Senior Cloud Security Analyst
Information security analyst job in Miami, FL
📍
Hybrid / Remote Options (No Sponsorship Available)
💼
Full-Time | Cloud Security | IAM | O365
About the Role
We are seeking a highly skilled Senior Cloud Security Analyst to lead the evaluation, security posture management, and continuous improvement of our multi-cloud and O365 environments. This role acts as a cross-brand consultant-connecting teams, identifying security gaps, standing up cloud environments, and guiding technical staff on required security controls and the “why” behind them.
You will assess digital and cloud security posture, outline required improvements, and partner with IT stakeholders to bring environments into compliance. This is a hands-on position focused on Azure, AWS, GCP, IAM governance, O365 security, and cloud access controls, along with managing and enhancing vulnerability management and key security indicators.
You will work closely with senior network and security analysts in a small, highly collaborative team supporting both shoreside and distributed operational environments.
What You'll Do
Cloud Security & Posture Management
Oversee, evaluate, and continuously strengthen cloud security posture across Azure, AWS, and GCP.
Assess current security controls, identify gaps, and develop actionable projects to remediate risks.
Provide clear security directives such as: “Your cloud environment requires A-D; you currently only have A,” and work with teams to stand up missing controls.
IAM & Access Governance
Support access and identity processes for O365, AD, Linux, and cloud-based platforms.
Assist with IAM operations involving SailPoint and enterprise identity workflows.
Evaluate access levels across environments and ensure appropriate permissions and segregation-of-duties.
Security Operations & Monitoring
Monitor brand security posture and provide input into SIEM integrations, identifying blind spots and validating configurations.
Support vulnerability management initiatives, analyzing cloud findings (e.g., Orca, Qualys) and helping IT translate data into actionable remediation.
Assist security operations with monitoring and triaging cloud security events.
Reporting & Stakeholder Engagement
Build dashboards and reporting for executives and business leaders communicating KRIs, risks, and security posture.
Provide training, documentation, and consulting to IT team members on cloud configurations, security best practices, and new technologies.
Architecture, Projects & Continuous Improvement
Support cloud implementation and architectural reviews for upcoming solutions.
Partner with PMO teams to build and prioritize the cybersecurity backlog.
Recommend modern replacement technologies for legacy systems.
Required Qualifications
Bachelor's degree preferred (IT, Cybersecurity, Computer Science, or related).
5+ years of experience in cloud security and access management.
Hands-on expertise with:
Azure security and administration
AWS security controls & tenant management
Active Directory, O365 security, Linux/Windows access admin
SailPoint IAM
Orca Security (preferred)
PowerShell and scripting (Python, etc. nice to have)
Strong understanding of IAM principles (not an IAM engineer, but fluent in IAM governance).
Experience with GDPR, PCI, NIST frameworks.
Ability to connect dots across teams and act as a security consultant between groups.
Strong analytical, communication, and stakeholder management skills.
Preferred Certifications
Microsoft 365 Messaging or Security Administrator
CompTIA Cloud+
Cloud Security-related certs (Azure, AWS, or GCP)
Top Skills
Cloud Security (Azure, AWS, GCP)
O365 Security
AD & Access Management
IAM Support (SailPoint)
Scripting (PowerShell / Python)
Security Posture Assessment
Vulnerability Management (Orca, Qualys)
SIEM Integration Review
Risk & Compliance (NIST, PCI, GDPR)
Team Structure
You'll join a small, senior-level team consisting of:
Senior Network Security Analyst
Senior Security Analyst
Cloud Security Analyst
Information security analyst job in Miami, FL
About the Company
Your new role as a Senior Cloud Security Analyst based in Miami, you will lead initiatives to strengthen the security posture across cloud environments (Azure, AWS, GCP). Acting as a consultant to internal teams, you'll evaluate digital security gaps, implement solutions, and ensure compliance with governance standards. You'll manage IAM processes, review access controls, monitor security events, and provide strategic security directives to stakeholders.
About the Role
Responsibilities
Lead initiatives to strengthen the security posture across cloud environments (Azure, AWS, GCP).
Act as a consultant to internal teams.
Evaluate digital security gaps and implement solutions.
Ensure compliance with governance standards.
Manage IAM processes and review access controls.
Monitor security events and provide strategic security directives to stakeholders.
Qualifications
Bachelor's degree in Computer Science or related field (or equivalent experience).
5+ years in cloud security and identity access management.
Required Skills
Expertise in Azure and AWS security administration.
Strong IAM knowledge (SailPoint, Active Directory, O365).
Familiarity with GDPR, PCI, NIST frameworks.
Scripting experience (PowerShell; Python a plus).
Experience with vulnerability tools (Qualys, Orca preferred).
Preferred Skills
Microsoft 365 Messaging or Security Administrator, CompTIA Cloud+.
Pay range and compensation package
110-120K plus bonus
Equal Opportunity Statement
We are committed to diversity and inclusivity.
IT Analyst - Artificial Intelligence
Information security analyst job in Miami, FL
We're looking for a proactive and innovative Senior Business Analyst to help advance the firm's expanding artificial intelligence strategy. This position partners directly with the Director of BPM and AI to understand business needs, evaluate and recommend AI-driven solutions, deliver training programs, and champion adoption efforts across the company. The ideal candidate will act as the key connector between business units and technical teams, ensuring AI initiatives are effective, scalable, and aligned with organizational objectives.
Primary Responsibilities
Collaborate with leadership to identify and prioritize opportunities to apply AI across systems and business processes.
Coordinate with internal teams to embed AI solutions into day-to-day workflows and assess third-party offerings for potential integration.
Create and facilitate AI and Generative AI learning sessions to help employees effectively use emerging tools.
Lead hands-on workshops and Q&A sessions to encourage company-wide adoption and confidence in AI capabilities.
Build and present demonstrations, mock datasets, and sample scenarios to showcase AI use cases for senior executives and clients.
Measure performance and business impact of AI initiatives through reporting and analytics, emphasizing value and return on investment.
Produce clear documentation, user guides, and reference materials to promote consistent AI practices across departments.
Manage and maintain an organized archive of AI-related resources, including project documentation, vendor reviews, and success stories.
Qualifications
Bachelor's degree in Business, Computer Science, Information Systems, or a related discipline.
2-4 years of experience in business analysis, data analytics, or technology implementation.
Direct experience working with Generative AI tools and prompt development to address practical business challenges.
Strong communication and presentation skills with the ability to simplify technical AI concepts for non-technical audiences.
Proven ability to gather requirements and partner with developers or vendors to deliver impactful technology solutions.
Security Engineer
Information security analyst job in Miami, FL
Must reside in South Florida to be considered, this is on site in Miami
Contract
The Security Engineer plays a key role in strengthening the organization's security posture by supporting the design, implementation, and operation of modern security tools and infrastructure. This role focuses on monitoring security systems, performing threat analysis, responding to incidents, and enforcing security baselines and controls. The Security Engineer works closely with infrastructure, engineering, and compliance teams to reduce risk and ensure alignment with security best practices.
Requirements
5+ years of experience in cybersecurity, security engineering, or related technical security roles
Hands-on experience with security tools such as SIEM, EDR, vulnerability scanners, and log management platforms
Strong understanding of security frameworks (NIST, CIS, ISO 27001) and best practices
Experience with incident response, threat analysis, and remediation processes
Knowledge of network security, endpoint security, and cloud security fundamentals
Experience with scripting or automation (Python, PowerShell, Bash)
Excellent analytical and problem-solving abilities
Strong communication skills and ability to work cross-functionally with IT, engineering, and compliance teams
Responsibilities
Assist with the design and implementation of modern security tools and infrastructure to support enterprise hardening initiatives
Monitor and manage security systems including SIEM, EDR, and vulnerability management platforms
Perform threat analysis, investigate security events, and support incident response and remediation activities
Implement, maintain, and audit security policies, controls, and configuration baselines
Support risk assessments, compliance reporting, and security documentation efforts
Collaborate with engineering and operations teams to identify and remediate security risks across the environment
Contribute to continuous improvement initiatives in detection, response, and security automation
Information Technology Operations Analyst
Information security analyst job in Hollywood, FL
Based in Hollywood, FL, Sintavia, LLC designs and additively manufactures critical components for the Aerospace, Defense, & Space industry.
