Senior Cloud Security Analyst
Information security analyst job in Miami, FL
📍
Hybrid / Remote Options (No Sponsorship Available)
💼
Full-Time | Cloud Security | IAM | O365
About the Role
We are seeking a highly skilled Senior Cloud Security Analyst to lead the evaluation, security posture management, and continuous improvement of our multi-cloud and O365 environments. This role acts as a cross-brand consultant-connecting teams, identifying security gaps, standing up cloud environments, and guiding technical staff on required security controls and the “why” behind them.
You will assess digital and cloud security posture, outline required improvements, and partner with IT stakeholders to bring environments into compliance. This is a hands-on position focused on Azure, AWS, GCP, IAM governance, O365 security, and cloud access controls, along with managing and enhancing vulnerability management and key security indicators.
You will work closely with senior network and security analysts in a small, highly collaborative team supporting both shoreside and distributed operational environments.
What You'll Do
Cloud Security & Posture Management
Oversee, evaluate, and continuously strengthen cloud security posture across Azure, AWS, and GCP.
Assess current security controls, identify gaps, and develop actionable projects to remediate risks.
Provide clear security directives such as: “Your cloud environment requires A-D; you currently only have A,” and work with teams to stand up missing controls.
IAM & Access Governance
Support access and identity processes for O365, AD, Linux, and cloud-based platforms.
Assist with IAM operations involving SailPoint and enterprise identity workflows.
Evaluate access levels across environments and ensure appropriate permissions and segregation-of-duties.
Security Operations & Monitoring
Monitor brand security posture and provide input into SIEM integrations, identifying blind spots and validating configurations.
Support vulnerability management initiatives, analyzing cloud findings (e.g., Orca, Qualys) and helping IT translate data into actionable remediation.
Assist security operations with monitoring and triaging cloud security events.
Reporting & Stakeholder Engagement
Build dashboards and reporting for executives and business leaders communicating KRIs, risks, and security posture.
Provide training, documentation, and consulting to IT team members on cloud configurations, security best practices, and new technologies.
Architecture, Projects & Continuous Improvement
Support cloud implementation and architectural reviews for upcoming solutions.
Partner with PMO teams to build and prioritize the cybersecurity backlog.
Recommend modern replacement technologies for legacy systems.
Required Qualifications
Bachelor's degree preferred (IT, Cybersecurity, Computer Science, or related).
5+ years of experience in cloud security and access management.
Hands-on expertise with:
Azure security and administration
AWS security controls & tenant management
Active Directory, O365 security, Linux/Windows access admin
SailPoint IAM
Orca Security (preferred)
PowerShell and scripting (Python, etc. nice to have)
Strong understanding of IAM principles (not an IAM engineer, but fluent in IAM governance).
Experience with GDPR, PCI, NIST frameworks.
Ability to connect dots across teams and act as a security consultant between groups.
Strong analytical, communication, and stakeholder management skills.
Preferred Certifications
Microsoft 365 Messaging or Security Administrator
CompTIA Cloud+
Cloud Security-related certs (Azure, AWS, or GCP)
Top Skills
Cloud Security (Azure, AWS, GCP)
O365 Security
AD & Access Management
IAM Support (SailPoint)
Scripting (PowerShell / Python)
Security Posture Assessment
Vulnerability Management (Orca, Qualys)
SIEM Integration Review
Risk & Compliance (NIST, PCI, GDPR)
Team Structure
You'll join a small, senior-level team consisting of:
Senior Network Security Analyst
Senior Security Analyst
Cloud Security Analyst
Information security analyst job in Miami, FL
About the Company
Your new role as a Senior Cloud Security Analyst based in Miami, you will lead initiatives to strengthen the security posture across cloud environments (Azure, AWS, GCP). Acting as a consultant to internal teams, you'll evaluate digital security gaps, implement solutions, and ensure compliance with governance standards. You'll manage IAM processes, review access controls, monitor security events, and provide strategic security directives to stakeholders.
About the Role
Responsibilities
Lead initiatives to strengthen the security posture across cloud environments (Azure, AWS, GCP).
Act as a consultant to internal teams.
Evaluate digital security gaps and implement solutions.
Ensure compliance with governance standards.
Manage IAM processes and review access controls.
Monitor security events and provide strategic security directives to stakeholders.
Qualifications
Bachelor's degree in Computer Science or related field (or equivalent experience).
5+ years in cloud security and identity access management.
Required Skills
Expertise in Azure and AWS security administration.
Strong IAM knowledge (SailPoint, Active Directory, O365).
Familiarity with GDPR, PCI, NIST frameworks.
Scripting experience (PowerShell; Python a plus).
Experience with vulnerability tools (Qualys, Orca preferred).
Preferred Skills
Microsoft 365 Messaging or Security Administrator, CompTIA Cloud+.
Pay range and compensation package
110-120K plus bonus
Equal Opportunity Statement
We are committed to diversity and inclusivity.
IT Analyst - Artificial Intelligence
Information security analyst job in Miami, FL
We're looking for a proactive and innovative Senior Business Analyst to help advance the firm's expanding artificial intelligence strategy. This position partners directly with the Director of BPM and AI to understand business needs, evaluate and recommend AI-driven solutions, deliver training programs, and champion adoption efforts across the company. The ideal candidate will act as the key connector between business units and technical teams, ensuring AI initiatives are effective, scalable, and aligned with organizational objectives.
Primary Responsibilities
Collaborate with leadership to identify and prioritize opportunities to apply AI across systems and business processes.
Coordinate with internal teams to embed AI solutions into day-to-day workflows and assess third-party offerings for potential integration.
Create and facilitate AI and Generative AI learning sessions to help employees effectively use emerging tools.
Lead hands-on workshops and Q&A sessions to encourage company-wide adoption and confidence in AI capabilities.
Build and present demonstrations, mock datasets, and sample scenarios to showcase AI use cases for senior executives and clients.
Measure performance and business impact of AI initiatives through reporting and analytics, emphasizing value and return on investment.
Produce clear documentation, user guides, and reference materials to promote consistent AI practices across departments.
Manage and maintain an organized archive of AI-related resources, including project documentation, vendor reviews, and success stories.
Qualifications
Bachelor's degree in Business, Computer Science, Information Systems, or a related discipline.
2-4 years of experience in business analysis, data analytics, or technology implementation.
Direct experience working with Generative AI tools and prompt development to address practical business challenges.
Strong communication and presentation skills with the ability to simplify technical AI concepts for non-technical audiences.
Proven ability to gather requirements and partner with developers or vendors to deliver impactful technology solutions.
Security Engineer
Information security analyst job in Miami, FL
Must reside in South Florida to be considered, this is on site in Miami
Contract
The Security Engineer plays a key role in strengthening the organization's security posture by supporting the design, implementation, and operation of modern security tools and infrastructure. This role focuses on monitoring security systems, performing threat analysis, responding to incidents, and enforcing security baselines and controls. The Security Engineer works closely with infrastructure, engineering, and compliance teams to reduce risk and ensure alignment with security best practices.
