Cyber Security Analyst
Information security analyst job in Orlando, FL
Sanford Rose JFSPartners is currently looking for a Cybersecurity GRC Analyst for a full-time opportunity in Orlando. The GRC Analyst supports the security compliance program, tracking completion and remediation of compliance activities, and documenting compliance program evidence.
RESPONSIBILITIES:
Works as a team member in the Cybersecurity Department focusing on IT Security compliance processes and initiatives, acting as the central point of contact and collaborating with other organization units within the company in these matters
Supports security compliance program, ensuring the identification, tracking, prioritization, and remediation of all internal and external compliance requirements; also supports Internal Audit activities and remediation requirements.
Ensures adequate and effective IT controls exist to meet applicable current and future security compliance requirements found in laws, regulations, frameworks such as requirements to comply with SOX (Sarbanes-Oxley)
Coordinates the information security compliance efforts of all internal and outsourced functions that have one or more information security-related responsibilities, to ensure that organization-wide information security compliance efforts are consistent.
Assists with the implementation of company-wide security awareness and education programs that are aligned with security policy, standards, regulatory requirements, and industry practices.
Assists with vulnerability management reporting including patch management tracking and software code analysis reports.
REQUIRED TECHNICAL SKILLS:
3+ years of experience in an IT role focusing on information security and IT compliance
Knowledge of regulatory compliance regulations (PCI, SOX, PII)
Familiarity with industry standard frameworks such as NIST and ISO
Knowledge of information technology systems and processes, network infrastructure, data architecture, data processes and protocols
Experience with GRC tools (Oracle, RSA Archer, MetricsStream, etc.)
At Sanford Rose Associates - JFSPartners, we specialize in Finance & Accounting, Legal, and Information Technology recruitment, dedicated to helping professionals like you discover the perfect career opportunities. With a track record of assisting thousands of professionals nationwide, we are prepared to leverage our expertise on your behalf. Partnering with us means gaining access to serious candidates, minimizing hiring errors, and ensuring top-tier hires, all while navigating the hiring process with confidence. We understand the significance of finding the ideal role and aligning with an organization that shares your values.
Cyber Security Analyst
Information security analyst job in Tampa, FL
Job Title: Junior GRC Analyst
Openings: 1
Duration: 1 year +, potential to go perm
Pay Rate: $40
Interview Process: 1 virtual, final onsite with team
Minimum Qualifications & Experience Required
Bachelor's degree in Information Security, Computer Science, Risk Management, or related field
1+ year experience in IT, cybersecurity, or healthcare
Ability to assess and evaluate technical documentation (data flow and network architecture diagrams) and attestations /certifications (SOC 2, ISO)
Familiarity with the HIPAA Security Rule, NIST CSF 2.0, and PCI-DSS
Strong analytical, documentation, and problem-solving skills
Excellent written and verbal communication skills for both technical and non-technical stakeholders
Ability to manage multiple projects, collaborate across IT and business teams, and drive remediation efforts
Proficiency in Microsoft Office Suite (Excel, Word, PowerPoint)
Nice To Have Qualifications & Experience
Exposure to ServiceNow and Safe Security
Exposure to Factor Analysis of Information Risk (FAIR) for quantitative risk analysis
Basic understanding of first and third-party risk management concepts and practices
Familiarity with AI security concepts and emerging frameworks (NIST AI RMF, OWASP COMPASS)
Industry certifications such as CompTIA Security+, CRISC, or CISA
Day-to-Day Responsibilities
Conduct and document third-party risk assessments, reviewing security questionnaires, attestation/certification reports, BAAs, and technical diagrams
Assist with risk quantification by gathering scenario inputs, impact drivers, and control maturity data.
Support AI governance intake reviews and documentation for new use cases
Track remediation and corrective actions related to findings, risks, and audit outcomes
Assist in maintaining and updating risk registers and compliance documentation
Assist in incident response documentation, root cause analysis, and identifying control improvements
Support internal audits, e-discoveries, and evidence collection for regulatory and certification requirements
Monitor and track remediation of identified risks and compliance gaps
Help develop, document, and enforce security policies, standards, and procedures
Collaborate with IT and business teams to ensure adherence to standards
Prepare reports and dashboards for management on risk and compliance status
Stay current on emerging regulations and security best practices
Senior Cloud Security Analyst
Information security analyst job in Miami, FL
📍
Hybrid / Remote Options (No Sponsorship Available)
💼
Full-Time | Cloud Security | IAM | O365
About the Role
We are seeking a highly skilled Senior Cloud Security Analyst to lead the evaluation, security posture management, and continuous improvement of our multi-cloud and O365 environments. This role acts as a cross-brand consultant-connecting teams, identifying security gaps, standing up cloud environments, and guiding technical staff on required security controls and the “why” behind them.
You will assess digital and cloud security posture, outline required improvements, and partner with IT stakeholders to bring environments into compliance. This is a hands-on position focused on Azure, AWS, GCP, IAM governance, O365 security, and cloud access controls, along with managing and enhancing vulnerability management and key security indicators.
You will work closely with senior network and security analysts in a small, highly collaborative team supporting both shoreside and distributed operational environments.
What You'll Do
Cloud Security & Posture Management
Oversee, evaluate, and continuously strengthen cloud security posture across Azure, AWS, and GCP.
Assess current security controls, identify gaps, and develop actionable projects to remediate risks.
Provide clear security directives such as: “Your cloud environment requires A-D; you currently only have A,” and work with teams to stand up missing controls.
IAM & Access Governance
Support access and identity processes for O365, AD, Linux, and cloud-based platforms.
Assist with IAM operations involving SailPoint and enterprise identity workflows.
Evaluate access levels across environments and ensure appropriate permissions and segregation-of-duties.
Security Operations & Monitoring
Monitor brand security posture and provide input into SIEM integrations, identifying blind spots and validating configurations.
Support vulnerability management initiatives, analyzing cloud findings (e.g., Orca, Qualys) and helping IT translate data into actionable remediation.
Assist security operations with monitoring and triaging cloud security events.
Reporting & Stakeholder Engagement
Build dashboards and reporting for executives and business leaders communicating KRIs, risks, and security posture.
