Post job

Cyber security analyst jobs in Dunedin, FL - 67 jobs

All
Cyber Security Analyst
Information Systems Security Officer
Security System Engineer
Information Security Analyst
Security Engineer
Senior Cyber Security Analyst
Securities Analyst
Senior Information Security Analyst
Information Assurance Analyst
Cyber Security Specialist
Senior Security Engineer
  • Cyber Security Analyst - Senior II

    Amentum

    Cyber security analyst job in Tampa, FL

    in Tampa, FL. Description - External Performs assessment and authorization coordination. Advises and assists the customer with Risk Management Framework (RMF) and develops a Plan of Action and Milestones for resolving network deficiencies in accordance with DODI 8510.01 and ICD 503. The duties of this task include assessing network compliance against controls listed in NIST 800-53 and creating A&A packages. Performs assessment, compliance, and validation of IT systems to support the Cybersecurity program at USSOCOM, its Component Commands, TSOCs, and deployed forces. The Contractor shall execute a comprehensive assessment, compliance and validation of customer networks to ensure compliance with regulations and security and standards. The end goal is to ensure the integrity of customer systems by identifying and mitigating potential shortcomings and vulnerabilities. Advise USSOCOM, its Component Commands, TSOCs, and deployed forces on network and system risks, risk mitigation courses of action, and operational. Additionally, the Cybersecurity Systems Analyst should be able to perform security evaluations and vulnerability assessments using the DOD Assured Compliance Assessment Solution (ACAS), Nessus vulnerability scanning tool and Security Content Automation Protocol tool. Identify applicable STIGs and perform assessments using the Security Content Automation Protocol tool. The Cybersecurity Systems Analyst will liaison with network and system administrators to correct identified deficiencies. The Cybersecurity Systems Analyst will also scan (or review scans) for new systems and applications being introduced into the SOF environment, identify issues, and draft certification letters for the government. The contractor will liaison with the Site Integration Facility (SIF) to ensure systems and application meet the standards in the DISA Security Technical Implementation Guides (STIG). The Cybersecurity Systems analyst should be knowledgeable of cyber network defense tools such as end point security, SIEM, comply to connect, etc. Typical duties include: · Tracks A&A status of SIE governed ISs. Ensures these artifacts and documentation are available in the USSOCOM-chosen automated tool for cybersecurity Provide DoD & IC RMF subject matter expertise to USSOCOM, its Component Commands, TSOCs, deployed forces and their delegates, including other Contractors, and assist with the development and execution of the RMF program at USSOCOM, its Component Commands, TSOCs, and deployed forces. Maintain, track, and validate DISN, cloud and DIA connection approval packages, including those from USSOCOM, its Component Commands, TSOCs, and other subordinate organizations. Develop and maintain supporting documentation for new and existing networks, cloud environments, information systems and technologies as they are introduced into the SIE Develop and review the A&A of SIE networks, cloud environments, systems, services, telecommunication circuits, mobile devices, portable electronic devices, hardware, and software using the DoD & IC RMF to obtain an Authority to Operate (ATO), Interim Authority to Test (IATT), or Authority to Connect (ATC). Perform risk and vulnerability assessments of IT and IS for authorization; prepare risk assessment reports for submission to the SCA and Authorizing Official/Designated Authorizing Official/Designated Accrediting Authority (AO/DAO/DAA) in accordance with DoD, DIA, USCYBERCOM, USSOCOM, Component Command, TSOC, and deployed forces' policies, procedures, and regulations. Assist USSOCOM, its Component Commands, TSOCs and deployed forces with the enforcement of A&A, as well as DoD, DIA, USSOCOM, Component Command, TSOC, and deployed forces' connection standards for networks and systems. Track and maintain A&A databases, web sites and tools to ensure that networks, systems and devices are properly documented and managed from a cybersecurity perspective. Track and report to higher headquarters organizations (e.g. USCYBERCOM, DIA) compliance with applicable Cybersecurity regulations and directives. Ensure timely notifications are made to responsible individuals and organizations in order to prevent lapses in accreditations (e.g., 30, 60, and 90 day notices). Develop and maintain an Information Security Continuous Monitoring (ISCM) Plan. This plan shall address ongoing awareness of information security, vulnerabilities, security controls, and threats to support organizational risk management decisions. · Identify, assess, and advise on cybersecurity control compliance and associated risks. Coordinate with USCYBERCOM, DoD, DIA, NSA, DISA, and subordinate organizations to support the resolution of issues with security, A&A, connection approvals, and waiver requests. Perform network, cloud, information systems, hardware, software and device security authorization and assessments, as well as the application and execution of policy, including project management support services. Validate the patching of systems, perform validation scanning, develop Plans of Action & Milestone (POA&Ms), and report as directed by applicable policies, procedures, and regulations. · Provide subject matter expertise for COA development and the implementation of Cybersecurity mitigation strategies. Develop and implement required processes, procedures, and capabilities to mitigate vulnerabilities and weaknesses for software and hardware deployment. Identify, implement and validate continued effectiveness of key performance parameters and applied security measures · Perform analytics on cybersecurity posture and provide reports to the AO/DAO and applicable stakeholders as required per ISCM and AO/DAO direction. Qualifications - External Knowledge, Skills and Abilities: Experience with the US Combatant Commands (USCENTCOM/USSOCOM) is desired Technical background with system administration experience, architecture and engineering preferred Technical background in networking, identity management, Microsoft and Linux operating systems, database, and mobility Working knowledge of the RMF. Knowledge of the Telos Xacta or Enterprise Mission Assurance Support Services (eMASS) system is desired. Must have excellent communications skill (written and oral) and interpersonal skills. Knowledge and experience with DoD IA processes and policies (e.g., DODI 8510.01, NIST, CNSS and other cybersecurity policies, Chairman of the Joint Chiefs of Staff Manual (CJCSM) 65101.01, Incident Response and other IA policies). Active TS/SCI clearance required. Experience, Education, & Certification Requirements: Years of Experience Required: 8+ yrs Education Required: BA/BS Certification Required: Current DoD 8570.01- M, IAT- Level III or IAM Level III. Example Certs: CISSP (or Associate), CASP+CE, CISA, CISM, CCISO, GCED, GCIH, CCSP, or GSLC Physical Requirements: May include lifting of weight up to forty (20) pounds as necessary Work Environment: Can involve inside or outside work depending on the task. An inside environment may be a cubicle (considerations: close quarters, low to moderate noise, bright or dim lighting). Outside work may include various environmental conditions including warm and cold climates. Needs to be able to work well with co-workers and all levels of management. No hazards on job or unusual environmental conditions. Equipment and Machines: Ability to operate office equipment such as a personal computer, printer, copy machine, telephone, fax machine and other equipment including desk supplies and other work-related tools as required. Possess heavy and light equipment licenses, or the ability to obtain the necessary licenses. Attendance: Normal hours are Monday - Friday between 6:00am to 4:00pm. With the exception of STD/LTD/FMLA & approved time off, attendance is considered essential. Other Essential Functions: Must demonstrate professional behavior at all times when dealing with customers, management, and co-workers. Must have clear, concise and accurate communications skills in English, both verbal and written. Grooming and dress must be appropriate for the position and must not impose a safety risk to employees or others. Must maintain a positive work atmosphere by behaving and communicating in a professional manner. Independent personal transportation to office or work site is required. Travel (up to 10%) to and from customer locations and test locations (government and vendor) may be required to support projects. This may involve airline travel. In some cases, accommodations can possibly be made for POV, if necessary. When operating any vehicle for work purposes, must wear seat belt and in addition, no cellular devices are to be used when vehicle is in motion Compensation Details: $105,000 The compensation range or hourly rate listed for this position is provided as a good-faith estimate of what the company intends to offer for this role at the time this posting was issued. Actual compensation may vary based on factors such as job responsibilities, education, experience, skills, internal equity, market data, applicable collective bargaining agreements, and relevant laws. Benefits Overview: Our health and welfare benefits are designed to support you and your priorities. Offerings include: Health, dental, and vision insurance Paid time off and holidays Retirement benefits (including 401(k) matching) Educational reimbursement Parental leave Employee stock purchase plan Tax-saving options Disability and life insurance Pet insurance Note: Benefits may vary based on employment type, location, and applicable agreements. Positions governed by a Collective Bargaining Agreement (CBA), the McNamara-O'Hara Service Contract Act (SCA), or other employment contracts may include different provisions/benefits. Original Posting: 01/14/2026 - Until Filled Amentum anticipates this job requisition will remain open for at least three days, with a closing date no earlier than three days after the original posting. This timeline may change based on business needs. Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters.
    $105k yearly Auto-Apply 20d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cyber Security Specialist

