Post job

Information Security Analyst jobs in Kendale Lakes, FL

- 140 Jobs
All
Information Security Analyst
Cyber Security Analyst
Senior Security Analyst
Network Security Analyst
Information Systems Security Officer
Security System Engineer
Information Security Officer
Information Assurance Analyst
Information Security Manager
Information Security Director
  • BISO - Business Information Security Officer

    Globalsource It 4.0company rating

    Information Security Analyst job in Miami, FL

    GlobalSource IT has a client that is looking to hire a Business Information Security Officer on a Contract to Hire basis. Those with experience in the role of a BISO or those who feel they are ready to step into such a role are encouraged to apply. The BISO team is the IT Security primary point of contact for the assigned IT and business unit teams, driving the creation and supporting the implementation of the security program. As a trusted advisor, the BISO will collect business requirements and will provide advice and oversight to ensure that Information Security policy is complied with for processes and systems. Our client, a leader in the hospitality industry, offers a competitive compensation package and excellent opportunity for advancement. This role will start off as a 6-12 month contract, then convert to an FTE. During the contract period, if you do not live in Miami, you are allowed to work remote. All FTE's are required to work on site in the Miami, FL area. If you're interested in discussing this opportunity, please apply with your resume and contact information and we can coordinate a time to connect. Thank you!
    $92k-134k yearly est. 14d ago
  • Cyber Security Analyst

    Exeter Government Servi 4.1company rating

    Information Security Analyst job in Miami, FL

    Job Title: SCITES - Cyber Security Analyst Required Clearance: Minimum Secret clearance upon start and be eligible for TS/SCI clearance Required Certification(s): DoDM 8570 CSSP Category Certification (e.g. CompTIA CySA+ or CEH) Required Education: Bachelor's in IT or a related technical discipline preferred or commensurate level of experience based on position level Required Experience: Advisor 8+ Years, Senior 5+ Years, Analyst 0 - 2 Years Position Description: Exeter is seeking personnel to provide Cyber Security, Computer Network Defense in support of the SOUTHCOM Cyber Information Technology Enterprise Services (SCITES) Contract in Doral FL. Primary Responsibilities: Incident Reporting, manages, track and report incidents to include submitting incident reports using the SharePoint Incident Reporting Portal Uses SIEM Q-RADAR/ArcSight for event tracking and correlation Develops, tests, and operates firewalls, intrusion detection systems, enterprise antivirus systems and software deployment tools Evaluate firewall change requests and assess organizational risk Safeguards network against unauthorized infiltration, modification, destruction or disclosure Researches, evaluates, tests, recommends, communicates and implements new security software or dev forensics; manages, performs and reports forensics analysis to government leadership Monitor and analyze Network IDS to identify security issues for remediation Manages, performs and monitors the following CND tools: PowerShell, IBM Q-RADAR, CISCO SOURCEFIRE (IDS), WIDS, ACAS,JRSS Stack: Agency FIREWALL PALO ALTO, BASE FIREWALL CISCO ASA, Tipping Point (IPS), PCAP collector, InQuest, ArcSight ESM and loggers, Lancope, Blue coat Web Proxy Required Qualifications: Must be a U.S. Citizen Minimum Secret clearance upon start and be eligible for TS/SCI clearance DoDM 8570 Cyber Security Service Provider (CSSP) Category Certification (e.g. CompTIA CySA+ or CEH) Shift work required to support real-world or contingency operations Candidates must be local or willing to relocate Desired Qualifications/Experience: Bachelor's Degree in specialty field Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. #clearancejobs
    $72k-104k yearly est. 60d+ ago
  • Virtual Cyber Security SDR, BDR, Contract to Hire

    Planet Green Search

    Information Security Analyst job in Miami, FL

    Company Overview: Our Client is a leading provider of cutting-edge cybersecurity solutions to protect businesses from evolving digital threats. They pride themselves on our innovative approach to safeguarding sensitive data, networks, and systems. Their team of experts provides comprehensive cybersecurity solutions that empower organizations to navigate the complex digital landscape with confidence. Position Summary: As a Virtual SDR, BDR at our Client, you will play a pivotal role in driving the success of our cybersecurity solutions across the United States. As one of the first 20 employees, you will play a vital role in shaping the direction of our company and driving growth. Their recent seed round raised an unbelievable $11M at a $36M valuation, and the founders' last venture resulted in a big exit with the sale of the company to Microsoft. They operate in the IT Security space and are 100% virtual. In this dynamic and customer-facing role, you will leverage your technical expertise and sales acumen to provide strategic guidance and support to our clients throughout the sales process. This position offers a unique blend of technical knowledge, sales skills, and the opportunity for nationwide travel. We Are Looking For: As a mid-level Business Development Rep. (BDR SDR) you'll be at the tip of the spear, responsible for researching and qualifying top of funnel leads while being the first to connect with our potential customers. You'll research and build contact lists, make outbound cold calls/emails to those who fit our Ideal Customer Profile (ICP) and will then partner with AEs to get customers onboarded. This position will spend roughly 80% of the time on the phone or email prospecting for new clients. This position is a great way for individuals to gain in-depth sales experience with a rapidly growing SaaS security company looking to win the category! What You'll Do: Generate high volume quality MQLs through various direct sales efforts such as calls, emails, events, webinars, and other channels generated by Marketing. Make daily outbound calls/emails to prospects who have demonstrated interest. Follow up on all calls and emails until meetings are booked or you've been able to move the prospect through the funnel. Record all activities and properly manage lead stage/flow in our Salesforce CRM. Achieve or exceed monthly quotas of meetings, demos, and qualified leads worked with AEs. Schedule product demos on AE's calendar. Discern buyer intent and partner with AEs to get the right customers onboarded. Work closely with Marketing, Product, and CS/CX to clearly communicate critical top-of-funnel feedback and suggestions that help optimize segmentation, content, & features. What You'll Need: Must have BDR/SDR experience in the SaaS or similar software space Great speaking self-awareness and ability to read prospect signals and adjust accordingly to move the prospect down the funnel. Must have a clear, easy-to-understand phone voice and a professional Zoom presence with the ability to engage and empathize over the phone. Hands-on experience with multiple sales prospecting techniques like cold calling, cold emailing, video conference selling, and social outreach is a must. Knowledge of sales & marketing constructs, the evergreen funnel, and playbooks are important. Must be a great listener with an ability to address objections graciously and frame the next steps clearly. Good writers and creative thinkers needed - Must be able to craft well-written (great grammar and spelling), compelling emails, and responses that lead prospects down the funnel. Verifiable track record of success and goal attainment in a frontline sales-oriented role Deep knowledge of software and social networks (especially LinkedIn, Facebook, and Twitter) is important. Track record of (over)achieving sales quotas. Must have a strong, self-motivated drive, passion, and desire to deliver results. Experience in a fast-growing startup environment is a big plus. What We Offer: Contract to Hire, Strong Salary plus comm after 90 days Full Benes PreIPO equity Be part of an exciting high-growth SaaS organization An impactful role with lots of growth potential A lot of freedom to apply your creative and strategic skills A work-hard, play-hard environment 100% virtual Virtual Cyber Security SDR, BDR, Contract to Hire
    $68k-96k yearly est. 60d+ ago
  • Associate Cyber Security Analyst

