Cyber Security Analyst
Information security analyst job in Tampa, FL
Job Title: Junior GRC Analyst
Openings: 1
Duration: 1 year +, potential to go perm
Pay Rate: $40
Interview Process: 1 virtual, final onsite with team
Minimum Qualifications & Experience Required
Bachelor's degree in Information Security, Computer Science, Risk Management, or related field
1+ year experience in IT, cybersecurity, or healthcare
Ability to assess and evaluate technical documentation (data flow and network architecture diagrams) and attestations /certifications (SOC 2, ISO)
Familiarity with the HIPAA Security Rule, NIST CSF 2.0, and PCI-DSS
Strong analytical, documentation, and problem-solving skills
Excellent written and verbal communication skills for both technical and non-technical stakeholders
Ability to manage multiple projects, collaborate across IT and business teams, and drive remediation efforts
Proficiency in Microsoft Office Suite (Excel, Word, PowerPoint)
Nice To Have Qualifications & Experience
Exposure to ServiceNow and Safe Security
Exposure to Factor Analysis of Information Risk (FAIR) for quantitative risk analysis
Basic understanding of first and third-party risk management concepts and practices
Familiarity with AI security concepts and emerging frameworks (NIST AI RMF, OWASP COMPASS)
Industry certifications such as CompTIA Security+, CRISC, or CISA
Day-to-Day Responsibilities
Conduct and document third-party risk assessments, reviewing security questionnaires, attestation/certification reports, BAAs, and technical diagrams
Assist with risk quantification by gathering scenario inputs, impact drivers, and control maturity data.
Support AI governance intake reviews and documentation for new use cases
Track remediation and corrective actions related to findings, risks, and audit outcomes
Assist in maintaining and updating risk registers and compliance documentation
Assist in incident response documentation, root cause analysis, and identifying control improvements
Support internal audits, e-discoveries, and evidence collection for regulatory and certification requirements
Monitor and track remediation of identified risks and compliance gaps
Help develop, document, and enforce security policies, standards, and procedures
Collaborate with IT and business teams to ensure adherence to standards
Prepare reports and dashboards for management on risk and compliance status
Stay current on emerging regulations and security best practices
IT Security Engineer
Information security analyst job in Saint Petersburg, FL
Location: St Petersburg, FL | Southfield, MI | Memphis, TN - [This position follows a hybrid work model, requiring on-site presence approximately 10-12 days per month].
Please note: This role is not eligible for work visa sponsorship, now or in the future.
Compensation: $110,000 - $140,000 base salary range.
Job Summary
We are seeking an experienced IT Security Engineer to join our Identity & Access Management Engineering team, with a focus on Identity Governance & Administration and Directory Services. In this role, you will help secure the enterprise by managing and optimizing critical platforms such as Microsoft Active Directory, Microsoft Entra ID, and Infoblox.
As a Security Engineer, you will do more than maintain systems-you will help shape the future of IAM. You will contribute to strategic projects, implement advanced security solutions, and drive automation to improve operational efficiency. This position offers the opportunity to work on high-impact initiatives that reduce risk, enable business growth, and ensure compliance across a dynamic environment.
If you thrive in a collaborative setting, enjoy solving complex problems, and want to make a measurable impact on enterprise security, this role provides an excellent opportunity to innovate, lead, and grow.
Responsibilities
Manage and maintain Active Directory, Entra ID, and DNS/DHCP/IPAM systems.
Define and implement support procedures for AD, Entra ID, and DNS/DHCP/IPAM.
Handle operational engineering tasks, including tickets, incidents, change requests, vulnerability remediation, and maintenance.
Provide technical input on IAM technologies, policies, and compliance requirements.
Participate in IAM-related projects and contribute to deliverables using established methodologies.
Engage in enterprise disaster recovery exercises and participate in on-call rotations.
Recommend and implement technical improvements to enhance security and efficiency.
Collaborate with stakeholders to translate business requirements into technical solutions.
Develop and maintain system documentation, including flowcharts, diagrams, and specifications.
Document current and future state processes and assist in planning transitions.
Required Technical Skillsets
Minimum 5 years of experience with Active Directory, Entra ID, AWS, and DNS/DHCP/IPAM.
Hands-on experience with IAM in hybrid and cloud environments.
Strong experience with networking solutions such as DNS/DHCP/IPAM.
Proven scripting and automation skills (e.g., PowerShell).
Enterprise-level experience required; financial services experience preferred.
Additional skills: event/log analysis, troubleshooting, system monitoring, and event analysis.
Education
Bachelor's degree in Computer and Information Science (required).
High School diploma (required).
Information Security Analyst
Information security analyst job in Bradenton, FL
Job Description
CoAdvantage is a leading human resource solutions provider for small to mid-sized companies. We are HR experts who partner with small businesses nationwide to administer payroll, benefits, workers' compensation and core HR management. Headquartered in Bradenton, Florida, CoAdvantage has offices throughout Florida, Georgia, Alabama, Texas, Oklahoma, Colorado, California, North Carolina, New Jersey and New York, and serves more than 100,000 worksite employees in all 50 states. We're looking for the best professionals in our markets who are interested in building a successful and rewarding career and be part of a focused, energetic team dedicated to delivering excellence to America's small business owners.
Position Summary:
The IT Security Analyst participates in the execution and monitoring of IT Security related activities that safeguard the company's information and technology assets. Primary responsibilities include participating in the development of new, and the operation of existing IT Security programs, procedure development and standards documentation. Ensures the appropriate information security access controls are in place and applied consistently.
Review daily and periodic data to identify, report, and remedy vulnerabilities.
Document, prioritize, and analyze security threats, incidents and key metrics.
Knowledge of information security principles, including risk assessment and management, Cyber security defenses, threat and vulnerability management, incident response, application security, and identity and access management.
Identifies, researches, and resolves technical problems that arise within enterprise security applications and tools. Manage vendor relationship for enterprise security applications and tools.
Respond to SSAE18 requests and other questionnaires. Audit vendor and remote sites for physical and logical security.
Participate in breach investigations and provide subject matter expertise for an effective investigation.