We are seeking a career-minded individual for the position of IT Operations Analyst, preferably someone who is looking for long-term growth and potential. In addition to the below, candidates must possess strong customer service skills, an eye for detail, and the ability to multi-task at a quick pace. Being a team player is a must!
SUMMARY: Specializes by platform or application and is responsible for performing all operational processes and procedures, ensuring that all IT services and infrastructure meet operational goals.
DUTIES AND RESPONSIBILITIES:
Analyze and provide solution to low complexity and routine computer issues
Work together with vendors to aid repairs of hardware, i.e., printers, laptops, and desktops
Responsible for the definition, design, implementation, and maintenance of support infrastructure for application solutions
Oversee the Incident, Problem, and Change management processes
Identify incident trends; recommend and implement improvements to reduce volume
Prepare SOP (Standard Operating Procedures) for the daily maintenance of applications and underlying systems
Keep Operations team up to date with new implementations and technologies
Establish clear communication channels for feedback from customers, peers, and cross functional teams
Identify new solutions for improved processes, as well as develop cost/benefit analysis for business solutions
Make certain that technology solutions adhere to quality standards
Collaborate with the project teams to review or inspect work to guarantee their quality
Assist in other tasks as required
QUALIFICATIONS:
Bachelor's degree (B.A.) from four-year college or university; or two years related experience and/or training; or equivalent combination of education and experience.
Demonstrated ability to balance department efficiency and service excellence.
Strong written, verbal, and interpersonal communications skills including ability to listen attentively and to communicate information clearly and effectively.
Demonstrated interpersonal, collaborative, and relationship-building skills; ability to interact positively with teammates at various levels across the company and customers.
Demonstrated ability to work well with cross-functional groups.
Self-motivated, able to multi-task, and detail oriented.
Strong organizational, analytical, problem-solving and decision-making skills.
Able to maintain a professional demeanor and a polished professional appearance.
Background checks will be completed on all candidates considered for hire.
REQUIREMENTS:
Working knowledge of systems architectural concepts and methodologies; infrastructure platforms and their application; business processes, process analysis/management, and IT requirements and IT managed services
It is also important that they can manage Critical Incident and Change Management SLA's with Service Provider, and can also manage and implement process improvements in NOC/SOC (network/security operation center)
Working knowledge of networking; can write Technical Specs and provide Level1 application Support (Client/Server)
Must have the required technical skills to identify system problems, as well as seek out ways to improve processes
Must be able to learn procedures quickly and be a team player
Easily adapt to new organizations / technical environments
Ability to handle and prioritize multiple tasks
Project management on small to medium projects
Must be able to perform a variety of routine tasks and demonstrate a good working knowledge of equipment, procedures and working with common hand tools
PHYSICAL DEMANDS AND WORK ENVIRONMENT:
Frequently required to sit, walk, stand, bend, stoop, kneel or crawl
Continually utilize visual acuity to operate equipment, read
technical information, and/or use a keyboard
Frequently required to lift/push/carry items up to 50 pounds
Work on Specialized equipment
WHY SINTAVIA:
We offer a comprehensive compensation and benefits package and the tools you will need to be successful, including:
Medical, dental, and vision plans after 30 days
Paid PTO and holiday
Paid life and long-term disability insurance
401(K) retirement plan and matching program
We provide a safe, fun, exciting and collaborative workplace, where growth and advancement opportunities abound.
Sintavia is an equal opportunity employer and a drug free workplace.
The above is intended to describe the general content of and requirements for the performance of this job. It is not to be construed as an exhaustive statement of duties, responsibilities or physical requirements. Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Cyber Security Analyst
Information security analyst job in Miami, FL
Job Title: SCITES - Cyber Security Analyst
Required Clearance: Minimum Secret clearance upon start and be eligible for TS/SCI clearance
Required Certification(s): DoDM 8570 CSSP Category Certification (e.g. CompTIA CySA+ or CEH)
Required Education: Bachelor's in IT or a related technical discipline preferred or commensurate level of experience based on position level
Required Experience: Advisor 8+ Years, Senior 5+ Years, Analyst 0 - 2 Years
Position Description:
Exeter is seeking personnel to provide Cyber Security, Computer Network Defense in support of the SOUTHCOM Cyber Information Technology Enterprise Services (SCITES) Contract in Doral FL.
Primary Responsibilities:
Incident Reporting, manages, track and report incidents to include submitting incident reports using the SharePoint Incident Reporting Portal
Uses SIEM Q-RADAR/ArcSight for event tracking and correlation
Develops, tests, and operates firewalls, intrusion detection systems, enterprise antivirus systems and software deployment tools
Evaluate firewall change requests and assess organizational risk
Safeguards network against unauthorized infiltration, modification, destruction or disclosure
Researches, evaluates, tests, recommends, communicates and implements new security software or dev forensics; manages, performs and reports forensics analysis to government leadership
Monitor and analyze Network IDS to identify security issues for remediation
Manages, performs and monitors the following CND tools: PowerShell, IBM Q-RADAR, CISCO SOURCEFIRE (IDS), WIDS, ACAS,JRSS Stack: Agency FIREWALL PALO ALTO, BASE FIREWALL CISCO ASA, Tipping Point (IPS), PCAP collector, InQuest, ArcSight ESM and loggers, Lancope, Blue coat Web Proxy
Required Qualifications:
Must be a U.S. Citizen
Minimum Secret clearance upon start and be eligible for TS/SCI clearance
DoDM 8570 Cyber Security Service Provider (CSSP) Category Certification (e.g. CompTIA CySA+ or CEH)
Shift work required to support real-world or contingency operations
Candidates must be local or willing to relocate
Desired Qualifications/Experience:
Bachelor's Degree in specialty field
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
#clearancejobs
Auto-ApplyCYBERSECURITY ANALYST 1_DATA SECURITY, GOVER(1941000)
Information security analyst job in Miami, FL
Miami-Dade County Public Schools (M-DCPS), an A-rated district, is the nation's third largest school system with nearly 500 schools and a diverse enrollment of more than 335,500 students from over 160 countries. Our ongoing tradition of groundbreaking achievement has earned top recognition at the national and international levels and makes M-DCPS your best choice.
Job Posting Details
The Application deadline is Friday, January 9, 2026 by 11:59 PM (EST). This is a DCSAA pay grade 41 position. Applicants need to contact Compensation Administration at ************ or ********************** for individual salary calculation. All application documents must be in SuccessFactors by the application deadline to be considered for an interview.
Required Documents:
* Current Resume
* Two (2) Professional Letters of Recommendation signed or electronic signature and dated within the last 12 months (one year) of the application. References must be from a person who can assess your ability as an administrator or your work ethic and character. Letters of recommendation must include the name, signature and contact information for the person completing the reference.
Professional Certifications or Licenses: If a position requires a specific certification(s) or license in the minimum qualification requirements listed in the job description, please upload a copy of your current/active certificate or license to your candidate profile.
Performance Evaluations: Candidates selected for a final interview are required to have acceptable performance evaluations during the three years immediately preceding application for the position. You can upload these evaluations to your candidate profile.
Veteran's Preference: If requesting veteran's preference, please check the appropriate box in SuccessFactors and attach form DD-214.
Conferred Transcripts with a Graduation Date: Current M-DCPS employees do not need to submit official transcripts if highest degree earned is on file in the Office of Personnel Records **************. For external candidates, official transcripts will be required if you are recommended for the position. Your degree must be from an accredited university. If the position does not require a college degree, you are required to have at least a high school diploma. Candidates with academic training and degrees granted outside the U.S. must submit a credential evaluation report that includes a statement of degree equivalency from an accredited agency in the U.S.