    Ascension Federal Services

    Cyber security analyst job in Tampa, FL

    Cyber Security Specialist Location: Tampa, FL 33607 Clearance: TS/SCI Job Description: The Cyber Security Specialist will be responsible for protecting the organization's computer networks and systems from unauthorized access, attacks, and breaches. The specialist will work closely with the IT team to identify potential vulnerabilities and develop strategies to mitigate risks. Responsibilities: Develop and implement security policies, procedures, and standards Conduct regular security assessments and audits Monitor network traffic for suspicious activity Respond to security incidents and breaches Stay up-to-date with the latest security trends and technologies Collaborate with other departments to ensure compliance with regulations and standards Provide training and education to employees on security best practices Requirements: Bachelor's degree in Computer Science, Information Technology, or related field Minimum of 3 years of experience in cyber security Strong knowledge of security protocols and technologies Experience with security tools such as firewalls, intrusion detection systems, and antivirus software Excellent problem-solving and analytical skills Ability to work independently and as part of a team Excellent communication and interpersonal skills Benefits: 401(k) Dental insurance Flexible spending account Health insurance/Vision insurance Life insurance
    $68k-102k yearly est. 60d+ ago
  • Information Systems Security Officer (ISSO)

    Contact Government Services

    Cyber security analyst job in Tampa, FL

    ISSO Employment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements. CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities. Skills and attributes for success: * Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. * Maintain responsibility for managing cybersecurity risk from an organizational perspective. * Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership. * Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies. * Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO). * Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes. * Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF. * Provide subject matter expertise for cyber security and trusted system technology. * Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems. * Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. * Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring. * Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems. Qualifications: * Bachelor's Degree. * A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc. * eMASS experience. * Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher. * Strong desktop publishing skills using Microsoft Word and Excel. * Experience with industry writing styles such as grammar, sentence form, and structure. * Ability to multi-task in a deadline-oriented environment. Ideally, you will also have: * CISSP, CASP, or a similar certificate is preferred. * Master's Degree in Cybersecurity or related field. * Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking. * Demonstrated ability to work well independently and as a part of a team. * Excellent work ethic and a high commitment to quality. Our Commitment: Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems. For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work. Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come. We care about our employees. Therefore, we offer a comprehensive benefits package. Health, Dental, and Vision Life Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Join our team and become part of government innovation! Explore additional job opportunities with CGS on our Job Board: ************************************* For more information about CGS please visit: ************************** or contact: Email: [email protected] #CJ $92,213.33 - $125,146.66 a year We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $92.2k-125.1k yearly 38d ago
  • Security Analyst Tier 2

    Digital Hands 3.9company rating

    Cyber security analyst job in Tampa, FL

    #GetThereFirst Digital Hands is an innovative Managed Security Service Provider (MSSP) with a mission to protect customer data and make technology available, productive and secure with the strongest talent in the cyber industry. Members of the Digital Hands Team work with leading technologies and protect a dynamic set of enterprise-class customers including best-known brands in the hospitality, financial, manufacturing and communications industries. Digital Hands employees enjoy competitive compensation and benefits, training opportunities, personal skills development, and opportunities for professional advancement across the organization. Digital Hands is comprised of innovators leading from the front, fueled by a desire to achieve, test new boundaries, and a determination to do whatever it takes to get there first every time. Ideal candidates believe in the mission and vision of the company and have a genuine love for what they do. At Digital Hands, we take ownership, obsess over our promises, anticipate our customers' needs. and get ahead of every threat so that our customers can focus on their business with the peace of mind that only comes from knowing their cyberworld is secure. Join Us as an IT Security Associate Analyst! At Digital Hands, we're dedicated to fortifying cybersecurity for organizations everywhere. We're on the lookout for a proactive IT Associate Analyst to join our Digital Hands Security Operations Center (SOC). In this role, you'll act as a Tier 2 escalation security analyst and help monitor, analyze, and respond to security incidents, providing essential support to our customers and security teams. This is an onsite, full-time position at our Tampa Headquarters. About You You're a Critical Thinker: You can quickly assess security alerts and incidents, prioritizing actions based on risk and impact. You're Detail-Oriented: Your ability to dig deep into network traffic, security logs, and threat intelligence helps identify and mitigate potential threats before they escalate. You Have a Strong Security Mindset: Passionate about maintaining confidentiality, integrity, and availability, you're committed to protecting information systems from advanced threats. You Work Well Under Pressure: You thrive in fast-paced, high-stakes situations, ensuring that incidents are handled with precision and care. You Communicate Clearly: Whether in documentation, escalation, or direct communication with team members and customers, you excel in conveying technical issues in a clear, actionable manner. You Embrace Continuous Learning: You're always growing your skill set and adapting to new challenges and security practices to stay ahead of emerging threats. You're Passionate About Process Improvement and Mentoring: You actively seek opportunities to enhance workflows, improve team efficiency, and mentor others, sharing your knowledge to elevate the entire team's performance. Things You'll Do Monitor and Respond to Alerts: Analyze and respond to security events, including alerts from SIEMs, Firewalls, IDS/IPS, and Anti-Virus software, ensuring quick and effective action. Escalate and Triage Incidents: Act as an escalation point for first responders, ensuring that incidents are properly documented, analyzed, and escalated as needed. Investigate Security Threats: Use a variety of security tools to identify, assess, and remediate threats within customer environments, including investigating network traffic, endpoint logs, and event histories. Implement Security Measures: Take action to mitigate attacks, such as implementing IP blocks in firewalls and analyzing network traffic to reduce the attack surface. Provide Analytical Support: Utilize tools like Wireshark and tcpdump to analyze and characterize network traffic, identifying potential security threats and vulnerabilities. Collaborate with Teams: Work closely with other security professionals to correlate threat data, validate alerts, and contribute to the overall improvement of incident response and security practices. Create and Improve Documentation and mentor others: Document incident details, lessons learned, and opportunities for process improvement to ensure continuous enhancement of our security posture. What You Bring Education & Experience: Bachelor's degree or 3-5 years of experience in a SOC or similar IT security role, with a strong understanding of network protocols and security concepts. Technical Skills: Experience with SIEM tools, firewalls, IDS/IPS systems, anti-virus software, and security management tools. Hands-on knowledge of network traffic analysis tools such as Wireshark and tcpdump is a plus. Certifications: CompTIA Security+, Network+, Linux+, or SANS GIAC GSEC, GCIH, or equivalent certifications are preferred. Hands-On Experience: Familiarity with various operating systems (UNIX, Linux, Windows) and the ability to interpret security logs and system data from different platforms. Security Knowledge: Solid understanding of incident response procedures, security tools, and common vulnerabilities, as well as industry standards and best practices. If you're ready to join a dynamic team and play a crucial role in the fight against cyber threats, we want to hear from you! Help shape the future of cybersecurity at Digital Hands. Digital Hands is dedicated to a diverse and inclusive workplace and culture, and proud to be an Equal Employment Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex (including pregnancy, childbirth, reproductive health decisions, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, genetic information, political views or activity, or other applicable legally protected characteristics. Digital Hands is committed to providing reasonable accommodations for qualified individuals with disabilities and disabled veterans in our job application procedures. If you need assistance or an accommodation due to a disability, please contact us at ********************************* . Digital Hands participates in the U.S. Government's E-Verify program to determine employment eligibility. In compliance with the federal government, all hired applicants will be required to verify identity and employment eligibility upon hire. To learn more about E-Verify, please visit dhs.gov/e-verify . This link leads to the machine readable files that are made available in response to the federal Transparency in Coverage Rule and includes negotiated service rates and out-of-network allowed amounts between health plans and healthcare providers. The machine-readable files are formatted to allow researchers, regulators, and application developers to more easily access and analyze data. By submitting your application, you agree that Digital Hands may collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Digital Hands' recruitment activities. You may delete your application and/or unsubscribe from receiving notifications of career opportunities at Digital Hands at any time. For additional details on how Digital Hands uses and protects your personal information in the application process, including your rights under the California Privacy Rights Act (“CPRA”), click here to view our Privacy Notice.
    $59k-92k yearly est. Auto-Apply 45d ago
  • Senior Information Security Analyst