    Costa Farms 4.4company rating

    Information Security Analyst job in Miami, FL

    Who is Costa Farms? We're one of the world's largest horticultural growers-but without an ego to match our acreage. Our headquarters are in Miami, Florida, where we were founded in 1961. Costa Farms started on just 30 acres, and over the last 60 years, we've grown to more than 5,000 acres around the world. We have farms in North and South Carolina, Central and South Florida, and the Dominican Republic, plus an office in China. Costa Farms now employs nearly 6,000 people: engineers, marketers, accountants/analysts, human resources professionals, and of course, growers and plant scientists! Here at Costa Farms, we live by the values of H3: being Humble, staying Hungry, and always Hustling. The team rallies to the mission of being a lean, green, growing machine dedicated to enriching the world by bringing plants into everyone's life. True to that mission, we grow more than 1,500 plant varieties. Driven by the spirit of innovation, the team is always testing new plants and developing new solutions to make it easier for retailers and plant parents to enjoy plants. We're also continuously testing different ways of growing our plants to increase quality and improve their ecological footprint as one aspect of our many sustainability efforts. We cultivate plants, as well as a winning culture. Join the team, and you'll find opportunities to learn and grow. You'll collaborate with other driven, determined people who together keep Costa Farms an industry leader. You'll support and be supported by a team that cares about each other, our customers, our consumers, and our community. You'll also find right away that Costa Farms is committed to providing a diverse environment. We're proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetic information, disability, age, military status, marital status or veteran status, or any other group status protected by federal, state, or local law. DESCRIPTION: The Associate Cyber Security Analyst plays a vital role in the in monitoring, detecting, investigating and preventing security incidents across the enterprise. This entry-level role is foundational for developing expertise in threat analysis, incident response, and security operations within a Zero Trust framework. RESPONSIBILITIES: Security Monitoring & Alert Triage * Monitor SIEM dashboards and endpoint protection tools (e.g., Microsoft Defender, Palo Alto Prisma Access) for suspicious activity. Escalate alerts based on severity and context. Incident Response Support * Assist in documenting and responding to security incidents. Participate in root cause analysis and help maintain incident response playbooks. Vulnerability & Risk Assessment Run vulnerability scans, track remediation efforts, and support patch management cycles. Help maintain secure configurations across endpoints and cloud environments. Access Control & IAM * Support identity and access reviews, enforce multi-factor authentication (MFA) policies, and help manage user provisioning and deprovisioning. Security Awareness & Training * Support coordination of phishing simulations and employee training campaigns across the enterprise. Track participation and follow-up actions. Documentation & Reporting * Maintain logs, update security documentation, and assist in preparing reports for audits and compliance reviews. * Assist in documenting and responding to security incidents. Participate in root cause analysis and help maintain incident response playbooks. TOOLS AND TECHNOLOGIES: * Microsoft Defender for Endpoint, Intune, Sentinel * Palo Alto Prisma Access * Nessus, Jira, SharePoint * AWS IAM, Terraform (for cloud provisioning) * NIST SP 800-53, 800-30, 800-37 (for compliance frameworks) SKILLS AND QUALIFICATIONS: * Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field. (or equivalent professional experience or certifications like CompTIA Security+). * An internship or project experience in cybersecurity is strongly preferred. * Basic understanding of networking, firewalls, and endpoint security tools. * Familiarity with SIEM tools and log analysis. * Interest in pursuing certifications (e.g., Security+, SSCP, GSEC). * Strong analytical and troubleshooting skills. * Effective verbal and written communication - bilingual English and Spanish verbal communication is strongly preferred. * Experience with scripting (Python, PowerShell). * Exposure to cloud platforms (AWS, Azure) or Microsoft security tools. PHYSICAL DEMANDS: * Sedentary Work: Exerting up to 10 pounds of force occasionally and/or a negligible amount of force frequently or constantly to lift, carry, push, pull, or otherwise move objects, including the human body Primarily involves sitting, with occasional requirements to stand, walk, or lift objects to a certain weight. WORK ENVIRONMENT: * Office: Office-based settings may include open office environments where background noise from conversations, office equipment, and phone calls is common. All applicants must be work-authorized. Costa Farms will not sponsor any visa for this position. After applying, follow us on LinkedIn to stay up to date on what's happening around Costa Farms and to start becoming part of our family. Come Grow with Us! Costa Farms offers competitive wages and benefits, including: * 401(k) Plan * Company 401(k) Matching Contributions * Health Savings Account, Flexible Spending Account, and Dependent Care * Telemedicine/ Mental Health Services * Health Insurance * Dental Insurance * Vision Insurance * Pet Insurance * Supplemental Insurance (Aflac) * Growth Opportunities * Challenging and exciting work environment * Costa Farms Scholarship * Employee discounts on plants Costa Farms headquarters also has: * On-site gym with showers * Subsidized on-site cafeteria, a quiet room, and indoor games * Love Where You Work activities throughout the year This organization participates in E-Verify * E-Verify Notice of Participation / E-Verify Aviso de Participación (English/Español) * E-Verify Right to Work Poster / E-Verify Cartel Derecho a Trabajar (English/Español)
    $69k-101k yearly est. 10d ago
  • Cyber Security Analyst

    Bluestone 4.1company rating

    Information Security Analyst job in Boca Raton, FL

    blue Stone Recruiting is a national search firm with a focus of placing top Cyber Security talent from the Analyst level to CISO with prestigious organizations nationwide Job Description Reports to CISO and works with a team of Cyber Security specialists. The Cyber Security Analyst is responsible for identifying risks to the confidentiality, integrity, and availability of our clients products and services, while maintaining compliance with applicable regulatory standards. In this role, you will be expected to contribute to the integrity and sustainability of the service delivery network, which consists of advanced server-based applications used to support our client's customers. The successful candidate will work directly with senior team members on issues that may require some after-hours and weekend availability. Specific Job Duties: • Articulate technical and security requirements to departments/business groups • Identify gaps in security operations and develop mitigation strategies • Assist with the maintenance of application and operating system software in the Service Delivery Network • Participate in disaster recovery and business continuity planning • Perform software development lifecycle auditing • Prioritize compliance actions according to business risk Desired Preferred Skills: • Industry certifications - PMP, CISA, CISSP, Security + • Department of Defense IT experience • Pharmacy or healthcare experience Qualifications • Masters's degree in computer science or relative discipline • 5-10 years combined experience in information security • Proficient with Unix / Linux • Strong analytical problem solving • Knowledge of the software development lifecycle • Proven ability to plan and work to a deadline • Must be able to obtain Department of Defense clearance Additional InformationWork with blue Stone recruiting to find your next Cyber Security role. You can find us at ******************************* We look forward to speaking with you.
    $68k-98k yearly est. 60d+ ago
  • Security/Information Assurance Analyst (SAP/STO)

    Sancorp Consulting

    Information Security Analyst job in Doral, FL

    Senior IT Systems and Security Analyst (SAP/STO) Work Posture: On-site Travel: Occasional Deployment: No Drug screening: Yes Security Clearance: Citizenship: TS/SCI Must be a U.S. Citizen Required Experience A minimum of five (5) years support experience in various aspects of IT systems and security (ie: help desk, system administration, project management, knowledge management) A minimum of three (3) years of experience managing IT life cycle and maintenance programs (ie: upgrades, Defense Conference System, inventory) A minimum of one (1) year relevant experience working in a joint/CCMD environment supporting various IT networks. Ability to obtain a DoD 8570 Certification within 3 months of hire (CompTIA Network+ and/or Security + Certification). Willingness to submit to random selected CI, SCOPE Polygraph testing and/or any additional security screening as required. Knowledge of the Federal Enterprise Architecture (FEA) and the DoD Enterprise Architecture framework (e.g., Secret Internet Protocol Router Network (SIPRNet) Nonsecure Internet Protocol (IP) Router Network, NIPRNet and Joint Worldwide Intelligence Communications Systems (JWICS) networks), and the Information Technology (IT) rules and regulatory authorities to develop and implement policies and planning concepts, and project management methods. Knowledge of basic Microsoft office software applications (e.g., Word, PowerPoint, Excel, Access). Salary: Commensurate with experience Responsibilities: SANCORP is seeking a Senior IT Systems and Security Analyst in support of USSOUTHCOMS Special information operations. The following are examples of responsibilities: Supporting the Command SAP Control Officer and SAP Security Manager with sustainment of SAP/STO networks, coordinating with government agencies and program offices to maintain, upgrade, sanitize, decommission, and track equipment per SAPCON SOP. Ensuring compliance with DoDM 5205.07, DoDM 5200.01, and SAPCON SOP in managing SAP systems, information assurance policies, and incident monitoring. Monitoring user compliance with cybersecurity policies; report discrepancies per SAPCON SOP. Developing and maintaining secure document repositories for SAP and ACCM networks. Implementing and reporting IS security measures and incidents in accordance with SAPCON SOP. Responding to IT inquiries and requests, ensuring alignment with SAP and DoD policy. Liaison between users and IT project managers for configuration changes and upgrades. Investigating SAP-related incidents, suspicious activity, and potential breaches; coordinate with security teams for incident containment and mitigation. Applying and supporting implementation of SAP system security configurations; collaborate with administrators and security teams to address vulnerabilities. Administering SAP/STO user accounts and authorizations; track resolution of user-reported issues. Coordinating with developers, data owners, and COIs to enforce secure data management, sharing, and classification standards. Managing and compiling ATO packages; support policy enforcement, security training, and cybersecurity awareness. Developing POA&Ms for IT projects and upgrades; conduct compliance reviews and continuous system monitoring, including data spillage tracking. Serving as liaison for USSOUTHCOM SAP/ACCM IT upgrades, project support, and requirements identification. Supporting the ACCM Lead Control Officer and Security Manager in applying DoDM 5200.01, CJCSM 3213.02, and SAPCON SOP for ACCM systems. Maintaining ACCM databases and document repositories; manage role-based access controls and conduct regular access reviews. Sancorp Consulting LLC shall, in its discretion, modify or adjust the position to meet Sancorp's changing needs. This job description is not a contract and may be adjusted as deemed appropriate at Sancorp's sole discretion. Sancorp Consulting, LLC, is an SDVOSB and SBA 8(a) company seeking highly motivated and qualified professionals and offer an attractive salary and benefits package that includes: Medical, Dental, life and Disability Insurance; 401K, and holidays to ensure the highest quality of life for our employees. Please visit our website for more information at ************************** Sancorp Consulting, LLC is an equal opportunity employer. At Sancorp Consulting, LLC we are committed to providing equal employment opportunities (EEO) to all employees and applicants without
    $48k-75k yearly est. 60d+ ago
  • CAC/PKI Local Registration Authority (LRA) Information Security Specialist - Intermediate SOUTHCOM, Doral, Florida