Provide training, documentation, and consulting to IT team members on cloud configurations, security best practices, and new technologies.
Architecture, Projects & Continuous Improvement
Support cloud implementation and architectural reviews for upcoming solutions.
Partner with PMO teams to build and prioritize the cybersecurity backlog.
Recommend modern replacement technologies for legacy systems.
Required Qualifications
Bachelor's degree preferred (IT, Cybersecurity, Computer Science, or related).
5+ years of experience in cloud security and access management.
Hands-on expertise with:
Azure security and administration
AWS security controls & tenant management
Active Directory, O365 security, Linux/Windows access admin
SailPoint IAM
Orca Security (preferred)
PowerShell and scripting (Python, etc. nice to have)
Strong understanding of IAM principles (not an IAM engineer, but fluent in IAM governance).
Experience with GDPR, PCI, NIST frameworks.
Ability to connect dots across teams and act as a security consultant between groups.
Strong analytical, communication, and stakeholder management skills.
Preferred Certifications
Microsoft 365 Messaging or Security Administrator
CompTIA Cloud+
Cloud Security-related certs (Azure, AWS, or GCP)
Top Skills
Cloud Security (Azure, AWS, GCP)
O365 Security
AD & Access Management
IAM Support (SailPoint)
Scripting (PowerShell / Python)
Security Posture Assessment
Vulnerability Management (Orca, Qualys)
SIEM Integration Review
Risk & Compliance (NIST, PCI, GDPR)
Team Structure
You'll join a small, senior-level team consisting of:
Senior Network Security Analyst
Senior Security Analyst
Technology - Security Analyst Senior
Information security analyst job in Jacksonville, FL
Job Title: Technology - Security Analyst Senior
Duration: Long term contract
Experienced professional responsible for implementing, maintaining, monitoring, and troubleshooting enterprise-wide security systems. Supports 24/7 availability, mentors junior staff, and ensures compliance with security frameworks and policies.
✅ Core Responsibilities:
Implement and manage enterprise security systems, including cloud-based (AWS/Azure).
Perform security audits, risk analysis, and vulnerability assessments.
Conduct log analysis via SIEM tools; respond to security incidents.
Lead incident response, threat hunting, and forensic analysis.
Maintain firewalls, encryption systems, and endpoint protections.
Develop and enforce security policies, SOPs, and compliance protocols.
Manage user access, logical security, and secure configurations.
Collaborate cross-functionally on infrastructure and software security.
Support regulatory compliance with standards (e.g., NIST, COBIT).
Train and mentor team members; provide escalated issue resolution.
Evaluate and onboard new security technologies.
✅ Technical Skills Required:
Operating Systems: Windows (5+ years), Linux is a plus
Cloud Platforms: AWS (EC2, IAM, Security), Azure (AD, Sentinel, Security Center)
Security Tools: SIEM (e.g., Splunk), Firewalls, IDS/IPS, Endpoint Protection
Scripting: PowerShell, Python, VBScript, Regex
Frameworks & Compliance: NIST, COBIT, ISO 27001, ITIL
Forensics & IR: Evidence gathering, threat profiling, penetration testing
Documentation: RFPs, RFIs, policy writing, technical reporting
Protocols: TCP/IP, DNS, HTTP/S, LDAP, SNMP, VPN, SSH
✅ Soft Skills & Abilities:
Critical thinking and creative problem-solving
Leadership in projects and incident response
Effective communication (written and verbal)
Mentoring and knowledge-sharing
Ability to prioritize and work independently under pressure
Collaboration across departments and vendors
✅ Educational Requirements:
Preferred: Bachelor's degree in CS, InfoSec, or related
Alternate: 8 years equivalent experience in system/security administration
✅ Experience Requirements:
Minimum: 4 years in security/system admin in enterprise IT
Mandatory: 5 years in Windows environment
✅ Required Certifications (any 2 or equivalent):
Security & Compliance: GIAC GMON, GPCS, DoD 8570 certs
Cloud & Microsoft:
AWS: Cloud Practitioner, Solutions Architect, Security Specialty
Azure: Fundamentals, Security Ops/Engineer, Solutions Architect
MCSE
Aviatrix Certified Engineer (ACE)
IT Security Engineer
Information security analyst job in Saint Petersburg, FL
Location: St Petersburg, FL | Southfield, MI | Memphis, TN - [This position follows a hybrid work model, requiring on-site presence approximately 10-12 days per month].
Please note: This role is not eligible for work visa sponsorship, now or in the future.
Compensation: $110,000 - $140,000 base salary range.
Job Summary
We are seeking an experienced IT Security Engineer to join our Identity & Access Management Engineering team, with a focus on Identity Governance & Administration and Directory Services. In this role, you will help secure the enterprise by managing and optimizing critical platforms such as Microsoft Active Directory, Microsoft Entra ID, and Infoblox.
As a Security Engineer, you will do more than maintain systems-you will help shape the future of IAM. You will contribute to strategic projects, implement advanced security solutions, and drive automation to improve operational efficiency. This position offers the opportunity to work on high-impact initiatives that reduce risk, enable business growth, and ensure compliance across a dynamic environment.
If you thrive in a collaborative setting, enjoy solving complex problems, and want to make a measurable impact on enterprise security, this role provides an excellent opportunity to innovate, lead, and grow.
Responsibilities
Manage and maintain Active Directory, Entra ID, and DNS/DHCP/IPAM systems.
Define and implement support procedures for AD, Entra ID, and DNS/DHCP/IPAM.
Handle operational engineering tasks, including tickets, incidents, change requests, vulnerability remediation, and maintenance.
Provide technical input on IAM technologies, policies, and compliance requirements.
Participate in IAM-related projects and contribute to deliverables using established methodologies.
Engage in enterprise disaster recovery exercises and participate in on-call rotations.
Recommend and implement technical improvements to enhance security and efficiency.
Collaborate with stakeholders to translate business requirements into technical solutions.
Develop and maintain system documentation, including flowcharts, diagrams, and specifications.
Document current and future state processes and assist in planning transitions.
Required Technical Skillsets
Minimum 5 years of experience with Active Directory, Entra ID, AWS, and DNS/DHCP/IPAM.