    Prevailance 4.2company rating

    Cyber security analyst job in Tampa, FL

    Job DescriptionDescription: is contingent upon successful contract award. Prevailance is seeking a highly skilled Senior Information Security Analyst to support the planning, design, implementation, operation, and reporting of cybersecurity systems across complex network environments. This role requires deep experience with the DoD Risk Management Framework (RMF), system accreditation processes, cyber incident response, and vulnerability management. The ideal candidate brings strong technical expertise, the ability to interpret and action tasking orders, and the capability to train and mentor military personnel on cybersecurity best practices. Responsibilities include, but not limited to: Support planning, design, implementation, and operation of cybersecurity systems and architectures Manage RMF accreditation processes for new and existing systems, using service-level RMF tools Identify, track, and resolve cybersecurity vulnerabilities across networked systems and platforms Review network security configurations and assess system health and compliance status Monitor systems, activate remote terminals, and support resolution of cybersecurity incidents Receive, interpret, and respond to Cyber Tasking Orders (CCTOs), enterprise OpDirs, and other cybersecurity directives Support development and maintenance of cybersecurity diagrams, including system-level and operational-level views Execute robust change management processes and maintain configuration documentation Train military personnel in cybersecurity processes, best practices, and unit training requirements Assist in developing and executing cybersecurity training and education programs Provide subject matter expertise on vulnerability remediation, risk management, and cyber readiness reporting Requirements: Qualifications: 5-8 years of experience in cybersecurity system planning, design, implementation, operation, reporting, and RMF accreditation Experience identifying, tracking, and resolving vulnerabilities across networked systems Desired Qualifications: Senior-level cybersecurity and defensive cyber operations experience Skilled in accrediting systems using service RMF tools and managing lifecycle compliance Capable of interpreting and responding to CCTOs and OpDirs and managing incident resolution workflows Proficient in reviewing network security settings and monitoring system health Ability to train military personnel and support cybersecurity education initiatives Capable of producing system-level cybersecurity diagrams and maintaining change control documentation Strong analytical, documentation, and communication skills Education: Bachelor's degree (BA/BS) DoD IAT Level II or higher certification (e.g., Security+, CISSP, CASP+) Security+ plus Cybersecurity Workforce Master Certification also meets the requirement Clearance: Possesses Top Secret Clearance ( SCI preferred ) Secret may be acceptable depending on mission needs If you meet these qualifications and are ready to make an impact, we encourage you to apply today! Prevailance, Inc. proudly supports veterans as a member of the V3 (Virginia Values Veterans) program and the Hire Vets initiative. Recognized as a Top Workplace in 2025, Prevailance fosters a supportive, mission-driven environment for its team members. We provide a comprehensive benefits package to eligible employees, designed to support health, wellness, and financial security. Our benefits include: Medical Insurance TriCare Supplemental Dental Insurance Vision Insurance Life & Accidental Death & Dismemberment (AD&D) Coverage 401(k) Plan with Company Matching Contributions Paid Time Off (PTO) 11 Paid Holidays Education Reimbursement Program Computing Device Reimbursement Program Prevailance, Inc. is an Equal Opportunity/Affirmative Action Employer. All qualified candidates will receive consideration for employment and will not be discriminated against based on race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, age, pregnancy, genetic information, citizenship status, marital status or any other consideration prohibited by law or contract. Prevailance, Inc. participates in E-Verify and is VEVRAA Compliant.
    $84k-109k yearly est. 25d ago
  • Information System Security Officer (ISSO) / System Administrator

    Nv5 Global, Inc.

    Cyber security analyst job in Saint Petersburg, FL

    There are two parts to this role, ISSO and System Administrator. The Information System Security Officer (ISSO) supports the security posture of classified and unclassified information systems within a geospatial technology environment. The ISSO works under the direction of the ISSM to implement security controls, maintain compliance with federal regulations, and protect sensitive geospatial data. This role involves monitoring, documentation, and day-to-day security operations to ensure systems remain accredited and secure under the Risk Management Framework (RMF). As a System Administrator, you will provide internal end user support for onsite and remote users and systems. Work Environment: * Location: NV5 Regional office St. Petersburg, FL * This position reports to the IT Business Services Manager * Potential travel up 10% of the time NV5 is a global technology solutions and consulting services company with a workforce of over 4,500 professionals in more than 100 offices worldwide. NV5's continued growth has been spurred through strategic investments in firms with unique capabilities to help current and future customers solve the world's toughest problems. The NV5 family brings together talent across a wide range of markets and fields, including Professional Engineers, Professional Land Surveyors, Architects, Photogrammetrists, GIS Professionals, Software Developers, IT, Project Management Professionals, and more. At NV5 Geospatial, we are a collaboration of intelligent, innovative thinkers who care for each other, our communities, and the environment. We value both heart and head, the diversity of our people, and their experiences because that is how we continue to grow as a leader in our industry and expand our individual and collective potential. Responsibilities Security Implementation & Monitoring * Assist in applying and maintaining security controls on geospatial systems in accordance with NIST, DoD, and company standards. * Monitor system security status and report anomalies or incidents promptly. * Support continuous monitoring activities and vulnerability management. Documentation & Compliance * Maintain and update security documentation, including System Security Plans (SSPs), POA&Ms, and audit logs. * Ensure compliance with RMF and applicable federal regulations. * Participate in internal and external audits and inspections. Incident Response * Assist in investigating and responding to security incidents. * Document findings and implement corrective actions under ISSM guidance. Non-classified domain, end user and workstation support * Work as a member of the Business Services Team to provide end user and workstation support for both onsite and remote users throughout the US and international offices Qualifications Requirements: * Education: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field. * CISSP or other advanced certifications preferred. * Active DOD Secret security clearance or ability to obtain it. Experience: * 2+ years in information system security or related field. * Familiarity with RMF, NIST SP 800-series, and DoD security requirements. * Experience supporting Windows OS, Microsoft O365, license severs, Microsoft SCCM * Experience working in a call management system Skills: * Proven experience in Systems Administration, Service Desk or similar role * Resourcefulness and problem solving aptitude * In depth understanding of computer hardware, networking and ticket management * Strong attention to detail and documentation skills. * Ability to work collaboratively in a team environment. Please be aware that some of our positions may require the ability to obtain a security clearance. Security clearances may only be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment may be subject to government security investigation(s) and must meet eligibility requirements for access to classified information. Employment is contingent upon successful completion of a background check and drug screening. NV5 offers a competitive compensation and benefits package including medical, dental, life insurance, FTO, 401(k) and professional development/advancement opportunities. NV5 provides equal employment opportunities (EEO) to all applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state, and local laws. NV5 complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. #LI-Onsite #LI-JG1
    $62k-88k yearly est. Auto-Apply 45d ago
  • Information System Security Officer (ISSO) / System Administrator

    Nv5

    Cyber security analyst job in Saint Petersburg, FL

    There are two parts to this role, ISSO and System Administrator. The Information System Security Officer (ISSO) supports the security posture of classified and unclassified information systems within a geospatial technology environment. The ISSO works under the direction of the ISSM to implement security controls, maintain compliance with federal regulations, and protect sensitive geospatial data. This role involves monitoring, documentation, and day-to-day security operations to ensure systems remain accredited and secure under the Risk Management Framework (RMF). As a System Administrator, you will provide internal end user support for onsite and remote users and systems. Work Environment: Location: NV5 Regional office St. Petersburg, FL This position reports to the IT Business Services Manager Potential travel up 10% of the time NV5 is a global technology solutions and consulting services company with a workforce of over 4,500 professionals in more than 100 offices worldwide. NV5's continued growth has been spurred through strategic investments in firms with unique capabilities to help current and future customers solve the world's toughest problems. The NV5 family brings together talent across a wide range of markets and fields, including Professional Engineers, Professional Land Surveyors, Architects, Photogrammetrists, GIS Professionals, Software Developers, IT, Project Management Professionals, and more. At NV5 Geospatial, we are a collaboration of intelligent, innovative thinkers who care for each other, our communities, and the environment. We value both heart and head, the diversity of our people, and their experiences because that is how we continue to grow as a leader in our industry and expand our individual and collective potential. Responsibilities Security Implementation & Monitoring Assist in applying and maintaining security controls on geospatial systems in accordance with NIST, DoD, and company standards. Monitor system security status and report anomalies or incidents promptly. Support continuous monitoring activities and vulnerability management. Documentation & Compliance Maintain and update security documentation, including System Security Plans (SSPs), POA&Ms, and audit logs. Ensure compliance with RMF and applicable federal regulations. Participate in internal and external audits and inspections. Incident Response Assist in investigating and responding to security incidents. Document findings and implement corrective actions under ISSM guidance. Non-classified domain, end user and workstation support Work as a member of the Business Services Team to provide end user and workstation support for both onsite and remote users throughout the US and international offices Qualifications Requirements: Education: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field. CISSP or other advanced certifications preferred. Active DOD Secret security clearance or ability to obtain it. Experience: 2+ years in information system security or related field. Familiarity with RMF, NIST SP 800-series, and DoD security requirements. Experience supporting Windows OS, Microsoft O365, license severs, Microsoft SCCM Experience working in a call management system Skills: Proven experience in Systems Administration, Service Desk or similar role Resourcefulness and problem solving aptitude In depth understanding of computer hardware, networking and ticket management Strong attention to detail and documentation skills. Ability to work collaboratively in a team environment. Please be aware that some of our positions may require the ability to obtain a security clearance. Security clearances may only be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment may be subject to government security investigation(s) and must meet eligibility requirements for access to classified information. Employment is contingent upon successful completion of a background check and drug screening. NV5 offers a competitive compensation and benefits package including medical, dental, life insurance, FTO, 401(k) and professional development/advancement opportunities. NV5 provides equal employment opportunities (EEO) to all applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state, and local laws. NV5 complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. #LI-Onsite #LI-JG1
    $62k-88k yearly est. Auto-Apply 45d ago
  • Application Security Engineer