    Empower Ai

    Information Security Analyst job in Doral, FL

    Empower AI is AI for government. Empower AI gives federal agency leaders the tools to elevate the potential of their workforce with a direct path for meaningful transformation. Headquartered in Reston, Va., Empower AI leverages three decades of experience solving complex challenges in Health, Defense, and Civilian missions. Our proven Empower AI Platform provides a practical, sustainable path for clients to achieve transformation that is true to who they are, what they do, how they work, with the resources they have. The result is a government workforce that is exponentially more creative and productive. For more information, visit *************** Empower AI is proud to be recognized as a 2024 Military Friendly Employer by Viqtory, the publisher of G.I. Jobs. This designation reflects the company's commitment to hiring and supporting active-duty and veteran employees. Responsibilities Empower AI: As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the SOUTHCOM, Doral, Florida CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer. Highlights of Responsibilities: Provide LRA support 0600-2200, Monday-Friday. Provide 24/7 On-Call and Emergency Response. Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR. Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites. Provide support for annual and semi-annual DoD Compliance Audits. Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS. Develop and maintain On-the-Job Training packages. Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability. Verify Subscriber's identity. Pre-register users with PKI. Validate NPE certificate requirements and forward revocation requests. Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon. Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered. Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS. Complete General Officer / Senior Executive Service requests within 12 hours of receipt. Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours. Complete request for key recoveries within 48 hours. Complete new ASCL and NSS SIPRNET token request within 72 hours. Submit a monthly RA Activity Report. Submit a monthly Token Report of all tokens on hand to include returned and bad tokens. Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time. Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office. Qualifications Minimum Requirements: Secret Security Clearance with completed a Tier 5 (T5) background investigation Bachelor's degree 7 - 12 years of experience Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services. Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties. Have never been denied or had a security clearance revoked. Have never been convicted of a felony offense. Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials. Preferred Qualifications: DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification ITIL v4 Foundations certification Physical Requirements: Sitting for long periods Standing for long periods Ambulate throughout an office Ambulate between several buildings Stoop, kneel, crouch, or crawl as required Travel by land or air transportation 10% or less About Empower AI All hiring and promotion decisions at Empower AI are based on merit to bring the best talent available to contribute to our firm's overall success. It is the policy of Empower AI not to discriminate against any applicant for employment, or employee because of age, color, sex, disability, national origin, race, religion, or veteran status. Empower AI is a VEVRAA Federal Contractor.
    $60k-92k yearly est. 10d ago
  • Sr Security and Threat Monitoring Analyst

    UKG (Ultimate Kronos Group

    Information Security Analyst job in Weston, FL

    With 80,000 customers across 150 countries, UKG is the largest U.S.-based private software company in the world. And we're only getting started. Ready to bring your bold ideas and collaborative mindset to an organization that still has so much more to build and achieve? Read on. At UKG, you get more than just a job. You get to work with purpose. Our team of U Krewers are on a mission to inspire every organization to become a great place to work through our award-winning HR technology built for all. Here, we know that you're more than your work. That's why our benefits help you thrive personally and professionally, from wellness programs and tuition reimbursement to U Choose - a customizable expense reimbursement program that can be used for more than 200+ needs that best suit you and your family, from student loan repayment, to childcare, to pet insurance. Our inclusive culture, active and engaged employee resource groups, and caring leaders value every voice and support you in doing the best work of your career. If you're passionate about our purpose - people -then we can't wait to support whatever gives you purpose. We're united by purpose, inspired by you. **About the Team** As a Senior Security and Threat Monitoring Analyst, you will be part of UKG's Global Security Operations Center (GSOC) team investigating events of interest and incidents within UKG's FedRAMP authorized computing environments. **About the Role** You will facilitate and follow UKG's standard processes to investigate, contain, eradicate, and respond in a continued and unified effort to protect the confidentiality, integrity, and availability of UKG, our partners' and customers' data and services. You will be an escalation point for all incidents, analyzing, confirming, re-prioritizing if necessary and remediating those identified threats within the UKG FedRAMP authorized computing environments. You will leverage your skills, experience, and creativity to perform initial, forensically sound collection and analysis, methodologies to contain, eradicate, and recover from realized threats such as zero-day, ransomware, malware and other APT's. Additionally, you will be responsible for participating in incident response activities as part of the Cyber Incident Response Team (CIRT) or as the Cyber Incident Response Lead (CIRL), providing strong technical and environmental knowledge during the incident. You will lead efforts, post incident, in reporting and continuous improvement recommendations to enhance UKG's security posture through process development, tool rationalization, detection technique and automation enhancement opportunities and enablement/training possibilities. Due to the nature of the work, you are required to have occasional on-call duties on weekends and/or holidays. Additional work hours may also be required during an incident investigation. **Responsibilities:** - Review tickets escalated from junior analysts to confirm the priority, category and accuracy of the details and conditions. - Pivot to additional security tools to obtain and ascertain context or information and any other pertinent information to inform on the most effective and efficient mitigation/remediation actions. - Escalate tickets as required to GSOC Director for additional scrutiny and incident declaration. - Collaborate with UKG internal and external groups to develop and execute containment, eradication, and recovery strategies for lower priority incidents. - Identify, approve, and implement blocking, listing and other mechanisms to promote a robust security posture. - Participate in the Cyber Incident Response Plan (CIRP) process as part of the Cyber Incident Response Team (CIRT) or as the Cyber Incident Response Lead (CIRL) to lead and/or support mitigating and/or remediating critical incidents. - Participate in post-incident activities including coordinating and providing input within the requisite reports and identifying areas for continuous improvements within the GSOC enablement, processes or technology. - Provide mentoring and enablement of junior analysts globally to expand and extend UKG's GSOC capabilities and experiential capacities. **Basic Qualifications:** - Working professional with 4-6 years of relevant Security/SOC experience - 4-6 years of experience with common attack vectors on the network layer, different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). - 4-6 years of experience with cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored) and cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). - Working knowledge of FedRAMP requirements, processes and procedures - Bachelor's degree in computer science or a related discipline - CISSP, CCSP, GIAC or other relevant cyber security certifications **Preferred Qualifications:** - Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). - Knowledge of cybersecurity, incident response methodologies, privacy principles, cyber threats, vulnerabilities, and detection methodologies and techniques for detecting intrusions. - Experience with Splunk, ServiceNow SIR, EDR solutions, email security tools, and cloud environments (GCP, Azure). - Knowledge and experience in reverse engineering to understand how an information asset works and analyzing system components to identify potential vulnerabilities. - Knowledge and experience in developing automations using scripting languages like Python and PowerShell to automate various tasks and improve accuracy, enhance task consistency, and increase scalability. - Knowledge and experience in conducting and participating in security audits and assessments. - Understanding and experience in developing and delivering relevant and value-add operational metrics to support and provide visibility into the GSOC program. - Knowledge of new and emerging cybersecurity technologies, threats, and threat vectors. - Knowledge and experience in designing, executing, and reporting threat hunting activities. - Knowledge and experience around offensive security (ethical hacking) techniques to identify and mitigate/remediate vulnerabilities in the UKG environment. - Knowledge and experience in cyber forensic procedures and how to extract information and generate reports in support of incident response and other advanced requirements. **Where we're going** UKG is on the cusp of something truly special. Worldwide, we already hold the #1 market share position for workforce management and the #2 position for human capital management. Tens of millions of frontline workers start and end their days with our software, with billions of shifts managed annually through UKG solutions today. Yet it's our AI-powered product portfolio designed to support customers of all sizes, industries, and geographies that will propel us into an even brighter tomorrow! Equal Opportunity Employer UKG is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, disability, religion, sex, age, national origin, veteran status, genetic information, and other legally protected categories. View The EEO Know Your Rights poster (https:****************************************************************************************** UKG participates in E-Verify. View the E-Verify posters here (https:************************************************************************************ . It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability. The pay range for this position is $99,800.00 to $143,450.00 USD, however, base pay offered may vary depending on skills, experience, job-related knowledge and location. This position is also eligible for a short-term incentive and a long-term incentive as part of total compensation. Information about UKG's comprehensive benefits can be reviewed on our careers site at https:******************* (https:*******************) It is the policy of Ultimate Software to promote and assure equal employment opportunity for all current and prospective Peeps without regard to race, color, religion, sex, age, disability, marital status, familial status, sexual orientation, pregnancy, genetic information, gender identity, gender expression, national origin, ancestry, citizenship status, veteran status, and any other legally protected status entitled to protection under federal, state, or local anti-discrimination laws. This policy governs all matters related to recruitment, advertising, and initial selection of employment. It shall also apply to all other aspects of employment, including, but not limited to, compensation, promotion, demotion, transfer, lay-offs, terminations, leave of absence, and training opportunities.
    $99.8k-143.5k yearly 60d+ ago
  • Sr Security and Threat Monitoring Analyst