Essential Job Functions:
Identify, plan, develop and implement automation of routine tasks
Remediate issues occurring with any IT security systems including but not limited to unexplained system outages, cyber security incidents, issues with data collection feeds or interfaces the day-to-day administration of information security tools and devices, alert response and analysis for security incident response actions. Perform forensic research and images as needed
Update information security metrics
Assist in documenting and updating information security standards and procedures
Assess information systems and company processes are safe and secure for information handling
Recommends, tests, schedules and implements upgrades and patches that may affect enterprise as well as the enterprise security applications and the servers they reside on
Given the confidentiality needs of this role, the highest levels of personal integrity, professionalism, judgment, and maturity are expected
Participates in special projects and performs other duties as assigned
Required Skills and Experience:
4 year Degree in Technology or Business or equivalent combination of relevant experience, education and training
2-4 years in the IT security field preferred
Strong background in maintaining operational computer security and application security, scripting languages (primarily PowerShell), and Active Directory
Working knowledge of but not limited to: API, application security, IPS, network monitoring tools, antivirus, identity management and user provisioning, risk assessments, audits, security testing and auditing, security intrusion detection, security maintenance, and security policy
Strong working knowledge of relevant laws, regulation, and standards relating to information security, including HIPAA, HITRUST, ISO 27001, NIST, PCI-DSS, etc
Preferred Information Security certifications such as Security+, CISSP, GPEN, etc. or other industry -specific certifications such as Microsoft or Cisco
Passion for customer service and problem solving
Ability to prioritize and balance multiple tasks
Continuous Improvement: Seeks efficiencies in daily work and projects; Brings new and creative suggestions to the table; Anticipates roadblocks, problems or obstacles in advance and creates or proposes solutions to overcome; Uses innovative strategies to continually improve the quality or output of work and/or generate executable business solutions; seeks to continually improve and develop skills
Communication: Seeks clarity; Asks questions to gain full understanding and is willing to ask for help; keeps management aware of project progress and shifting priorities; Willing to give feedback to others; communicates both cross functionally and upwards within the organization; uses professionalism in communication
Accountability and Ownership: Exercises self-discipline; Accepts accountability for achievement of goals and objectives; Removes blame; Shows a personal commitment to the team and the function/role; Can demonstrate “upward accountability”; Takes ownership of issues and sees them through to completion
Results Driven Execution: Acts with a sense of urgency; Takes initiative on projects and in daily work; pushes to keep tasks on schedule and plans work; accordingly, addresses challenges appropriately to continue focusing on the end result
Collaboration and Team Oriented: Assumes the good intentions of others; Inclusive; Puts the needs and interest of the team first; Recognizes peers; Maintains positivity and encouragement; Has a deep commitment to the team and the objectives of all members; Is willing to step outside of his/her scope for the betterment of the broader organization.
EOE
CoAdvantage is committed to providing equal employment opportunities to all employees and applicants without regard to race, color, religion, national origin, ancestry, citizenship status, age, sex (including pregnancy, childbirth, breast feeding and pregnancy-related medical conditions), gender, gender identity or expression, sexual orientation, marital status, uniform service member and veteran status, disability, genetic information, or any other characteristic protected by applicable federal, state, or local laws and ordinances.
#LI-HYBRID
Powered by ExactHire:187834
Cyber Security Awareness Analyst [2026 EDGE Program]
Information security analyst job in Tampa, FL
Are you ready to make an impact at DTCC? Do you want to work on innovative projects, collaborate with a dynamic and supportive team, and receive investment in your professional development? At DTCC, we are at the forefront of innovation in the financial markets. We're committed to helping our employees grow and succeed. We believe that you have the skills and drive to make a real impact. We foster a thriving internal community and are committed to creating a workplace that looks like the world that we serve.
About the EDGE Program:
The Exploration, Development, Growth and Experience (EDGE) Program supports DTCC's commitment to identifying and selecting diverse early career talent across the organization, ensuring you have a comprehensive understanding of our industry, our company, the technical / functional skills needed for the various business areas, and the leadership competencies needed for overall success within DTCC.
What to expect as an EDGE Analyst:
* A program that provides accelerated development opportunities designed to cultivate the future leaders for DTCC
* Week-long orientation
* A comprehensive learning and engagement plan
* Assigned to your own mentor and EDGE buddy to gain a well-rounded view of the company
* Networking and exposure to senior management
Pay and Benefits:
* Competitive compensation, including base pay and annual incentive
* Comprehensive health and life insurance and well-being benefits, based on location
* Pension / Retirement benefits
* Paid Time Off and Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
* DTCC offers a flexible/hybrid model of 3 days onsite and 2 days remote (onsite Tuesdays, Wednesdays and a third day unique to each team or employee).
The impact you will have in this role:
Being a member of the Cyber Security Awareness and Training (CSAT) team as a Cyber Security Awareness and Training Analyst, you will be the driving force behind cultivating a security-first culture across the organization. Your work will empower employees to recognize and respond to cyber threats confidently, reduce human risk, and ensure compliance with regulatory standards. Through innovative training programs, engaging campaigns, and strategic collaboration, you will help transform cybersecurity from a technical concern into a shared responsibility, making every employee a proactive defender of our digital ecosystem.
Your Primary Responsibilities:
* Assist in engaging, interactive training modules tailored to different roles and risk levels across the organization
* Participate in sessions on topics such as phishing, social engineering, password hygiene, and AI-based deception
* Incorporate gamification, storytelling, and real-world scenarios to improve retention and participation
* Assist in maintaining the annual and quarterly training calendar, including mandatory new hire orientation, monthly phishing simulations, and ad-hoc events like Cyber Spotlight Series and Coffee Talks
* Analyze metrics from simulations and awareness campaigns to identify gaps and improve future programming
* Collaborate with internal stakeholders to embed security practices into daily operations
* Assist with initiatives during Cyber Security Awareness Month, including speaker sessions, pop-up events, and team challenges
* Stay current with emerging threats and update training materials accordingly
* Ensure content reflects the latest industry standards and internal risk posture, including role-based training and incident response protocols
* NOTE: The Primary Responsibilities of this role are not limited to the details above. *
Selection and Program Timeline: (timing may vary)
* August - October 2025: Applications open
* October - December 2025: Interview and Selection process
* January - July 2026: Early engagement and onboarding process
* July 2026: Start of program
Qualifications:
* Candidates must be working towards a bachelor's degree in the following curriculums and graduating no later than May 2026: Cybersecurity, Business, Finance , Computer Science, MIS or Business & Technology Management
* Candidates must have authorization to work permanently in the US without the need for sponsorship (now or in the future)
* Candidates must have minimum of a 3.2 GPA upon graduation
Talents Needed for Success:
* Must demonstrate superior analytical and communication skills
* Strong interest in the financial services industry, with previous internship experience a plus
* Ability to engage cross-functional teams and promote a security-first culture
* Strong communication and storytelling skills to translate complex cybersecurity concepts into accessible language for diverse audiences
The salary range is indicative for roles at the same level within DTCC across all US locations. Actual salary is determined based on the role, location, individual experience, skills, and other considerations. We are an equal opportunity employer and value diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, sex, gender, gender expression, sexual orientation, age, marital status, veteran status, or disability status. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Auto-ApplyInformation Security Analyst
Information security analyst job in Tampa, FL
As an Information Security Analyst, you will have shared responsibility for implementing and maintaining company's security strategies and services while providing security guidance based on industry standards and best practices. The ideal candidate will ho have an educational background and/or experience to maintain and support assigned information security technologies with general leadership oversight.
*This position is located out of our Tampa, FL corporate office.