    Suncoast Schools Federal Credit Union 4.2company rating

    Cyber security analyst job in Tampa, FL

    Compensation: $90,000 - $140,000 based on experience and credentials Position Type: Full-Time The Application Security Engineer collaborates closely with the enterprise agility, application development staff, information security and IT teams to implement a DevSecOps program. This role ensures security is built into web applications developed at Suncoast Credit Union. The individual is responsible for maintaining secure development standards, performing application penetration tests, and documenting remediation steps for the organization's applications. This position will maintain products assigned to application security and provide appropriate hands-on training to development staff. Responsibilities * Identify, exploit, and remediate common application vulnerabilities using tools and code review * Collaborate with the application development team to remediate vulnerabilities * Utilize penetration testing skills, tools, and methodology to assess new applications or services * Enforce secure development standards and requirements * Contribute to application security development projects and discussions * Utilize SAST/DAST and other products to identify security vulnerabilities * Develop and conduct security-focused training for the Suncoast Credit Union development team * Perform research on new security trends, tools, and techniques to improve existing processes * Prioritize and track assigned security issues * Maintain a professional working relationship with other departments through clear communication * Assist new team members with acclimating to new job roles and responsibilities * Respond to emergency situations in a proactive manner * Maintains knowledge and understanding of current trends, laws, and issues affecting area of expertise * Attends educational events to increase professional knowledge and benefit the organization Qualifications * Bachelor's degree in computer science, cyber security, or related field (A comparable combination of education, work experience, and training may be substituted for education requirements) * 3+ years of secure development experience * Experience programming and developing in .net * Strong knowledge of secure development and secure architecture * Familiar with C++ and C Sharp preferred * Proficient with cyber security, conducting penetration tests to assess vulnerabilities in applications (Blue Test or ethical hacker) * CSSLP, CISSP, GWAPT, CEH, or other applicable certifications preferred * Strong knowledge of web application vulnerabilities, exploits, and remediation techniques * Competent with dynamic and static testing tools or techniques * Experienced with secure coding principles and architecture * Ability to work as part of a larger team to find solutions * Ability to prioritize tasks by effectively managing competing and changing priorities to meet deadlines * Accurate, detail-oriented, and organized with task management * Ability to analyze and resolve complex problems * Excellent written, verbal, and interpersonal communication skills to interact effectively with members, staff, vendors, and government regulators * Ability to influence others regarding policies, practices, and procedures Benefits * Financial Well-Being: Bonus Program up to 12%, 401K Matching up to 8%, Retirement Planning, Pay Increases based on Competency, Employee Loan Discounts, Flex Spending Accounts * Wellness: Medical Coverage, Dental and Vision Coverage, Access to 4,000+ Gyms, Mental Health Resources, PTO Wellness Days, Short Term and Long Term Disability Coverage * Work-Life Balance: 11 Paid Holidays, 3 weeks of Paid Time Off, 4 weeks of Paid Parental Leave, Birthday PTO * Community Involvement: Paid Volunteer Hours * Growth: Degree Assistance up to $5,000 per year For more information, including additional benefits, please visit our benefits website at ************************************************ Company Overview Suncoast Credit Union is consistently chosen as a Tampa Bay Times Top Workplace because its employees genuinely #LOVEWORK! Employees flourish in an inclusive culture celebrating growth and prioritizing the community. Chartered in 1934. For more information, please visit our careers site at **************************************** Responsibilities * Identify, exploit, and remediate common application vulnerabilities using tools and code review * Collaborate with the application development team to remediate vulnerabilities * Utilize penetration testing skills, tools, and methodology to assess new applications or services * Enforce secure development standards and requirements * Contribute to application security development projects and discussions * Utilize SAST/DAST and other products to identify security vulnerabilities * Develop and conduct security-focused training for the Suncoast Credit Union development team * Perform research on new security trends, tools, and techniques to improve existing processes * Prioritize and track assigned security issues * Maintain a professional working relationship with other departments through clear communication * Assist new team members with acclimating to new job roles and responsibilities * Respond to emergency situations in a proactive manner * Maintains knowledge and understanding of current trends, laws, and issues affecting area of expertise * Attends educational events to increase professional knowledge and benefit the organization Qualifications * Bachelor's degree in computer science, cyber security, or related field (A comparable combination of education, work experience, and training may be substituted for education requirements) * 3+ years of secure development experience * Experience programming and developing in .net * Strong knowledge of secure development and secure architecture * Familiar with C++ and C Sharp preferred * Proficient with cyber security, conducting penetration tests to assess vulnerabilities in applications (Blue Test or ethical hacker) * CSSLP, CISSP, GWAPT, CEH, or other applicable certifications preferred * Strong knowledge of web application vulnerabilities, exploits, and remediation techniques * Competent with dynamic and static testing tools or techniques * Experienced with secure coding principles and architecture * Ability to work as part of a larger team to find solutions * Ability to prioritize tasks by effectively managing competing and changing priorities to meet deadlines * Accurate, detail-oriented, and organized with task management * Ability to analyze and resolve complex problems * Excellent written, verbal, and interpersonal communication skills to interact effectively with members, staff, vendors, and government regulators * Ability to influence others regarding policies, practices, and procedures Benefits * Financial Well-Being: Bonus Program up to 12%, 401K Matching up to 8%, Retirement Planning, Pay Increases based on Competency, Employee Loan Discounts, Flex Spending Accounts * Wellness: Medical Coverage, Dental and Vision Coverage, Access to 4,000+ Gyms, Mental Health Resources, PTO Wellness Days, Short Term and Long Term Disability Coverage * Work-Life Balance: 11 Paid Holidays, 3 weeks of Paid Time Off, 4 weeks of Paid Parental Leave, Birthday PTO * Community Involvement: Paid Volunteer Hours * Growth: Degree Assistance up to $5,000 per year For more information, including additional benefits, please visit our benefits website at ************************************************ Company Overview Suncoast Credit Union is consistently chosen as a Tampa Bay Times Top Workplace because its employees genuinely #LOVEWORK! Employees flourish in an inclusive culture celebrating growth and prioritizing the community. Chartered in 1934. For more information, please visit our careers site at ****************************************
    $90k-140k yearly Auto-Apply 7d ago
  • Security Systems Field Laborer

    Laforce Careers 4.2company rating

    Cyber security analyst job in Tampa, FL

    At LaForce, we specialize in delivering access control, video surveillance, and intercom solutions that keep people and businesses secure. We're looking for a dedicated and skilled Security Integration Field Laborer in our Tampa, FL location to join our team. This role assists with installing and maintaining access control systems, video surveillance, and other electro-mechanical security products for commercial businesses. What You'll Do: As a Field Laborer, you will help with ensuring secure and functional installations for our customers. Every day will bring new challenges, from problem solving complex technical issues to learning new technologies in the security industry. Your day-to-day will include: Helping with installing and programming access control systems, CCTV, intercoms, security systems, and electrical hardware with precision and efficiency. Troubleshooting and adjusting new or existing systems to meet customer needs. Safely handling disassembly and removal of electrical products and door hardware. Training customers on new and existing systems and software. Producing quality results on time and within budget, representing the company professionally, and fostering strong customer relationships. Helping with accurate wiring diagrams upon project completion for future reference. Maintaining clear, professional communication with customers, sales staff, and supervisors. Operating a company vehicle safely and respectfully in accordance with company policy. What You'll Bring: We welcome applicants with technical certificates, equivalent professional experience, or relevant military experience in electrical or mechanical fields. The ideal candidate has knowledge of low-voltage electrical wiring, the ability to read wiring diagrams and blueprints, strong problem-solving skills, and a valid driver's license with a clean record. Physical Requirements This role demands physical stamina and precision, including: Frequently standing, walking, climbing ladders, and lifting up to 40 pounds. Occasionally carrying loads up to 75 pounds Performing tasks requiring elevated activity. Why Join LaForce? At LaForce, you're part of a team dedicated to growth, innovation, and excellence. From competitive pay to a supportive culture that values your ideas, we're here to help you thrive. You'll receive a cell phone stipend, company-provided tools, and comprehensive hands-on training. How to Apply Screening includes a drug test, background check, and driver's license verification. If you're passionate about security systems and looking to make a difference in the field, apply today! We look forward to meeting you!
    $70k-101k yearly est. 60d+ ago
  • Cyber Security Systems Engineer