Screening of Applications: Following the application deadline a screening committee will review the applications. Candidates will be notified of the screening results by email.
Oral Interview Assessment Categories: Candidates invited to an interview will be assessed in the following areas:
* Experience
* Job Knowledge
* Reasoning and Decision-Making Skills
* Ability to Present Ideas Effectively
* Ability to Communicate in Written Form
Candidates will be invited to complete a written essay prior to the Initial Interview. Candidates who are successful in the Initial Interview will be invited to a Final Interview. M-DCPS employees who are moved to a final interview will require a reference evaluation from their immediate supervisor. Our office will email form #3506 (reference evaluation) to the Supervisor.
Background Screening for the Selected Candidate (External Candidates):
Please click on the link below for information on M-DCPS Employment Standards, Drug Testing and Fingerprinting requirements in order to be hired as an employee.
************************************************
If you have any questions, please contact Mr. Jorge Rubio, District Director, Administrative/Professional Technical Staffing at ************ or by email at **********************.
Salary Min: $58,073.00
Salary Max: $99,221.00
41 $58,073 - $99,221
OCCUPATIONAL SUMMARY
The Cybersecurity Analyst I provides support relative to the creation, maintenance, and troubleshooting of user accounts associated with various District information systems. Assists in the development and review of policies, practices, programs and materials to ensure that M-DCPS administrative and student information is secure from unauthorized access, protected from inappropriate alteration, and physically secure. Responsible for the access of various District systems to authorized users in a timely fashion.
EXAMPLE OF DUTIES
1. Creates, modifies, resumes, and deletes user ID's for various applications within Mainframe environments, various applications that authenticate against Microsoft Active Directory Services, and third-party applications.
2. Protects District systems by implementing defined access privileges to systems and applications.
3. Provides second-tier technical support for M-DCPS help-desk personnel and/or other District personnel, as appropriate, with respect to the creation, modification, and/or deletion of user ID's or permissions for various District systems.
4. Participates in organizing, writing, and editing technical instructions, operational procedures, and related materials, as appropriate.
5. Works closely with ITS staff and independent contractors in evaluating computer systems vulnerabilities by searching system logs to troubleshoot security and/or user ID issues.
6. Assists with agreed upon 'Best Practice' security settings for system policies.
7. Diagnoses and reports software malfunctions relevant to the maintenance of user ID's for various systems and recommends solutions, as appropriate.
8. Performs other duties related to general responsibilities of the position.
9. On-call 24 hours a day, 7 days a week, as needed.
PHYSICAL REQUIREMENTS
This work requires the following physical activities: sitting, mobility, lifting, finger dexterity, grasping, repetitive motions, talking, hearing and visual acuity. The work is performed primarily indoors.
MINIMUM QUALIFICATION REQUIREMENTS
1. Graduation from high school or evidence of equivalent educational proficiency, preferably supplemented by courses in data processing, networking, or cybersecurity.
2. Experience in analyzing problems related to current data processing systems and data processing scheduling. Procedure writing preferred.
3. Minimum of two (2) years of experience supporting client access to personnel, payroll, financial, or student information systems, including input and retrieval of data using a personal computer or terminal.
4. Ability to communicate effectively in both oral and written forms.
Miami-Dade County Public Schools is an equal opportunity employer!
Easy ApplyCyber Security Training
Information security analyst job in Miami, FL
Best technology is when it brings people together, but it exceeds its best when people together are high tech. With a bright team, high tech and customer-centric approach Resourcex Inc has entered the IT field by offering solutions for IT staffing, IT talent management and IT services to the clients with unmatched quality, responsiveness, and flexibility.
With a unique approach and distinct IT structure, we at Resourcex Inc meet all your IT needs quickly and efficiently. Our continuous efforts and expertise, support us in expanding and developing our services that help you to unlock the potential of every resource and creativity within the organization.
Job Description
Our Training Features:
· You will receive top quality instruction that is famous for Online IT training.
· Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue.
· Training sessions are conducted by real-time instructor with real-time examples.
· Every training session is recorded and posted to the batch after each weekend class.
· We are offering online training on Cyber Security.
.
Provide OPT Stem Ext.:
Guidance and support for applying for the 24-month OPT STEM extension
Help with OPT Employment letter:
Help with drafting and obtaining OPT employment letters that meet USCIS requirements.
· We provide training in technology of your choice.
· Good online training virtual class room environment.
· Highly qualified and experienced trainers.
· Professional environment.
· Special interview training
· Training for skill enhancement.
· Study material and Lab material provided.
· E-Verified company.
If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates.
Thanks
Additional Information
All your information will be kept confidential according to EEO guidelines.
Cyber Security Analyst
Information security analyst job in Doral, FL
Job Details Corporate Headquarters Miami - Doral, FLDescription
For nearly 30 years, DASI has been in the business of providing comprehensive aircraft inventory support for airlines, MROs, OEMs, and distributors. Headquartered in Miami, Florida, with service centers in London and Singapore, DASI is a truly global partner, serving customers' parts and inventory needs in more than 140 countries.
DASI is embracing the potential of online sales and their digital marketplace, which has been growing exponentially and has tremendous potential with the right technology team in place to support and take it to the next level.
Purpose:
At DASI, we offer a total e-procurement solution for aircraft parts to its customers. Our IT department plays a critical role in aligning technology with business goals, ensuring secure and high-quality service delivery. The role of Junior Cyber Security Analyst is key in supporting secure operations that safeguard digital assets, to achieve these goals. The ideal candidate will assist in monitoring, detecting, and responding to cybersecurity threats, supporting vulnerability management efforts, and contributing to overall risk mitigation activities.
This is an entry-level, full-time, onsite position offering a great opportunity to build foundational cybersecurity skills while contributing to a forward-thinking IT department. This role is ideal for early-career professionals or recent graduates looking to build practical experience in cybersecurity within a collaborative, fast-paced environment.
Key accountabilities:
Monitor and analyse security alerts from SIEM, EDR, and other tools.
Investigate suspicious activity and assist in incident response.
Assist with vulnerability scans and tracking remediation efforts.
Maintain and update security logs and reports.
Support compliance efforts (e.g., NIST, SOC 2) through documentation and audit preparation.
Assist in phishing simulations and awareness campaigns.
Maintain inventory of digital assets and help track security baselines.
Collaborate with IT and DevOps teams to implement security controls.
Stay informed on the latest cybersecurity threats and mitigation strategies.
Perform all other duties as assigned.
Key skills and competences:
Possess strong analytical and troubleshooting skills.
Possess excellent written and verbal communication skills.
Has an understanding of basic cybersecurity principles and network security concepts.
Shows an eagerness to learn and develop skills in cybersecurity.
Has a high degree of self-direction, motivation, and energy.
Experience and qualifications:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field, or equivalent practical experience.
Relevant certifications (e.g., CompTIA Security+, (ISC)² Certified in Cybersecurity (CC), Microsoft SC-900, GIAC Security Essentials (GSEC), or equivalent).
Exposure to compliance or regulatory frameworks is a plus, but not required.
Aerospace background or experience is a plus, but not required.
DASI, LLC. and group companies are an Equal Opportunities Employer
Information Security Analyst
Information security analyst job in Doral, FL
SGP Recruiting provides both operations and strategic support to Tribal 8(a) and commercial organizations. Our client is a CVE-verified Veteran-Owned Small Business (VOSB) and a proud ISO 9001:2015 certified organization specializing in systems integration and enterprise management solutions. As a trusted GSA MAS contract holder, they deliver mission-critical telecommunications, network infrastructure, and IT services to Federal, State, and Local Government agencies, the U.S. Military, and private-sector clients.