Hands-on experience with IAM in hybrid and cloud environments.
Strong experience with networking solutions such as DNS/DHCP/IPAM.
Proven scripting and automation skills (e.g., PowerShell).
Enterprise-level experience required; financial services experience preferred.
Additional skills: event/log analysis, troubleshooting, system monitoring, and event analysis.
Education
Bachelor's degree in Computer and Information Science (required).
High School diploma (required).
Director Information Technology Security
Information security analyst job in Boca Raton, FL
Flybridge Staffing is currently searching for a Director of InfoSec/Cybersecurity for a client who develops and delivers innovative merchant payment processing and point of sale solutions to clients nationwide. This role will be centralized in our Boca Raton office, with remote work 90% of the time.
****NO SPONSORSHIP AVAILABLE**** US Citizen, and GC only please.
We are currently seeking an InfoSec/Cybersecurity Director who will continue to mature the company's Cybersecurity and Information Security posture and strengthen the overall security controls throughout the enterprise.
This role will enable the expansion of the company's ability to meet and exceed all financial services and payments industry security standards, such as PCI and SOC-1 compliance requirements, through the implementation of sound policies, procedures, and tools needed to secure our customers and the company's information.
Responsibilities
Initiate, develop, and maintain information security policies and procedures.
Ensure security strategies are being followed to meet organizational security goals and industry standards such as PCI and SOC-1.
Identify security risks, coordinate and/or perform assessment of security risks, facilitate risk and security incident responses, and validate security controls as needed.
Document all the security policies and promote activities and procedures to create a general awareness about the significance of security within the company.
Review the security plans that have been implemented on the systems throughout the entire network of the organization, thus acting as an information security consultant.
Ensure that IT security best practices and configurations are included in network, desktop, server, wireless, VoIP, and mobile configurations.
Configure, implement, monitor, and support security software/systems that will help ensure compliance with regulatory, industry, and corporate policies and procedures. This includes but is not limited to IDS/IPS, secure file transfer, DLP, encryption, firewall rule assessments, log management/correlation, secure password storage/retrieval, application whitelisting, vulnerability management, threat hunting, etc.
Respond to security-related tickets escalated from various departments and work collaboratively across multiple teams to communicate and manage expectations during the resolution of the issue.
Monitor, analyze, and respond to SIEM alerts from monitoring tools and third-party vendors.
Perform regular inspections and tests (e.g., External and Internal PEN tests) to ensure the security of sensitive information.
Assist in routine system and network management tasks as needed, including Change Management, System Updates and Patch Management; Backup and Recovery of server and desktop systems.
Assists IT Department in assessing technological risks.
Minimum Qualifications
BA or BS degree and/or equivalent combination of education and experience.
At least 10 years of experience in a medium or large-sized enterprise or service provider IT organization.
Minimum of six (6) years' experience in IT security infrastructure, design, operations, and information assurance.
Deep understanding and 5+ years of experience working with industry-leading security platforms (e.g. firewalls, IDP/IDS, anti-virus, threat intelligence, vulnerability management, etc.).
Additional Requirements
Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Information Systems Security Engineering Professional (ISSEP) or other certifications preferred.
Hands on experience as an incident first responder or incident response manager.
Hands on experience (build, administration, and maintenance) of Windows, Linux and virtualization technologies.
Expert knowledge of patch and vulnerability management processes.
Knowledge of cloud technologies with current experience and training.
Knowledge of network protocols, utilities, and topics.
Knowledge of vulnerability and threat management solutions.
Knowledge of desktop and backup technologies.
If your background aligns with the above details and you would like to learn more, please also submit your resume to jobs@flybridgestaffing.com or on our website, www.flybridgestaffing.com and one of our recruiters will be in touch with you ASAP.
Follow us on LinkedIn to keep up with all our latest job openings and referral program.
Security Engineer
Information security analyst job in Miami, FL
Must reside in South Florida to be considered, this is on site in Miami
Contract
The Security Engineer plays a key role in strengthening the organization's security posture by supporting the design, implementation, and operation of modern security tools and infrastructure. This role focuses on monitoring security systems, performing threat analysis, responding to incidents, and enforcing security baselines and controls. The Security Engineer works closely with infrastructure, engineering, and compliance teams to reduce risk and ensure alignment with security best practices.
Requirements
5+ years of experience in cybersecurity, security engineering, or related technical security roles
Hands-on experience with security tools such as SIEM, EDR, vulnerability scanners, and log management platforms
Strong understanding of security frameworks (NIST, CIS, ISO 27001) and best practices
Experience with incident response, threat analysis, and remediation processes
Knowledge of network security, endpoint security, and cloud security fundamentals
Experience with scripting or automation (Python, PowerShell, Bash)
Excellent analytical and problem-solving abilities
Strong communication skills and ability to work cross-functionally with IT, engineering, and compliance teams
Responsibilities
Assist with the design and implementation of modern security tools and infrastructure to support enterprise hardening initiatives
Monitor and manage security systems including SIEM, EDR, and vulnerability management platforms
Perform threat analysis, investigate security events, and support incident response and remediation activities
Implement, maintain, and audit security policies, controls, and configuration baselines
Support risk assessments, compliance reporting, and security documentation efforts
Collaborate with engineering and operations teams to identify and remediate security risks across the environment
Contribute to continuous improvement initiatives in detection, response, and security automation
IT Portfolio Analyst
Information security analyst job in Miami, FL
This position plays a central role in coordinating activities throughout the IT ecosystem - including Security, Business Platforms, and Data & Analytics. The Analyst applies flexible, agile-inspired project management methods to encourage collaboration, maintain visibility, and support the continuous delivery of technology initiatives. The role ensures that IT efforts remain synchronized across teams and aligned with organizational objectives.
Beyond project execution, this role partners with stakeholders from multiple departments to clarify goals, prioritize work, and monitor measurable progress. By strengthening communication between technical teams and business units, the Analyst contributes to process improvement, change enablement, and the consistent delivery of value through IT initiatives that advance the company's strategic direction.
Responsibilities
Coordinate IT Life Cycle Activities: Manage cross-functional work across Security, Business Platforms, and Data & Analytics to support ongoing IT programs and ensure operational alignment.