    Lukos

    Cyber security analyst job in Tampa, FL

    Cyber Security Systems Engineer Please note: This position is contingent upon the award of a contract. We will provide updates on the status of the contract and next steps during the hiring process. Minimum Qualifications Summary Certification & Education Must possess a current US Passport with ability to travel and work overseas. Must be able to complete a favorably adjudicated Tier 5 (T5) or Tier 5 Review (T5R) of the SSBI. This applies to all IA and Cybersecurity tasks. Must be able to meet COMSEC briefing and Local Element management certification requirements available under the OPNAVINST 2201.4, DoD Instruction 8523.01 and Air Force Manual 17-1301. Must be able to complete an in-scope (per current DoD 6-year reinvestigation requirement), favorable, ST5 investigation (to include SBPR, PPR, T5R, or current enrollment in the DoD Continuous Evaluation (CE) / Continuous Vetting (CV) program), adjudicated for SCI eligibility by the DoD Central Adjudication Facility (DoD CAF) without conditions, exceptions, or waivers at the time of performance and must maintain the level of security required for the life of the contract. Current DoD IAT certification Level II or above, NET + certified and Voice/Video Network Certification, preferably CISCO certified Must possess a TS/SCI Security Clearance Must possess and maintain professional certification at the DoD IAT II or above level Higher education degree in Cyber Security or related field preferred Experience Required Preferred: Prior experience and operational knowledge of planning, design, implementation, operation and reporting of cyber security systems and the Risk Management Framework (RMF) accreditation of new or existing systems and capabilities Preferred: Prior experience and operational knowledge of CENTCOM Cyber Tasking Orders (CCTOs), Marine Corps Enterprise Network OpDirs and track to completion Preferred: Prior experience and operational knowledge of security configuration of networks, monitoring systems, activating remote terminals as well as tracking and resolving Cyber incident reports Five years' military experience Job Objective Under a five-year contract, the Cyber Security Systems Engineer will support the United States Marine Corps Forces, Central Command (MARCENT) and subordinate commands. The scope of the requirement includes professional services for MARCENT located aboard MacDill Air Force Base (AFB), Florida, which serves as a Component Command to U.S. Central Command (USCENTCOM). Specifically, the Cyber Security Systems Engineer will support the Communication Directorate (G-6) within the continental United States (CONUS) and outside the continental United States (OCONUS). The G-6 provides communication support to MARCENT as well as command, control, communications, and computer (C4) policy advocacy to CENTCOM Communications (CCJ6) and HQMC agencies. The G-6 conducts C4 planning and validation for USMC forces operating in the CENTCOM AOR. Responsibilities Provide services for the planning, design, implementation, operation and reporting of cyber security systems and the Risk Management Framework (RMF) accreditation of new or existing systems and capabilities Provide technical and operational support including subject matter expertise for accreditation of systems in the Service RMF tool, remediation of vulnerabilities, and training of Military staff in correct cybersecurity processes Review the security configuration of networks, monitoring systems, activating remote terminals as well as tracking and resolving Cyber incident reports and problems related to vulnerabilities Receive, acknowledge, interpret and respond to CENTCOM Cyber Tasking Orders (CCTOs), Marine Corps Enterprise Network OpDirs and track to completion Develop Cyber Security diagrams that include operation and system level views while executing sound change management processes and assist in developing and executing the Command Cyber Security Training and Education Program Education & Certification Must possess a current US Passport with ability to travel and work overseas. Must be able to complete a favorably adjudicated Tier 5 (T5) or Tier 5 Review (T5R) of the SSBI. This applies to all IA and Cybersecurity tasks. Must be able to meet COMSEC briefing and Local Element management certification requirements available under the OPNAVINST 2201.4, DoD Instruction 8523.01 and Air Force Manual 17-1301. Must be able to complete an in-scope (per current DoD 6-year reinvestigation requirement), favorable, ST5 investigation (to include SBPR, PPR, T5R, or current enrollment in the DoD Continuous Evaluation (CE) / Continuous Vetting (CV) program), adjudicated for SCI eligibility by the DoD Central Adjudication Facility (DoD CAF) without conditions, exceptions, or waivers at the time of performance and must maintain the level of security required for the life of the contract. Current DoD IAT certification Level II, NET + certified and Voice/Video Network Certification, preferably CISCO certified Must possess and maintain professional certification at the DoD IAT II or above level Higher education degree in Cyber Security or related field preferred Security Clearance Must possess a TS/SCI Security Clearance Work Location MARCENT, MacDill Air Force Base, Tampa, Florida Travel: Contractor personnel must support the projected travel in support of government requirements to MARCENT AOR and supporting locations, which includes but not limited to the following countries: Bahrain, United Arab Emirates (UAE), Saudi Arabia, Jordan, Egypt, France, Germany, United Kingdom, Oman, Qatar, Kuwait, Iraq, Israel, Afghanistan, Syria, Lebanon, Yemen, Pakistan, Turkmenistan, Uzbekistan, Kyrgyz Republic, Tajikistan, Kazakhstan, Djibouti, Cyprus, Turkey, Italy, and Greece. The ideal candidate will be available for travel on less than 24 hours-notice to support personnel recovery and training for forward deployed forces. The ideal candidate will possess the ability to execute OCONUS travel throughout the Central Command (CENTCOM) AOR. About Lukos Lukos has been delivering professional services to the Federal Government for 15 years. We help a variety of federal agencies in areas such as national security, homeland security, international development, training, analytics, healthcare, and other professional services. Since our founding, we have grown to support all military services and multiple federal civilian agencies. About Our Name: Lukos is ancient Greek for “wolf”. The characteristics of the wolf match our approach to national security. The wolf is known for cunning, aggression, patience, and teamwork. An individual wolf is smart, strong, and resilient, but the true strength of wolves is their ability to work together as a wolfpack. Kipling said it best in The Law of the Jungle. "For the strength of the pack is the wolf, and the strength of the wolf is the pack." At Lukos we take care of our pack by offering full time employees competitive benefits to include: medical, dental, vision, 401(k), life insurance, short and long term disability coverage, paid time off and Federal holidays. Lukos is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, disability, or national origin.
    $70k-100k yearly est. 60d+ ago
  • Offensive Security Engineer

    Jpmorgan Chase & Co 4.8company rating

    Cyber security analyst job in Tampa, FL

    JobID: 210702924 JobSchedule: Full time JobShift: Base Pay/Salary: New York,NY $152,000.00-$260,000.00; Washington,DC $152,000.00-$260,000.00; Chicago,IL $133,000.00-$225,000.00; Jersey City,NJ $152,000.00-$260,000.00; Brooklyn,NY $152,000.00-$260,000.00 This position is also open in the following locations: Chicago, IL / Tampa, FL / Atlanta, FL / Plano, TX / Houston, TX / Brooklyn, NY / Columbus, OH / Washington, DC / McLean, VA / Jersey City, NJ / Wilmington, DE Drive the security of critical banking applications and platforms through hands-on offensive testing. As an Assessments & Exercises Vice President in the Cybersecurity and Technology Controls organization, you will play a key role in safeguarding the firm's most vital assets. Your primary responsibility will be to plan, execute, and report on penetration tests targeting high-impact applications, platforms, and services. Leveraging industry-standard methodologies and advanced techniques, you will proactively identify vulnerabilities, collaborate with application owners to understand root causes, and guide effective remediation to strengthen the firm's security posture. We are seeking candidates with a passion for offensive security, deep technical expertise in penetration testing, and a commitment to continuous learning and excellence. Job responsibilities * Plan, scope, and execute penetration testing engagements across a variety of environments, including web applications, APIs, cloud platforms, infrastructure, thick-client, and/or mobile applications. * Collect and validate pre-requisites for each engagement, ensuring all necessary access, documentation, and approvals are in place. * Perform manual and automated testing to identify vulnerabilities, misconfigurations, and security weaknesses, leveraging industry-standard tools and custom scripts. * Document and communicate findings through comprehensive reports that include technical details, risk assessments, and actionable remediation recommendations. * Conduct peer reviews of penetration test reports to ensure accuracy, consistency, and quality of deliverables. * Collaborate with development, infrastructure, and security teams to clarify findings, support remediation efforts, and provide subject matter expertise on offensive security. * Stay current with emerging threats, vulnerabilities, and attack techniques by leveraging threat intelligence, security research, and participation in relevant industry groups. * Contribute to the continuous improvement of penetration testing methodologies, tools, and frameworks to enhance effectiveness and alignment with firm strategy and regulatory requirements. Required qualifications, capabilities, and skills * 5+ years of hands-on penetration testing experience in offensive security, with a proven track record of scoping, executing, and reporting on complex engagements. * Expertise in manual penetration testing of web, API, cloud (AWS/Azure/GCP), infrastructure, thick-client, and/or mobile applications (android/iOS), including the use of industry-standard tools (e.g., Burp Suite, Nmap, Metasploit, etc.). * Strong understanding of security assessment methodologies such as OWASP Top Ten, NIST Cybersecurity Framework, and other relevant standards. * Ability to identify and articulate systemic security issues related to threats, vulnerabilities, and risks, and provide clear, actionable recommendations for remediation. * Exceptional organizational and communication skills, including the ability to write detailed technical reports and present findings to both technical and non-technical stakeholders. * Experience conducting peer reviews of penetration test reports and mentoring junior testers. * Continuous learner who keeps up with the latest offensive security trends, tools, and techniques. Preferred qualifications, capabilities, and skills * Knowledge of cybersecurity practices, operational risk management, and incident response methodologies within the US financial services sector, including relevant regulations, threats, and risks. * Proficiency in penetration testing and security concepts for both Windows and Unix-like operating systems. * Experience conducting security-focused source code reviews (e.g., Python, Java, Rust). * Experience in reverse engineering thick-client and mobile applications to identify vulnerabilities. * Relevant certifications such as OSWE, CREST (CRT, CCT), OSCP, OSCE, GXPN, GWAPT, GPEN, GMOB, or BSCP.
    $91k-117k yearly est. Auto-Apply 2d ago
  • Information Security Analyst II