They are seeking a motivated, career and customer-oriented Information Security Analyst in Doral, FL. Possible other locations for this position: Key West, Newport (FL), and Naval Station Guantánamo Bay (NSGB). Join a team dedicated to Meeting today's mission demands requires more than just technology - it requires the right people, the right expertise, and the right partners working together with precision and purpose. Propel your career forward and be part of something extraordinary.
Salary Range - $85 - 90K Annually.
Employment - Full time
Worksite Type - Onsite
Security Clearance Required - Secret
Responsibilities include but are not limited to:
· Design, development, and maintenance of insightful and actionable. The Cybersecurity Analyst is responsible for the design, development, and maintenance of insightful and actionable dashboards using the ConstantView platform dashboards using the ConstantView platform.
· Possess a high level of expertise in ConstantView's functionalities, data visualization techniques, and data analysis methodologies.
· Lead the development of dashboards that effectively translate complex data into clear and concise visual representations, enabling stakeholders to gain valuable insights and make informed decisions.
· Includes collaborating with business users to understand their information needs, identifying relevant data sources, and designing dashboards that align with business objectives.
· Manipulate and transform data, apply appropriate visualizations, and ensure the accuracy and reliability of dashboard outputs.
· They also maintain existing dashboards, troubleshoot issues, and implement enhancements based on user feedback and evolving business requirements.
· They possess a strong understanding of data modeling, SQL querying, and data governance principles and can communicate technical concepts to non-technical audiences.
· The Information Systems Specialist III provides direction and mentorship to subordinate staff.
Minimum Qualifications:
· Bachelor's degree in information systems, Computer Science, Data Analytics, or 4+ years of additional experience related field in lieu of a required Bachelor's degree
· 9+ years of relevant Information Systems Specialist experience.
· Experience in data analysis and reporting, with a significant portion focused on dashboard development.
· Proven expertise in using Constant View for dashboard creation and maintenance.
· Strong understanding of data visualization principles and best practices.
· Experience with data manipulation and transformation techniques using SQL or other tools. Experience with data modeling and database design concepts. Relevant ConstantView certifications (e.g., developer, administrator). Training or certifications in data visualization tools and techniques.
Desired Qualifications:
· Master's degree in a relevant field. Experience with other data visualization platforms (e.g., Tableau, Power BI).
· Experience with data storytelling and presentation skills. Experience with data governance and data quality management.
· Experience with agile-informed development methodologies.
· Experience with statistical analysis and data mining techniques.
· Certifications in relevant programming languages (e.g., Python, R). Certifications in data science or data engineering.
· Experience at a DoD Combatant Command (e.g., SOUTHCOM, NORTHCOM, CENTCOM, CYBERCOM, INDOPACOM, EUCOM, AFRICOM, STRATCOM, TRANSCOM, SOCOM, SPACECOM) or a component is desired.
Our client provides a variety of benefits including company-paid health, dental & vision insurance coverage, as well as additional employee-paid health insurance options; company-paid life and disability insurance; 401k retirement savings plan with employer match; 10 company paid holidays per year, and paid time off.
Our client also considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
Auto-ApplyTemp Associate Cyber Security Specialist
Information security analyst job in Miami, FL
Who is Costa Farms? We're one of the world's largest horticultural growers-but without an ego to match our acreage. Our headquarters are in Miami, Florida, where we were founded in 1961. Costa Farms started on just 30 acres, and over the last 60 years, we've grown to more than 5,000 acres around the world. We have farms in North and South Carolina, Central and South Florida, and the Dominican Republic, plus an office in China. Costa Farms now employs nearly 6,000 people: engineers, marketers, accountants/analysts, human resources professionals, and of course, growers and plant scientists!
Here at Costa Farms, we live by the values of H3: being Humble, staying Hungry, and always Hustling. The team rallies to the mission of being a lean, green, growing machine dedicated to enriching the world by bringing plants into everyone's life.
True to that mission, we grow more than 1,500 plant varieties. Driven by the spirit of innovation, the team is always testing new plants and developing new solutions to make it easier for retailers and plant parents to enjoy plants. We're also continuously testing different ways of growing our plants to increase quality and improve their ecological footprint as one aspect of our many sustainability efforts.
We cultivate plants, as well as a winning culture. Join the team, and you'll find opportunities to learn and grow. You'll collaborate with other driven, determined people who together keep Costa Farms an industry leader. You'll support and be supported by a team that cares about each other, our customers, our consumers, and our community.
You'll also find right away that Costa Farms is committed to providing a diverse environment. We're proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetic information, disability, age, military status, marital status or veteran status, or any other group status protected by federal, state, or local law.
Requirements
Project Overview:
You will analyze Microsoft Defender's asset exposure scoring and contribute to the development and refinement of a Standard Operating Procedure (SOP) for managing high-risk assets. This includes classification, triage, incident lifecycle management, and governance.
Tools & Platforms:
· Microsoft Defender for Endpoint & Identity
· Attack Surface Management
· Microsoft Sentinel
· Picus Security Validation
· MXDR SOP Framework
· ITGC Risk Control Matrix
Week-by-Week Breakdown:
Week 1: Orientation & Tool Access
- Review the Defender_High_Exposure_Assets_SOP. - Attend walkthroughs of Defender dashboards and exposure scoring. - Gain access to Defender, Sentinel, and relevant dashboards.
Week 2-3: Asset Classification & Exposure Analysis
- Learn tagging logic and exposure score thresholds. - Identify high-risk assets using Defender telemetry. - Document asset classification logic and criticality levels.
Week 4-5: SOP Drafting & Incident Lifecycle Mapping
- Map Defender alerts to triage workflows (Detection ? IR ? Engineering). - Draft SOP sections on containment, root cause analysis, and remediation. - Collaborate with MXDR and IR teams for feedback.
Week 6: Governance & Reporting
- Build mock dashboards to track exposure trends and SLA compliance. - Draft weekly review templates and MXDR bulletin contributions. - Align SOP with audit controls (GCC Matrix, ITGC Risk Control Matrix).
Week 7-8: Testing & Continuous Improvement
- Simulate incidents using Picus and validate Defender response. - Conduct post-mortem analysis and refine SOP playbooks. - Present findings and recommendations to the cybersecurity team.
Deliverables:
· Updated SOP document with intern contributions
· Asset classification matrix
· Exposure trend dashboard mockup
· Weekly review and audit templates
Mentorship & Check-ins:
- Weekly 1:1 - Shadow sessions with MXDR, IR, and IT Operations teams - Final presentation to the IT leadership team
All applicants must be work-authorized.
Costa Farms will not sponsor any visa for this position.
After applying, follow us on LinkedIn to stay up to date on what's happening around Costa Farms and to start becoming part of our family. Come Grow with Us™!
Costa Farms offers competitive wages and benefits, including:
401(k) Plan
Company 401(k) Matching Contributions
Health Savings Account, Flexible Spending Account, and Dependent Care
Telemedicine/ Mental Health Services
Health Insurance
Dental Insurance
Vision Insurance
Pet Insurance
Supplemental Insurance (Aflac)
Growth Opportunities
Challenging and exciting work environment
Costa Farms Scholarship
Employee discounts on plants
Costa Farms headquarters also has:
On-site gym with showers
Subsidized on-site cafeteria, a quiet room, and indoor games
Love Where You Work activities throughout the year
Cyber Forensic Analyst III (Onsite - Saint Petersburg, FL)
Information security analyst job in Plantation, FL
WHO WE ARE:
ELYON provides the Program Management for its Channel of Commercial Technology companies in Government that consist of Small Businesses and New Technology start-ups.
ELYON advocates for policies that can improve government services and maintain our government's competitive advantage, by bringing more technology into government programs.
ELYON advocates on behalf of our nation's innovative, new technology and small businesses looking to work with the U.S. government. We do this by aligning the voice of our small business members with advocacy for change in federal policy that will make the government market more accessible to small businesses and the commercial technology ecosystem.