2 days a week in office are required*
Some of the regular responsibilities may include:
Provision, manage, monitor, test, and decommission security tools and applications.
Attend and lead small project meetings and enforce best practices.
Apply specialized security technical knowledge.
Evaluate, plan and implement security projects.
Remain current on assigned security tools and applications and apply skilled understanding of troubleshooting.
Document and resolve moderately complex problems.
Report progress to leaders.
Monitor and analyze Identity security incidents, and provide recommendations for remediation
Other duties as assigned or required.
Experience to be successful:
IT security risks and mitigation strategies.
Security Incident Response
Security frameworks, including ISO and NIST.
Company IT and HR policies.
Various IT security-related regulatory requirements.
IT security logging and monitoring strategies.
Deployment and use of sophisticated IT security monitoring tools.
Educational background: Bachelor's degree in computer science, Information Systems, or other related field; or has 2-5 years of relevant experience.
Technical Skills to understand the role:
Analytical ability
Analyzing Security System Logs, Security Tools, and Data
Communicating Up, Down, and Across All Levels of the Organization
Creating, Modifying, and Updating Security Information Event Management (SIEM)
Deep Understanding of Risk Management Frameworks
Discovering Vulnerabilities in Information Systems
Evaluating and Deconstructing Malware Software
Familiarity with Security Regulations and Standards
Implement and Maintain Security Frameworks for Existing and New Systems
Maintaining Security Records of Monitoring and Incident Response Activities
Monitoring Compliance with Information Security Policies and Procedures
Network and System Administration Experience
Responding to Requests for Specialized Cyber Threat Reports
Performing Cyber and Technical Threat Analyses
Performing Security Monitoring
Producing Situational and Incident-Related Reports
Providing Host-Based Forensics
Providing Timely and Relevant Security Reports
Responding to Security Events
Supporting and Managing Security Services
#LI-MB1
Benefits may include:
Comprehensive medical, prescriptions, dental and vision plans
401(k) plan with a discretionary company match
Shareholder Purchase and Reinvestment Plan
Basic life and accidental death and dismemberment insurance premium paid by the company
Voluntary supplemental life insurance for employees, spouses and dependent children
Fertility and Family Building Benefits
Paid Disability benefits
Paid time off programs
11 Company paid holidays per year
Flexible spending account
Health savings account (available to High Deductible Health Plan participants only)
Employee Assistance Program
Educational Assistance Program
Voluntary benefits, such as Critical Illness, Hospital Indemnity, Pet Insurance and Accident Insurance
Title insurance policies and certain escrow services for the employee's primary personal residence at no charge
Transportation benefit plan for mass transit, parking and vanpool, in several markets
Note: If you currently are employed by Old Republic Title (or one of its wholly owned affiliated companies) please get in touch with your human resources representative regarding the application process.
For California applicants, please click the following link to view our CCPA Applicant Notice
Old Republic Title is an Equal Opportunity Employer
Auto-ApplyInformation System Security Officer (ISSO)
Information security analyst job in Tampa, FL
ACTIVE TS/SCI SECURITY CLEARANCE REQUIRED
We are seeking a TS/SCI-cleared Information System Security Officer (ISSO) to join our team and help strengthen the cybersecurity posture of critical federal systems.
What You'll Do
As an ISSO at D2, you'll play a key role in protecting high-value government systems. You will:
Lead Security Documentation & Compliance
Develop and coordinate all key authorization artifacts, including System Categorization, System Security Plans, and System Risk Assessments.
Support control assessments, reporting, and ongoing monitoring using the CSAM (Cyber Security and Assessment Management) system.
Keep components aligned with Core Controls and A-123 assessment timelines.
Ensure all Risk-Based Decisions have current waivers and proper documentation.
Strengthen System Security Posture
Support security control testing, document results, assist in remediation, and ensure effective POA&M management.
Develop or update Business Continuity Plans and Contingency Plans.
Guide components on decisions affecting the security of their systems and networks.
Prepare teams for tri-annual Security Assessment and Authorization (SA&A) activities.
Perform Assessments & Provide Expert Analysis
Conduct assessments of information system security requirements and recommend remediation priorities.
Review system architecture, infrastructure, and SA&A documentation.
Assess NIST 800-53 Rev. 4 controls and document outcomes.
Evaluate and enhance standard SA&A documentation processes.
Drive Risk Management & Continuous Improvement
Perform and document risk assessments, evaluate vulnerabilities, and recommend risk-based mitigations.
Develop and manage POA&Ms aligned with federal standards and industry best practices.
Create System Security Plans, User Guides, and ST&E review documentation for new and legacy systems.
Conduct NIST-based self-assessments and develop improvement plans.
Develop Initial Privacy Assessments (IPA) and Privacy Impact Assessments (PIA).
Conduct ST&Es and Independent Verification & Validation (IV&V) for federal IT systems.
Conduct OMB A-123 security assessments for federal systems.
What You Bring
Bachelor's degree in Computer Science or a related technical field
- or equivalent combination of education, certifications, and experience
8+ years of experience performing system security assessments, producing security documentation, or executing security upgrades across networks, servers, desktops, and databases
8+ years of experience developing and enhancing IT security policies aligned to federal and international standards
8+ years of IT security expertise, including experience developing C&A/SA&A packages and achieving ATO for classified systems
Strong working knowledge of NIST SP standards, including NIST SP 800-37, and experience using CSAM
TS/SCI clearance required, with eligibility for CI Poly
At least one of the following certifications:
CISA
CRISC
CISM
CGEIT
CISSP
CAP
Location
Onsite at Customer Location
U.S. Citizenship Required
Additional Information
All your information will be kept confidential according to appropriate guidelines.
Compensation is unique to each candidate and relative to the skills and experience they bring to the position. The salary range for this position is typically $145k-159k. This does not guarantee a specific salary as compensation is based upon multiple factors such as education, experience, certifications, and other requirements, and may fall outside of the above-stated range.
Highlights of our benefits include Health/Dental/Vision, 401(k) match, Accrued PTO, STD/LTD/Life Insurance, Referral Bonuses, professional development reimbursement, and more!
D2 Consulting is committed to a merit-based recruitment process and encourages applications from all qualified individuals. As a Veteran-Owned Small Business, we particularly welcome applications from veterans who have the requisite skills and experience. Job applicants that are interested in one of our openings and may require a reasonable accommodation to participate in the job application or interview process, should contact us to request an accommodation.
Auto-ApplyThreat Detection & Response Tier 1, Analyst
Information security analyst job in Tampa, FL
Do you want your voice heard and your actions to count?
Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world's leading financial groups. Across the globe, we're 150,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.
With a vision to be the world's most trusted financial group, it's part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.
Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.
The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.
The working hours for this role in the Tampa office will be 8:00 AM - 6:00 PM US Eastern Time, 4 days per week (Sunday to Wednesday).