Requirements
5+ years of experience in cybersecurity, security engineering, or related technical security roles
Hands-on experience with security tools such as SIEM, EDR, vulnerability scanners, and log management platforms
Strong understanding of security frameworks (NIST, CIS, ISO 27001) and best practices
Experience with incident response, threat analysis, and remediation processes
Knowledge of network security, endpoint security, and cloud security fundamentals
Experience with scripting or automation (Python, PowerShell, Bash)
Excellent analytical and problem-solving abilities
Strong communication skills and ability to work cross-functionally with IT, engineering, and compliance teams
Responsibilities
Assist with the design and implementation of modern security tools and infrastructure to support enterprise hardening initiatives
Monitor and manage security systems including SIEM, EDR, and vulnerability management platforms
Perform threat analysis, investigate security events, and support incident response and remediation activities
Implement, maintain, and audit security policies, controls, and configuration baselines
Support risk assessments, compliance reporting, and security documentation efforts
Collaborate with engineering and operations teams to identify and remediate security risks across the environment
Contribute to continuous improvement initiatives in detection, response, and security automation
Information Technology Operations Analyst
Information security analyst job in Hollywood, FL
Based in Hollywood, FL, Sintavia, LLC designs and additively manufactures critical components for the Aerospace, Defense, & Space industry.
We are seeking a career-minded individual for the position of IT Operations Analyst, preferably someone who is looking for long-term growth and potential. In addition to the below, candidates must possess strong customer service skills, an eye for detail, and the ability to multi-task at a quick pace. Being a team player is a must!
SUMMARY: Specializes by platform or application and is responsible for performing all operational processes and procedures, ensuring that all IT services and infrastructure meet operational goals.
DUTIES AND RESPONSIBILITIES:
Analyze and provide solution to low complexity and routine computer issues
Work together with vendors to aid repairs of hardware, i.e., printers, laptops, and desktops
Responsible for the definition, design, implementation, and maintenance of support infrastructure for application solutions
Oversee the Incident, Problem, and Change management processes
Identify incident trends; recommend and implement improvements to reduce volume
Prepare SOP (Standard Operating Procedures) for the daily maintenance of applications and underlying systems
Keep Operations team up to date with new implementations and technologies
Establish clear communication channels for feedback from customers, peers, and cross functional teams
Identify new solutions for improved processes, as well as develop cost/benefit analysis for business solutions
Make certain that technology solutions adhere to quality standards
Collaborate with the project teams to review or inspect work to guarantee their quality
Assist in other tasks as required
QUALIFICATIONS:
Bachelor's degree (B.A.) from four-year college or university; or two years related experience and/or training; or equivalent combination of education and experience.
Demonstrated ability to balance department efficiency and service excellence.
Strong written, verbal, and interpersonal communications skills including ability to listen attentively and to communicate information clearly and effectively.
Demonstrated interpersonal, collaborative, and relationship-building skills; ability to interact positively with teammates at various levels across the company and customers.
Demonstrated ability to work well with cross-functional groups.
Self-motivated, able to multi-task, and detail oriented.
Strong organizational, analytical, problem-solving and decision-making skills.
Able to maintain a professional demeanor and a polished professional appearance.
Background checks will be completed on all candidates considered for hire.
REQUIREMENTS:
Working knowledge of systems architectural concepts and methodologies; infrastructure platforms and their application; business processes, process analysis/management, and IT requirements and IT managed services
It is also important that they can manage Critical Incident and Change Management SLA's with Service Provider, and can also manage and implement process improvements in NOC/SOC (network/security operation center)
Working knowledge of networking; can write Technical Specs and provide Level1 application Support (Client/Server)
Must have the required technical skills to identify system problems, as well as seek out ways to improve processes
Must be able to learn procedures quickly and be a team player
Easily adapt to new organizations / technical environments
Ability to handle and prioritize multiple tasks
Project management on small to medium projects
Must be able to perform a variety of routine tasks and demonstrate a good working knowledge of equipment, procedures and working with common hand tools
PHYSICAL DEMANDS AND WORK ENVIRONMENT:
Frequently required to sit, walk, stand, bend, stoop, kneel or crawl
Continually utilize visual acuity to operate equipment, read
technical information, and/or use a keyboard
Frequently required to lift/push/carry items up to 50 pounds
Work on Specialized equipment
WHY SINTAVIA:
We offer a comprehensive compensation and benefits package and the tools you will need to be successful, including:
Medical, dental, and vision plans after 30 days
Paid PTO and holiday
Paid life and long-term disability insurance
401(K) retirement plan and matching program
We provide a safe, fun, exciting and collaborative workplace, where growth and advancement opportunities abound.
Sintavia is an equal opportunity employer and a drug free workplace.
The above is intended to describe the general content of and requirements for the performance of this job. It is not to be construed as an exhaustive statement of duties, responsibilities or physical requirements. Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Cyber Security Analyst
Information security analyst job in Miami, FL
Job Title: SCITES - Cyber Security Analyst
Required Clearance: Minimum Secret clearance upon start and be eligible for TS/SCI clearance
Required Certification(s): DoDM 8570 CSSP Category Certification (e.g. CompTIA CySA+ or CEH)
Required Education: Bachelor's in IT or a related technical discipline preferred or commensurate level of experience based on position level
Required Experience: Advisor 8+ Years, Senior 5+ Years, Analyst 0 - 2 Years
Position Description:
Exeter is seeking personnel to provide Cyber Security, Computer Network Defense in support of the SOUTHCOM Cyber Information Technology Enterprise Services (SCITES) Contract in Doral FL.
Primary Responsibilities:
Incident Reporting, manages, track and report incidents to include submitting incident reports using the SharePoint Incident Reporting Portal
Uses SIEM Q-RADAR/ArcSight for event tracking and correlation
Develops, tests, and operates firewalls, intrusion detection systems, enterprise antivirus systems and software deployment tools
Evaluate firewall change requests and assess organizational risk
Safeguards network against unauthorized infiltration, modification, destruction or disclosure
Researches, evaluates, tests, recommends, communicates and implements new security software or dev forensics; manages, performs and reports forensics analysis to government leadership
Monitor and analyze Network IDS to identify security issues for remediation
Manages, performs and monitors the following CND tools: PowerShell, IBM Q-RADAR, CISCO SOURCEFIRE (IDS), WIDS, ACAS,JRSS Stack: Agency FIREWALL PALO ALTO, BASE FIREWALL CISCO ASA, Tipping Point (IPS), PCAP collector, InQuest, ArcSight ESM and loggers, Lancope, Blue coat Web Proxy
Required Qualifications:
Must be a U.S. Citizen
Minimum Secret clearance upon start and be eligible for TS/SCI clearance
DoDM 8570 Cyber Security Service Provider (CSSP) Category Certification (e.g. CompTIA CySA+ or CEH)
Shift work required to support real-world or contingency operations
Candidates must be local or willing to relocate
Desired Qualifications/Experience:
Bachelor's Degree in specialty field
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
#clearancejobs
Auto-ApplyCYBERSECURITY ANALYST 1_DATA SECURITY, GOVER(1941000)
Information security analyst job in Miami, FL
Miami-Dade County Public Schools (M-DCPS), an A-rated district, is the nation's third largest school system with nearly 500 schools and a diverse enrollment of more than 335,500 students from over 160 countries. Our ongoing tradition of groundbreaking achievement has earned top recognition at the national and international levels and makes M-DCPS your best choice.
Job Posting Details
The Application deadline is Friday, January 9, 2026 by 11:59 PM (EST). This is a DCSAA pay grade 41 position. Applicants need to contact Compensation Administration at ************ or ********************** for individual salary calculation. All application documents must be in SuccessFactors by the application deadline to be considered for an interview.
Required Documents:
* Current Resume
* Two (2) Professional Letters of Recommendation signed or electronic signature and dated within the last 12 months (one year) of the application. References must be from a person who can assess your ability as an administrator or your work ethic and character. Letters of recommendation must include the name, signature and contact information for the person completing the reference.
Professional Certifications or Licenses: If a position requires a specific certification(s) or license in the minimum qualification requirements listed in the job description, please upload a copy of your current/active certificate or license to your candidate profile.