The Channel's founding Technical Board Members include former government leaders and IT executives passionate about bringing best-of-breed technology to the government.
We are seeking a skilled and experienced Cyber Forensic Analyst III to join our team!
Successful ELYON employees possess the following traits:
An ability to get things done: You are persistent, resourceful, results-oriented, and action oriented. You constantly plan ahead and foresee issues before they occur.
Analytical: In order to improve your comprehension of the market and the demands and problems of your clients, you have good analytical abilities and are at ease reading quantitative data.
Creative mind-set: You are able to solve problems creatively and swiftly adjust. You possess a thorough understanding of product management principles and the ability to apply them when analysing data and making recommendations.
Emotional Intelligence: You have a strong sense of self and excellent perception of how important relationships function. You are upbeat, sympathetic, adaptable, and inquisitive. Your genuineness, warmth, and competence help you win the respect of your co-workers.
Trustworthy: You have a strong sense of morality, principles, and purpose. You are trustworthy because of how you conduct yourself. You are a living example of the company's values.
Position Description:
We are seeking a highly skilled Cyber Forensic Analyst to support high-impact investigative and intelligence missions involving cybercrime, cryptocurrency, and financial crime. You will work alongside federal agency teams, partner law enforcement agencies, and regulatory bodies to conduct technical and financial investigations. This role requires expertise in analyzing complex cyber threats, blockchain transactions, digital assets, and hidden wealth strategies.
You'll need to bring both analytical rigor and a tenacious, detail-oriented mindset to help us trace digital breadcrumbs in support of critical investigations across national security and criminal enforcement efforts.
Multiple options: St Petersburg, FL
Key Responsibilities
Cybercrime Investigative Case Support
Work directly on cases with a cyber nexus in collaboration with law enforcement teams and external partners, using advanced investigative tools and techniques:
Conduct cryptocurrency tracing and analysis using blockchain forensics tools.
Gather and analyze dark web intelligence to identify threat actors, forums, and illicit activity.
Perform data analytics to uncover patterns, relationships, and anomalies.
Analyze electronic evidence, including servers, hard drives, communications, and OSINT sources.
Draft subpoenas targeting financial institutions and cryptocurrency exchanges.
Participate in inter-agency meetings with law enforcement, prosecutors, and other stakeholders.
Identify overlapping financial transactions and alternative stores of wealth, such as:
Prepaid and store gift cards
Monetary instruments
NFTs and digital assets
Cold/public crypto wallets
High-end real estate and luxury goods
Cyber-Financial Investigative Support
Assist in comprehensive financial tracing operations involving both fiat and digital currencies:
Analyze bank records, wire transfers, and credit card transactions to track illicit funds.
Draft targeted subpoena requests to financial institutions and crypto platforms.
Participate in investigative interviews under agency direction.
Identify and correlate layered financial networks and hidden asset channels.
Apply knowledge of financial laws and frameworks, including:
Bank Secrecy Act (BSA)
Asset Forfeiture practices
Money Laundering statutes
OFAC and sanctions compliance
Required Qualifications
8+ years of direct experience in cybercrime investigations, blockchain analysis, or digital forensics.
Security Clearance Required: Active Secret or above preferred
Proven experience with cryptocurrency investigations, darknet operations, or forensic platforms (e.g., Chainalysis, TRM, CipherTrace).
Familiarity with financial investigative techniques, including subpoena processes and transactional analysis.
Strong working knowledge of cyber law, digital evidence handling, and financial crime statutes.
Excellent interpersonal and written communication skills; ability to draft clear, concise, and actionable reports.
Ability to work independently in a fast-paced, mission-driven environment.
Preferred Qualifications
Prior experience supporting federal investigations preferred (FBI, DHS, IRS-CI, HSI, etc.).
Certifications such as CFE, CFCE, GCFA, CFCI, or CAMS
Familiarity with blockchain intelligence platforms and open-source investigation tools.
Understanding of evolving technologies in digital assets and cyber-enabled crime.
Why Join Us
Work on cutting-edge investigations with national impact.
Collaborate with elite teams fighting complex financial and cyber threats.
Opportunity for professional growth, certifications, and hands-on casework.
Competitive salary, benefits, and mission-driven culture.
Benefits:
Paid sick leave, Medical/Dental (optional), 401 (k) Retirement Plan (optional), Employer Paid Life Insurance, Employer Paid Short Term Disability, Optional Life Insurance.
ELYON International, Inc. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Sr Cloud Security Analyst (onsite)
Information security analyst job in Doral, FL
13804 - Sr Cloud Security Analyst (onsite) - Doral, FL Work Setting: Hybrid Required: • Availability to work at the Client's site in Doral, FL (required); • Experience with O365, AD, MS, Linux Access management (5+ years); • Experience with Cloud Security (5+ years);
• Experience with Azure administration and configure access controls;
• Experience with AWS security administration and configure access controls;
• Experience with GCP;
• Experience with GDPR, PCI, NIST;
• Experience with Vendor technology legacy;
• Experience with SailPoint IAM solution;
• Experience with Active Directory;
• Experience with Windows workstations and server operating systems;
• Experience with managing security for AWS cloud environment tenants;
• Security background;
• High School Diploma or GED in Computer Science or other technical degree or equivalent experience;
• Certifications: Microsoft 365 Messaging and or Security Administrator, CompTIA Cloud+.
Preferred:
• Scripting experience (PowerShell, Python etc.);
• Experience with Qualys;
• Experience with Orca Security;
• Bachelor's Degree.
Responsibilities:
• Management, evaluation, maintenance, and enhancement of the cloud security posture;
• Operation of identity and access processes and controls for SailPoint, Active Directory, Email, and Collaboration Platforms and cloud-based solution;
• Continuous improvement of the brand vulnerability management people, process, and technology analyzing cloud environment reporting, prioritizing, and working with brand IT to make Cloud Security Management data actionable and understandable;
• Evaluation and providing directives and guidance regarding our SIEM integrations, identifying potential blind spots, and assisting with configuration validations;
• Augment and assist GISCS Security Operations, monitoring and triaging brand security events (Security Operations);
• Creates visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs;
• Assisting with security architecture reviews for new and proposed integrated solutions.
Why apply?
• Work with one of the largest global vacation and cruise providers and a recognizable brand;
• Be a part of a diverse multicultural team and thrive in a fun and inclusive work environment dedicated to providing memorable and affordable vacations;
• Work with the leader in cutting-edge technology and programming;
• Be certain in your future as our Client is a stable and growing company with increasing revenue;
• Receive plenty of coaching and support from the team and current Vitaver consultants.
Enjoy a comprehensive employee benefits program:
• Get paid on a bi-weekly basis;
• During the 1st year of employment - prorated amount of PTO and Sick Time. After - 14 days of PTO annually and 10 days of sick time annually;
• Eight paid holidays annually;
• Available health, dental, vision plans;
• Flexible spending account;
• 401K retirement savings plan;
• Employee Stock Purchase plan;
• Short and long-term disability plan;
• Cruise benefits;
• Discount and complimentary memberships (various complimentary memberships, discount cards and passes: theme parks, various restaurants, wholesale clubs, car rental agencies and cell phone providers to name a few).
Onsite perks:
• Fitness center;
• Child Development Center;
• Café and coffee shop;
• Learning Resource Center (LRC);
• Discounted dry-cleaning service;
• Fuel service & car wash.
Network Security Analyst
Information security analyst job in North Miami, FL
The Cybersecurity Analyst is responsible for safeguarding organizational systems and data by detecting, analyzing, and responding to cybersecurity threats. This role requires hands-on expertise in security and log analysis, incident response, and triage, as well as experience with Trellix solutions, PCI DSS assessments, and SIEM platforms such as Helix, SolarWinds, and Splunk. Familiarity with NIST 800-53 and NIST 800-35 frameworks is essential.