Job Summary
In this role you will focus on researching potential cybersecurity threats to various systems, technologies, operations, and programs throughout multiple environments. You will perform analysis based on this research to determine the risk to the organization and take appropriate actions based upon that analysis. Responsibilities include rapidly responding to potential incidents and events to minimize risk exposure and ensure the confidentiality, integrity, and availability of assets and business processes. Additionally, you will proactively monitor internal and external-facing environments, seek opportunities to strengthen and automate detection and remediation capabilities, reduce response times for incidents, and produce analyses of cybersecurity events that include perspectives on the behavior of adversaries.
Major Responsibilities
Perform cybersecurity threat detection, assessment, and mitigation efforts as part of a 24/7 global team
Investigate potential cybersecurity events across multiple environments using various tools and techniques
Support inquiries from compliance teams such as IT risk management and internal and external auditors to ensure documentation is complete and processes are in compliance with information security policies
Create reports analyzing activities or trends both within and outside of the organization
Perform threat hunting across the environment to attempt to detect any adversary activity
Support the development of security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats
Reviews internal logs and alerts to identify potential cybersecurity events. Triage cases based on output from automated alerts, and determine when to escalate to other teams
Monitors external service provider activity to detect potential cybersecurity events
Analyzes security data from all systems in real time to spot and thwart potential threats, attacks, and other violations
Analyzes compromised systems and remediates to a clean state
Performs breach indicator assessments to investigate network traffic for malicious activity
Assists with internal or third-party employee investigations
Assists in the production of various reports which identify and analyze relevant upcoming and ongoing threats to the enterprise
Researches evolving threats, techniques, tools, and vulnerabilities in support of information security efforts
Stays current with information security program developments, industry frameworks, changes in the company, industry trends, and current security practices
Qualifications
Bachelor's degree in Information Technology, Cyber Security, Computer Science, or related discipline or equivalent work experience
1 + years of experience working in the cybersecurity or related field
Relevant technical and industry certifications, such as those provided by GIAC, EC-Council, ISC2, and CompTIA are preferred
Experience in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics preferred
Experience with information security risk management, including information security audits, reviews, and risk assessments
Desired Skills
Understanding of enterprise detection and response technologies and processes (advanced threat detection tools, intrusion detection/prevention systems, network packet analysis, endpoint detection and response, firewalls, Anti malware/anti-virus, Security Information and Event Management tools, etc.)
Ability to perform risk analysis utilizing logs and other information compiled from various sources
Understanding of network protocols, operating systems (Windows, Unix, Linux, databases), and mobile device security
Knowledge in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics
Knowledge of cloud security, networks, databases, and applications
Knowledge of the various types of cyber-attacks and their implementations
A fundamental understanding of enterprise cybersecurity frameworks such as MITRE ATT&CK and Cyber Kill Chain
Ability to document and explain technical details in a concise, understandable manner
Experience in operational processes such as security monitoring, data correlation, troubleshooting, security operations, etc.
The typical base pay range for this role is between $85K - $104K depending on job-related knowledge, skills, experience and location. This role may also be eligible for certain discretionary performance-based bonus and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package (in accordance with the eligibility requirements and respective terms of each) that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, and paid vacation, sick days, and holidays. For more information on our Total Rewards package, please click the link below.
MUFG Benefits Summary
We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws (including (i) the San Francisco Fair Chance Ordinance, (ii) the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, (iii) the Los Angeles County Fair Chance Ordinance, and (iv) the California Fair Chance Act) to the extent that (a) an applicant is not subject to a statutory disqualification pursuant to Section 3(a)(39) of the Securities and Exchange Act of 1934 or Section 8a(2) or 8a(3) of the Commodity Exchange Act, and (b) they do not conflict with the background screening requirements of the Financial Industry Regulatory Authority (FINRA) and the National Futures Association (NFA). The major responsibilities listed above are the material job duties of this role for which the Company reasonably believes that criminal history may have a direct, adverse and negative relationship potentially resulting in the withdrawal of conditional offer of employment, if any.The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual's associates or relatives that is protected under applicable federal, state, or local law.
Auto-ApplyInformation Security Analyst II
Information security analyst job in Palm Harbor, FL
Job DescriptionDescription:
Job Summary: The Information Security Analyst will be responsible for directly supporting one or more of the following programs: Vulnerability Management (VM), Digital Forensics and Incident Response (DFIR), Tool Administration, Tool Documentation and/or Procedural Documentation drafting. GSI is a highly dynamic environment and as such the successful employee will adequately manage competing priorities in a growing department. Information Security analysts ensure that the organization is adequately aligning with the information security frameworks that GSI has established.
Viable candidates must be willing to work onsite at GSI's headquarters in Palm Harbor, Florida daily.
Key Responsibilities:
Understanding of network infrastructure concepts
Assisting with the configurations, engineering and deployments of new tools and features to existing toolsets
Monitor and/or administer two or more Information Security tools
Participates in the enforcement of Information Security policies, procedures and standard practices
Conducting routine log analysis
Analyzing and responding to findings appropriately, potentially during after-hours, based on the criticality
Documenting findings in documents and/or a ticketing system
Assisting in technical document creation, such as Standard Operating Procedures (SOPs) and Tool Documentation
Participating in regular meetings with internal stakeholders including team leads and managers
Creating and presenting presentations relevant to Information Security
Work with auditors, both internal and external, to provide evidence of compliance
Know or be willing to learn Information Security frameworks
Participating in training events, seminars, and obtaining certifications
Supporting other internal stakeholders, such as the Security Operations Center (SOC) and Network Operations Center (NOC) as needed
Leading Security Incident calls and response teams
Requirements:
Work Experience / Knowledge:
1 - 3 years of relevant experience
Knowledge of various security methodologies and processes, and technical security solutions (SIEM, IDS/IPS, Firewall Solutions, etc.)