Implement Agile Practices: Apply streamlined project management techniques to enhance teamwork, transparency, and iterative progress across IT efforts.
Align Stakeholders: Act as a liaison between technology and business groups, facilitate updates, and support adoption of new processes or tools that improve overall IT effectiveness.
Qualifications
Bachelor's degree in Information Technology, Computer Science, or a related discipline.
At least five years of experience delivering or coordinating IT projects using Agile or blended methodologies.
Working knowledge of core IT areas such as cybersecurity, software development, and risk management.
Proficiency with Agile project or portfolio management platforms (e.g., Smartsheet, Monday.com).
Strong facilitation, communication, and organizational skills, with experience engaging both business and technical audiences.
Application Security Engineer
Information security analyst job in Orlando, FL
We are seeking a Senior Software Engineer with strong expertise in application security to join a forward-thinking technology team focused on enhancing secure software development practices. This role combines deep technical knowledge with the ability to collaborate across engineering and security teams to ensure robust, secure applications.
Role Overview
The ideal candidate will have a software development background (Java and JavaScript preferred) and hands-on experience in application security, including vulnerability analysis, remediation strategies, and secure coding principles. This position requires strong communication skills to act as a bridge between development and security teams, driving best practices and influencing architecture decisions.
Key Responsibilities
Implement and manage software security testing techniques aligned with enterprise standards.
Analyze and assess open-source vulnerabilities, including zero-day threats, and determine impact on applications.
Develop and execute remediation plans for identified risks, including code refactoring and dependency updates.
Champion secure coding practices and lead security reviews across engineering teams.
Provide technical designs and recommendations to reduce vulnerabilities and improve security posture.
Collaborate with development, architecture, and security teams to integrate security into the software delivery lifecycle.
Stay current on emerging threats, tools, and best practices in application and cloud security.
Desired Skills & Competencies
Strong experience in application security testing and software composition analysis.
Knowledge of web application security, cloud security, and container security.
Familiarity with OWASP, CWE, CVE standards and vulnerability mitigation techniques.
Hands-on experience with tools such as Sonatype, Qualys, SonarQube, and AWS Inspector.
Proficiency in Java, JavaScript, and Python.
Working knowledge of AWS services, Docker, Terraform, and DevSecOps practices.
Excellent communication skills and ability to influence technical and non-technical stakeholders.
Preferred Qualifications
Bachelor's degree in Computer Science or related field (AWS and security certifications a plus).
Experience collaborating with cross-functional teams and driving secure development initiatives.
Familiarity with industry-standard tools for code quality, repository management, and CI/CD pipelines.
Information Technology Operations Analyst
Information security analyst job in Hollywood, FL
Based in Hollywood, FL, Sintavia, LLC designs and additively manufactures critical components for the Aerospace, Defense, & Space industry.
We are seeking a career-minded individual for the position of IT Operations Analyst, preferably someone who is looking for long-term growth and potential. In addition to the below, candidates must possess strong customer service skills, an eye for detail, and the ability to multi-task at a quick pace. Being a team player is a must!
SUMMARY: Specializes by platform or application and is responsible for performing all operational processes and procedures, ensuring that all IT services and infrastructure meet operational goals.
DUTIES AND RESPONSIBILITIES:
Analyze and provide solution to low complexity and routine computer issues
Work together with vendors to aid repairs of hardware, i.e., printers, laptops, and desktops
Responsible for the definition, design, implementation, and maintenance of support infrastructure for application solutions
Oversee the Incident, Problem, and Change management processes
Identify incident trends; recommend and implement improvements to reduce volume
Prepare SOP (Standard Operating Procedures) for the daily maintenance of applications and underlying systems
Keep Operations team up to date with new implementations and technologies
Establish clear communication channels for feedback from customers, peers, and cross functional teams
Identify new solutions for improved processes, as well as develop cost/benefit analysis for business solutions
Make certain that technology solutions adhere to quality standards
Collaborate with the project teams to review or inspect work to guarantee their quality
Assist in other tasks as required
QUALIFICATIONS:
Bachelor's degree (B.A.) from four-year college or university; or two years related experience and/or training; or equivalent combination of education and experience.
Demonstrated ability to balance department efficiency and service excellence.
Strong written, verbal, and interpersonal communications skills including ability to listen attentively and to communicate information clearly and effectively.
Demonstrated interpersonal, collaborative, and relationship-building skills; ability to interact positively with teammates at various levels across the company and customers.
Demonstrated ability to work well with cross-functional groups.
Self-motivated, able to multi-task, and detail oriented.
Strong organizational, analytical, problem-solving and decision-making skills.
Able to maintain a professional demeanor and a polished professional appearance.
Background checks will be completed on all candidates considered for hire.
REQUIREMENTS:
Working knowledge of systems architectural concepts and methodologies; infrastructure platforms and their application; business processes, process analysis/management, and IT requirements and IT managed services
It is also important that they can manage Critical Incident and Change Management SLA's with Service Provider, and can also manage and implement process improvements in NOC/SOC (network/security operation center)
Working knowledge of networking; can write Technical Specs and provide Level1 application Support (Client/Server)
Must have the required technical skills to identify system problems, as well as seek out ways to improve processes
Must be able to learn procedures quickly and be a team player
Easily adapt to new organizations / technical environments
Ability to handle and prioritize multiple tasks
Project management on small to medium projects
Must be able to perform a variety of routine tasks and demonstrate a good working knowledge of equipment, procedures and working with common hand tools
PHYSICAL DEMANDS AND WORK ENVIRONMENT:
Frequently required to sit, walk, stand, bend, stoop, kneel or crawl
Continually utilize visual acuity to operate equipment, read
technical information, and/or use a keyboard
Frequently required to lift/push/carry items up to 50 pounds
Work on Specialized equipment
WHY SINTAVIA:
We offer a comprehensive compensation and benefits package and the tools you will need to be successful, including:
Medical, dental, and vision plans after 30 days
Paid PTO and holiday
Paid life and long-term disability insurance
401(K) retirement plan and matching program
We provide a safe, fun, exciting and collaborative workplace, where growth and advancement opportunities abound.