    Ultimate Kronos Group

    Information Security Analyst job in Weston, FL

    With 80,000 customers across 150 countries, UKG is the largest U.S.-based private software company in the world. And we're only getting started. Ready to bring your bold ideas and collaborative mindset to an organization that still has so much more to build and achieve? Read on. At UKG, you get more than just a job. You get to work with purpose. Our team of U Krewers are on a mission to inspire every organization to become a great place to work through our award-winning HR technology built for all. Here, we know that you're more than your work. That's why our benefits help you thrive personally and professionally, from wellness programs and tuition reimbursement to U Choose - a customizable expense reimbursement program that can be used for more than 200+ needs that best suit you and your family, from student loan repayment, to childcare, to pet insurance. Our inclusive culture, active and engaged employee resource groups, and caring leaders value every voice and support you in doing the best work of your career. If you're passionate about our purpose - people -then we can't wait to support whatever gives you purpose. We're united by purpose, inspired by you. About the Team As a Senior Security and Threat Monitoring Analyst, you will be part of UKG's Global Security Operations Center (GSOC) team investigating events of interest and incidents within UKG's FedRAMP authorized computing environments. About the Role You will facilitate and follow UKG's standard processes to investigate, contain, eradicate, and respond in a continued and unified effort to protect the confidentiality, integrity, and availability of UKG, our partners' and customers' data and services. You will be an escalation point for all incidents, analyzing, confirming, re-prioritizing if necessary and remediating those identified threats within the UKG FedRAMP authorized computing environments. You will leverage your skills, experience, and creativity to perform initial, forensically sound collection and analysis, methodologies to contain, eradicate, and recover from realized threats such as zero-day, ransomware, malware and other APT's. Additionally, you will be responsible for participating in incident response activities as part of the Cyber Incident Response Team (CIRT) or as the Cyber Incident Response Lead (CIRL), providing strong technical and environmental knowledge during the incident. You will lead efforts, post incident, in reporting and continuous improvement recommendations to enhance UKG's security posture through process development, tool rationalization, detection technique and automation enhancement opportunities and enablement/training possibilities. Due to the nature of the work, you are required to have occasional on-call duties on weekends and/or holidays. Additional work hours may also be required during an incident investigation. Responsibilities: * Review tickets escalated from junior analysts to confirm the priority, category and accuracy of the details and conditions. * Pivot to additional security tools to obtain and ascertain context or information and any other pertinent information to inform on the most effective and efficient mitigation/remediation actions. * Escalate tickets as required to GSOC Director for additional scrutiny and incident declaration. * Collaborate with UKG internal and external groups to develop and execute containment, eradication, and recovery strategies for lower priority incidents. * Identify, approve, and implement blocking, listing and other mechanisms to promote a robust security posture. * Participate in the Cyber Incident Response Plan (CIRP) process as part of the Cyber Incident Response Team (CIRT) or as the Cyber Incident Response Lead (CIRL) to lead and/or support mitigating and/or remediating critical incidents. * Participate in post-incident activities including coordinating and providing input within the requisite reports and identifying areas for continuous improvements within the GSOC enablement, processes or technology. * Provide mentoring and enablement of junior analysts globally to expand and extend UKG's GSOC capabilities and experiential capacities. Basic Qualifications: * Working professional with 4-6 years of relevant Security/SOC experience * 4-6 years of experience with common attack vectors on the network layer, different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). * 4-6 years of experience with cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored) and cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). * Working knowledge of FedRAMP requirements, processes and procedures * Bachelor's degree in computer science or a related discipline * CISSP, CCSP, GIAC or other relevant cyber security certifications Preferred Qualifications: * Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). * Knowledge of cybersecurity, incident response methodologies, privacy principles, cyber threats, vulnerabilities, and detection methodologies and techniques for detecting intrusions. * Experience with Splunk, ServiceNow SIR, EDR solutions, email security tools, and cloud environments (GCP, Azure). * Knowledge and experience in reverse engineering to understand how an information asset works and analyzing system components to identify potential vulnerabilities. * Knowledge and experience in developing automations using scripting languages like Python and PowerShell to automate various tasks and improve accuracy, enhance task consistency, and increase scalability. * Knowledge and experience in conducting and participating in security audits and assessments. * Understanding and experience in developing and delivering relevant and value-add operational metrics to support and provide visibility into the GSOC program. * Knowledge of new and emerging cybersecurity technologies, threats, and threat vectors. * Knowledge and experience in designing, executing, and reporting threat hunting activities. * Knowledge and experience around offensive security (ethical hacking) techniques to identify and mitigate/remediate vulnerabilities in the UKG environment. * Knowledge and experience in cyber forensic procedures and how to extract information and generate reports in support of incident response and other advanced requirements. Where we're going UKG is on the cusp of something truly special. Worldwide, we already hold the #1 market share position for workforce management and the #2 position for human capital management. Tens of millions of frontline workers start and end their days with our software, with billions of shifts managed annually through UKG solutions today. Yet it's our AI-powered product portfolio designed to support customers of all sizes, industries, and geographies that will propel us into an even brighter tomorrow! Equal Opportunity Employer UKG is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, disability, religion, sex, age, national origin, veteran status, genetic information, and other legally protected categories. View The EEO Know Your Rights poster UKG participates in E-Verify. View the E-Verify posters here. It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability. The pay range for this position is $99,800.00 to $143,450.00 USD, however, base pay offered may vary depending on skills, experience, job-related knowledge and location. This position is also eligible for a short-term incentive and a long-term incentive as part of total compensation. Information about UKG's comprehensive benefits can be reviewed on our careers site at ***************************
    $99.8k-143.5k yearly 60d+ ago
  • Senior Personnel Security Analyst

    Mantech 4.5company rating

    Information Security Analyst job in Doral, FL

    **ManTech** seeks a motivated, career and customer-oriented **Senior** **Personnel Security Analyst** to join our team in **Doral, FL** . **Responsibilities include but are not limited to:** + Leads the team responsible for assessing, implementing, and maintaining security measures for an organization's personnel, ensuring the protection of sensitive information and resources + Develop, implement, and maintain a comprehensive personnel security program that aligns with regulatory requirements, industry best practices, and organizational needs + Conduct security risk assessments to identify potential vulnerabilities related to personnel and manage the security clearance process for employees and contractors, including initiating, tracking, and maintaining clearances + Ensure compliance with security clearance requirements and procedures, advising employees on security clearance matters + Develop, deliver, and track the completion of personnel security awareness training programs + Ensure that investigations, background checks, and risk assessments are completed on time and accurately to identify potential security threats and ensure appropriate mitigation steps are taken for relevant findings + Provide guidance and support to ensure compliance with security policies and procedures, training staff on security awareness and best practices + Collaborate with various stakeholders, such as Program Management, Human Resources, Legal, and IT Departments, to develop and implement effective security strategies and protocols + Play a crucial role in safeguarding personnel and assets from potential security risks and conduct background investigations and risk assessments, along with other duties associated with organizational personnel security **Minimum Qualifications:** + Bachelor's degree in security management, human resources, criminal justice, or a related field or4 years of additional experience in lieu of a required bachelor's degree + 9+ years of experience with 5+ years of relevant Personnel Security Analyst experience + In-depth knowledge of personnel security principles, investigative procedures, and relevant regulations (e.g., NISPOM). + Experience processing background investigations and managing security clearances. + Experience with Government personnel security systems of record (e.g., DISS and Scattered Castles). **Desired Qualifications:** + More than 7 years of experience in personnel security or a related field. + Experience with security vulnerability assessments and risk management. + Knowledge of human resources principles and practices. + Security Fundamentals Professional Certification (SFPC) or similar certification. + Experience at a DoD Combatant Command (e.g., SOUTHCOM, NORTHCOM, CENTCOM, CYBERCOM, INDOPACOM, EUCOM, AFRICOM, STRATCOM, TRANSCOM, SOCOM, SPACECOM) or a component is desired. **Clearance Requirements:** + Must have an active Interim Secret clearance with the ability to obtain a Secret clearance. **Physical Requirements:** + The person in this position must be able to remain in a stationary position 50% of the time. Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations. ManTech International Corporation, as well as its subsidiaries proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you are a qualified individual with a disability and require a reasonable accommodation to apply for a position with ManTech through its online applicant system, please email us at ******************* and provide your name and contact information.
    $72k-93k yearly est. 28d ago
  • Network, Application, and Security Operations Center Analyst