Performance Evaluations: Candidates selected for a final interview are required to have acceptable performance evaluations during the three years immediately preceding application for the position. You can upload these evaluations to your candidate profile.
Veteran's Preference: If requesting veteran's preference, please check the appropriate box in SuccessFactors and attach form DD-214.
Conferred Transcripts with a Graduation Date: Current M-DCPS employees do not need to submit official transcripts if highest degree earned is on file in the Office of Personnel Records **************. For external candidates, official transcripts will be required if you are recommended for the position. Your degree must be from an accredited university. If the position does not require a college degree, you are required to have at least a high school diploma. Candidates with academic training and degrees granted outside the U.S. must submit a credential evaluation report that includes a statement of degree equivalency from an accredited agency in the U.S.
Screening of Applications: Following the application deadline a screening committee will review the applications. Candidates will be notified of the screening results by email.
Oral Interview Assessment Categories: Candidates invited to an interview will be assessed in the following areas:
* Experience
* Job Knowledge
* Reasoning and Decision-Making Skills
* Ability to Present Ideas Effectively
* Ability to Communicate in Written Form
Candidates will be invited to complete a written essay prior to the Initial Interview. Candidates who are successful in the Initial Interview will be invited to a Final Interview. M-DCPS employees who are moved to a final interview will require a reference evaluation from their immediate supervisor. Our office will email form #3506 (reference evaluation) to the Supervisor.
Background Screening for the Selected Candidate (External Candidates):
Please click on the link below for information on M-DCPS Employment Standards, Drug Testing and Fingerprinting requirements in order to be hired as an employee.
************************************************
If you have any questions, please contact Mr. Jorge Rubio, District Director, Administrative/Professional Technical Staffing at ************ or by email at **********************.
Salary Min: $58,073.00
Salary Max: $99,221.00
41 $58,073 - $99,221
OCCUPATIONAL SUMMARY
The Cybersecurity Analyst I provides support relative to the creation, maintenance, and troubleshooting of user accounts associated with various District information systems. Assists in the development and review of policies, practices, programs and materials to ensure that M-DCPS administrative and student information is secure from unauthorized access, protected from inappropriate alteration, and physically secure. Responsible for the access of various District systems to authorized users in a timely fashion.
EXAMPLE OF DUTIES
1. Creates, modifies, resumes, and deletes user ID's for various applications within Mainframe environments, various applications that authenticate against Microsoft Active Directory Services, and third-party applications.
2. Protects District systems by implementing defined access privileges to systems and applications.
3. Provides second-tier technical support for M-DCPS help-desk personnel and/or other District personnel, as appropriate, with respect to the creation, modification, and/or deletion of user ID's or permissions for various District systems.
4. Participates in organizing, writing, and editing technical instructions, operational procedures, and related materials, as appropriate.
5. Works closely with ITS staff and independent contractors in evaluating computer systems vulnerabilities by searching system logs to troubleshoot security and/or user ID issues.
6. Assists with agreed upon 'Best Practice' security settings for system policies.
7. Diagnoses and reports software malfunctions relevant to the maintenance of user ID's for various systems and recommends solutions, as appropriate.
8. Performs other duties related to general responsibilities of the position.
9. On-call 24 hours a day, 7 days a week, as needed.
PHYSICAL REQUIREMENTS
This work requires the following physical activities: sitting, mobility, lifting, finger dexterity, grasping, repetitive motions, talking, hearing and visual acuity. The work is performed primarily indoors.
MINIMUM QUALIFICATION REQUIREMENTS
1. Graduation from high school or evidence of equivalent educational proficiency, preferably supplemented by courses in data processing, networking, or cybersecurity.
2. Experience in analyzing problems related to current data processing systems and data processing scheduling. Procedure writing preferred.
3. Minimum of two (2) years of experience supporting client access to personnel, payroll, financial, or student information systems, including input and retrieval of data using a personal computer or terminal.
4. Ability to communicate effectively in both oral and written forms.
Miami-Dade County Public Schools is an equal opportunity employer!
Easy ApplyCyber Security Training
Information security analyst job in Miami, FL
Best technology is when it brings people together, but it exceeds its best when people together are high tech. With a bright team, high tech and customer-centric approach Resourcex Inc has entered the IT field by offering solutions for IT staffing, IT talent management and IT services to the clients with unmatched quality, responsiveness, and flexibility.
With a unique approach and distinct IT structure, we at Resourcex Inc meet all your IT needs quickly and efficiently. Our continuous efforts and expertise, support us in expanding and developing our services that help you to unlock the potential of every resource and creativity within the organization.
Job Description
Our Training Features:
· You will receive top quality instruction that is famous for Online IT training.
· Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue.
· Training sessions are conducted by real-time instructor with real-time examples.
· Every training session is recorded and posted to the batch after each weekend class.
· We are offering online training on Cyber Security.
.
Provide OPT Stem Ext.:
Guidance and support for applying for the 24-month OPT STEM extension
Help with OPT Employment letter:
Help with drafting and obtaining OPT employment letters that meet USCIS requirements.
· We provide training in technology of your choice.
· Good online training virtual class room environment.
· Highly qualified and experienced trainers.
· Professional environment.
· Special interview training
· Training for skill enhancement.
· Study material and Lab material provided.
· E-Verified company.
If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates.
Thanks
Additional Information
All your information will be kept confidential according to EEO guidelines.
Temp Associate Cyber Security Specialist
Information security analyst job in Miami, FL
Job DescriptionDescription:
Who is Costa Farms? We're one of the world's largest horticultural growers-but without an ego to match our acreage. Our headquarters are in Miami, Florida, where we were founded in 1961. Costa Farms started on just 30 acres, and over the last 60 years, we've grown to more than 5,000 acres around the world. We have farms in North and South Carolina, Central and South Florida, and the Dominican Republic, plus an office in China. Costa Farms now employs nearly 6,000 people: engineers, marketers, accountants/analysts, human resources professionals, and of course, growers and plant scientists!
Here at Costa Farms, we live by the values of H3: being Humble, staying Hungry, and always Hustling. The team rallies to the mission of being a lean, green, growing machine dedicated to enriching the world by bringing plants into everyone's life.
True to that mission, we grow more than 1,500 plant varieties. Driven by the spirit of innovation, the team is always testing new plants and developing new solutions to make it easier for retailers and plant parents to enjoy plants. We're also continuously testing different ways of growing our plants to increase quality and improve their ecological footprint as one aspect of our many sustainability efforts.
We cultivate plants, as well as a winning culture. Join the team, and you'll find opportunities to learn and grow. You'll collaborate with other driven, determined people who together keep Costa Farms an industry leader. You'll support and be supported by a team that cares about each other, our customers, our consumers, and our community.
You'll also find right away that Costa Farms is committed to providing a diverse environment. We're proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetic information, disability, age, military status, marital status or veteran status, or any other group status protected by federal, state, or local law.
Requirements:
Project Overview:
You will analyze Microsoft Defender's asset exposure scoring and contribute to the development and refinement of a Standard Operating Procedure (SOP) for managing high-risk assets. This includes classification, triage, incident lifecycle management, and governance.
Tools & Platforms:
· Microsoft Defender for Endpoint & Identity
· Attack Surface Management
· Microsoft Sentinel
· Picus Security Validation
· MXDR SOP Framework
· ITGC Risk Control Matrix
Week-by-Week Breakdown:
Week 1: Orientation & Tool Access
- Review the Defender_High_Exposure_Assets_SOP. - Attend walkthroughs of Defender dashboards and exposure scoring. - Gain access to Defender, Sentinel, and relevant dashboards.