Sintavia is an equal opportunity employer and a drug free workplace.
The above is intended to describe the general content of and requirements for the performance of this job. It is not to be construed as an exhaustive statement of duties, responsibilities or physical requirements. Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Cloud Security Analyst
Information security analyst job in Miami, FL
About the Company
Your new role as a Senior Cloud Security Analyst based in Miami, you will lead initiatives to strengthen the security posture across cloud environments (Azure, AWS, GCP). Acting as a consultant to internal teams, you'll evaluate digital security gaps, implement solutions, and ensure compliance with governance standards. You'll manage IAM processes, review access controls, monitor security events, and provide strategic security directives to stakeholders.
About the Role
Responsibilities
Lead initiatives to strengthen the security posture across cloud environments (Azure, AWS, GCP).
Act as a consultant to internal teams.
Evaluate digital security gaps and implement solutions.
Ensure compliance with governance standards.
Manage IAM processes and review access controls.
Monitor security events and provide strategic security directives to stakeholders.
Qualifications
Bachelor's degree in Computer Science or related field (or equivalent experience).
5+ years in cloud security and identity access management.
Required Skills
Expertise in Azure and AWS security administration.
Strong IAM knowledge (SailPoint, Active Directory, O365).
Familiarity with GDPR, PCI, NIST frameworks.
Scripting experience (PowerShell; Python a plus).
Experience with vulnerability tools (Qualys, Orca preferred).
Preferred Skills
Microsoft 365 Messaging or Security Administrator, CompTIA Cloud+.
Pay range and compensation package
110-120K plus bonus
Equal Opportunity Statement
We are committed to diversity and inclusivity.
Cyber Information Assurance Analyst III / Information Security
Information security analyst job in Pensacola, FL
Global Business Solutions, Inc., established in 1995, offers customers a distinctive blend of information technology capabilities, education and training services, and information assurance solutions. Managed by a team of executive leaders experienced in the field of information technology and training services within the industry and government, GBSI prides itself on exceeding expectations. Our award-winning solutions give clients the support tools needed to successfully deliver in evolving environments with confidence.
Job Description
Role and Responsibilities
This position does not represent a current opening and is posted for the purpose of collecting multiple resumes across various skill levels for a pending contract. GBSI may consider candidates who express an interest in this position for future job openings.
This Position is located in Pensacola, FL - Currently, there is no relocation assistance
.
The Cyber Information Assurance Analyst III designs and conducts regular audits on computer systems to determine that they are operating securely and that data is protected from both internal and external threats. Makes assessments of assigned systems to determine the system security status and ensure compliance to security policies, procedures and standards.
Primary Objectives of the Cyber Information Assurance Analyst III - InfoSec
Designs and recommends security policies and procedures;
Prepares training materials and instructs computer security education and awareness training programs;
Monitors, evaluates, and maintains complex security systems according to industry best practices and safeguards internal information systems and databases;
Reviews system configurations to ensure compliance with security requirements and complies with established standards;
Investigates security violations and breaches and recommends solutions;
Compiles reports on intrusions as necessary and provides analysis summaries to management;
Reviews organization wide firewall logs;
Provides reports to internal and external customers in response to queries and requests for computer security information;
Consults on tasks, provides leadership and guidance for junior personnel
Gives recommendations for product upgrades, patches and general security measures to secure and/or mitigate threats for various clients.
Qualifications
Qualifications and Education Requirements
Ability to pass a Government background check;
Bachelor's degree in Computer Science, Management Information Systems, or data security experience;
Four (4) or more years of experience in computer science, information systems management or data security may be substituted in lieu of a degree;
Experience working with system/network security tools;
Must possess an active CompTIA Security+ or CISSP certification or be able to obtain either certification within thirty (30) days of employment.
Preferred Qualifications
CompTIA Security+ Certification;
CISSP Certification.
Additional Information
GBSI is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action-Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA statement, please visit ********************************************************** You may also view the "EEO is the Law" poster directly at *****************************************************************
No part of this Position Description or of any other shall be construed as an employment contract. Employment with GBSI is at will and constrained by both the laws of the State of Florida and those of the state wherein the employee performs services for the company.
Information Security Analyst
Information security analyst job in Tampa, FL
As an Information Security Analyst, you will have shared responsibility for implementing and maintaining company's security strategies and services while providing security guidance based on industry standards and best practices. The ideal candidate will ho have an educational background and/or experience to maintain and support assigned information security technologies with general leadership oversight.
*This position is located out of our Tampa, FL corporate office.
2 days a week in office are required*
Some of the regular responsibilities may include:
Provision, manage, monitor, test, and decommission security tools and applications.
Attend and lead small project meetings and enforce best practices.
Apply specialized security technical knowledge.
Evaluate, plan and implement security projects.
Remain current on assigned security tools and applications and apply skilled understanding of troubleshooting.
Document and resolve moderately complex problems.
Report progress to leaders.
Monitor and analyze Identity security incidents, and provide recommendations for remediation
Other duties as assigned or required.
Experience to be successful:
IT security risks and mitigation strategies.
Security Incident Response
Security frameworks, including ISO and NIST.
Company IT and HR policies.
Various IT security-related regulatory requirements.
IT security logging and monitoring strategies.
Deployment and use of sophisticated IT security monitoring tools.
Educational background: Bachelor's degree in computer science, Information Systems, or other related field; or has 2-5 years of relevant experience.