    Geographic Solutions Inc. 3.7company rating

    Cyber security analyst job in Palm Harbor, FL

    Job DescriptionDescription: Job Summary: The Information Security Analyst will be responsible for directly supporting one or more of the following programs: Vulnerability Management (VM), Digital Forensics and Incident Response (DFIR), Tool Administration, Tool Documentation and/or Procedural Documentation drafting. GSI is a highly dynamic environment and as such the successful employee will adequately manage competing priorities in a growing department. Information Security analysts ensure that the organization is adequately aligning with the information security frameworks that GSI has established. Viable candidates must be willing to work onsite at GSI's headquarters in Palm Harbor, Florida daily. Key Responsibilities: Understanding of network infrastructure concepts Assisting with the configurations, engineering and deployments of new tools and features to existing toolsets Monitor and/or administer two or more Information Security tools Participates in the enforcement of Information Security policies, procedures and standard practices Conducting routine log analysis Analyzing and responding to findings appropriately, potentially during after-hours, based on the criticality Documenting findings in documents and/or a ticketing system Assisting in technical document creation, such as Standard Operating Procedures (SOPs) and Tool Documentation Participating in regular meetings with internal stakeholders including team leads and managers Creating and presenting presentations relevant to Information Security Work with auditors, both internal and external, to provide evidence of compliance Know or be willing to learn Information Security frameworks Participating in training events, seminars, and obtaining certifications Supporting other internal stakeholders, such as the Security Operations Center (SOC) and Network Operations Center (NOC) as needed Leading Security Incident calls and response teams Requirements: Work Experience / Knowledge: 1 - 3 years of relevant experience Knowledge of various security methodologies and processes, and technical security solutions (SIEM, IDS/IPS, Firewall Solutions, etc.) Knowledge of TCP/IP Protocols, network analysis, and network/security applications Basic proficiencies in Forensics and Malware Analysis (file signatures, tool sets, recovering data, analyzing memory, analyzing binaries) Knowledge of different Operating Systems Knowledge of common Internet protocols and applications General familiarity of industry compliance frameworks (NIST, ISO, HITRUST) Qualifications / Certifications: Bachelor's degree in Computer Science, Information Technology, or Cyber Security, or a related field OR High School diploma and relevant industry training and certifications Ability to excel in a fast paced and rapidly changing environment Strong work ethic with attention to detail Detail-oriented with a commitment to maintaining the highest standards of integrity and ethics Excellent communication and interpersonal skills to work effectively with cross-functional teams and external stakeholders Relevant industry certifications are a plus, such as: EC-Council Certified Ethical Hacker (CEH), CompTIA PenTest+, CompTIA Security+, CompTIA Network+, (ISC)² Systems Security Certified Practitioner (SSCP), or GIAC Security Essentials (GSEC), CISA, CISM Special Requirements: Must be proficient in the English language, both written and verbal May also be assigned various projects and tasks as needed Sitting for long periods of time Ability to lift 50 pounds Equal Opportunity Employer. M/F/D/V
    $61k-88k yearly est. 30d ago
  • F5 Security Engineer - Active TS/SCI with CI Poly

    ENS Solutions, LLC

    Cyber security analyst job in Tampa, FL

    Job Description Participate in the development and support of customer technical requirements Champion a collaborative, team-based environment, sharing standard methodologies and success and building positive relationships Plan, Design, Develop, Implement and Operate F5 products such as LTM, ASM, BIG-IQ and APM Manage the configuration on multiple physical and virtual F5 across multiple data centers Develop scripts and tools to automate configuration of a large number of network security devices distributed across multiple data centers Propose and implement system enhancements that will improve the performance and reliability of the network security infrastructure Applies capacity planning configuration changes as demanded by the business Address performance, scalability, and service architecture administration issues Design, install, configure, maintain network security services, equipment and devices Plan and support network security infrastructure Provide clear technical documentation and written procedures for issues identified and addressed Monitoring and troubleshooting of platform and OS based problems, network security infrastructure and connectivity issues Perform launch testing for new software releases and the introduction of new features Coordinate equipment orders including physical or virtual appliances, as well as upgrading, monitoring, testing and servicing the systems as needed Demonstrates knowledge of a broad range of technology towers i.e.: Storage, Virtualization, Intel, Networking, Data Center Migration and Disaster Recovery Knowledge of risk and controls landscape, ensuring company-wide standards are met Participate in change and incident management Anticipating potential problems and acting to minimize the impact they may have on the project or unit Ability to collaborate with different technology towers to achieve common goals Requirements Bachelor's degree in computer science, information systems, telecommunications, or an engineering focused field Must have an Active TS/SCI and willing to obtain a CI Poly 5+ years of relevant F5 experience with F5 LTM, ASM, BIG-IQ, and/or APM administration and life cycle management including experience with advanced iRule creation and troubleshooting Ability to handle multiple complex F5 configurations and deployments at once Understanding of networking at all layers of the OSI model; and Previous experience with web application technologies Experience deploying, managing, and troubleshooting network systems, switching, and routing protocol standards such as: TCP/IP, MPLS, OSPF, BGP, SDN, and 802.1x. Experience managing and troubleshooting DNS, DHCP, IPAM, and NTP in a large multi-site environment Ability to manage multiple stands of work simultaneously. Executes within a customer-centric environment. Excellent verbal and written communication skill Hands on experience with Python and APIs Self-driven with the ability to manage workload without direct supervision Must have the F5 201 certification 8570 IAT Level II Certification required Preferred Skills/Qualifications Experience with Infoblox DDI, Microsoft DNS, Dyn, VMWare Automation products (vRO, vRA) Benefits Essential Network Security (ENS) Solutions, LLC is a service-disabled veteran owned, highly regarded IT consulting and management firm. ENS consults for the Department of Defense (DoD) and Intelligence Community (IC) providing innovative solutions in the core competency area of Identity, Credential and Access Management (ICAM), Software Development, Cyber and Network Security, System Engineering, Program/Project Management, IT support, Solutions, and Services that yield enduring results. Our strong technical and management experts have been able to maintain a standard of excellence in their relationships while delivering innovative, scalable and collaborative infrastructure to our clients. Why ENS? Free Platinum-Level Medical/Dental/Vision coverage, 100% paid for by ENS 401k Contribution from Day 1 PTO + 11 Paid Federal Holidays Long & Short Term Disability Insurance Group Term Life Insurance Tuition, Certification & Professional Development Assistance Workers' Compensation Relocation Assistance
    $73k-103k yearly est. 6d ago
  • Senior Cloud Security Engineer

    Foley & Lardner LLP 4.9company rating

    Cyber security analyst job in Tampa, FL

    Foley & Lardner LLP is a great place to work because of what we do and how we do it. Here, your unique perspectives, experiences, and abilities will be embraced and developed, so you can excel. Being a part of Foley means having the opportunities and resources necessary to gain experience, advance professional goals, and forge meaningful connections. It's a place where you can build your career and enjoy professionally satisfying work. We have over 2,300 people who are #HappyatFoley, and we think you will be too. Foley & Lardner LLP is currently seeking a Senior Security Engineer to join the Architecture team in our Information Security department. The Senior Security Engineer is responsible for engineering and implementing solutions to enhance the Firm's security infrastructure, collaborating with the Information Security team, internal IT, and business units. This role focuses on securing cloud-based environments through initiatives such as Cloud Security Posture Management (CSPM), DevSecOps practices (e.g., automated security testing in CI/CD pipelines), Identity and Access Management (IAM/IDM) administration, and participation in Information Security Architecture reviews. Key responsibilities include implementing and maintaining robust security controls for technology infrastructure and cloud platforms, while ensuring secure integration of emerging technologies, including AI systems. The role also serves as an escalation resource for the Information Security Operations team, providing advanced expertise and support. As part of a small team, you will provide security guidance for the technology environment, aiming to mature the security control framework, develop tailored solutions for cloud workloads, and enhance overall security posture. You will act as a security advocate, advising key stakeholders on technology risk management and balancing security with business needs through effective mitigation strategies, ensuring safe adoption of cloud and related technologies. Responsibilities * Work in active partnership with key stakeholders to perform security architecture risk reviews. * Develop and implement advanced-level Cloud Security solutions. * Support and advance the overall Information Security technology roadmap. * Provide recommendations for advancing the Information Security program, security policies, and security control standards to enhance operational practices. * Create and maintain Information Security standards applicable to all technologies in the portfolio. * Provide requirement, guidance, and vision to the vendor community to cultivate the appropriate combination of technology and feature capabilities to meet current and future security requirements. * Execute on infrastructure threat and vulnerability management processes. * Ensure security systems are upgraded by monitoring security environment, identifying security gaps and evaluating and implementing enhancements. * Define, develop and maintain metrics and measurements for information security controls and processes. * Respond to security-related issues, problems, crises, and critical situations to support resolution and minimize downtime. * Act as a senior-level point of contact for incident investigations and minor security events (e.g., unauthorized access, non-compliance with Firm policies, fraud, service disruptions, etc.) to determine malfunctions, breaches, and remediation steps. * Responsible for Information Security technology selection process to include requirements consolidation into RFI/RFP/RFQ, testing, POC, selection and deployment. * Support audits against internal and industry process, quality, and security standards; drive initiatives and remediation efforts to correct non-conformance. * Provide Information Security consulting on security related issues. * Collaborate with peers to identify and implement improvement initiatives across the Firm, processes and toolsets. * Manage multiple, parallel projects using formal project planning techniques. * Ability to work evening and weekend hours as needed or directed. Some travel may be required. Qualifications * High School Diploma or equivalent required; Associate's Degree or Bachelor's Degree preferably in Engineering, Information Technology, Computer Science, or similar strongly preferred * Minimum of five (5) years in a professional technical Information Technology role required * Minimum of three (3) years of hands-on experience in Information Security with Cloud Security exposure required * Specialized Cloud Security certification(s), CISSP, Microsoft Azure AZ-104 & AZ-500, CCSP, CCSK, or CPT/CEH desired * SailPoint Identity and Access Management (IAM/IDM) vendor-specific certification(s) desired #LI-Hybrid In support of transparency and equity in the workplace, Foley provides salary ranges for all positions. The figures below represent the full compensation range of this position. The actual offered amount will be between the range minimum and midpoint based on the following factors: education, experience, geographic market, and internal pay equity at Foley.Chicago - $111,500 to $167,300
    $111.5k-167.3k yearly 14d ago
  • Computer Security Systems Engineer-AIC