    Keel Digital Solutions

    Information Security Analyst job in Miami, FL

    Network, Application, and Security Operations Center Analyst Salary: $80,000 - $100,000 per year Benefits: Extended Health Care Schedule: Monday to Friday We kindly ask that applicants submit only one application for this position, as multiple submissions will not be reviewed Keel Digital Solutions and Our Culture Keel Digital Solutions is a technology and innovation organization positioned within the healthcare sector, with a focus on providing unparalleled service to clients through state-of-the-art technology, virtual health care and laboratory services.Each member of our team plays an important role in executing best-in-class solutions with the very best in people, process, suppliers, technology, and business intelligence. We are seeking a dedicated and detail-oriented Network, Application, and Security (NAS) Operations Center Analyst to join our cybersecurity team. This critical role involves protecting our organization's digital assets through continuous monitoring of systems, analyzing potential threats, and responding swiftly to security incidents. The ideal candidate will have a proactive approach to cybersecurity, ensuring our information systems remain secure and resilient against evolving cyber threats. You will be part of a dynamic and collaborative team environment where your contributions directly impact the security and success of our organization. We value individuals who demonstrate integrity, professionalism, and a passion for cybersecurity. If you are passionate about cybersecurity and eager to make a difference in protecting critical information assets, we encourage you to apply for this exciting opportunity. Responsibilities and Duties Continuously monitor network, application, and security systems, dashboards, logs, and alerts for potential threats and anomalies. Analyze security alerts, investigate suspicious activities, and conduct threat assessments to identify and evaluate risks. Lead and coordinate incident response activities to mitigate security breaches and vulnerabilities effectively and rapidly. Develop, configure, and maintain monitoring dashboards using tools such as Zabbix, Elastic Stack, etc. Perform capacity planning and forecasting for applications, including the video conferencing delivery network. Document all security incidents, investigation steps, and response actions thoroughly. Collaborate closely with internal IT teams and external partners to ensure comprehensive security coverage and coordinated incident response. Contribute to the development, refinement, and implementation of security policies, procedures, and best practices. Provide insights and recommendations to help shape the organization's cybersecurity strategy and strengthen its overall security posture. Stay current with emerging cybersecurity threats, trends, technologies, and best practices through ongoing training and professional development. Mandatory Skills and Qualifications Strong background and proven experience in cybersecurity, ideally within a Security Operations Center (SOC) or similar environment. Demonstrated experience in threat detection, incident response methodologies, and using security monitoring tools. Proficiency in analyzing security logs, alerts, and system data. Excellent analytical, critical thinking, and problem-solving skills. Ability to quickly assess complex situations, make informed decisions, and act effectively under pressure. Strong attention to detail and commitment to accuracy. Excellent communication (written and verbal) and interpersonal skills, with the ability to convey technical information clearly to various stakeholders. Proven ability to work collaboratively and effectively within a team environment. High level of integrity, professionalism, and a proactive mindset towards security. A commitment to continuous learning and professional development in the cybersecurity field Our Commitment to You An ethical and fair environment that is inclusive, high energy and best-in-class Training and structured onboarding to ensure you are set up to succeed Leadership, coaching and mentorship towards a rewarding career Competitive total compensation package that includes paid vacation and health/dental benefits A deep understanding of how your role supports the companys strategy and how the companys strategy supports you Keel Digital Solutions is an equal opportunity employer and employs personnel without regard to race, ancestry, place of origin, color, ethnic origin, language, citizenship, religion, gender identity, sexual orientation, age, family status, disability, physical and/or mental handicap or financial ability. While remaining alert and sensitive to the issue of fair and equitable treatment for all, Keel Digital Solutions is committed to helping individuals with disabilities participate in the workplace and ensure equal opportunity to compete for jobs. If you require accommodation, please emailoliviag@keel.digitalfor further assistance. Please note this email address is intended for use only to request accommodation as part of the application process. Any other correspondence will not receive a response.
    $80k-100k yearly 7d ago
  • Information Security Manager/ISO

    Tropical Financial Credit Union 4.4company rating

    Information Security Analyst job in Miramar, FL

    Are you looking for an organization that values your experience? Are you a skilled customer service professional ready to take your career to the next level? If so, keep reading! Tropical FCU (TFCU) is a Sun-Sentinel Top Workplace SIX years in a row. Being part of TFCU will provide you with opportunities to engage by learning, growing, contributing, collaborating, and developing professionally. Join us for a great employee experience focused on engaging employees and members alike. Individuals in the job are responsible for assisting Tropical Financial Credit Union with the achievement of its purpose of guiding members successfully through the financial marketplace. The Information Security Manager/ISO will oversee and ensure the effective implementation and management of the Credit Union's information security practices, programs, and policies. This role will be key in safeguarding the Credit Union's critical assets and systems against cyber threats and will ensure compliance with regulatory requirements, industry standards, and best practices. The Information Security Manager will also support the Credit Union's internal and external audit requirements, particularly in relation to IT risk management, cybersecurity operations, data protection, identity and access management, and other security-related areas. Essential Duties and Responsibilities include the following. Other duties may be assigned. * Lead the development, implementation, and continuous improvement of the Credit Union's information security framework, ensuring risks related to IT and cybersecurity are effectively managed. * Lead efforts in the development, implementation, and maintenance of the organization's information security program, ensuring adherence to federal and state regulations. * Collaborate with IT, Risk Management, Compliance, and Legal departments to integrate information security into business processes, addressing common security challenges. * Oversee the monitoring and security of the organization's network, including LAN/WAN/Internet/Intranet. * Regularly review firewall, intrusion detection, and prevention systems, ensuring they meet security standards. * Support the execution of the annual audit plan for Information Security, ensuring alignment with global regulatory requirements and internal audit protocols. Conduct audits in cybersecurity operations, IT risk management, vulnerability management, data privacy, and network security. * Serve as the key liaison for internal and external auditors, ensuring security policies and testing align with organizational and regulatory requirements. * Oversee vulnerability assessments and penetration testing for various applications, ensuring methodologies remain up-to-date and compliant with regulatory standards. * Ensure compliance with cybersecurity and IT regulations, and support responses to regulatory examinations and external audit requests. * Responsible for developing, implementing, and maintaining the Credit Union's overall member / information security program's policies and procedures. Lead the continuous monitoring program to identify and mitigate cybersecurity risks. Stay updated on industry developments, technological advances, and evolving regulatory expectations. * Conduct risk assessments, communicate trends in security risks to senior management, and provide actionable insights to mitigate risks and improve the organization's security posture. * Perform periodic risk assessments of controls, products, and policies. Prepare and coordinate recommendations as necessary to address security gaps. * Investigate and oversee any security breaches or violations, coordinating response actions and remediation efforts with the IT department. * Manage the organization's incident response activities in the event of a cybersecurity breach, coordinating with internal teams and external partners to minimize the impact. * Identify security deficiencies, develop remediation plans, and work with management to implement corrective actions promptly. * Develop and lead training programs on current and emerging cybersecurity threats, compliance requirements, and best practices. Foster continuous learning within the Information Security team. * Develop and implement employee and member security awareness programs, ensuring that all staff are informed of the latest cybersecurity trends and best practices. * Oversee third-party providers to ensure the implementation of appropriate security measures. Review and evaluate partner connections, independent audit reports, vulnerability assessments, and security programs to ensure compliance with internal standards. * Administer key systems and secure email service. Ensure the proper use of these tools in maintaining the organization's security posture. * Develop and deliver monthly security metrics and reports, providing an overview of information security activities and ongoing risk management efforts. * Continuously research and evaluate emerging security tools, programs, and technologies. Recommend security enhancements and solutions to protect organizational assets. * Assist the CTO in the development, implementation, and testing of the Disaster Recovery and Business Continuity Plans, ensuring they align with organizational and security needs. * Recruit, train, and develop staff to ensure a high-performing team capable of meeting IT Business Applications expectations. * Conduct regular coaching and performance evaluations, provide feedback, and set clear goals and outline development opportunities for team members. * Foster a positive and collaborative work environment that promotes teamwork and continuous improvement. * Ensure team training and development and reinforcement to ensure adherence to Credit Union policies, procedures, and regulatory requirements and thorough knowledge of products and services. BSA Compliance & Training: * Lead efforts in ensuring full compliance with the Bank Secrecy Act (BSA), anti-money laundering (AML) policies, and procedures across the credit union. * Provide guidance and oversight into the identification of unusual or suspicious activity, ensuring that it is reported and investigated appropriately. * Oversee the completion of annual BSA and OFAC training courses for relevant personnel, maintaining comprehensive knowledge of the Bank Secrecy Act, Customer Identification Program, USA Patriot Act, OFAC, Fair Lending, and the Credit Card Act. * Ensure that all team members comply with TFCU policies and procedures to maintain adherence to relevant regulations. Perform other duties as required, with or without accommodation. We offer Excellent Benefits such as: * Medical, Dental and Vision Insurance * Retirement Profit Sharing 401K Plan * Accident, Cancer and Hospital Indemnity Plan * Prepaid Legal * Voluntary Life Insurance * Pet Discount Program * Paid Time Off/ 11 Paid Holidays * And so much More! Qualifications: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. * A significant level of trust and diplomacy is required, in addition to normal courtesy and tact. Work involves extensive personal contact with others and is usually of a personal or sensitive nature. * Work may involve motivating, influencing or training others. * Outside contacts become important and fostering sound relationships with other entities (companies and/or individuals) becomes necessary and often requires the ability to influence and/or sell ideas or services to others. * Demonstrated project management skills, PMP certification a plus. * Ability to coordinate, delegate and ensure accountability with multiple activities, team members and work, in a high pace environment. * Strong interpersonal and leadership skills. * Excellent verbal and written communication skills and have the ability make presentations to internal and external groups. * Ability to work and travel independently as needed and use general office equipment. Education and/or Experience * Bachelor's degree in computer science or information systems preferred, will consider work experience and certifications in lieu of bachelor's degree. * Minimum of 8 years of experience in information security, IT risk management, or cybersecurity, ideally within the banking or financial services industry. Experience in leading audits and managing security risk assessments is preferred. * Minimum 3 years of business experience in a financial institution or technology company, dealing with multiple business platforms, business processes, geographies, and legal entities. * Minimum 3 years of experience managing teams and leading security initiatives. * Experience performing vulnerability and IT risk assessments. * Desired Information Security related certifications,CISM, CISA, CIS, CISSP, GIAC, CEH, Security+ Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. While performing the duties of this job, the employee is regularly required to talk or hear. The employee frequently is required to stand, walk, sit and use hands to handle or touch. The employee is occasionally required to reach with hands and arms. The employee must occasionally lift and/or move up to 10 pounds. Specific vision abilities required by this job include close vision, and ability to focus. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
    $89k-107k yearly est. 60d+ ago
  • Information System Security Officer (ISSO) Senior-SCITES