This position also requires a foundational understanding of IT infrastructure, as the analyst will closely partner with the Infrastructure team to ensure end-to-end system security.
Key Responsibilities
Conduct real-time security monitoring and log analysis to identify potential threats and anomalies.
Perform incident response activities including triage, investigation, containment, eradication, and recovery.
Manage and tune SIEM platforms (Helix, SolarWinds, Splunk) to ensure effective event correlation and alert accuracy.
Utilize Trellix security solutions (e.g., ETP, EDR, Helix) for threat detection, response, and endpoint protection.
Conduct PCI DSS assessments and support remediation to ensure compliance with regulatory and industry standards.
Develop and maintain incident response plans, playbooks, and post-incident reporting in alignment with NIST 800-53 / 800-35.
Perform root cause analysis and recommend proactive measures to reduce risk exposure.
Collaborate with cross-functional IT and Infrastructure teams to improve the organization's overall security posture.
Participate in a rotational weekly on-call schedule to support after-hours IT support and security.
Create detailed reports and metrics on incidents, vulnerabilities, and compliance performance.
Stay current on evolving threat landscapes, tools, and cybersecurity frameworks.
Required Skills and Qualifications
Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or equivalent experience.
Proven experience in incident response, security operations, and log analysis.
Hands-on experience with Trellix (McAfee) products and other EDR/SIEM solutions.
Proficiency in Helix, SolarWinds, and Splunk for monitoring, correlation, and threat hunting.
Experience performing or supporting PCI DSS audits and compliance efforts.
Solid understanding of NIST SP 800-53 and NIST SP 800-35 frameworks.
Strong analytical, troubleshooting, and communication skills.
IT infrastructure background with the ability to collaborate effectively with system administrators and network engineers.
Ability to lift up to 50 lbs as part of occasional equipment handling or system maintenance tasks.
Ability to work in a fast-paced environment and respond effectively under pressure.
Preferred Qualifications
Security certifications such as CompTIA Security+, CISSP, CISM, CEH, or GCIH.
Previous experience in a Security Operations Center (SOC) environment.
Familiarity with scripting (Python, PowerShell, Bash) for automation and log parsing.
Knowledge of vulnerability management and threat intelligence platforms.
Auto-ApplyInformation Systems Security Officer (ISSO)
Information security analyst job in Miami, FL
Job DescriptionISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Easy ApplyCybersecurity and Information Security Manager
Information security analyst job in Miami, FL
Job DescriptionSalary:
Cybersecurity and Information Security Manager Reports To: Director of Technology Position Type: Permanent Full-Time
ABOUT US
du Pont REGISTRY Group proudly marks four decades as a cornerstone of the luxury automotive market in 2025. Renowned for connecting millions of buyers and sellers worldwide, du Pont REGISTRY Group has facilitated billions in automotive transactions while setting the standard for excellence in the industry.
POSITION OVERVIEW
This role serves as the companys primary cybersecurity resource, responsible for securing du Pont Registrys systems, data, websites, and third-party platforms. The Cybersecurity & Information Security Manager balances business enablement with security oversight, managing everything from endpoint protection and incident response to vendor assessments and user awareness training.
The ideal candidate is self-sufficient, technically curious, and comfortable wearing multiple hats. They will perform both operational security tasks and higher-level program design in a fast-paced, entrepreneurial environment. They are also comfortable communicating and managing at the technical, configuration levels while providing key insight to executive boards through targeted high-level reporting.
KEY RESPONSIBILITIES
Security Operations & Infrastructure
Perform daily monitoring of security logs, alerts, and reports from firewalls, EDR, SIEM, and cloud environments.
Manage endpoint, network, and email security solutions; ensure systems are patched, updated, and compliant.
Oversee security of cloud and hosted services (AWS, Azure, Google Workspace, Microsoft 365, etc.).
Respond to and manage security incidents, data breaches, and vulnerabilities in coordination with IT vendors.
Perform internal security assessments, penetration testing coordination, and vulnerability scans.
Governance, Risk & Compliance
Develop, maintain, and implement cybersecurity policies and procedures aligned with modern frameworks (NIST CSF, CIS Controls).
Assist with risk assessments and vendor evaluations, especially for technology partners and marketing platforms.
Support compliance efforts related to privacy and payment requirements (CCPA, GDPR, PCI-DSS).
Maintain documentation for audits and leadership reporting.
Awareness & Training
Conduct regular employee security awareness and phishing simulation campaigns.
Promote a culture of cybersecurity across departments with practical, business-friendly approaches.
Strategic Support & Reporting
Provide regular reports to the CFO and leadership on cybersecurity posture, incidents, and key risks.
Participate in budgeting and planning for cybersecurity tools and services.
Stay current on emerging threats and technologies to continuously enhance the companys defenses.
QUALIFICATIONS
Bachelors degree in Information Security, Information Technology, Computer Science, or related field (or equivalent experience).
At least seven years of experience in IT security, cybersecurity operations, or systems administration.
Hands-on experience with key technologies: firewalls, endpoint protection, cloud security, Google cloud, Microsoft 365, and SIEM.
Working knowledge of network security principles, web application security, and vulnerability management.
Solid understanding of risk-based decision-making and practical security implementation in small/medium business environments.
Preferred: Security-related certifications such as Security+, CEH, GSEC, CISSP, or CISM.
Exposure to ecommerce, media, or marketing technology environments.
Experience implementing or managing security standards such as NIST, CIS Controls, or ISO 27001.
CIP Cyber Security Specialist
Information security analyst job in Princeton, FL
As an NRG employee, we encourage you to take charge of your career and development journey. We invite you to explore exciting opportunities across our businesses. You'll find that our dynamic work environment provides variety and challenge. Your growth is key to our ongoing success-take the lead in shaping your career development, goals and future!
Job Summary
Job Summary
Ensures execution of the security services and CIP compliance for generating plants. Will be responsible for maintaining inventories, configuration baselines, security logging and patching. Will work with compliance and controls personnel to implement and maintain the program and serve as the primary contact for the services.
Essential Duties/Responsibilities:
Essential Duties/ Responsibilities
• Ensure compliance to all NERC-CIP Standards at NRG's facilities.
• Primary responsibility for CIP compliance at assigned site.
Create and maintain compliance or operational procedures as required.
• Be the lead for all CIP related Physical and Electronic Access Control for identified site.
• Be the primary contact for issues with Physical Security at all assigned sites for Physical Security Perimeters, including verifying those needing accesses, response to breaches and security system failures.
• Determination, verification and justification of all open ports and enabled services on Cyber Assets.
• Assessment of security patches and updates for all Cyber Assets.
• Deployment or mitigation of required security patches and updates to all Cyber Assets.
• Insure that Cyber Assets are protected by Antivirus/Antimalware applications; update as required.
• Insure required logging and alerting of Cyber Assets is functional; respond to detection of various types of alerts or breaches.
• Be the administrator for personnel needing electronic access, both local and remote, to Cyber Assets.
• Follow NRG's Policy and Procedure for reporting of Cyber or Physical Security Incidents. Assist in testing of the Incident reporting procedure annually.
• Perform and verify backups of Cyber Assets.
• Create and maintain disaster recovery procedures and assist with performance
Follow and assist others in following the NRG Policy and Procedures for Change Management.
• Perform Cyber Vulnerability Assessments as needed.
• Provide accurate documentation for all NERC evidence requirements; complete evidence collections tasks in NRG's workflow program in a timely manner.
• Assist with Compliance Requirements at other sites in the region as needed as well as being available to assist team members at other sites across the NRG fleet if needed.
• Work with team members on projects and new, innovative ideas.
• Working with various teams, prepare evidence needed for NERC Audits.
• Maintain great working relationships with site personnel and other teams.
• Some travel required- approximately 15-25%.
• Other duties as required.