Knowledge of TCP/IP Protocols, network analysis, and network/security applications
Basic proficiencies in Forensics and Malware Analysis (file signatures, tool sets, recovering data, analyzing memory, analyzing binaries)
Knowledge of different Operating Systems
Knowledge of common Internet protocols and applications
General familiarity of industry compliance frameworks (NIST, ISO, HITRUST)
Qualifications / Certifications:
Bachelor's degree in Computer Science, Information Technology, or Cyber Security, or a related field OR High School diploma and relevant industry training and certifications
Ability to excel in a fast paced and rapidly changing environment
Strong work ethic with attention to detail
Detail-oriented with a commitment to maintaining the highest standards of integrity and ethics
Excellent communication and interpersonal skills to work effectively with cross-functional teams and external stakeholders
Relevant industry certifications are a plus, such as:
EC-Council Certified Ethical Hacker (CEH), CompTIA PenTest+, CompTIA Security+, CompTIA Network+, (ISC)² Systems Security Certified Practitioner (SSCP), or GIAC Security Essentials (GSEC), CISA, CISM
Special Requirements:
Must be proficient in the English language, both written and verbal
May also be assigned various projects and tasks as needed
Sitting for long periods of time
Ability to lift 50 pounds
Equal Opportunity Employer. M/F/D/V
SECURITY SYSTEMS ANALYST II
Information security analyst job in Tampa, FL
At Moffitt Cancer Center, we strive to be the leader in understanding the complexity of cancer and applying these insights to contribute to the prevention and cure of cancer. Our diverse team of over 9,000 are dedicated to serving our patients and creating a workspace where every individual is recognized and appreciated. For this reason, Moffitt has been recognized on the 2023 Forbes list of America's Best Large Employers and America's Best Employers for Women, Computerworld magazine's list of 100 Best Places to Work in Information Technology, DiversityInc Top Hospitals & Health Systems and continually named one of the Tampa Bay Time's Top Workplace. Additionally, Moffitt is proud to have earned the prestigious Magnet designation in recognition of its nursing excellence. Moffitt is a National Cancer Institute-designated Comprehensive Cancer Center based in Florida, and the leading cancer hospital in both Florida and the Southeast. We are a top 10 nationally ranked cancer center by Newsweek and have been nationally ranked by U.S. News & World Report since 1999.
Working at Moffitt is both a career and a mission: to contribute to the prevention and cure of cancer. Join our committed team and help shape the future we envision.
Summary
Security Systems Analyst II
Position Highlights:
* The Security Systems Analyst II, will maintain the architecture of security controls for applications of systems, such as infrastructure and web application firewalls.
* The Security Systems Analyst II reviews alerts and data from network and server infrastructure and documents formal, technical incident reports.
* Works with Security Systems Engineer on foundational technology security reviews and assessments.
* The Security Systems Analyst II will also administer and maintain an organizational SIEM and log solution in concert with organizational monitoring platforms.
* This position leverages experience with PKI and certificates and will also deliver XDR across the organization.
Responsibilities:
* Performs maintenance and management of security systems and applications, including firewalls, PKI and certificates, network security appliances and host-based security systems
* This includes infrastructure and web applications firewalls, including physical and virtual firewalls, including day to day maintenance of firewall rules. Investigates and documents issues or incidents involving the enterprise firewall.
* Participates in infrastructure projects to develop, plan and implement specifications for network and distributed system security technologies in support of key information systems
* Assists remediation required by audits, and document exceptions as necessary
Education and Experience:
* High School Diploma/GED
* Minimum of 5 years of experience in an IT support environment which could include experience in more than one of the following IT disciplines:
* Complex IT Portfolio environment including large scale systems, servers, storage and networking.
* High availability application layer and/or stateful inspection based firewalls.
* VPN gateways & remote access clients.
* Public key Infrastructures including Certificate Authority (CA), Registration Authority (RA) and Certificate Repository.
* Securing Internet access, Intranet, and Extranet.
* Technology background in systems, networking and/or data storage design, engineering and support.
Plus
* Experience delivering XDR across the organization.
* Experience with PKI and certificates
Share:
Senior Security Analyst/ Asst. COMSEC Custodian - St. Pete/Largo, FL
Information security analyst job in Saint Petersburg, FL
Country:
United States of America Onsite
U.S. Citizen, U.S. Person, or Immigration Status Requirements:
Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
Security Clearance:
DoD Clearance: Secret
At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Job Summary
Raytheon has an immediate opening for a Sr. Industrial Security Specialist/Alt COMSEC Custodian position located onsite in St. Petersburg, Florida.
This is a multi-faceted Industrial Security position working within a fast-paced, deadline driven environment. The candidate will help develop, administer and maintain a comprehensive security program in accordance with the 32 CFR Part 117, National Industrial Security Program Operating Manual (NISPOM) and the COMSEC Policy Manual 3-16.
What You Will Do
Perform various employee in-processing/out-processing security briefings/debriefings.
Process classified visits, incoming and outgoing.
Update security personnel access lists and databases accordingly.
Maintain classified document control/accountability of classified media shipped and received.
Receipt, custody, issue, safeguarding and accounting of COMSEC keying material and Controlled Cryptographic Items (CCI) IAW COMSEC Policy Manual 3-16.
Data entry and maintenance of the Distributed INFOSEC Accounting System (DIAS).
Submission of all required accounting reports, semi-annual and yearly audits and inspections
Assist with implementing Security Education and Media Control Plan
Assist with the implementation of local Standard Operating Procedures (SOP) and Operations Security (OPSEC) Plans, and Concept of Operations (CONOPs), etc.
Participate in a team environment to develop, update, and implement security policies and procedures in coordination with the company policies and government regulations.
Perform additional Industrial Security duties as needed.
Must able to obtain a Top Secret government security clearance within six months of employment.
Qualifications You Must Have
Typically requires a Bachelor's Degree or equivalent experience and minimum of two (2) years prior relevant security experience, or An Advanced Degree in a related field.
Experience with 32 CFR 117, DoD 5220.22-M (NISPOM) and COMSEC Policy 3-16
Experience in Industrial Security and COMSEC, working in a manufacturing environment
Qualification We Prefer
Knowledge of DISS and NISS
Knowledge of Distributed INFOSEC Accounting System (DIAS) software
Ability to communicate well with others both verbally and in writing
Completion of the
FSO Program Management for Possessing Facilities
IS030.CU curriculum located on the Defense Counterintelligence and Security Agency's (DCSA) Security Training, Education and Professionalization Portal (STEPP).
ISP Certification
What We Offer
Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Safety, Trust, Respect, Accountability, Collaboration, and Innovation.
This position is not eligible for relocation.
Learn More & Apply Now!
Please consider the following role type definition as you apply for this role. Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintenance employees, as they are essential to the development of our products.
As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote.
The salary range for this role is 66,000 USD - 130,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
Auto-ApplyInformation Security Director
Information security analyst job in Tampa, FL
The Director of Information Security, reporting to the Head of IT, will ensure security requirements are consistently practiced, improve compliance with security standards and policies globally and own design and enforcement of global information security standards. You will have a broad technical background, a solid grasp of cloud technologies and the courage to most insistent advocate for security and privacy in the company.
What You Will Do:
Define network security, infrastructure hardening, monitoring, and breach detection infrastructure
Own global compliance with GDPR, ISO, SOC and CCPA and all data and security compliance issues.
Oversee internal and external IT audits, scans, vulnerability testing, and mitigation.
Design, implement and continuously update security requirements, policies and standards for all of OPSWAT, including privileged account access, management, control, and monitoring standards.
Manage secure, consistent change management and deployment practices in an enterprise environment.
Implement security awareness training programs.
Design and approve of platform, application, storage, network, virtualization, cloud and mobile security standards and methodologies.
Develop technical designs for a project to meet information security requirements based on approved security architectures/design patterns.
Develop, review, and approve the installation requirements for LANs, WANs, VPNs, routers, firewalls, and related network devices.