    People Technology and Processes 4.2company rating

    Cyber security analyst job in Tampa, FL

    Computer Security Systems Engineer Clearance Level Required: Secret (eligible for Top Secret/SCI) Responsibilities include (but are not limited to): Provide technical support in the areas of survivability and vulnerability research and analysis to inform USCENTCOM CCJ3 and CCJ5 continuing requirements to improve survivability capabilities through the enhancement of Force Protection (FP) and assessment concepts and techniques. Perform technical, analytical, and programmatic analyses to develop transformational concepts to contribute to a more effective, flexible, and agile force, including maritime operations, and to deal with new, asymmetrical threats. Perform a variety of routine project tasks applied to specialized technology problems. Tasks involve integration of electronic processes or methodologies to resolve total system problems, or technology problems as they relate to Information Assurance requirements. Conduct security assessments and security consulting services. Analyze information security requirements. Qualifications Minimum 5 years of Geographic Combatant Command (GCC) staff experience is required. Experts on the functioning of a GCC, understand regional employment of national strategic objectives, and be knowledgeable on theater strategy, Combatant Command (COCOM) Campaign Plans (CCPs), COCOM Campaign Orders, Global Campaign Plans (GCPs), Annual Joint Assessment (AJA), and Chairman of the Joint Chiefs of Staff (CJCS) Joint Risk Assessment (CRAs), and Force Protection (FP) support to theater strategy, regional threats, security cooperation, advisory missions, phase zero operations, and the operations of a Joint Security Area. Experienced with the risk management process of the FP functions of the Service Components (i.e., ARCENT, AFCENT, MARCENT, NAVCENT, SPACECENT, and SOCCENT). Familiar with a variety of the field's concepts, practices, and procedures. Relies on extensive experience and judgment to plan and accomplish goals and independently performs a wide variety of complicated tasks. Provide consultation on complex projects and is considered to be the top-level contributor/specialist. Master's degree and/or Ph.D.; at least 12 years of experience in the field or in a related area. DoD secret clearance required, TS preferred with SCI eligibility.
    $70k-93k yearly est. 19d ago
  • Cyber Security Analyst - Senior II

    Amentum

    Cyber security analyst job in Tampa, FL

    in Tampa, FL. + **Description - External** + Performs assessment and authorization coordination. Advises and assists the customer with Risk Management Framework (RMF) and develops a Plan of Action and Milestones for resolving network deficiencies in accordance with DODI 8510.01 and ICD 503. + The duties of this task include assessing network compliance against controls listed in NIST 800-53 and creating A&A packages. Performs assessment, compliance, and validation of IT systems to support the Cybersecurity program at USSOCOM, its Component Commands, TSOCs, and deployed forces. + The Contractor shall execute a comprehensive assessment, compliance and validation of customer networks to ensure compliance with regulations and security and standards. + The end goal is to ensure the integrity of customer systems by identifying and mitigating potential shortcomings and vulnerabilities. + Advise USSOCOM, its Component Commands, TSOCs, and deployed forces on network and system risks, risk mitigation courses of action, and operational. + Additionally, the Cybersecurity Systems Analyst should be able to perform security evaluations and vulnerability assessments using the DOD Assured Compliance Assessment Solution (ACAS), Nessus vulnerability scanning tool and Security Content Automation Protocol tool. + Identify applicable STIGs and perform assessments using the Security Content Automation Protocol tool. The Cybersecurity Systems Analyst will liaison with network and system administrators to correct identified deficiencies. + The Cybersecurity Systems Analyst will also scan (or review scans) for new systems and applications being introduced into the SOF environment, identify issues, and draft certification letters for the government. The contractor will liaison with the Site Integration Facility (SIF) to ensure systems and application meet the standards in the DISA Security Technical Implementation Guides (STIG). + The Cybersecurity Systems analyst should be knowledgeable of cyber network defense tools such as end point security, SIEM, comply to connect, etc. + **Typical duties include** : + · Tracks A&A status of SIE governed ISs. Ensures these artifacts and documentation are available in the USSOCOM-chosen automated tool for cybersecurity + Provide DoD & IC RMF subject matter expertise to USSOCOM, its Component Commands, TSOCs, deployed forces and their delegates, including other Contractors, and assist with the development and execution of the RMF program at USSOCOM, its Component Commands, TSOCs, and deployed forces. + Maintain, track, and validate DISN, cloud and DIA connection approval packages, including those from USSOCOM, its Component Commands, TSOCs, and other subordinate organizations. + Develop and maintain supporting documentation for new and existing networks, cloud environments, information systems and technologies as they are introduced into the SIE + Develop and review the A&A of SIE networks, cloud environments, systems, services, telecommunication circuits, mobile devices, portable electronic devices, hardware, and software using the DoD & IC RMF to obtain an Authority to Operate (ATO), Interim Authority to Test (IATT), or Authority to Connect (ATC). + Perform risk and vulnerability assessments of IT and IS for authorization; prepare risk assessment reports for submission to the SCA and Authorizing Official/Designated Authorizing Official/Designated Accrediting Authority (AO/DAO/DAA) in accordance with DoD, DIA, USCYBERCOM, USSOCOM, Component Command, TSOC, and deployed forces' policies, procedures, and regulations. + Assist USSOCOM, its Component Commands, TSOCs and deployed forces with the enforcement of A&A, as well as DoD, DIA, USSOCOM, Component Command, TSOC, and deployed forces' connection standards for networks and systems. + Track and maintain A&A databases, web sites and tools to ensure that networks, systems and devices are properly documented and managed from a cybersecurity perspective. + Track and report to higher headquarters organizations (e.g. USCYBERCOM, DIA) compliance with applicable Cybersecurity regulations and directives. + Ensure timely notifications are made to responsible individuals and organizations in order to prevent lapses in accreditations (e.g., 30, 60, and 90 day notices). + Develop and maintain an Information Security Continuous Monitoring (ISCM) Plan. This plan shall address ongoing awareness of information security, vulnerabilities, security controls, and threats to support organizational risk management decisions. + · Identify, assess, and advise on cybersecurity control compliance and associated risks. + Coordinate with USCYBERCOM, DoD, DIA, NSA, DISA, and subordinate organizations to support the resolution of issues with security, A&A, connection approvals, and waiver requests. + Perform network, cloud, information systems, hardware, software and device security authorization and assessments, as well as the application and execution of policy, including project management support services. + Validate the patching of systems, perform validation scanning, develop Plans of Action & Milestone (POA&Ms), and report as directed by applicable policies, procedures, and regulations. + · Provide subject matter expertise for COA development and the implementation of Cybersecurity mitigation strategies. + Develop and implement required processes, procedures, and capabilities to mitigate vulnerabilities and weaknesses for software and hardware deployment. Identify, implement and validate continued effectiveness of key performance parameters and applied security measures + · Perform analytics on cybersecurity posture and provide reports to the AO/DAO and applicable stakeholders as required per ISCM and AO/DAO direction. + **Qualifications - External** + **Knowledge, Skills and Abilities:** + Experience with the US Combatant Commands (USCENTCOM/USSOCOM) is desired + Technical background with system administration experience, architecture and engineering preferred + Technical background in networking, identity management, Microsoft and Linux operating systems, database, and mobility + Working knowledge of the RMF. + Knowledge of the Telos Xacta or Enterprise Mission Assurance Support Services (eMASS) system is desired. + Must have excellent communications skill (written and oral) and interpersonal skills. + Knowledge and experience with DoD IA processes and policies (e.g., DODI 8510.01, NIST, CNSS and other cybersecurity policies, Chairman of the Joint Chiefs of Staff Manual (CJCSM) 65101.01, Incident Response and other IA policies). + Active TS/SCI clearance required. + **Experience, Education, & Certification Requirements** : + Years of Experience Required: 8+ yrs + Education Required: BA/BS + Certification Required: Current DoD 8570.01- M, IAT- Level III or IAM Level III. + **Example Certs: CISSP (or Associate), CASP+CE, CISA, CISM, CCISO, GCED, GCIH, CCSP, or GSLC** + Physical Requirements: May include lifting of weight up to forty (20) pounds as necessary + Work Environment: Can involve inside or outside work depending on the task. An inside environment may be a cubicle + (considerations: close quarters, low to moderate noise, bright or dim lighting). Outside work may include various + environmental conditions including warm and cold climates. Needs to be able to work well with co-workers and all levels + of management. No hazards on job or unusual environmental conditions. + Equipment and Machines: Ability to operate office equipment such as a personal computer, printer, copy machine, + telephone, fax machine and other equipment including desk supplies and other work-related tools as required. Possess + heavy and light equipment licenses, or the ability to obtain the necessary licenses. + Attendance: Normal hours are Monday - Friday between 6:00am to 4:00pm. With the exception of STD/LTD/FMLA & approved + time off, attendance is considered essential. + Other Essential Functions: + Must demonstrate professional behavior at all times when dealing with customers, management, and co-workers. Must have clear, concise and accurate communications skills in English, both verbal and written. + Grooming and dress must be appropriate for the position and must not impose a safety risk to employees or others. + Must maintain a positive work atmosphere by behaving and communicating in a professional manner. + Independent personal transportation to office or work site is required. Travel (up to 10%) to and from customer locations and test locations (government and vendor) may be required to support projects. This may involve airline travel. In some cases, accommodations can possibly be made for POV, if necessary. + When operating any vehicle for work purposes, must wear seat belt and in addition, no cellular devices are to be used when vehicle is in motion **Compensation Details:** $105,000 The compensation range or hourly rate listed for this position is provided as a good-faith estimate of what the company intends to offer for this role at the time this posting was issued. Actual compensation may vary based on factors such as job responsibilities, education, experience, skills, internal equity, market data, applicable collective bargaining agreements, and relevant laws. **Benefits Overview:** Our health and welfare benefits are designed to support you and your priorities. Offerings include: + Health, dental, and vision insurance + Paid time off and holidays + Retirement benefits (including 401(k) matching) + Educational reimbursement + Parental leave + Employee stock purchase plan + Tax-saving options + Disability and life insurance + Pet insurance _Note: Benefits may vary based on employment type, location, and applicable agreements. Positions governed by a Collective Bargaining Agreement (CBA), the McNamara-O'Hara Service Contract Act (SCA), or other employment contracts may include different provisions/benefits._ **Original Posting:** 01/14/2026 - Until Filled Amentum anticipates this job requisition will remain open for at least three days, with a closing date no earlier than three days after the original posting. This timeline may change based on business needs. Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters (********************************* SkbztPuAwwxfs) .
    $105k yearly 15d ago
  • Information Assurance Analyst