Week 2-3: Asset Classification & Exposure Analysis
- Learn tagging logic and exposure score thresholds. - Identify high-risk assets using Defender telemetry. - Document asset classification logic and criticality levels.
Week 4-5: SOP Drafting & Incident Lifecycle Mapping
- Map Defender alerts to triage workflows (Detection ? IR ? Engineering). - Draft SOP sections on containment, root cause analysis, and remediation. - Collaborate with MXDR and IR teams for feedback.
Week 6: Governance & Reporting
- Build mock dashboards to track exposure trends and SLA compliance. - Draft weekly review templates and MXDR bulletin contributions. - Align SOP with audit controls (GCC Matrix, ITGC Risk Control Matrix).
Week 7-8: Testing & Continuous Improvement
- Simulate incidents using Picus and validate Defender response. - Conduct post-mortem analysis and refine SOP playbooks. - Present findings and recommendations to the cybersecurity team.
Deliverables:
· Updated SOP document with intern contributions
· Asset classification matrix
· Exposure trend dashboard mockup
· Weekly review and audit templates
Mentorship & Check-ins:
- Weekly 1:1 - Shadow sessions with MXDR, IR, and IT Operations teams - Final presentation to the IT leadership team
All applicants must be work-authorized.
Costa Farms will not sponsor any visa for this position.
After applying, follow us on LinkedIn to stay up to date on what's happening around Costa Farms and to start becoming part of our family. Come Grow with Us™!
Costa Farms offers competitive wages and benefits, including:
401(k) Plan
Company 401(k) Matching Contributions
Health Savings Account, Flexible Spending Account, and Dependent Care
Telemedicine/ Mental Health Services
Health Insurance
Dental Insurance
Vision Insurance
Pet Insurance
Supplemental Insurance (Aflac)
Growth Opportunities
Challenging and exciting work environment
Costa Farms Scholarship
Employee discounts on plants
Costa Farms headquarters also has:
On-site gym with showers
Subsidized on-site cafeteria, a quiet room, and indoor games
Love Where You Work activities throughout the year
Sr Cloud Security Analyst (onsite)
Information security analyst job in Doral, FL
13804 - Sr Cloud Security Analyst (onsite) - Doral, FL Work Setting: Hybrid Required: • Availability to work at the Client's site in Doral, FL (required); • Experience with O365, AD, MS, Linux Access management (5+ years); • Experience with Cloud Security (5+ years);
• Experience with Azure administration and configure access controls;
• Experience with AWS security administration and configure access controls;
• Experience with GCP;
• Experience with GDPR, PCI, NIST;
• Experience with Vendor technology legacy;
• Experience with SailPoint IAM solution;
• Experience with Active Directory;
• Experience with Windows workstations and server operating systems;
• Experience with managing security for AWS cloud environment tenants;
• Security background;
• High School Diploma or GED in Computer Science or other technical degree or equivalent experience;
• Certifications: Microsoft 365 Messaging and or Security Administrator, CompTIA Cloud+.
Preferred:
• Scripting experience (PowerShell, Python etc.);
• Experience with Qualys;
• Experience with Orca Security;
• Bachelor's Degree.
Responsibilities:
• Management, evaluation, maintenance, and enhancement of the cloud security posture;
• Operation of identity and access processes and controls for SailPoint, Active Directory, Email, and Collaboration Platforms and cloud-based solution;
• Continuous improvement of the brand vulnerability management people, process, and technology analyzing cloud environment reporting, prioritizing, and working with brand IT to make Cloud Security Management data actionable and understandable;
• Evaluation and providing directives and guidance regarding our SIEM integrations, identifying potential blind spots, and assisting with configuration validations;
• Augment and assist GISCS Security Operations, monitoring and triaging brand security events (Security Operations);
• Creates visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs;
• Assisting with security architecture reviews for new and proposed integrated solutions.
Why apply?
• Work with one of the largest global vacation and cruise providers and a recognizable brand;
• Be a part of a diverse multicultural team and thrive in a fun and inclusive work environment dedicated to providing memorable and affordable vacations;
• Work with the leader in cutting-edge technology and programming;
• Be certain in your future as our Client is a stable and growing company with increasing revenue;
• Receive plenty of coaching and support from the team and current Vitaver consultants.
Enjoy a comprehensive employee benefits program:
• Get paid on a bi-weekly basis;
• During the 1st year of employment - prorated amount of PTO and Sick Time. After - 14 days of PTO annually and 10 days of sick time annually;
• Eight paid holidays annually;
• Available health, dental, vision plans;
• Flexible spending account;
• 401K retirement savings plan;
• Employee Stock Purchase plan;
• Short and long-term disability plan;
• Cruise benefits;
• Discount and complimentary memberships (various complimentary memberships, discount cards and passes: theme parks, various restaurants, wholesale clubs, car rental agencies and cell phone providers to name a few).
Onsite perks:
• Fitness center;
• Child Development Center;
• Café and coffee shop;
• Learning Resource Center (LRC);
• Discounted dry-cleaning service;
• Fuel service & car wash.
Network Security Analyst
Information security analyst job in North Miami, FL
The Cybersecurity Analyst is responsible for safeguarding organizational systems and data by detecting, analyzing, and responding to cybersecurity threats. This role requires hands-on expertise in security and log analysis, incident response, and triage, as well as experience with Trellix solutions, PCI DSS assessments, and SIEM platforms such as Helix, SolarWinds, and Splunk. Familiarity with NIST 800-53 and NIST 800-35 frameworks is essential.
This position also requires a foundational understanding of IT infrastructure, as the analyst will closely partner with the Infrastructure team to ensure end-to-end system security.
Key Responsibilities
Conduct real-time security monitoring and log analysis to identify potential threats and anomalies.
Perform incident response activities including triage, investigation, containment, eradication, and recovery.
Manage and tune SIEM platforms (Helix, SolarWinds, Splunk) to ensure effective event correlation and alert accuracy.
Utilize Trellix security solutions (e.g., ETP, EDR, Helix) for threat detection, response, and endpoint protection.
Conduct PCI DSS assessments and support remediation to ensure compliance with regulatory and industry standards.
Develop and maintain incident response plans, playbooks, and post-incident reporting in alignment with NIST 800-53 / 800-35.
Perform root cause analysis and recommend proactive measures to reduce risk exposure.
Collaborate with cross-functional IT and Infrastructure teams to improve the organization's overall security posture.
Participate in a rotational weekly on-call schedule to support after-hours IT support and security.
Create detailed reports and metrics on incidents, vulnerabilities, and compliance performance.
Stay current on evolving threat landscapes, tools, and cybersecurity frameworks.
Required Skills and Qualifications
Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or equivalent experience.
Proven experience in incident response, security operations, and log analysis.
Hands-on experience with Trellix (McAfee) products and other EDR/SIEM solutions.
Proficiency in Helix, SolarWinds, and Splunk for monitoring, correlation, and threat hunting.
Experience performing or supporting PCI DSS audits and compliance efforts.
Solid understanding of NIST SP 800-53 and NIST SP 800-35 frameworks.
Strong analytical, troubleshooting, and communication skills.
IT infrastructure background with the ability to collaborate effectively with system administrators and network engineers.
Ability to lift up to 50 lbs as part of occasional equipment handling or system maintenance tasks.
Ability to work in a fast-paced environment and respond effectively under pressure.
Preferred Qualifications
Security certifications such as CompTIA Security+, CISSP, CISM, CEH, or GCIH.
Previous experience in a Security Operations Center (SOC) environment.
Familiarity with scripting (Python, PowerShell, Bash) for automation and log parsing.
Knowledge of vulnerability management and threat intelligence platforms.