Technical Skills to understand the role:
Analytical ability
Analyzing Security System Logs, Security Tools, and Data
Communicating Up, Down, and Across All Levels of the Organization
Creating, Modifying, and Updating Security Information Event Management (SIEM)
Deep Understanding of Risk Management Frameworks
Discovering Vulnerabilities in Information Systems
Evaluating and Deconstructing Malware Software
Familiarity with Security Regulations and Standards
Implement and Maintain Security Frameworks for Existing and New Systems
Maintaining Security Records of Monitoring and Incident Response Activities
Monitoring Compliance with Information Security Policies and Procedures
Network and System Administration Experience
Responding to Requests for Specialized Cyber Threat Reports
Performing Cyber and Technical Threat Analyses
Performing Security Monitoring
Producing Situational and Incident-Related Reports
Providing Host-Based Forensics
Providing Timely and Relevant Security Reports
Responding to Security Events
Supporting and Managing Security Services
#LI-MB1
Benefits may include:
Comprehensive medical, prescriptions, dental and vision plans
401(k) plan with a discretionary company match
Shareholder Purchase and Reinvestment Plan
Basic life and accidental death and dismemberment insurance premium paid by the company
Voluntary supplemental life insurance for employees, spouses and dependent children
Fertility and Family Building Benefits
Paid Disability benefits
Paid time off programs
11 Company paid holidays per year
Flexible spending account
Health savings account (available to High Deductible Health Plan participants only)
Employee Assistance Program
Educational Assistance Program
Voluntary benefits, such as Critical Illness, Hospital Indemnity, Pet Insurance and Accident Insurance
Title insurance policies and certain escrow services for the employee's primary personal residence at no charge
Transportation benefit plan for mass transit, parking and vanpool, in several markets
Note: If you currently are employed by Old Republic Title (or one of its wholly owned affiliated companies) please get in touch with your human resources representative regarding the application process.
For California applicants, please click the following link to view our CCPA Applicant Notice
Old Republic Title is an Equal Opportunity Employer
Auto-ApplyCyber Tabletop Analyst
Information security analyst job in Destin, FL
Responsibilities • Support the planning and execution of cyber exercises and wargames. • Assess resiliency of weapon systems and critical infrastructure. • Assist with course of action analysis and strategy development. • Coordinate exercise progress and activities between clients and DoD agencies.
• Support the development of a novel wargaming methodology.
Requirements
• Experience with cyberspace operations, operational planning, and cyber mission force operations.
• Experience with exercise and training activities, including tabletop exercises and professional analytic wargaming.
• Ability to work well in a fast-paced environment with a diverse team.
• Ability to prioritize mission-essential tasks toward wargame objectives.
• Ability to plan, conduct, and analyze research to inform cyberspace wargames.
• Top Secret clearance.
• HS diploma or GED and 4+ years of experience in an operational role with DoD or interagency partners, or Bachelor's degree and 3+ years of experience.
Nice-to-haves
• Experience in intelligence analysis and developing adversary capability assessments.
• Experience in a military staff environment.
• Experience briefing and delivering training to senior military and civilian leaders.
• Experience using modeling and simulation tools to conduct assessments.
• Possession of excellent organizational skills.
• TS/SCI clearance.
• Master's degree.
About Us: We are Command Post Technologies, Inc. (CPT). CPT is a Service-Disabled, Veteran-Owned Small Business (SDVOSB), providing engineering services in the areas of Cyber Security, Software Development, Test & Evaluation, and Strategic Planning. CPT employees appreciate working in a caring environment that promotes a healthy work-life balance. As individuals, we come together as a team, supporting a culture rooted in our core principles of integrity, determination, and innovation. In all CPT's collaboration efforts, our team prioritizes communication, accountability, and being resourceful to maximize efficiency and results.
What's In It for You
Leadership training
Career professional development
Tuition reimbursement
Flexible hours
Work/Life balance
Rewards and recognition
Parental Leave
Command Post Technologies, Inc. (CPT) is a Service-Disabled Veteran-Owned Small Business (SDVOSB) founded in 2008 and headquartered in Suffolk, VA with personnel in various states including Virginia, Maryland, Florida, and Texas. With 2/3 of our staff being former military, CPT firmly believes in employing veterans. Command Post Technologies, Inc. is a unique provider of innovative solutions that enhance our corporate clients' productivity and empower our government clients with the ability to protect against all enemies: foreign and domestic. CPT adapts its successful military experiential approach to the needs of leaders in a global business environment and provides an elite leadership curriculum that results in a world-class, leadership-altering event.
Command Post Technologies Inc. (CPT) is an Equal Employment Opportunity and Affirmative Action employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identify, gender expression, sex, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law. We take Affirmative Action to ensure equal opportunities for employees and potential employees without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sex, sexual orientation, marital status, veteran status, disability genetic information, citizenship status, or membership in any other group protected by federal, state, or local law.?
We abide by the Pay Transparency Nondiscrimination Provision and will refrain from discharging or otherwise discriminating against employees or applicants who inquire about, discuss, or disclose their compensation or the compensation of other employees or applicants. An exception exists where the employee or applicant makes the disclosure based on information obtained while performing his or her essential job functions.
Cyber Security Specialist - Data Analysis
Information security analyst job in Estero, FL
A Day in the Life: The Cyber Security Specialist is a key member of the Security team that helps to assemble key performance metrics to demonstrate the effectiveness of the Cybersecurity organization. The starting salary for this role is $90K; commensurate with experience.
What You'll Do:
+ Design, develop, and maintain various interactive data visualizations and reports. These in-depth insights will empower organizations to streamline the decision-making process.
+ Analyzes and researches known indicators of compromise, key metrics and can correlates events.
+ Collaborates with IT and business leaders to ensure the reports are meeting the defined metrics.
+ Experience in analytical thinking to analyze data and provide relevant narratives.
+ Work with threat intelligence data from multiple sources and databases.
+ Familiar with Cybersecurity trends.
+ Drive optimal cyber security services to complete resolution according to security SLA's.
+ Handle all private information with discretion and keep sensitive information private.
+ Excellent teamwork competencies, seeks out opportunities to partner with all stakeholders.
What We're Looking For:
+ Bachelor degree in Computer Science, MIS, or related field.
+ 1 - 5 years of Information Security experience required. Security certification(s) preferred.
+ Experience with PowerBi.
+ Capable of working under pressure in a continually changing fast paced environment.
+ Ability to effectively collaborate with stakeholders across a global environment.
+ Strong written and verbal communication skills.
+ Strong analytical and problem-solving skills.
