ili ty to re -eng i neer ex i s t ing sec u r i ty p ro cesses to i m p rove sy s tem in teg r ity, s t rea m line wo rk f lo ws, and ens u rea l ign ment wi th evo lv ing t echno logy and regu la to ry s tanda rd s, p a rt icu la r ly wi th in M ic ros o ft and Az u reenv i ro n me n ts. Collaboration and Support: Wo rk wi th IT op e ra t ions and deve lop me nt tea ms to ens u re s ecu r i ty is in t eg ra ted in to sys t e ms and p rocesse s; P r ov ide t roub leshoo t ing and suppo rt for cyb e rse cu r i t y - re la ted issues, wi th an e mphas is on M ic ros o ft and Azu reenv i ro n men t s; and S t ay c u rre nt on e me rg i ng cybe rsecu r ity th re a ts and techno log ies, pa r t icu la r ly th ose a ffe c t ing law en fo rc e ment andco mp l iance wi th C J IS and s t a te cybe rsecu r ity s tanda rd s. Submissions Must Include Candidate Resume(s) Include relevant experience, certifications, education, etc. related to the services requested in the Scope of Services Knowledge, Skills, and Abilities Matrix References Exhibit F - Resume Self-Certification Form Per the IT Staff Augmentation State Terms Contract All selected candidates are required to complete the Department's Security Awareness Training within 30 calendar days of hire. Regards, Steve Williams Technical Recruiter P : +1 (908) 449 3004 A : 25 Oak Tavern Cir Branchburg, New Jersey - 08876 Email Disclaimer: This email and any attachments are confidential and intended solely for the recipient. If you received it by mistake, please notify the sender and delete it. The views expressed are solely those of the sender and not necessarily those of the company. We do not accept responsibility for any viruses transmitted. Email communication may be monitored. Click Here to -- Keywords: cprogramm rlang information technology logistics execution microsoft Arizona Colorado Connecticut Delaware Florida Idaho Illinois Iowa Louisiana Massachusetts North Dakota Pennsylvania Washington Wisconsin Local to Florida || Security Analyst || USC & GC [email protected] |
[email protected] View All |
08:35 PM 12-Nov-24 |