Working Conditions
Working Conditions
• Work in an open office or power plant environment
• Work overtime and non-standard working hours as directed
Minimum Requirements
Minimum Requirements
Over three years of experience in Cybersecurity, NERC-CIP compliance, and/or power generation and transmission operations.
Hands-on experience with Distributed Control Systems (DCS).
Strong understanding of Operational Technology (OT) environments and Balance of Plant (BoP) systems.
Skilled in performing system backups and restoration procedures for OT systems.
Proficient in asset protection strategies, including antivirus/antimalware deployment, security patching, and continuous security monitoring.
Experience in configuring, patching, and maintaining Windows-based servers and workstations, including anti-malware management.
Solid working knowledge of Microsoft Access, Word, Excel, Visio, and Unix systems for both server and workstation environments.
Practical experience with Unix/Linux operating systems.
Familiarity with OT network infrastructure, including firewalls, switches, and routers.
Preferred Qualifications
Preferred Qualifications
Bachelor's degree in information technology, engineering or related area
Cybersecurity certifications such as GCIP, CISSP, CISA, Security+
NERC-CIP experience and knowledge of NERC-CIP Standards and Requirements.
Knowledge and/or experience working with Distributed Control Systems (DCS).
Knowledge of OT Technologies and Balance of Plant (BoP) Systems.
Experience working with Ovation, T3000, Symphony +, or GE Control Systems
Experience using vulnerability scanning tools.
Experience provisioning and maintenance of PACS.
Administration experience of Windows and as related to both servers and workstations.
Demonstrated ability to communicate (verbal and written) with all levels of internal and external customers.
Demonstrated ability to work independently and as a team member.
Demonstrated ability to set priorities and to respond to changing demands.
Ability to exercise discretion and independent judgment in applying established techniques, procedures or standards; demonstrated ability to maintain confidentiality.
Additional Knowledge, Skills and Abilities
Additional KSAs
• Socialize innovative ideas with the team and others.
• Performs moderately complex work assignments under minimal supervision.
• Works to resolves moderately complex issue and seeks guidance from team members on escalated issues.
• Demonstrated ability to communicate (verbal and written) with all levels of internal and external customers.
• Demonstrated ability to work independently and as a team member.
• 1 year or more of experience with system management (patching, troubleshooting, administration)
• Demonstrated ability to set priorities and to respond to changing demands.
• Ability to exercise discretion and independent judgment in applying established techniques, procedures or standards; demonstrated ability to maintain confidentiality.
Physical Requirements
Physical Requirements
Demand
Frequency
• Requires lifting as appropriate to complete duties
Occasional
Statement
Statement
NRG Energy is committed to a drug and alcohol free workplace. To the extent permitted by law and any applicable collective bargaining agreement, employees are subject to periodic random drug testing, and post-accident and reasonable suspicion drug and alcohol testing. EOE AA M/F/Vet/Disability Level, Title and/or Salary may be adjusted based on the applicant's experience or skills. Official description on file with Human Resources.
NRG Energy is committed to a drug and alcohol-free workplace. To the extent permitted by law and any applicable collective bargaining agreement, employees are subject to periodic random drug testing, and post-accident and reasonable suspicion drug and alcohol testing. EOE AA M/F/Vet/Disability. Level, Title and/or Salary may be adjusted based on the applicant's experience or skills.
Official description on file with Talent.
System Security Engineer
Information security analyst job in Miami, FL
Instasks App is a Professional Concierge Service. The app provides top-tiered professionals and clients with an online platform. Our unique approach to building an App is to give the client and the provider instant bookings and an easy process of all services: For example, client requests for quick tasks and large projects. Providers receive custom requests for their specialized skills. The app takes care of all invoicing between client and provider with a detailed invoice. And book all the confirmed jobs. We track providers' locations for the client's en route to any job.
We created a portal platform to guide you in listing your professions. The platform provides you with schedules, invoicing and credit card processing are all part of the enhanced technology. Clients will have a choice to give the providers reviews and star ratings to ensure our elite services when booking on our app. Our mission is to help all providers strive to achieve their financial and independent goals. To have more time with their families and create a brighter future for all.
The App offers opportunities to providers over the age of 18 and, by law, over the age of 21 for any tasks serving liquor. Build your future with a secure & safe platform. Be your own boss by choosing the TASKS that best suit your schedules and be available to work when you want to work. Build your income to help increase your revenue. Book tasks that are within a 15-mile radius. Our language preferred gives you better communication skills during your tasks. Our client's and providers' health & well-being are our highest priorities.
BACKGROUND CHECK POLICY: All providers accountants go through an extensive (background check) through a third party company. The certificates they receive are in place to ensure the provider and client feel safe. The document you receive from the third-party background company can be given to any job you are applying for. Our policy states all providers must go through a third party background check only after you are confirmed for a job. We request you do not go through the background check link until you are confirmed for any jobs.
ETIQUETTE TRAINING POLICY: Each provider will go through etiquette training to ensure that every provider is a friendly and well-mannered individual. We are poised to give our clients the very best in professional service. Our platform should leave no room for laxity as we work hard to bring the very best to our customers.
SKILLS AND ABILITIES: Requires working from detailed instructions and occasional independent decision-making. Ability to read, analyze and interpret documents such as safety rules, operating and maintenance instructions, or procedural manuals.
We are looking for a capable System Security Engineer, who enjoys security work and possesses both deep and wide expertise in the security space.
You will make things more secure by protecting system boundaries, keeping computer systems and network devices hardened against attacks and securing highly sensitive data. Qualified candidates will have a background in security or systems engineering.
Responsibilities
Engineer, implement and monitor security measures for the protection of computer systems, networks and information.
Identify and define system security requirements.
Design computer security architecture and develop detailed cyber security designs.
Prepare and document standard operating procedures and protocols.
Configure and troubleshoot security infrastructure devices.
Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks.
Ensure that the company knows as much as possible, as quickly as possible about security incidents.
Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement.
Requirements
Proven work experience as a system security engineer or information security engineer.
Experience in building and maintaining security systems.
Detailed technical knowledge of database and operating system security.
Hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
Experience with network security and networking technologies and with system, security, and network monitoring tools.
Thorough understanding of the latest security principles, techniques, and protocols.
Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocols.
Problem-solving skills and ability to work under pressure.
BS degree in Computer Science or related field.
Security Systems Engineer
Information security analyst job in Miami, FL
Job DescriptionDescription:
Innovative Consulting & Management Services (ICMS) is a Professional & Technical Management Consulting firm with over 20 years of consulting experience. We offer technical professional services to Federal and State Governments, and Commercial clients.
ICMS is a Small Business and Certified HUBZone employer. We deliver value to our clients by combining deep industry knowledge with strong functional capabilities. Our focus is to manage cost-effective programs while at the same time mitigating risk and improving results. Our success is about teamwork, a coordinated effort from all disciplines, from clients to consultants and most important, it's about delivering on our commitments.
ICMS is seeking an experienced and detail-oriented Security Systems Engineer to join our team in support of one of our federal clients. This position is 100% onsite at a Federal Government facility. This is a corporate, exempt position.
The Security Systems Engineer will be responsible for the operations, management, maintenance and performance of all access control, security cameras, video surveillance systems, network backbone, automated gates, and door controls/ digital locks. Other duties include:
Perform routine maintenance and repair on various systems comprising the electronic security systems at a detention facility
Security Systems - Install, troubleshoot, program (knowledge of C-Cure 9000 and Aveva Wonderware, and Bosch VMS systems essential to long term success)
Security Cameras & Video Management - repair, install, troubleshooting, adjusting, cleaning, and programming of all peripheral devices (preferably knowledge of Bosch VMS)
HID Card Readers & Electronic Door Locks - repair, install, troubleshooting and programming (knowledge of PLC Programmable Logic Controllers a plus)
Radios and communication equipment - repair install and troubleshooting
Phone systems - repair, troubleshooting and installing patch panels (preferably Avaya Communication Systems)
Network Management - Fiber optic switches and other network devices (routers, surge protection, switches, servers, storage arrays) - operation, troubleshooting, monitoring and maintenance of underlying - install, tone, troubleshooting and repair
Data systems - install and terminate patch panels, troubleshooting and cable certifying
Interpreting drawings, electrical schematics, training manuals, and instructions to perform duties. Maintain up to date and current licensing and service agreements for all software components
Establish and maintain effective working relationships with supervisors, co-workers, and other employees.