Perform additional duties as assigned.
What You Should Have:
Bachelor's degree in Technology, Legal, Computer Science/Engineering, Cyber security, or related field/experience.
7+ years of working experience in an cloud environments.
4+ years of experience in cyber security.
Deep understanding of AWS, Azure and GCP technologies and architecture. Experience implementing security both on premise and in AWS, Azure and GCP.
Inside-out knowledge of Microsoft security technologies, platforms and patterns.
Experience with security practices such as security incident response and risk management.
Experience in the design, development, implementation and operational support of critical solutions in large scale environments and organizations.
Knowledge and understanding of relevant legal and regulatory requirements related to GDPR, ISO, SOC and CCPA.
A passion for cyber security.
Excellent verbal and written communication skills with a wide variety of audiences including technologists, executives, business partners and IT team members.
Manager of Information Security
Information security analyst job in Tampa, FL
Compensation: $110,000 - $150,000 based on experience and credentials Position Type: Full Time The IT Security Operations Manager oversees the operations of Suncoast Credit Union's security solutions. This individual establishes an enterprise security stance through policy implementation, architecture, and training processes. Key responsibilities include selecting appropriate security solutions and overseeing vulnerability audits and assessments. An ideal candidate is an ambassador who will interface with peers in the Systems and Network departments, along with other leaders, to share the organization's security vision and solicit involvement in achieving higher levels of enterprise security.
Responsibilities
* Create and maintain the security architecture design
* Budget, evaluate, and recommend solutions to current or potential security threats related to the computing environment
* Lead the design, implementation, operation, and maintenance of the Information Technology Security Framework based on the SANS Top 20 Critical Controls
* Ensure the confidentiality, integrity, and availability of data residing on or transmitted through enterprise workstations, servers, databases, and other data repositories
* Create and maintain the enterprise's security documents for standards, baselines, guidelines, and procedures
* Ensure the enforcement of enterprise security documents
* Collaborate with the Systems and Networking groups and other business units to ensure enterprise-wide understanding of security goals, solicit feedback, and foster cooperation
* Assist with the security awareness training program
* Select and acquire additional security solutions or enhancements to existing security solutions to improve overall enterprise security within the enterprise's existing procurement processes
* Oversee the deployment, integration, and initial configuration of new security solutions and enhancements to existing security solutions
* Supervise the design and execution of vulnerability assessments, penetration tests, and security audits
* Review and recommend new methods or procedures to make daily operations more efficient
* Set goals and objectives for team members to achieve operational and strategic results
* Direct and guide supervisors
* Develop and mentor directly reporting staff and respond appropriately to feedback or concerns
* Cultivate strong working relationships and build trust among team members
* Interpret and implement management policies, utilizing short-term planning, scheduling, and coordinating for the department
* Assist senior management with developing and implementing long-term and short-term business objectives
* Develop, monitor, and maintain the department budget in cooperation with senior management
* Assist the Vice President with regulatory compliance to ensure the department is in accordance with applicable laws and government regulations
* Maintain knowledge and understanding of current trends, laws, and issues affecting the area of expertise
Qualifications
* Bachelor's degree in information technology, information security, or related field (A comparable combination of education, work experience, and training may be substituted for education requirements)
* 7+ years of experience in enterprise security architecture design and enterprise security document creation, including management experience
* Ability to temporarily relocate out of state to provide support for business continuity during major incidents such as weather events
* Experience with designing and delivering employee security awareness training
* Experience with developing Business Continuity Plans and Disaster Recovery Plans
* Experience with various network protocols, firewalls, vulnerability assessment, penetration testing tools, remote access, network vulnerabilities, endpoint systems, vulnerabilities, and network management tools
* Strong understanding of IP, TCP/IP, and other network administration protocols.
* Proficient knowledge of security policies, standards, and procedures
* Ability to prioritize tasks by effectively managing competing and changing priorities to meet deadlines
* Accurate, detail-oriented, and organized with task management
* Ability to analyze and resolve complex problems
* Strong written, verbal, and interpersonal communication skills to interact effectively with members, staff, vendors, and government regulators
* Ability to influence others regarding policies, practices, and procedures
Benefits
* Financial Well-Being: Bonus Program up to 18%, 401K Matching up to 8%, Retirement Planning, Pay Increases based on Competency, Employee Loan Discounts, Flex Spending Accounts
* Wellness: Medical Coverage, Dental and Vision Coverage, Access to 4,000+ Gyms, Mental Health Resources, PTO Wellness Days, Short Term and Long Term Disability Coverage
* Work-Life Balance: 11 Paid Holidays, 3 weeks of Paid Time Off, 4 weeks of Paid Parental Leave, Birthday PTO
* Community Involvement: Paid Volunteer Hours
* Growth: Degree Assistance up to $5,000 per year
For more information, including additional benefits, please visit our benefits website at ************************************************
Responsibilities
* Create and maintain the security architecture design
* Budget, evaluate, and recommend solutions to current or potential security threats related to the computing environment
* Lead the design, implementation, operation, and maintenance of the Information Technology Security Framework based on the SANS Top 20 Critical Controls
* Ensure the confidentiality, integrity, and availability of data residing on or transmitted through enterprise workstations, servers, databases, and other data repositories
* Create and maintain the enterprise's security documents for standards, baselines, guidelines, and procedures
* Ensure the enforcement of enterprise security documents
* Collaborate with the Systems and Networking groups and other business units to ensure enterprise-wide understanding of security goals, solicit feedback, and foster cooperation
* Assist with the security awareness training program
* Select and acquire additional security solutions or enhancements to existing security solutions to improve overall enterprise security within the enterprise's existing procurement processes
* Oversee the deployment, integration, and initial configuration of new security solutions and enhancements to existing security solutions
* Supervise the design and execution of vulnerability assessments, penetration tests, and security audits
* Review and recommend new methods or procedures to make daily operations more efficient
* Set goals and objectives for team members to achieve operational and strategic results
* Direct and guide supervisors
* Develop and mentor directly reporting staff and respond appropriately to feedback or concerns
* Cultivate strong working relationships and build trust among team members
* Interpret and implement management policies, utilizing short-term planning, scheduling, and coordinating for the department
* Assist senior management with developing and implementing long-term and short-term business objectives
* Develop, monitor, and maintain the department budget in cooperation with senior management
* Assist the Vice President with regulatory compliance to ensure the department is in accordance with applicable laws and government regulations
* Maintain knowledge and understanding of current trends, laws, and issues affecting the area of expertise
Qualifications
* Bachelor's degree in information technology, information security, or related field (A comparable combination of education, work experience, and training may be substituted for education requirements)
* 7+ years of experience in enterprise security architecture design and enterprise security document creation, including management experience
* Ability to temporarily relocate out of state to provide support for business continuity during major incidents such as weather events
* Experience with designing and delivering employee security awareness training
* Experience with developing Business Continuity Plans and Disaster Recovery Plans
* Experience with various network protocols, firewalls, vulnerability assessment, penetration testing tools, remote access, network vulnerabilities, endpoint systems, vulnerabilities, and network management tools
* Strong understanding of IP, TCP/IP, and other network administration protocols.