Auto-ApplySecurity Analyst - Miami, FL
Information security analyst job in Miami, FL
Role: Security Analyst Duration: 6+ Months BGV will be done for the selected candidates.
Performs threat hunting, triaging, and reporting information security events Provide oversight to security incidents, processes, and escalations to determine the root cause and extent of the incidents
An understanding of Unix security
Drive the analysis and trending of security log data from a heterogeneous security devices
Performs information security policy review for third party/vendor relationships and monitor the service level agreements per agreed upon terms
Assist the security incident response team through all remediation and recovery phases
Develop procedures related to the review of vulnerabilities.
Develop security policies, standards, procedures and guidelines.
Implement and support security-focused tools and services.
Experience with the following tools is a plus: Nexspose
Responsible for security incident report investigation, and incident handling working closely with internal team, HR and Legal to perform investigation of security incidents in accordance with company policy.
Research the latest information security trends
Conduct strategic analysis of existing, new and evolving network security technologies
Knowledge of vulnerability scanning using the Tenable Nessus system or other equivalent network vulnerability assessment tools
Provide subject matter expertise to IT Compliance during IT internal and external audits
Assess security risks to the corporation's information and communications systems
Ability to research and understand the latest vulnerabilities and threats
Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques
Knowledge of malware families, botnets, threats by sector, and various attack campaigns and attacker methods, tools/techniques/practices
Conducts security research in keeping abreast of latest security issues.
Recognizes potential, successful and unsuccessful intrusion attempts and compromises through reviews and analyses of relevant event detail and summary information
Please respond with your word resume and requested details:
Full Name :
Work Authorization:
Contact Number :
Email ID :
Skype ID:
Current location:
Willing to relocate :
Rate/hr :
Additional Information
All your information will be kept confidential according to EEO guidelines.
Blockchain Security Analyst
Information security analyst job in Miami, FL
At ITRADE STEM, we help create jobs and support the future of industries like space, technology, energy, and manufacturing. We do this by creating programs that teach skills and support sustainable growth. Join us on our mission to Redefine STEM!
Job Overview:
Be part of a pioneering team as a Blockchain Security Analyst, where your expertise will shape the future of digital asset security. We are seeking a highly skilled professional to lead advanced blockchain investigations, analyze cryptocurrency transactions, and explore smart contract interactions. In this role, you'll also deliver engaging training sessions on cutting-edge investigative techniques, working alongside top cybersecurity and legal professionals. Your insights will impact the industry through detailed analytical reports, expert consultations, and innovative solutions. If you're passionate about blockchain technology, have a solid background in crypto investigations, excel in smart contract analysis, and enjoy mentoring others, this is your opportunity to make a difference in the rapidly evolving fields of blockchain analytics and cybersecurity.
Responsibilities:
Lead Complex Blockchain Investigations
Conduct advanced blockchain transaction analysis to trace cryptocurrency movements and identify patterns.
Investigate smart contract vulnerabilities and potential exploits using sophisticated forensic tools.
Drive Technical Innovation
Develop new methodologies for blockchain monitoring and analysis.
Design custom tools and automation scripts to enhance investigation efficiency.
Shape Industry Knowledge
Create and deliver expert-level training programs for law enforcement and industry professionals.
Produce comprehensive technical reports to influence industry best practices.
Lead Cross-functional Collaboration
Collaborate with cybersecurity experts and legal teams to advance investigations.
Contribute to the development of industry standards for blockchain security.
Professional Growth Opportunities
Work with state-of-the-art blockchain analysis tools and AI-powered platforms.
Gain exposure to emerging cryptocurrencies, DeFi protocols, and cutting-edge technologies.
Play a pivotal role in shaping the future of digital asset security.
Requirements:
Bachelor's degree in Computer Science, Cybersecurity, Forensic Analysis, or related field. Advanced degrees or certifications in blockchain or cybersecurity are a plus.
Strong written and verbal communication skills, with experience preparing detailed investigative reports and presenting findings.
Hands-on experience with blockchain analysis platforms (e.g., Chainalysis, CipherTrace, Crystal Blockchain).
Proficiency in Python, JavaScript, or similar programming languages for blockchain data analysis.
Deep understanding of DeFi protocols, DEXs, and cross-chain bridges.
Knowledge of blockchain ecosystems (Bitcoin, Ethereum, Solana, etc.).
Experience using smart contract security tools (e.g., Slither, Mythril, Echidna).
Familiarity with smart contract programming languages (e.g., Solidity, Rust).
Knowledge of anti-money laundering (AML) and know-your-customer (KYC) regulations.
Proven expertise in blockchain forensics and cryptocurrency investigations.
Experience with graph analysis tools and data visualization software.
Understanding of MEV, frontrunning, and DeFi attack vectors.
Exceptional problem-solving skills with strong attention to detail.
Ability to work with emerging technologies such as Layer 2 solutions, zk Proofs, and MEV protection.
Qualifications:
Experience in instructional design or delivering training in blockchain fundamentals and investigative techniques.
Familiarity with data analysis tools and methodologies.
Knowledge of cryptographic protocols and security measures.
Previous experience in teaching or mentoring, particularly in technology or cybersecurity.
Ability to develop and facilitate training sessions for diverse audiences, including law enforcement and non-technical stakeholders.
Experience with non-EVM platforms such as Solana, Algorand, and others.
Join a team at the forefront of blockchain innovation and make a lasting impact in the world of digital security!
Information Systems Security Officer (ISSO)
Information security analyst job in Miami, FL
Job DescriptionISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Easy ApplyCybersecurity and Information Security Manager
Information security analyst job in Miami, FL
Cybersecurity and Information Security Manager Reports To: Director of Technology Position Type: Permanent - Full-Time
ABOUT US
du Pont REGISTRY Group proudly marks four decades as a cornerstone of the luxury automotive market in 2025. Renowned for connecting millions of buyers and sellers worldwide, du Pont REGISTRY Group has facilitated billions in automotive transactions while setting the standard for excellence in the industry.
POSITION OVERVIEW
This role serves as the company's primary cybersecurity resource, responsible for securing du Pont Registry's systems, data, websites, and third-party platforms. The Cybersecurity & Information Security Manager balances business enablement with security oversight, managing everything from endpoint protection and incident response to vendor assessments and user awareness training.
The ideal candidate is self-sufficient, technically curious, and comfortable wearing multiple hats. They will perform both operational security tasks and higher-level program design in a fast-paced, entrepreneurial environment. They are also comfortable communicating and managing at the technical, configuration levels while providing key insight to executive boards through targeted high-level reporting.
KEY RESPONSIBILITIES
Security Operations & Infrastructure
Perform daily monitoring of security logs, alerts, and reports from firewalls, EDR, SIEM, and cloud environments.
Manage endpoint, network, and email security solutions; ensure systems are patched, updated, and compliant.
Oversee security of cloud and hosted services (AWS, Azure, Google Workspace, Microsoft 365, etc.).
Respond to and manage security incidents, data breaches, and vulnerabilities in coordination with IT vendors.
Perform internal security assessments, penetration testing coordination, and vulnerability scans.
Governance, Risk & Compliance
Develop, maintain, and implement cybersecurity policies and procedures aligned with modern frameworks (NIST CSF, CIS Controls).
Assist with risk assessments and vendor evaluations, especially for technology partners and marketing platforms.
Support compliance efforts related to privacy and payment requirements (CCPA, GDPR, PCI-DSS).
Maintain documentation for audits and leadership reporting.
Awareness & Training
Conduct regular employee security awareness and phishing simulation campaigns.
Promote a culture of cybersecurity across departments with practical, business-friendly approaches.