Requirements:
B.S. in Networking, Computer Science or applicable degree. Degree can be substituted with HS Diploma and at least 15 years of experience
Familiarity installing and troubleshooting low voltage equipment
Strong working knowledge of commercial access control, CCTV, burglary alarm, intrusion systems, and fire alarms
Strong working knowledge of Microsoft Office
Strong written and verbal communications skills
Working knowledge of network communications and IP addressing
Excellent problem solving and analytical skills
Excellent time management skills
Positive attitude and strong work ethic
Certifications in applicable industry domains, Bosch, Aveva or C-Cure platforms (or similar)
Knowledge of acceptable maintenance procedures and understanding of occupational safety and health regulations
Candidates must be available to support on-call shifts as part of a rolling schedule
Candidates must be U.S. Citizens
Candidates will be required to pass and maintain a favorable background investigation suitable for operating on a Federal Facility
Candidates will be subject to successfully passing drug screening prior to employment and random screening through their employment.
PREFERRED:
A valid driver's license
Experience working in a government facility or military experience.
Additional Qualifying Factors
As a condition of employment, may be required to pass a pre-employment drug screening, as well as have acceptable reference and background check results.
Security Clearance Requirements
It is mandatory that all Contractor personnel working onsite at federal facilities meet federal government security clearance standards. The Contractor shall submit security clearance information, for each employee, as required by current government identification card application procedures and future requirements as applicable.
All employees must be authorized as acceptable under by the contracting officer for the prime contract under which this employee is working.
Competencies
Accountability - Ability to accept responsibility and account for his/her actions.
Reliability - The trait of being dependable and trustworthy.
Responsible - Ability to be held accountable or answerable for one's conduct.
Safety Awareness - Ability to identify and correct conditions that affect employee safety.
Self-Motivated - Ability to be internally inspired to perform a task to the best of one's ability using his or her own drive or initiative.
Physical Requirements
The employee is regularly required to talk, listen, and hear, frequently required to use repetitive hand motion, handle, or feel, and to sit, stand, walk, reach, bend, regularly push, pull and lift up to 40 pounds and occasionally push, pull and lift up to 60 pounds. The employee must regularly use mechanical equipment typical of those used in the maintenance of buildings and landscape.
Benefits:
Medical, Dental, & Vision Insurance 100% covered for employee
Life and Accidental AD&D Insurance
401K Retirement plan with 3% automatic contribution
Paid Federal Holidays
Generous sick and vacation leave
ICMS is an Equal Opportunity Employer: Qualified applicants are considered for employment without regard to race, color, religion, age, sex, national origin, disability or veteran status, genetics, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
Director, Information Security & Compliance
Information security analyst job in Westchester, FL
Loyola Marymount University (LMU) is seeking an experienced leader to serve as Director of Information Security & Compliance within our Information Technology Services (ITS) team. This role offers a strategic opportunity to shape and safeguard the university's digital environment, drive proactive risk management, and embed a culture of security across the organization. Reporting directly to the CIO/VP of IT, the Director will architect and manage a best-in-class information security and compliance program that supports LMU's mission of learning, holistic education, service, and justice.
Under the general direction of the CIO/Vice President for Information Technology, the Director of Information Security and Compliance will serve as the University's Cybersecurity leader. The Director will create a modern and effective Information Security and Compliance Program that will drive the university's efforts to protect its information assets and ensure compliance with relevant regulations and standards. This role is pivotal in creating a secure and compliant digital environment that supports LMU's mission, values, and goals. The Director will leverage partnerships and collaboration to lead initiatives that result in measurable improvements in information security and compliance, fostering a culture of security awareness and proactive risk management. The Director will serve as the process owner of the appropriate second-line assurance activities not only related to confidentiality, integrity and availability, but also to the safety, privacy and recovery of information owned or processed by LMU in compliance with regulatory and university requirements. The Director will oversee the university's compliance with applicable laws, regulations, and policies related to information security and privacy.
Position Specific Responsibilities/Accountabilities
Enhance Security Posture: Develop and implement a comprehensive cybersecurity program that significantly reduces risks and vulnerabilities across the university's digital landscape.
Ensure Regulatory Compliance: Achieve and maintain compliance with relevant regulations and standards, ensuring that LMU meets all legal and regulatory requirements.
Collaborative Protection: Work closely with various campus partners, external stakeholders, and community partners to ensure that information assets and associated technologies are protected, resulting in a cohesive, unified, and well understood approach to information security and compliance.
Risk Management: Conduct thorough risk assessments and implement effective mitigation strategies, leading to a demonstrable reduction in potential threats.
Incident Response: Oversee and improve incident response and recovery efforts, ensuring swift and effective investigation and resolution of security incidents.
Policy Development: Create and enforce robust policies and procedures that safeguard information assets, leading to a well-documented and easily accessible framework for cybersecurity.
Training and Awareness: Provide comprehensive training and guidance to staff on cybersecurity best practices, resulting in a well-informed and vigilant workforce.
Monitoring and Reporting: Continuously monitor and report on the effectiveness of the cybersecurity program, providing clear metrics and insights that demonstrate progress and areas for improvement.
Leadership and Strategy: Plan and manage the strategy, people, processes, tools, services, and resources necessary to effectively support the program and meet strategic goals.
Business Continuity and Disaster Recovery: Orchestrate a secure, robust, and highly reliable approach to providing ITS services, during and after a disaster or disruption, to minimize negative impacts to business operations and maintain essential services.
Data Governance: Oversee the university's data governance efforts, ensuring that data is managed securely and in compliance with university policies and legal requirements.
Perform other related duties.
Loyola Marymount University Expectations
Exhibit behavior that supports the mission, vision, and values of the university. Communicate and employ interpersonal actions that model high standards of professional, responsible, accountable, and ethical conduct. Demonstrate a commitment to outstanding customer service.
Requisite Qualifications
Typically a Bachelor's Degree from an accredited four-year institution in Computer Science, Information Technology, or Cybersecurity.
Seven years of experience in information security, with at least three years in a management role.
Experience in developing and implementing technology policy, especially in a University environment is desirable.
Professional certifications such as CISSP, CISM, or CISA are highly desirable.
Experience in developing and implementing technology policy, preferably in a University environment.\
Strong knowledge of frameworks, standards, and best practices relating to Information Security, Privacy, Data Governance, and Business Continuity and Disaster Recovery Experience with regulatory compliance requirements (e.g., i.e. FERPA, HIPAA, GDPR, CCPA, and PCI-DSS).
Demonstrated excellent verbal and written communication skills, as well as presentation skills. Writing samples may be required.
Excellent analytical, problem-solving, and decision-making skills.
Strong communication and interpersonal skills, with the ability to effectively collaborate with diverse stakeholders.
Demonstrated ability to lead and manage a team of security professionals.
The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities, duties and skills required of this position.
#HERC# #HEJ#
Staff Regular
Salary range
$146,800.00 - $205,500.00 Salary commensurate with education and experience.
Please note that this position is not eligible for visa sponsorship now or in the future.
Loyola Marymount University, a Carnegie classified R2 institution in the mainstream of American Catholic higher education, seeks outstanding applicants who value its mission and share its commitment to inclusive excellence, the education of the whole person, and the building of a just society. LMU is an equal opportunity employer committed to providing an environment free from discrimination and harassment as defined by federal, state and local law. We invite all persons in the full diversity of their being, life experience, and beliefs to apply. (Visit *********** for more information.)
Auto-Apply