* Proficient knowledge of security policies, standards, and procedures
* Ability to prioritize tasks by effectively managing competing and changing priorities to meet deadlines
* Accurate, detail-oriented, and organized with task management
* Ability to analyze and resolve complex problems
* Strong written, verbal, and interpersonal communication skills to interact effectively with members, staff, vendors, and government regulators
* Ability to influence others regarding policies, practices, and procedures
Benefits
* Financial Well-Being: Bonus Program up to 18%, 401K Matching up to 8%, Retirement Planning, Pay Increases based on Competency, Employee Loan Discounts, Flex Spending Accounts
* Wellness: Medical Coverage, Dental and Vision Coverage, Access to 4,000+ Gyms, Mental Health Resources, PTO Wellness Days, Short Term and Long Term Disability Coverage
* Work-Life Balance: 11 Paid Holidays, 3 weeks of Paid Time Off, 4 weeks of Paid Parental Leave, Birthday PTO
* Community Involvement: Paid Volunteer Hours
* Growth: Degree Assistance up to $5,000 per year
For more information, including additional benefits, please visit our benefits website at ************************************************
Auto-ApplyInformation System Security Officer (ISSO)
Information security analyst job in Tampa, FL
Overview Location: MacDill AFB - Tampa, FL
Clearance Required: Active TS clearance (eligibility for SCI and ability to obtain a CI poly is required upon application for initial consideration)
**We are not able to upgrade or sponsor clearances**
Certification Required: CISA, CRISC, CISM, CGEIT, CISSP or CAP
At Bcore, our strength comes from how we deliver impact to the mission. Whether it's architecting critical IT solutions, producing actionable intelligence, or developing cutting edge technology, we succeed because of the expertise, collaboration, and agility of our teams. Our Mission Services division combines enterprise IT, cloud solutions, DevSecOps, systems engineering, software development, and operational support. Bcore accelerates decisive advantage for warfighters and intelligence professionals by fusing human insight, rapid-fire engineering, precision-measured outcomes, and relentless grit into mission-ready solutions.
Do you want to join a team that is building tailored technical solutions to modernize our government's mission and our client's business? Do you have a desire to change how people work? Are you interested in helping to protect our nation's cyber interests? Join our growing team supporting the NGA customer missions as an Information System Security Officer (ISSO).
Responsibilities What you get to do every day:
Develop and coordinate all authorization documentation associated including the Systems Categorization, Systems Security Plan, and Systems risk assessment
Support the control assessment, reporting and monitoring processes using the Cyber Security and Assessment Management (CSAM) system
Assist the component with staying on track with Core Controls and A-123 control assessment schedules
Work with components to ensure each Risk Based Decisions (RBD's) has a current Waivers.
Coordinate with CSS Customer Liaison support, including status of the process and POA&Ms.
Support and document security controls tests, assist in remediation and ensure that POA&Ms are being appropriately managed.
Develop or update the Business Continuity and Contingency Plan for the component.
Assist the components with decisions that affect security of their systems and networks.
Facilitate preparations for the tri-annual Security Assessment and Authorization (SA&A) component's Information System.
Conduct assessments of information systems security requirements, evaluate current security posture and recommend priorities for remediation.
Review information system infrastructure and application architecture to assess security requirements
Review existing SA&A documentation, Security Assessment Report and security infrastructure (i.e. IDS, firewalls, vulnerability scan tools, etc.)
Assess NIST 800-53, Rev 4. Control and document results
Evaluate and strengthen standard SA&A Documentation
Perform and document risk assessments, analyzing security vulnerabilities, and the metrics to measure the risks associated with those vulnerabilities;
Based on the risk profile of the analyzed systems, development and documentation of a Plan of Action and Milestones (POA&M) for mitigating those risks;
Design and development of comprehensive Systems Security Plan, covering at a high level the infrastructure, policies and procedures which define the systems security profile for the analyzed systems;
Development of Systems Security Users Guides specific to selected networks, desktop computers, servers and data base systems; Design, development, and validation of System Test and Evaluation (ST&E) reviews for new and/or legacy systems.
Review and conduct NIST-based Self Assessments, identifying any weaknesses which need to be addressed, and developing a POA&M for each of those weaknesses based on industry best practices.
Design and development of Initial Privacy Assessment (IPA) and Privacy Impact Assessments (PIAs) for each major Federal Government IT Systems Developing and conducting System Test and Evaluations (ST&Es) and Independent Verification and Validation (IV&Vs) of the security profiles of Federal Government IT Systems
Conduct OMB A-123 security assessments of Federal Government IT Systems.
Qualifications
Clearance Required: Active TS clearance (eligibility for SCI and ability to obtain a CI poly is required upon application for initial consideration)
**We are not able to upgrade or sponsor clearances**
Certification Required:
Current certification in one or more of the following IT Security disciplines:
ISACA - Certified Information Systems Auditor (CISA)
ISACA - Certified in Risk and Information Systems Control (CRISC)
ISACA - Certified Information Security Manager (CISM)
ISACA - Certified in Governance of Enterprise IT(CGEIT)
(ISC)2 - Certified Information Systems Security Professional (CISSP)
(ISC)2 - Certified Authorization Professional (CAP)
Education/Experience:
Requires Bachelor's degree
8+ years' experience performing systems security assessments, preparing system security documentation, and/or performing security upgrades for live networks, desktop systems, servers, and enterprise data bases leading to successful certification and accreditation or security authorization of such systems.
8+ years' experience assessing and enhancing IT systems security policies and procedures in response to the regulatory requirements associated with Federal and International standards.
8+ years IT Security experience with extensive knowledge in security regulations and security assessments having developed numerous security C&A (or SA&A) and ATO on a range of systems including classified systems
Strong working knowledge with NIST Special Publications and the NIST SP 800-37 SA using CSAM system
What is ideal?
Intelligence Community Experience preferred
What you can expect from us
Recognizing great achievements do not go unnoticed by bcore through service anniversaries, spot awards, and employee referral bonuses
You'll join a growing organization of passionate, top-shelf, IT engineering professionals with extensive experience in actively developing the technology revolution in the Intelligence community
Highlights of our benefits include Health/Dental/Vision, 401(k) match and potential Profit Sharing, Universal Leave, STD/LTD/Life Insurance/Voluntary Life Insurance, Stipends, Referral Bonuses, and more!
Compensation is unique to each candidate and compensation packages are based on education, experience, and other requirements.
BCore is proud to be an equal opportunity workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, sexual orientation or any other characteristic protected by law.