What You'll Get:
+ Up to 40% off any standard Hertz Rental
+ Paid Time Off
+ Medical, Dental & Vision plan options
+ Retirement programs, including 401(k) employer matching
+ Paid Parental Leave & Adoption Assistance
+ Employee Assistance Program for employees & family
+ Educational Reimbursement & Discounts
+ Voluntary Insurance Programs - Pet, Legal/Identity Theft, Critical Illness
+ Perks & Discounts -Theme Park Tickets, Gym Discounts & more
The Hertz Corporation operates the Hertz, Dollar Car Rental, Thrifty Car Rental brands in approximately 9,700 corporate and franchisee locations throughout North America, Europe, The Caribbean, Latin America, Africa, the Middle East, Asia, Australia and New Zealand. The Hertz Corporation is one of the largest worldwide airport general use vehicle rental companies, and the Hertz brand is one of the most recognized in the world.
**US EEO STATEMENT**
At Hertz, we champion and celebrate a culture of diversity and inclusion. We take affirmative steps to promote employment and advancement opportunities. The endless variety of perspectives, experiences, skills and talents that our employees invest in their work every day represent a significant part of our culture - and our success and reputation as a company.
Individuals are encouraged to apply for positions because of the characteristics that make them unique.
EOE, including disability/veteran
Senior IT Security Analyst
Information security analyst job in Fort Myers, FL
The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies.
The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business.
Duties & Responsibilities
* Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes
* Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary.
* Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments.
* Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours.
* Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies.
* Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data.
* Document and perform verification of IT related changes in accordance with Company security policies and procedures.
* Research and recommend hardware and software solutions to augment or enhance existing security measures.
* Stay current in events and trends in IT security.
* Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered.
* Conduct scheduled reviews of key application security settings.
* Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates.
* Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs
* Supports audit and incident processes, as required
* Monitor and support internal SEIM systems, reports, and searches
* Monitor and support internal phishing email report systems and reports
* Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business
* Develops strong liaison relationships with key internal business and technology teams
* Coach level I & IIs on security domains and program processes
* Depending on need, VP Security may determine a Team Lead designation for Level III role
* Participate in security work streams for a variety of enterprise projects and initiatives
* Determine and communicate security risk postures to partners and leaders as appropriate
Education & Experience
Knowledge of:
* Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments.
* Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents.
* Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices.
* Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS.
* Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Familiarity with cloud architectures, security standards, and best practices
* Strong oral and written communication skills
* Strong organizational skills and attention to detail
* Excellent interpersonal skills
Ability to:
* Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits.
* Take independent action within established options and develops new procedures and approaches to problems when necessary
* Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required
* Self-starter requiring minimal supervision
* Highly organized and efficient.
* Demonstrated strategic and tactical thinking.
* Stays current with the evolving threat landscape.
* Perform duties and make decisions under frequent time pressures
Education and Training:
* (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience.
* On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent
* Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire.
* At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration
* Requires knowledge of Microsoft Office and other productivity tools
Benefits and Compensation
Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance.
(Base Pay Range: $86,000 - $123,000/year)
Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information.
Equal Opportunity
Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment.
Unsolicited Resumes
Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails.
Application Deadline 11/15/25
Auto-ApplyInformation Security Analyst
Information security analyst job in Doral, FL
SGP Recruiting provides both operations and strategic support to Tribal 8(a) and commercial organizations. Our client is a CVE-verified Veteran-Owned Small Business (VOSB) and a proud ISO 9001:2015 certified organization specializing in systems integration and enterprise management solutions. As a trusted GSA MAS contract holder, they deliver mission-critical telecommunications, network infrastructure, and IT services to Federal, State, and Local Government agencies, the U.S. Military, and private-sector clients.
They are seeking a motivated, career and customer-oriented Information Security Analyst in Doral, FL. Possible other locations for this position: Key West, Newport (FL), and Naval Station Guantánamo Bay (NSGB). Join a team dedicated to Meeting today's mission demands requires more than just technology - it requires the right people, the right expertise, and the right partners working together with precision and purpose. Propel your career forward and be part of something extraordinary.
Salary Range - $85 - 90K Annually.
Employment - Full time
Worksite Type - Onsite
Security Clearance Required - Secret
Responsibilities include but are not limited to:
· Design, development, and maintenance of insightful and actionable. The Cybersecurity Analyst is responsible for the design, development, and maintenance of insightful and actionable dashboards using the ConstantView platform dashboards using the ConstantView platform.
· Possess a high level of expertise in ConstantView's functionalities, data visualization techniques, and data analysis methodologies.
· Lead the development of dashboards that effectively translate complex data into clear and concise visual representations, enabling stakeholders to gain valuable insights and make informed decisions.
· Includes collaborating with business users to understand their information needs, identifying relevant data sources, and designing dashboards that align with business objectives.
· Manipulate and transform data, apply appropriate visualizations, and ensure the accuracy and reliability of dashboard outputs.
· They also maintain existing dashboards, troubleshoot issues, and implement enhancements based on user feedback and evolving business requirements.
· They possess a strong understanding of data modeling, SQL querying, and data governance principles and can communicate technical concepts to non-technical audiences.
· The Information Systems Specialist III provides direction and mentorship to subordinate staff.
Minimum Qualifications:
· Bachelor's degree in information systems, Computer Science, Data Analytics, or 4+ years of additional experience related field in lieu of a required Bachelor's degree
· 9+ years of relevant Information Systems Specialist experience.
· Experience in data analysis and reporting, with a significant portion focused on dashboard development.
· Proven expertise in using Constant View for dashboard creation and maintenance.
· Strong understanding of data visualization principles and best practices.
· Experience with data manipulation and transformation techniques using SQL or other tools. Experience with data modeling and database design concepts. Relevant ConstantView certifications (e.g., developer, administrator). Training or certifications in data visualization tools and techniques.
Desired Qualifications:
· Master's degree in a relevant field. Experience with other data visualization platforms (e.g., Tableau, Power BI).
· Experience with data storytelling and presentation skills. Experience with data governance and data quality management.
· Experience with agile-informed development methodologies.
· Experience with statistical analysis and data mining techniques.
· Certifications in relevant programming languages (e.g., Python, R). Certifications in data science or data engineering.
· Experience at a DoD Combatant Command (e.g., SOUTHCOM, NORTHCOM, CENTCOM, CYBERCOM, INDOPACOM, EUCOM, AFRICOM, STRATCOM, TRANSCOM, SOCOM, SPACECOM) or a component is desired.