Strategic Support & Reporting
Provide regular reports to the CFO and leadership on cybersecurity posture, incidents, and key risks.
Participate in budgeting and planning for cybersecurity tools and services.
Stay current on emerging threats and technologies to continuously enhance the company's defenses.
QUALIFICATIONS
Bachelor's degree in Information Security, Information Technology, Computer Science, or related field (or equivalent experience).
At least seven years of experience in IT security, cybersecurity operations, or systems administration.
Hands-on experience with key technologies: firewalls, endpoint protection, cloud security, Google cloud, Microsoft 365, and SIEM.
Working knowledge of network security principles, web application security, and vulnerability management.
Solid understanding of risk-based decision-making and practical security implementation in small/medium business environments.
Preferred: Security-related certifications such as Security+, CEH, GSEC, CISSP, or CISM.
Exposure to ecommerce, media, or marketing technology environments.
Experience implementing or managing security standards such as NIST, CIS Controls, or ISO 27001.
Blockchain Security Analyst
Information security analyst job in Miami, FL
Job Description
Octagon Talent Solutions is a full-service technology recruitment and staffing company based in South Florida. We humanize technical recruitment by identifying candidates' long-term career goals and assessing cultural fit when presenting opportunities. Our focus on long-term relationships helps ensure placements that last.
Job Overview:
Be part of a pioneering team as a Blockchain Security Analyst, where your expertise will shape the future of digital asset security. We are seeking a highly skilled professional to lead advanced blockchain investigations, analyze cryptocurrency transactions, and explore smart contract interactions. In this role, you'll also deliver engaging training sessions on cutting-edge investigative techniques, working alongside top cybersecurity and legal professionals. Your insights will impact the industry through detailed analytical reports, expert consultations, and innovative solutions. If you're passionate about blockchain technology, have a solid background in crypto investigations, excel in smart contract analysis, and enjoy mentoring others, this is your opportunity to make a difference in the rapidly evolving fields of blockchain analytics and cybersecurity.
Responsibilities:
Lead Complex Blockchain Investigations
Conduct advanced blockchain transaction analysis to trace cryptocurrency movements and identify patterns.
Investigate smart contract vulnerabilities and potential exploits using sophisticated forensic tools.
Drive Technical Innovation
Develop new methodologies for blockchain monitoring and analysis.
Design custom tools and automation scripts to enhance investigation efficiency.
Shape Industry Knowledge
Create and deliver expert-level training programs for law enforcement and industry professionals.
Produce comprehensive technical reports to influence industry best practices.
Lead Cross-functional Collaboration
Collaborate with cybersecurity experts and legal teams to advance investigations.
Contribute to the development of industry standards for blockchain security.
Professional Growth Opportunities
Work with state-of-the-art blockchain analysis tools and AI-powered platforms.
Gain exposure to emerging cryptocurrencies, DeFi protocols, and cutting-edge technologies.
Play a pivotal role in shaping the future of digital asset security.
Requirements:
Bachelor's degree in Computer Science, Cybersecurity, Forensic Analysis, or related field. Advanced degrees or certifications in blockchain or cybersecurity are a plus.
Strong written and verbal communication skills, with experience preparing detailed investigative reports and presenting findings.
Hands-on experience with blockchain analysis platforms (e.g., Chainalysis, CipherTrace, Crystal Blockchain).
Proficiency in Python, JavaScript, or similar programming languages for blockchain data analysis.
Deep understanding of DeFi protocols, DEXs, and cross-chain bridges.
Knowledge of blockchain ecosystems (Bitcoin, Ethereum, Solana, etc.).
Experience using smart contract security tools (e.g., Slither, Mythril, Echidna).
Familiarity with smart contract programming languages (e.g., Solidity, Rust).
Knowledge of anti-money laundering (AML) and know-your-customer (KYC) regulations.
Proven expertise in blockchain forensics and cryptocurrency investigations.
Experience with graph analysis tools and data visualization software.
Understanding of MEV, frontrunning, and DeFi attack vectors.
Exceptional problem-solving skills with strong attention to detail.
Ability to work with emerging technologies such as Layer 2 solutions, zk Proofs, and MEV protection.
Qualifications:
Experience in instructional design or delivering training in blockchain fundamentals and investigative techniques.
Familiarity with data analysis tools and methodologies.
Knowledge of cryptographic protocols and security measures.
Previous experience in teaching or mentoring, particularly in technology or cybersecurity.
Ability to develop and facilitate training sessions for diverse audiences, including law enforcement and non-technical stakeholders.
Experience with non-EVM platforms such as Solana, Algorand, and others.
Join a team at the forefront of blockchain innovation and make a lasting impact in the world of digital security!
Security Systems Engineer
Information security analyst job in Miami, FL
Full-time Description
Innovative Consulting & Management Services (ICMS) is a Professional & Technical Management Consulting firm with over 20 years of consulting experience. We offer technical professional services to Federal and State Governments, and Commercial clients.
ICMS is a Small Business and Certified HUBZone employer. We deliver value to our clients by combining deep industry knowledge with strong functional capabilities. Our focus is to manage cost-effective programs while at the same time mitigating risk and improving results. Our success is about teamwork, a coordinated effort from all disciplines, from clients to consultants and most important, it's about delivering on our commitments.
ICMS is seeking an experienced and detail-oriented Security Systems Engineer to join our team in support of one of our federal clients. This position is 100% onsite at a Federal Government facility. This is a corporate, exempt position.
The Security Systems Engineer will be responsible for the operations, management, maintenance and performance of all access control, security cameras, video surveillance systems, network backbone, automated gates, and door controls/ digital locks. Other duties include:
Perform routine maintenance and repair on various systems comprising the electronic security systems at a detention facility
Security Systems - Install, troubleshoot, program (knowledge of C-Cure 9000 and Aveva Wonderware, and Bosch VMS systems essential to long term success)
Security Cameras & Video Management - repair, install, troubleshooting, adjusting, cleaning, and programming of all peripheral devices (preferably knowledge of Bosch VMS)
HID Card Readers & Electronic Door Locks - repair, install, troubleshooting and programming (knowledge of PLC Programmable Logic Controllers a plus)
Radios and communication equipment - repair install and troubleshooting
Phone systems - repair, troubleshooting and installing patch panels (preferably Avaya Communication Systems)
Network Management - Fiber optic switches and other network devices (routers, surge protection, switches, servers, storage arrays) - operation, troubleshooting, monitoring and maintenance of underlying - install, tone, troubleshooting and repair
Data systems - install and terminate patch panels, troubleshooting and cable certifying
Interpreting drawings, electrical schematics, training manuals, and instructions to perform duties. Maintain up to date and current licensing and service agreements for all software components
Establish and maintain effective working relationships with supervisors, co-workers, and other employees.
Requirements
B.S. in Networking, Computer Science or applicable degree. Degree can be substituted with HS Diploma and at least 15 years of experience
Familiarity installing and troubleshooting low voltage equipment
Strong working knowledge of commercial access control, CCTV, burglary alarm, intrusion systems, and fire alarms
Strong working knowledge of Microsoft Office
Strong written and verbal communications skills
Working knowledge of network communications and IP addressing
Excellent problem solving and analytical skills
Excellent time management skills
Positive attitude and strong work ethic
Certifications in applicable industry domains, Bosch, Aveva or C-Cure platforms (or similar)
Knowledge of acceptable maintenance procedures and understanding of occupational safety and health regulations
Candidates must be available to support on-call shifts as part of a rolling schedule
Candidates must be U.S. Citizens
Candidates will be required to pass and maintain a favorable background investigation suitable for operating on a Federal Facility
Candidates will be subject to successfully passing drug screening prior to employment and random screening through their employment.