    People Technology and Processes 4.2company rating

    Information Security Analyst job in Doral, FL

    Job Details Doral, FLDescription PWS Title: Information System Security Officer (ISSO) Senior Clearance Type: TS/SCI Responsibilities (including but not limited to): Implements and enforces security policies, standards, and procedures in compliance with organizational and regulatory requirements. Verifies that information systems adhere to applicable laws, regulations, and industry standards. Develops and maintains security documentation, including System Security Plans (SSPs), risk assessments, and audit reports. Prepares and submits security reports to management and regulatory bodies as required. Continuously monitors information systems for security threats, vulnerabilities, and anomalies. Conducts vulnerability assessments and penetration testing to identify and mitigate potential security risks. Manages and oversees access control mechanisms, ensuring that users have appropriate access based on their roles. Regularly reviews and updates access privileges to maintain the principle of least privilege. Participates in or leads the response to security incidents, including detection, analysis, containment, and recovery. Investigates security breaches, document findings, and implement corrective actions. Provides security awareness training to employees, ensuring they understand their roles in protecting information systems. Educates staff on emerging threats, security best practices, and organizational security policies. Supports the accreditation and certification process for information systems, ensuring systems meet security requirements. Works with external assessors and auditors to achieve and maintain system accreditation. Conducts risk assessments to identify potential security threats and vulnerabilities. Recommends and implements security controls to mitigate identified risks. Works closely with IT and security teams to ensure security is integrated into system designs and operations. Collaborates on the implementation of new security technologies and tools. Stays updated on the latest cybersecurity trends, threats, and technologies. Recommends and implements improvements to security practices, tools, and processes to enhance the organization's security posture. Creates Plan of Actions and Milestones (POA&M) (Del. 24). Provides input into the Security Assessment Report (SAR) (Del. 22). Continuous monitor of ATOs and security posture of the environment. Qualifications Required Qualifications: 10+ + years experience in related field. Possess a valid U.S. state vehicle operator's license. Certification: IAM Level 2 or higher.
    $60k-80k yearly est. 60d+ ago
  • Security Systems Engineer

    Innovative Consulting & Management Services

    Information Security Analyst job in Miami, FL

    Job DescriptionDescription: Innovative Consulting & Management Services (ICMS) is a Professional & Technical Management Consulting firm with over 20 years of consulting experience. We offer technical professional services to Federal and State Governments, and Commercial clients. ICMS is a Small Business and Certified HUBZone employer. We deliver value to our clients by combining deep industry knowledge with strong functional capabilities. Our focus is to manage cost-effective programs while at the same time mitigating risk and improving results. Our success is about teamwork, a coordinated effort from all disciplines, from clients to consultants and most important, it’s about delivering on our commitments. ICMS is seeking an experienced and detail-oriented Security Systems Engineer to join our team in support of one of our federal clients. This position is 100% onsite at a Federal Government facility. This is a corporate, exempt position. The Security Systems Engineer will be responsible for the operations, management, maintenance and performance of all access control, security cameras, video surveillance systems, network backbone, automated gates, and door controls/ digital locks. Other duties include: Perform routine maintenance and repair on various systems comprising the electronic security systems at a detention facility Security Systems – Install, troubleshoot, program (knowledge of C-Cure 9000 and Aveva Wonderware, and Bosch VMS systems essential to long term success) Security Cameras & Video Management - repair, install, troubleshooting, adjusting, cleaning, and programming of all peripheral devices (preferably knowledge of Bosch VMS) HID Card Readers & Electronic Door Locks - repair, install, troubleshooting and programming (knowledge of PLC Programmable Logic Controllers a plus) Radios and communication equipment - repair install and troubleshooting Phone systems - repair, troubleshooting and installing patch panels (preferably Avaya Communication Systems) Network Management - Fiber optic switches and other network devices (routers, surge protection, switches, servers, storage arrays) – operation, troubleshooting, monitoring and maintenance of underlying - install, tone, troubleshooting and repair Data systems - install and terminate patch panels, troubleshooting and cable certifying Interpreting drawings, electrical schematics, training manuals, and instructions to perform duties. Maintain up to date and current licensing and service agreements for all software components Establish and maintain effective working relationships with supervisors, co-workers, and other employees. Requirements: B.S. in Networking, Computer Science or applicable degree. Degree can be substituted with HS Diploma and at least 15 years of experience Familiarity installing and troubleshooting low voltage equipment Strong working knowledge of commercial access control, CCTV, burglary alarm, intrusion systems, and fire alarms Strong working knowledge of Microsoft Office Strong written and verbal communications skills Working knowledge of network communications and IP addressing Excellent problem solving and analytical skills Excellent time management skills Positive attitude and strong work ethic Certifications in applicable industry domains, Bosch, Aveva or C-Cure platforms (or similar) Knowledge of acceptable maintenance procedures and understanding of occupational safety and health regulations Candidates must be available to support on-call shifts as part of a rolling schedule Candidates must be U.S. Citizens Candidates will be required to pass and maintain a favorable background investigation suitable for operating on a Federal Facility Candidates will be subject to successfully passing drug screening prior to employment and random screening through their employment. PREFERRED: A valid driver’s license Experience working in a government facility or military experience. Additional Qualifying Factors As a condition of employment, may be required to pass a pre-employment drug screening, as well as have acceptable reference and background check results. Security Clearance Requirements It is mandatory that all Contractor personnel working onsite at federal facilities meet federal government security clearance standards. The Contractor shall submit security clearance information, for each employee, as required by current government identification card application procedures and future requirements as applicable. All employees must be authorized as acceptable under by the contracting officer for the prime contract under which this employee is working. Competencies Accountability - Ability to accept responsibility and account for his/her actions. Reliability - The trait of being dependable and trustworthy. Responsible - Ability to be held accountable or answerable for one’s conduct. Safety Awareness - Ability to identify and correct conditions that affect employee safety. Self-Motivated - Ability to be internally inspired to perform a task to the best of one’s ability using his or her own drive or initiative. Physical Requirements The employee is regularly required to talk, listen, and hear, frequently required to use repetitive hand motion, handle, or feel, and to sit, stand, walk, reach, bend, regularly push, pull and lift up to 40 pounds and occasionally push, pull and lift up to 60 pounds. The employee must regularly use mechanical equipment typical of those used in the maintenance of buildings and landscape. Benefits: Medical, Dental, & Vision Insurance 100% covered for employee Life and Accidental AD&D Insurance 401K Retirement plan with 3% automatic contribution Paid Federal Holidays Generous sick and vacation leave ICMS is an Equal Opportunity Employer: Qualified applicants are considered for employment without regard to race, color, religion, age, sex, national origin, disability or veteran status, genetics, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
    $68k-99k yearly est. 12d ago
  • Director of Information Security and Compliance