Our client provides a variety of benefits including company-paid health, dental & vision insurance coverage, as well as additional employee-paid health insurance options; company-paid life and disability insurance; 401k retirement savings plan with employer match; 10 company paid holidays per year, and paid time off.
Our client also considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
Auto-ApplyInformation Security Specialist (US) - Email Governance
Information security analyst job in Fort Lauderdale, FL
Hours: 40 Pay Details: $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
Depth & Scope:
* Participates on complex, comprehensive or large projects and initiatives
* Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
* Has advanced knowledge of organization, technology controls / security/ risk issues
Education & Experience:
* Bachelor's degree preferred
* Information security certification / accreditation an asset
* 7+ years of relevant experience
* Expert knowledge of IT security and risk disciplines and practices
Preferred Qualifications:
* Experience leading complex governance initiatives
* Knowledge and understanding of various technologies related to email and platforms including secure mail gateways, protocols, APIs, 3rd party providers, Graph API, header analysis, SPF/DKIM/DMARC
* Experience with email management related to enterprise services and applications
* Understanding of external IP space and IP restrictions.
* Familiarity of industry guidelines for email technologies, i.e. NIST, CISA, CIS
* Able to create Process Control and Documents; familiar with RACI framework
* Perform Email Design reviews and identify security gaps
* Information Security certification
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
* Domestic Travel - Occasional
* International Travel - Never
* Performing sedentary work - Continuous
* Performing multiple tasks - Continuous
* Operating standard office equipment - Continuous
* Responding quickly to sounds - Occasional
* Sitting - Continuous
* Standing - Occasional
* Walking - Occasional
* Moving safely in confined spaces - Occasional
* Lifting/Carrying (under 25 lbs.) - Occasional
* Lifting/Carrying (over 25 lbs.) - Never
* Squatting - Occasional
* Bending - Occasional
* Kneeling - Never
* Crawling - Never
* Climbing - Never
* Reaching overhead - Never
* Reaching forward - Occasional
* Pushing - Never
* Pulling - Never
* Twisting - Never
* Concentrating for long periods of time - Continuous
* Applying common sense to deal with problems involving standardized situations - Continuous
* Reading, writing and comprehending instructions - Continuous
* Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplyInformation Security consultant
Information security analyst job in Bonita Springs, FL
· Trend Micro Deep Security for VM Server End point protection measures such as Antimalware, HIPS and FIM · Vulnerability and Threat management of server instances through Qualys Vulnerability Scanner for scanning internal network · Web Application Firewall through Qualys
· Alert logic - Log Manager - Security Intelligence for Monitoring.
· Expert level working experience in technologies like, SIEM, WAF, Vulnerability Management, Endpoint Security like Antivirus
· Have handled customer project for implementation/Migration of security controls on virtualized/AWS cloud environment
· Exposure to SIEM migration / Integration projects and integration of Log Source and custom parser
· Exposure to Endpoint Security migration / Integration projects and awareness of latest threats
· Exposure to Web Application Firewall migration / Integration projects and integration of heterogeneous Networks/Services/systems would be an added advantage, Log collection and analysis.
· Performs analysis and diagnosis of complex security problems
· Provide users and business partners with second level security technical support.
· Support preventive maintenance efforts, change management activities, and project initiatives to meet organizational objectives.
· Prepare implementation, migration plan and risk mitigation strategy for WAF, SIEM and Endpoint technologies
Additional Information
All your information will be kept confidential according to EEO guidelines.
Network Security Analyst
Information security analyst job in North Miami, FL
The Cybersecurity Analyst is responsible for safeguarding organizational systems and data by detecting, analyzing, and responding to cybersecurity threats. This role requires hands-on expertise in security and log analysis, incident response, and triage, as well as experience with Trellix solutions, PCI DSS assessments, and SIEM platforms such as Helix, SolarWinds, and Splunk. Familiarity with NIST 800-53 and NIST 800-35 frameworks is essential.
This position also requires a foundational understanding of IT infrastructure, as the analyst will closely partner with the Infrastructure team to ensure end-to-end system security.
Key Responsibilities
Conduct real-time security monitoring and log analysis to identify potential threats and anomalies.
Perform incident response activities including triage, investigation, containment, eradication, and recovery.
Manage and tune SIEM platforms (Helix, SolarWinds, Splunk) to ensure effective event correlation and alert accuracy.
Utilize Trellix security solutions (e.g., ETP, EDR, Helix) for threat detection, response, and endpoint protection.
Conduct PCI DSS assessments and support remediation to ensure compliance with regulatory and industry standards.
Develop and maintain incident response plans, playbooks, and post-incident reporting in alignment with NIST 800-53 / 800-35.
Perform root cause analysis and recommend proactive measures to reduce risk exposure.
Collaborate with cross-functional IT and Infrastructure teams to improve the organization's overall security posture.
Participate in a rotational weekly on-call schedule to support after-hours IT support and security.
Create detailed reports and metrics on incidents, vulnerabilities, and compliance performance.
Stay current on evolving threat landscapes, tools, and cybersecurity frameworks.
Required Skills and Qualifications
Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or equivalent experience.
Proven experience in incident response, security operations, and log analysis.
Hands-on experience with Trellix (McAfee) products and other EDR/SIEM solutions.
Proficiency in Helix, SolarWinds, and Splunk for monitoring, correlation, and threat hunting.
Experience performing or supporting PCI DSS audits and compliance efforts.
Solid understanding of NIST SP 800-53 and NIST SP 800-35 frameworks.
Strong analytical, troubleshooting, and communication skills.
IT infrastructure background with the ability to collaborate effectively with system administrators and network engineers.
Ability to lift up to 50 lbs as part of occasional equipment handling or system maintenance tasks.
Ability to work in a fast-paced environment and respond effectively under pressure.
Preferred Qualifications
Security certifications such as CompTIA Security+, CISSP, CISM, CEH, or GCIH.
Previous experience in a Security Operations Center (SOC) environment.
Familiarity with scripting (Python, PowerShell, Bash) for automation and log parsing.
Knowledge of vulnerability management and threat intelligence platforms.
Auto-Apply