PREFERRED:
A valid driver's license
Experience working in a government facility or military experience.
Additional Qualifying Factors
As a condition of employment, may be required to pass a pre-employment drug screening, as well as have acceptable reference and background check results.
Security Clearance Requirements
It is mandatory that all Contractor personnel working onsite at federal facilities meet federal government security clearance standards. The Contractor shall submit security clearance information, for each employee, as required by current government identification card application procedures and future requirements as applicable.
All employees must be authorized as acceptable under by the contracting officer for the prime contract under which this employee is working.
Competencies
Accountability - Ability to accept responsibility and account for his/her actions.
Reliability - The trait of being dependable and trustworthy.
Responsible - Ability to be held accountable or answerable for one's conduct.
Safety Awareness - Ability to identify and correct conditions that affect employee safety.
Self-Motivated - Ability to be internally inspired to perform a task to the best of one's ability using his or her own drive or initiative.
Physical Requirements
The employee is regularly required to talk, listen, and hear, frequently required to use repetitive hand motion, handle, or feel, and to sit, stand, walk, reach, bend, regularly push, pull and lift up to 40 pounds and occasionally push, pull and lift up to 60 pounds. The employee must regularly use mechanical equipment typical of those used in the maintenance of buildings and landscape.
Benefits:
Medical, Dental, & Vision Insurance 100% covered for employee
Life and Accidental AD&D Insurance
401K Retirement plan with 3% automatic contribution
Paid Federal Holidays
Generous sick and vacation leave
ICMS is an Equal Opportunity Employer: Qualified applicants are considered for employment without regard to race, color, religion, age, sex, national origin, disability or veteran status, genetics, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
Salary Description up to $120,000/annually
CIP Cyber Security Specialist
Information security analyst job in Princeton, FL
As an NRG employee, we encourage you to take charge of your career and development journey. We invite you to explore exciting opportunities across our businesses. You'll find that our dynamic work environment provides variety and challenge. Your growth is key to our ongoing success-take the lead in shaping your career development, goals and future!
Job Summary
Job Summary
Ensures execution of the security services and CIP compliance for generating plants. Will be responsible for maintaining inventories, configuration baselines, security logging and patching. Will work with compliance and controls personnel to implement and maintain the program and serve as the primary contact for the services.
Essential Duties/Responsibilities:
Essential Duties/ Responsibilities
• Ensure compliance to all NERC-CIP Standards at NRG's facilities.
• Primary responsibility for CIP compliance at assigned site.
Create and maintain compliance or operational procedures as required.
• Be the lead for all CIP related Physical and Electronic Access Control for identified site.
• Be the primary contact for issues with Physical Security at all assigned sites for Physical Security Perimeters, including verifying those needing accesses, response to breaches and security system failures.
• Determination, verification and justification of all open ports and enabled services on Cyber Assets.
• Assessment of security patches and updates for all Cyber Assets.
• Deployment or mitigation of required security patches and updates to all Cyber Assets.
• Insure that Cyber Assets are protected by Antivirus/Antimalware applications; update as required.
• Insure required logging and alerting of Cyber Assets is functional; respond to detection of various types of alerts or breaches.
• Be the administrator for personnel needing electronic access, both local and remote, to Cyber Assets.
• Follow NRG's Policy and Procedure for reporting of Cyber or Physical Security Incidents. Assist in testing of the Incident reporting procedure annually.
• Perform and verify backups of Cyber Assets.
• Create and maintain disaster recovery procedures and assist with performance
Follow and assist others in following the NRG Policy and Procedures for Change Management.
• Perform Cyber Vulnerability Assessments as needed.
• Provide accurate documentation for all NERC evidence requirements; complete evidence collections tasks in NRG's workflow program in a timely manner.
• Assist with Compliance Requirements at other sites in the region as needed as well as being available to assist team members at other sites across the NRG fleet if needed.
• Work with team members on projects and new, innovative ideas.
• Working with various teams, prepare evidence needed for NERC Audits.
• Maintain great working relationships with site personnel and other teams.
• Some travel required- approximately 15-25%.
• Other duties as required.
Working Conditions
Working Conditions
• Work in an open office or power plant environment
• Work overtime and non-standard working hours as directed
Minimum Requirements
Minimum Requirements
Over three years of experience in Cybersecurity, NERC-CIP compliance, and/or power generation and transmission operations.
Hands-on experience with Distributed Control Systems (DCS).
Strong understanding of Operational Technology (OT) environments and Balance of Plant (BoP) systems.
Skilled in performing system backups and restoration procedures for OT systems.
Proficient in asset protection strategies, including antivirus/antimalware deployment, security patching, and continuous security monitoring.
Experience in configuring, patching, and maintaining Windows-based servers and workstations, including anti-malware management.
Solid working knowledge of Microsoft Access, Word, Excel, Visio, and Unix systems for both server and workstation environments.
Practical experience with Unix/Linux operating systems.
Familiarity with OT network infrastructure, including firewalls, switches, and routers.
Preferred Qualifications
Preferred Qualifications
Bachelor's degree in information technology, engineering or related area
Cybersecurity certifications such as GCIP, CISSP, CISA, Security+
NERC-CIP experience and knowledge of NERC-CIP Standards and Requirements.
Knowledge and/or experience working with Distributed Control Systems (DCS).
Knowledge of OT Technologies and Balance of Plant (BoP) Systems.
Experience working with Ovation, T3000, Symphony +, or GE Control Systems
Experience using vulnerability scanning tools.
Experience provisioning and maintenance of PACS.
Administration experience of Windows and as related to both servers and workstations.
Demonstrated ability to communicate (verbal and written) with all levels of internal and external customers.
Demonstrated ability to work independently and as a team member.
Demonstrated ability to set priorities and to respond to changing demands.
Ability to exercise discretion and independent judgment in applying established techniques, procedures or standards; demonstrated ability to maintain confidentiality.
Additional Knowledge, Skills and Abilities
Additional KSAs
• Socialize innovative ideas with the team and others.
• Performs moderately complex work assignments under minimal supervision.
• Works to resolves moderately complex issue and seeks guidance from team members on escalated issues.
• Demonstrated ability to communicate (verbal and written) with all levels of internal and external customers.
• Demonstrated ability to work independently and as a team member.
• 1 year or more of experience with system management (patching, troubleshooting, administration)
• Demonstrated ability to set priorities and to respond to changing demands.
• Ability to exercise discretion and independent judgment in applying established techniques, procedures or standards; demonstrated ability to maintain confidentiality.
Physical Requirements
Physical Requirements
Demand
Frequency
• Requires lifting as appropriate to complete duties
Occasional
Statement
Statement
NRG Energy is committed to a drug and alcohol free workplace. To the extent permitted by law and any applicable collective bargaining agreement, employees are subject to periodic random drug testing, and post-accident and reasonable suspicion drug and alcohol testing. EOE AA M/F/Vet/Disability Level, Title and/or Salary may be adjusted based on the applicant's experience or skills. Official description on file with Human Resources.
NRG Energy is committed to a drug and alcohol-free workplace. To the extent permitted by law and any applicable collective bargaining agreement, employees are subject to periodic random drug testing, and post-accident and reasonable suspicion drug and alcohol testing. EOE AA M/F/Vet/Disability. Level, Title and/or Salary may be adjusted based on the applicant's experience or skills.
Official description on file with Talent.
System Security Engineer
Information security analyst job in Miami, FL
Instasks App is a Professional Concierge Service. The app provides top-tiered professionals and clients with an online platform. Our unique approach to building an App is to give the client and the provider instant bookings and an easy process of all services: For example, client requests for quick tasks and large projects. Providers receive custom requests for their specialized skills. The app takes care of all invoicing between client and provider with a detailed invoice. And book all the confirmed jobs. We track providers' locations for the client's en route to any job.