    Loyola Marymount University 3.5company rating

    Information Security Analyst job in Westchester, FL

    The LMU Information Technology Services team enables technologically-rich learning environments, provides effective teaching and scholarship resources and maintains reliable, accessible, and integrated information systems. This work is grounded in and supports the University' mission: • The encouragement of learning • The education of the whole person • The service of faith and the promotion of justice Under the general direction of the CIO/Vice President for Information Technology, the Director of Information Security and Compliance will drive the university's efforts to protect its information assets and ensure compliance with relevant regulations and standards. This role is pivotal in creating a secure and compliant digital environment that supports LMU's mission, values, and goals. The Director will leverage partnerships and collaboration to lead initiatives that result in measurable improvements in information security and compliance, fostering a culture of security awareness and proactive risk management. The Director will serve as the process owner of the appropriate second-line assurance activities not only related to confidentiality, integrity and availability, but also to the safety, privacy and recovery of information owned or processed by LMU in compliance with regulatory and university requirements. The Director will oversee the university's compliance with applicable laws, regulations, and policies related to information security and privacy. Position Specific Responsibilities/Accountabilities Enhance Security Posture: Develop and implement a comprehensive information security program that significantly reduces risks and vulnerabilities across the university's digital landscape. Ensure Regulatory Compliance: Achieve and maintain compliance with relevant regulations and standards, ensuring that LMU meets all legal and regulatory requirements. Collaborative Protection: Work closely with various campus partners, external stakeholders, and community partners to ensure that information assets and associated technologies are protected, resulting in a cohesive, unified, and well understood approach to information security and compliance. Risk Management: Conduct thorough risk assessments and implement effective mitigation strategies, leading to a demonstrable reduction in potential threats. Incident Response: Oversee and improve incident response and recovery efforts, ensuring swift and effective investigation and resolution of security incidents. Policy Development: Create and enforce robust policies and procedures that safeguard information assets, leading to a well-documented and easily accessible framework for information security. Training and Awareness: Provide comprehensive training and guidance to staff on information security best practices, resulting in a well-informed and vigilant workforce. Monitoring and Reporting: Continuously monitor and report on the effectiveness of the information security program, providing clear metrics and insights that demonstrate progress and areas for improvement. Leadership and Strategy: Plan and manage the strategy, people, processes, tools, services, and resources necessary to effectively support the program and meet strategic goals. Business Continuity and Disaster Recovery: Orchestrate a secure, robust, and highly reliable approach to providing ITS services, during and after a disaster or disruption, to minimize negative impacts to business operations and maintain essential services. Data Governance: Oversee the university's data governance efforts, ensuring that data is managed securely and in compliance with university policies and legal requirements. Perform other related duties. Loyola Marymount University Expectations Exhibit behavior that supports the mission, vision, and values of the university. Communicate and employ interpersonal actions that model high standards of professional, responsible, accountable, and ethical conduct. Demonstrate a commitment to outstanding customer service. Requisite Qualifications Typically a Bachelor's Degree from an accredited four-year institution in Computer Science, Information Technology, or Cybersecurity. Seven years of experience ininformation security, with at least three years in a management role. Professional certifications such as CISSP, CISM, or CISA are highly desirable. Experience in developing and implementing technology policy, preferably in a University environment. Strong knowledge of frameworks, standards, and best practices relating to Information Security, Privacy, Data Governance, and Business Continuity and Disaster Recovery Experience with regulatory compliance requirements (e.g., i.e. FERPA, HIPAA, GDPR, CCPA, and PCI-DSS). Demonstrated excellent verbal and written communication skills, as well as presentation skills. Writing samples may be required. Excellent leadership, analytical, problem-solving, and decision-making skills. Strong communication and interpersonal skills, with the ability to effectively collaborate with diverse stakeholders. Demonstrated ability to lead and manage a team of security professionals. The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities, duties and skills required of this position. #HERC# #HEJ# Staff Regular Salary range $143,100.00 - $200,300.00 Salary commensurate with education and experience.Loyola Marymount University, a Carnegie classified R2 institution in the mainstream of American Catholic higher education, seeks outstanding applicants who value its mission and share its commitment to inclusive excellence, the education of the whole person, and the building of a just society. LMU is an equal opportunity employer committed to providing an environment free from discrimination and harassment as defined by federal, state and local law. We invite all persons in the full diversity of their being, life experience, and beliefs to apply. (Visit *********** for more information.)
    $143.1k-200.3k yearly 60d+ ago
  • Cyber Security Analyst

    Exeter Government Servi 4.1company rating

    Information Security Analyst job in Miami, FL

    Job Title: SCITES - Cyber Security Analyst Required Clearance: Minimum Secret clearance upon start and be eligible for TS/SCI clearance Required Certification(s): DoDM 8570 CSSP Category Certification (e.g. CompTIA CySA+ or CEH) Required Education: Bachelor's in IT or a related technical discipline preferred or commensurate level of experience based on position level Required Experience: Advisor 8+ Years, Senior 5+ Years, Analyst 0 - 2 Years Position Description: Exeter is seeking personnel to provide Cyber Security, Computer Network Defense in support of the SOUTHCOM Cyber Information Technology Enterprise Services (SCITES) Contract in Doral FL. Primary Responsibilities: Incident Reporting, manages, track and report incidents to include submitting incident reports using the SharePoint Incident Reporting Portal Uses SIEM Q-RADAR/ArcSight for event tracking and correlation Develops, tests, and operates firewalls, intrusion detection systems, enterprise antivirus systems and software deployment tools Evaluate firewall change requests and assess organizational risk Safeguards network against unauthorized infiltration, modification, destruction or disclosure Researches, evaluates, tests, recommends, communicates and implements new security software or dev forensics; manages, performs and reports forensics analysis to government leadership Monitor and analyze Network IDS to identify security issues for remediation Manages, performs and monitors the following CND tools: PowerShell, IBM Q-RADAR, CISCO SOURCEFIRE (IDS), WIDS, ACAS,JRSS Stack: Agency FIREWALL PALO ALTO, BASE FIREWALL CISCO ASA, Tipping Point (IPS), PCAP collector, InQuest, ArcSight ESM and loggers, Lancope, Blue coat Web Proxy Required Qualifications: Must be a U.S. Citizen Minimum Secret clearance upon start and be eligible for TS/SCI clearance DoDM 8570 Cyber Security Service Provider (CSSP) Category Certification (e.g. CompTIA CySA+ or CEH) Shift work required to support real-world or contingency operations Candidates must be local or willing to relocate Desired Qualifications/Experience: Bachelor's Degree in specialty field Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. #clearancejobs
    $72k-104k yearly est. 28d ago
  • Associate Cyber Security Analyst

    Costa Farms 4.4company rating

    Information Security Analyst job in Miami, FL

    Who is Costa Farms? We're one of the world's largest horticultural growers-but without an ego to match our acreage. Our headquarters are in Miami, Florida, where we were founded in 1961. Costa Farms started on just 30 acres, and over the last 60 years, we've grown to more than 5,000 acres around the world. We have farms in North and South Carolina, Central and South Florida, and the Dominican Republic, plus an office in China. Costa Farms now employs nearly 6,000 people: engineers, marketers, accountants/analysts, human resources professionals, and of course, growers and plant scientists! Here at Costa Farms, we live by the values of H3: being Humble, staying Hungry, and always Hustling. The team rallies to the mission of being a lean, green, growing machine dedicated to enriching the world by bringing plants into everyone's life. True to that mission, we grow more than 1,500 plant varieties. Driven by the spirit of innovation, the team is always testing new plants and developing new solutions to make it easier for retailers and plant parents to enjoy plants. We're also continuously testing different ways of growing our plants to increase quality and improve their ecological footprint as one aspect of our many sustainability efforts. We cultivate plants, as well as a winning culture. Join the team, and you'll find opportunities to learn and grow. You'll collaborate with other driven, determined people who together keep Costa Farms an industry leader. You'll support and be supported by a team that cares about each other, our customers, our consumers, and our community. You'll also find right away that Costa Farms is committed to providing a diverse environment. We're proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetic information, disability, age, military status, marital status or veteran status, or any other group status protected by federal, state, or local law. DESCRIPTION: The Associate Cyber Security Analyst plays a vital role in the in monitoring, detecting, investigating and preventing security incidents across the enterprise. This entry-level role is foundational for developing expertise in threat analysis, incident response, and security operations within a Zero Trust framework. RESPONSIBILITIES: Security Monitoring & Alert Triage Monitor SIEM dashboards and endpoint protection tools (e.g., Microsoft Defender, Palo Alto Prisma Access) for suspicious activity. Escalate alerts based on severity and context. Incident Response Support Assist in documenting and responding to security incidents. Participate in root cause analysis and help maintain incident response playbooks. Vulnerability & Risk Assessment Run vulnerability scans, track remediation efforts, and support patch management cycles. Help maintain secure configurations across endpoints and cloud environments. Access Control & IAM Support identity and access reviews, enforce multi-factor authentication (MFA) policies, and help manage user provisioning and deprovisioning. Security Awareness & Training Support coordination of phishing simulations and employee training campaigns across the enterprise. Track participation and follow-up actions. Documentation & Reporting Maintain logs, update security documentation, and assist in preparing reports for audits and compliance reviews. Assist in documenting and responding to security incidents. Participate in root cause analysis and help maintain incident response playbooks. TOOLS AND TECHNOLOGIES: Microsoft Defender for Endpoint, Intune, Sentinel Palo Alto Prisma Access Nessus, Jira, SharePoint AWS IAM, Terraform (for cloud provisioning) NIST SP 800-53, 800-30, 800-37 (for compliance frameworks) SKILLS AND QUALIFICATIONS: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field. (or equivalent professional experience or certifications like CompTIA Security+). An internship or project experience in cybersecurity is strongly preferred. Basic understanding of networking, firewalls, and endpoint security tools. Familiarity with SIEM tools and log analysis. Interest in pursuing certifications (e.g., Security+, SSCP, GSEC). Strong analytical and troubleshooting skills. Effective verbal and written communication - bilingual English and Spanish verbal communication is strongly preferred. Experience with scripting (Python, PowerShell). Exposure to cloud platforms (AWS, Azure) or Microsoft security tools. PHYSICAL DEMANDS: Sedentary Work: Exerting up to 10 pounds of force occasionally and/or a negligible amount of force frequently or constantly to lift, carry, push, pull, or otherwise move objects, including the human body Primarily involves sitting, with occasional requirements to stand, walk, or lift objects to a certain weight. WORK ENVIRONMENT: Office: Office-based settings may include open office environments where background noise from conversations, office equipment, and phone calls is common. All applicants must be work-authorized. Costa Farms will not sponsor any visa for this position. After applying, follow us on LinkedIn to stay up to date on what's happening around Costa Farms and to start becoming part of our family. Come Grow with Us™! Costa Farms offers competitive wages and benefits, including: 401(k) Plan Company 401(k) Matching Contributions Health Savings Account, Flexible Spending Account, and Dependent Care Telemedicine/ Mental Health Services Health Insurance Dental Insurance Vision Insurance Pet Insurance Supplemental Insurance (Aflac) Growth Opportunities Challenging and exciting work environment Costa Farms Scholarship Employee discounts on plants Costa Farms headquarters also has: On-site gym with showers Subsidized on-site cafeteria, a quiet room, and indoor games Love Where You Work activities throughout the year This organization participates in E-Verify E-Verify Notice of Participation / E-Verify Aviso de Participación (English/Español) E-Verify Right to Work Poster / E-Verify Cartel Derecho a Trabajar (English/Español)
    $69k-101k yearly est. 8d ago
  • Cyber Security Analyst