    Ascension Federal Services

    Cyber security analyst job in Tampa, FL

    Job Description: Information Assurance Analyst Clearance: Secret The Information Assurance Analyst will be responsible for ensuring the security and integrity of the organization's information systems and data. This includes implementing and maintaining security measures, monitoring systems for potential security breaches, and responding to security incidents as needed. Key Responsibilities: Implement and maintain security measures to protect the organization's information systems and data Monitor systems for potential security breaches and respond to security incidents as needed Conduct regular security assessments and audits to identify vulnerabilities and recommend solutions Develop and implement security policies and procedures to ensure compliance with industry standards and regulations Provide training and support to staff on security best practices and procedures Collaborate with other IT staff to ensure the overall security and integrity of the organization's information systems and data Qualifications: Bachelor's degree in Computer Science, Information Technology, or related field 5+ years of experience in information security or related field Knowledge of security best practices and industry standards Experience with security tools and technologies, such as firewalls, intrusion detection systems, and antivirus software Excellent problem-solving and analytical skills Strong communication and interpersonal skills Ability to work independently and as part of a team Benefits: 401(k) Dental insurance Flexible spending account Health insurance/Vision insurance Life insurance
    $49k-77k yearly est. 60d+ ago
  • Information Systems Security Officer (ISSO)

    Contact Government Services, LLC

    Cyber security analyst job in Tampa, FL

    Job DescriptionISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements. CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities. Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems. Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment. Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality. Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems. For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work. Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come. We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: ******************* #CJ We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $62k-88k yearly est. Easy Apply 16d ago
  • Security Systems Field Laborer

    Laforce Inc. 4.2company rating

    Cyber security analyst job in Tampa, FL

    At LaForce, we specialize in delivering access control, video surveillance, and intercom solutions that keep people and businesses secure. We're looking for a dedicated and skilled Security Integration Field Laborer in our Tampa, FL location to join our team. This role assists with installing and maintaining access control systems, video surveillance, and other electro-mechanical security products for commercial businesses. What You'll Do: As a Field Laborer, you will help with ensuring secure and functional installations for our customers. Every day will bring new challenges, from problem solving complex technical issues to learning new technologies in the security industry. Your day-to-day will include: * Helping with installing and programming access control systems, CCTV, intercoms, security systems, and electrical hardware with precision and efficiency. * Troubleshooting and adjusting new or existing systems to meet customer needs. * Safely handling disassembly and removal of electrical products and door hardware. * Training customers on new and existing systems and software. * Producing quality results on time and within budget, representing the company professionally, and fostering strong customer relationships. * Helping with accurate wiring diagrams upon project completion for future reference. * Maintaining clear, professional communication with customers, sales staff, and supervisors. * Operating a company vehicle safely and respectfully in accordance with company policy. What You'll Bring: We welcome applicants with technical certificates, equivalent professional experience, or relevant military experience in electrical or mechanical fields. The ideal candidate has knowledge of low-voltage electrical wiring, the ability to read wiring diagrams and blueprints, strong problem-solving skills, and a valid driver's license with a clean record. Physical Requirements This role demands physical stamina and precision, including: * Frequently standing, walking, climbing ladders, and lifting up to 40 pounds. * Occasionally carrying loads up to 75 pounds * Performing tasks requiring elevated activity. Why Join LaForce? At LaForce, you're part of a team dedicated to growth, innovation, and excellence. From competitive pay to a supportive culture that values your ideas, we're here to help you thrive. You'll receive a cell phone stipend, company-provided tools, and comprehensive hands-on training. How to Apply Screening includes a drug test, background check, and driver's license verification. If you're passionate about security systems and looking to make a difference in the field, apply today! We look forward to meeting you!
    $70k-101k yearly est. 60d+ ago
  • Information Security Analyst I

    Geographic Solutions Inc. 3.7company rating

    Cyber security analyst job in Palm Harbor, FL

    Job DescriptionDescription: Job Summary: The Information Security Analyst will be responsible for directly supporting one or more of the following programs: Vulnerability Management (VM), Digital Forensics and Incident Response (DFIR), Tool Administration. Viable candidates must be willing to work onsite at GSI's headquarters in Palm Harbor, Florida daily. Key Responsibilities: Understanding general network infrastructure concepts Assisting with the configurations and deployments of new tools and features to existing toolsets Monitor and/or administer one or more Information Security tools Participates in the enforcement of Information Security policies, procedures and standard practices Conducting routine log analysis Analyzing and responding to findings appropriately, potentially during after-hours, based on the criticality Documenting findings in documents and/or a ticketing system Assisting in technical document creation, such as Standard Operating Procedures (SOPs) Participating in regular meetings with internal stakeholders Occasionally creating and presenting presentations relevant to Information Security Work with auditors, both internal and external, to provide evidence of compliance Know or be willing to learn Information Security frameworks Participating in training events, seminars, and obtaining certifications Supporting other internal stakeholders, such as the Security Operations Center (SOC) and Network Operations Center (NOC) as needed Requirements: Work Experience / Knowledge: 1 - 2 years of relevant experience Knowledge of various security methodologies and processes, and technical security solutions (SIEM, IDS/IPS, Firewall Solutions, etc.) Knowledge of TCP/IP Protocols, network analysis, and network/security applications Basic proficiencies in Forensics and Malware Analysis (file signatures, tool sets, recovering data, analyzing memory, analyzing binaries) Familiarity with different Operating Systems Knowledge of common Internet protocols and applications General familiarity of industry compliance frameworks (NIST, ISO, HITRUST) Qualifications / Certifications: Bachelor's degree in Computer Science, Information Technology, or Cyber Security, or a related field OR High School diploma and relevant industry training and certifications Relevant industry certifications are a plus, such as: EC-Council Certified Ethical Hacker (CEH), CompTIA PenTest+, CompTIA Security+, CompTIA Network+, (ISC)² Systems Security Certified Practitioner (SSCP), or GIAC Security Essentials (GSEC) Special Requirements: Must be proficient in the English language, both written and verbal May also be assigned various projects and tasks as needed Sitting for long periods of time Ability to lift 50 pounds Equal Opportunity Employer. M/F/D/V
    $61k-88k yearly est. 12d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Dunedin, FL?

The average cyber security analyst in Dunedin, FL earns between $61,000 and $112,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Dunedin, FL

$83,000
Job type you want
Full Time
Part Time
Internship
Temporary