We created a portal platform to guide you in listing your professions. The platform provides you with schedules, invoicing and credit card processing are all part of the enhanced technology. Clients will have a choice to give the providers reviews and star ratings to ensure our elite services when booking on our app. Our mission is to help all providers strive to achieve their financial and independent goals. To have more time with their families and create a brighter future for all.
The App offers opportunities to providers over the age of 18 and, by law, over the age of 21 for any tasks serving liquor. Build your future with a secure & safe platform. Be your own boss by choosing the TASKS that best suit your schedules and be available to work when you want to work. Build your income to help increase your revenue. Book tasks that are within a 15-mile radius. Our language preferred gives you better communication skills during your tasks. Our client's and providers' health & well-being are our highest priorities.
BACKGROUND CHECK POLICY: All providers accountants go through an extensive (background check) through a third party company. The certificates they receive are in place to ensure the provider and client feel safe. The document you receive from the third-party background company can be given to any job you are applying for. Our policy states all providers must go through a third party background check only after you are confirmed for a job. We request you do not go through the background check link until you are confirmed for any jobs.
ETIQUETTE TRAINING POLICY: Each provider will go through etiquette training to ensure that every provider is a friendly and well-mannered individual. We are poised to give our clients the very best in professional service. Our platform should leave no room for laxity as we work hard to bring the very best to our customers.
SKILLS AND ABILITIES: Requires working from detailed instructions and occasional independent decision-making. Ability to read, analyze and interpret documents such as safety rules, operating and maintenance instructions, or procedural manuals.
We are looking for a capable System Security Engineer, who enjoys security work and possesses both deep and wide expertise in the security space.
You will make things more secure by protecting system boundaries, keeping computer systems and network devices hardened against attacks and securing highly sensitive data. Qualified candidates will have a background in security or systems engineering.
Responsibilities
Engineer, implement and monitor security measures for the protection of computer systems, networks and information.
Identify and define system security requirements.
Design computer security architecture and develop detailed cyber security designs.
Prepare and document standard operating procedures and protocols.
Configure and troubleshoot security infrastructure devices.
Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks.
Ensure that the company knows as much as possible, as quickly as possible about security incidents.
Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement.
Requirements
Proven work experience as a system security engineer or information security engineer.
Experience in building and maintaining security systems.
Detailed technical knowledge of database and operating system security.
Hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
Experience with network security and networking technologies and with system, security, and network monitoring tools.
Thorough understanding of the latest security principles, techniques, and protocols.
Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocols.
Problem-solving skills and ability to work under pressure.
BS degree in Computer Science or related field.
Director, Information Security & Compliance
Information security analyst job in Westchester, FL
Loyola Marymount University (LMU) is seeking an experienced leader to serve as Director of Information Security & Compliance within our Information Technology Services (ITS) team. This role offers a strategic opportunity to shape and safeguard the university's digital environment, drive proactive risk management, and embed a culture of security across the organization. Reporting directly to the CIO/VP of IT, the Director will architect and manage a best-in-class information security and compliance program that supports LMU's mission of learning, holistic education, service, and justice.
Under the general direction of the CIO/Vice President for Information Technology, the Director of Information Security and Compliance will serve as the University's Cybersecurity leader. The Director will create a modern and effective Information Security and Compliance Program that will drive the university's efforts to protect its information assets and ensure compliance with relevant regulations and standards. This role is pivotal in creating a secure and compliant digital environment that supports LMU's mission, values, and goals. The Director will leverage partnerships and collaboration to lead initiatives that result in measurable improvements in information security and compliance, fostering a culture of security awareness and proactive risk management. The Director will serve as the process owner of the appropriate second-line assurance activities not only related to confidentiality, integrity and availability, but also to the safety, privacy and recovery of information owned or processed by LMU in compliance with regulatory and university requirements. The Director will oversee the university's compliance with applicable laws, regulations, and policies related to information security and privacy.
Position Specific Responsibilities/Accountabilities
Enhance Security Posture: Develop and implement a comprehensive cybersecurity program that significantly reduces risks and vulnerabilities across the university's digital landscape.
Ensure Regulatory Compliance: Achieve and maintain compliance with relevant regulations and standards, ensuring that LMU meets all legal and regulatory requirements.
Collaborative Protection: Work closely with various campus partners, external stakeholders, and community partners to ensure that information assets and associated technologies are protected, resulting in a cohesive, unified, and well understood approach to information security and compliance.
Risk Management: Conduct thorough risk assessments and implement effective mitigation strategies, leading to a demonstrable reduction in potential threats.
Incident Response: Oversee and improve incident response and recovery efforts, ensuring swift and effective investigation and resolution of security incidents.
Policy Development: Create and enforce robust policies and procedures that safeguard information assets, leading to a well-documented and easily accessible framework for cybersecurity.
Training and Awareness: Provide comprehensive training and guidance to staff on cybersecurity best practices, resulting in a well-informed and vigilant workforce.
Monitoring and Reporting: Continuously monitor and report on the effectiveness of the cybersecurity program, providing clear metrics and insights that demonstrate progress and areas for improvement.
Leadership and Strategy: Plan and manage the strategy, people, processes, tools, services, and resources necessary to effectively support the program and meet strategic goals.
Business Continuity and Disaster Recovery: Orchestrate a secure, robust, and highly reliable approach to providing ITS services, during and after a disaster or disruption, to minimize negative impacts to business operations and maintain essential services.
Data Governance: Oversee the university's data governance efforts, ensuring that data is managed securely and in compliance with university policies and legal requirements.
Perform other related duties.
Loyola Marymount University Expectations
Exhibit behavior that supports the mission, vision, and values of the university. Communicate and employ interpersonal actions that model high standards of professional, responsible, accountable, and ethical conduct. Demonstrate a commitment to outstanding customer service.
Requisite Qualifications
Typically a Bachelor's Degree from an accredited four-year institution in Computer Science, Information Technology, or Cybersecurity.
Seven years of experience in information security, with at least three years in a management role.
Experience in developing and implementing technology policy, especially in a University environment is desirable.
Professional certifications such as CISSP, CISM, or CISA are highly desirable.
Experience in developing and implementing technology policy, preferably in a University environment.\
Strong knowledge of frameworks, standards, and best practices relating to Information Security, Privacy, Data Governance, and Business Continuity and Disaster Recovery Experience with regulatory compliance requirements (e.g., i.e. FERPA, HIPAA, GDPR, CCPA, and PCI-DSS).
Demonstrated excellent verbal and written communication skills, as well as presentation skills. Writing samples may be required.
Excellent analytical, problem-solving, and decision-making skills.
Strong communication and interpersonal skills, with the ability to effectively collaborate with diverse stakeholders.
Demonstrated ability to lead and manage a team of security professionals.
The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities, duties and skills required of this position.
#HERC# #HEJ#
Staff Regular
Salary range
$146,800.00 - $205,500.00 Salary commensurate with education and experience.
Please note that this position is not eligible for visa sponsorship now or in the future.
Loyola Marymount University, a Carnegie classified R2 institution in the mainstream of American Catholic higher education, seeks outstanding applicants who value its mission and share its commitment to inclusive excellence, the education of the whole person, and the building of a just society. LMU is an equal opportunity employer committed to providing an environment free from discrimination and harassment as defined by federal, state and local law. We invite all persons in the full diversity of their being, life experience, and beliefs to apply. (Visit *********** for more information.)
Auto-Apply