    Bluestone 4.1company rating

    Information Security Analyst job in Boca Raton, FL

    Reports to CISO and works with a team of Cyber Security specialists. The Cyber Security Analyst is responsible for identifying risks to the confidentiality, integrity, and availability of our clients products and services, while maintaining compliance with applicable regulatory standards. In this role, you will be expected to contribute to the integrity and sustainability of the service delivery network, which consists of advanced server-based applications used to support our client's customers. The successful candidate will work directly with senior team members on issues that may require some after-hours and weekend availability. Specific Job Duties: • Articulate technical and security requirements to departments/business groups • Identify gaps in security operations and develop mitigation strategies • Assist with the maintenance of application and operating system software in the Service Delivery Network • Participate in disaster recovery and business continuity planning • Perform software development lifecycle auditing • Prioritize compliance actions according to business risk Desired Preferred Skills: • Industry certifications - PMP, CISA, CISSP, Security + • Department of Defense IT experience • Pharmacy or healthcare experience Qualifications • Masters's degree in computer science or relative discipline • 5-10 years combined experience in information security • Proficient with Unix / Linux • Strong analytical problem solving • Knowledge of the software development lifecycle • Proven ability to plan and work to a deadline • Must be able to obtain Department of Defense clearance Additional Information Work with blue Stone recruiting to find your next Cyber Security role. You can find us at ******************************* We look forward to speaking with you.
    $68k-98k yearly est. 27d ago
  • Network, Application, and Security Operations Center Analyst

    Keel Digital Solutions

    Information Security Analyst job in Miami, FL

    Network, Application, and Security Operations Center Analyst Salary: $80,000 - $100,000 per year Benefits: Extended Health Care Schedule: Monday to Friday We kindly ask that applicants submit only one application for this position, as multiple submissions will not be reviewed Keel Digital Solutions and Our Culture Keel Digital Solutions is a technology and innovation organization positioned within the healthcare sector, with a focus on providing unparalleled service to clients through state-of-the-art technology, virtual health care and laboratory services. Each member of our team plays an important role in executing best-in-class solutions with the very best in people, process, suppliers, technology, and business intelligence. We are seeking a dedicated and detail-oriented Network, Application, and Security (NAS) Operations Center Analyst to join our cybersecurity team. This critical role involves protecting our organization's digital assets through continuous monitoring of systems, analyzing potential threats, and responding swiftly to security incidents. The ideal candidate will have a proactive approach to cybersecurity, ensuring our information systems remain secure and resilient against evolving cyber threats. You will be part of a dynamic and collaborative team environment where your contributions directly impact the security and success of our organization. We value individuals who demonstrate integrity, professionalism, and a passion for cybersecurity. If you are passionate about cybersecurity and eager to make a difference in protecting critical information assets, we encourage you to apply for this exciting opportunity. Responsibilities and Duties Continuously monitor network, application, and security systems, dashboards, logs, and alerts for potential threats and anomalies. Analyze security alerts, investigate suspicious activities, and conduct threat assessments to identify and evaluate risks. Lead and coordinate incident response activities to mitigate security breaches and vulnerabilities effectively and rapidly. Develop, configure, and maintain monitoring dashboards using tools such as Zabbix, Elastic Stack, etc. Perform capacity planning and forecasting for applications, including the video conferencing delivery network. Document all security incidents, investigation steps, and response actions thoroughly. Collaborate closely with internal IT teams and external partners to ensure comprehensive security coverage and coordinated incident response. Contribute to the development, refinement, and implementation of security policies, procedures, and best practices. Provide insights and recommendations to help shape the organization's cybersecurity strategy and strengthen its overall security posture. Stay current with emerging cybersecurity threats, trends, technologies, and best practices through ongoing training and professional development. Mandatory Skills and Qualifications Strong background and proven experience in cybersecurity, ideally within a Security Operations Center (SOC) or similar environment. Demonstrated experience in threat detection, incident response methodologies, and using security monitoring tools. Proficiency in analyzing security logs, alerts, and system data. Excellent analytical, critical thinking, and problem-solving skills. Ability to quickly assess complex situations, make informed decisions, and act effectively under pressure. Strong attention to detail and commitment to accuracy. Excellent communication (written and verbal) and interpersonal skills, with the ability to convey technical information clearly to various stakeholders. Proven ability to work collaboratively and effectively within a team environment. High level of integrity, professionalism, and a proactive mindset towards security. A commitment to continuous learning and professional development in the cybersecurity field Our Commitment to You An ethical and fair environment that is inclusive, high energy and best-in-class Training and structured onboarding to ensure you are set up to succeed Leadership, coaching and mentorship towards a rewarding career Competitive total compensation package that includes paid vacation and health/dental benefits A deep understanding of how your role supports the company's strategy and how the company's strategy supports you Keel Digital Solutions is an equal opportunity employer and employs personnel without regard to race, ancestry, place of origin, color, ethnic origin, language, citizenship, religion, gender identity, sexual orientation, age, family status, disability, physical and/or mental handicap or financial ability. While remaining alert and sensitive to the issue of fair and equitable treatment for all, Keel Digital Solutions is committed to helping individuals with disabilities participate in the workplace and ensure equal opportunity to compete for jobs. If you require accommodation, please email oliviag@keel.digital for further assistance. Please note this email address is intended for use only to request accommodation as part of the application process. Any other correspondence will not receive a response.
    $80k-100k yearly 6d ago
  • Information System Security Officer FL

    People Technology and Processes 4.2company rating

    Information Security Analyst job in Doral, FL

    Job Details Doral, FL Full TimeDescription Systems Administrator/Application Engineer Clearance: Top Secret/SCI Responsibilities (including but not limited to): Ensuring compliance with NIST and DoD frameworks, managing security policies, and overseeing audits and incident monitoring with eMASS and Exacta. Additionally, Compile and manage Authorization to Operate (ATO) packets, streamline incident response, deliver security training, and keep abreast of evolving cybersecurity trends to safeguard information systems. The contract will work in various DOD cyber security approving systems to support authority to operate (ATO) and other DOD related approvals, Provide Quality Assurance and Quality Control of J2 portal sites, and content support for the J2 SharePoint Portal development. APAN community site support, Quality Assurance and Quality Control of J2 Today site, and content support for the J2 SharePoint Portal and Microsoft Teams development. Qualifications 3+ years experience in a cyber security related position. Experience with Enterprise Mission Assurance Support Service (eMass) and Xacta. Either SEC+, aCISSP, or equivalent certification. Top Secret Clearance w/ SCI.
    $60k-80k yearly est. 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Kendale Lakes, FL?

The average information security analyst in Kendale Lakes, FL earns between $49,000 and $112,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Kendale Lakes, FL

$74,000

What are the biggest employers of Information Security Analysts in Kendale Lakes, FL?

The biggest employers of Information Security Analysts in Kendale Lakes, FL are:
  1. NCI
  2. Empower Ai
Job type you want
Full Time
Part Time
Internship
Temporary