Auto-ApplyInformation Systems Security Officer (ISSO)
Information security analyst job in Tampa, FL
Job DescriptionISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Easy ApplyChief Information Security Officer
Information security analyst job in Tampa, FL
Slide Insurance - Fun. Innovation Driven. Fueled by Passion, Purpose and Technology.
At Slide, you will not only be part of a successful team, but you will also be a part of our Slide Vibe/award winning culture where collaboration and innovation are expected, recognized and awarded!
Duties and Responsibilities
Security Strategy & Governance
Develop and maintain the enterprise security roadmap aligned with business strategy, insurance-specific risks, and regulatory obligations.
Responsible for the cybersecurity program and establish policies, standards, and procedures for cybersecurity, data protection, access control, and technology governance.
Prepare executive-level reporting on security posture, key risks, and program maturity for CIO, Executive Leadership, and Audit/Risk Committees.
Lead or support compliance with NIST CSF, ISO 27001, NAIC Model Law, state DOI cyber requirements (e.g., NY DFS, FL OIR etc.), SOX, GLBA, PCI, and privacy regulations.
Cybersecurity Program Management
Oversee the Security Operations Center (internal and/or external), including threat monitoring, incident detection, and incident response.
Lead development of modern security architecture including zero-trust principles, cloud security, identity governance, and endpoint security.
Mature vulnerability management, penetration testing, and security hardening activities across the organization.
Direct development and testing of incident response plans, tabletop exercises, and post-incident analysis.
Manage investigation of security alerts, vulnerabilities, and suspicious activities.
Regulatory Compliance & Public Company Requirements
Ensure compliance with NAIC cybersecurity model law, NIST CSF, ISO 27001, state DOI regulations, PCI, GLBA, and privacy requirements.
Oversee preparation of cybersecurity-related SEC disclosures, including incident reporting and governance statements.
Partner with internal departments to maintain required documentation and audit readiness.
Lead third-party risk programs covering vendors, agents, service providers, and cloud platforms.
Business Partnership & Insurance-Specific Risk Management
Partner with Underwriting, Claims, Product, and Sales to ensure secure design of systems and workflows.
Work with actuarial and underwriting teams on cybersecurity posture assessments relevant to cyber insurance offerings.
Ensure contact center, agent portals, field adjuster tools, and policyholder self-service platforms meet security standards.
Balance strong controls with operational efficiency in a high-volume insurance environment.
Drive remediation efforts in partnership with infrastructure, networking, DevOps, and application teams.
Lead business continuity and disaster recovery planning for critical systems.
Third-Party Risk Management
Lead cybersecurity assessments for vendors, agent platforms, cloud service providers, and third-party partners.
Ensure contracts meet required security and privacy standards.
Data Protection & Privacy
Oversee data protection strategy, including encryption, access management, retention standards, and sensitive data governance.
Implement and enforce data protection standards including encryption, retention, and secure data handling for policyholder and agent data.
Monitor for data-loss risks and manage DLP tools and processes.
Cloud & Application Security
Partner with engineering and DevOps teams to implement secure cloud (AWS/Azure) architecture practices.
Ensure security controls are embedded in system development, integrations, and modernization efforts.
Support secure design reviews for new applications, claims tools, underwriting systems, and customer portals.
Team Leadership & Capability Building
Provide leadership to employees and regularly conduct effective and timely structured Progress & Growth Structured Dialogue sessions.
Coach, train, and develop employees; set goals and lead to success.
Conduct employee interviews and make staffing recommendations, as needed.
Manage relationships with key technology and security vendors, including MDR/MSSP partners.
Build a culture of security awareness across the enterprise, including training, phishing simulations, and workforce engagement.
Perform other duties, as assigned.
Education, Experience and Licensing Requirements:
Minimum 8 years' progressive experience in cybersecurity or information security.
3+ years leading InfoSec or cyber teams, ideally within regulated industries (financial services, insurance, fintech, banking).
Experience with cloud security (AWS, Azure), identity access management, and security architecture.
Experience with public-company cybersecurity governance and regulatory reporting required.
Prior experience in P&C insurance, financial services, or other regulated risk-based businesses highly preferred.
Desired Certifications: CISSP, CISM, CISA, CCSP, CRISC.
Qualifications/Skills and Competencies:
Deep knowledge of cybersecurity frameworks (NIST CSF, ISO 27001, CIS Controls).
Strong understanding of NIST CSF, CIS Controls, ISO 27001, and NAIC Model Law.
Hands-on experience with SIEM, firewalls, endpoint protection, IAM, cloud security, and vulnerability tools.
Proven ability to lead security programs in mid-sized organizations.
Excellent communication skills with technical and non-technical stakeholders.
Demonstrated ability to brief executives.
Exceptional time management skills with ability to prioritize tasks and allocate resources efficiently.
Proven ability to be adaptable and flexible; able to adjust to new requirements or unforeseen issues.
Expert user of MSO/365 applications such as Microsoft Teams, SharePoint, Word, Excel, PowerPoint, and Outlook.
Desire to live Slide's Core Values.
What Slide offers to you:
The Slide Vibe - An opportunity to be a part of a fun and innovation-driven culture fueled by Passion, Purpose and Technology! Slide offers many opportunities to collaborate and innovate across the company and departments, as well as get to know other Sliders. From coffee chats, to clubs, to social events - we plan it, so all Sliders feel included and Enjoy their Journey.
Benefits - Created using Slider feedback, Slide offers a comprehensive and affordable benefits package to cover all aspects of health...Physical, Emotional, Financial, Social and Professional. A Lifestyle Spending Account is set up for each Slider and Slide contributes to it monthly for use on any benefit that individually suits you - Health Your Way!
2023, 2024 & 2025 BEST PLACE TO WORK - Tampa Bay Business Journal
2024 & 2025 TOP WORKPLACE - Tampa Bay Times (Local) &
2024 TOP WORKPLACE - USA Today (National)
Auto-ApplyProgram Security Analyst
Information security analyst job in Tampa, FL
Applied Research Solutions has an exciting new opportunity for a Program Security Analyst in support of Special Operations Forces Acquisition, Technology and Logistics' (SOF AT&L) Program Executive Office for SOF Warrior (PEO-SW). PEO-SW accepts and manages risk, takes personal initiative, and ensures results for the Nation's warriors. PEO-SW proves its worth in the fight in every action, every strike, and every operation. SOF Warrior executes with a sense of urgency and purpose in support of SOF operations every day.
Why Work with us?
Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.
Responsibilities Include:
Support the Government Program Security Manager (PSM), Program Security Officer (PSO), and Special Access Program (SAP) Security Officer (GSSO)
Responsible for supporting security administration, management, and operations of DoD Special Access Programs and SAP facilities (SAPFs) managed by USSOCOM SOF AT&L Acquisition Security Directorate
Create and maintain secure environments for the execution of SAP acquisition programs.
Coordinate security matters for and with the Program Security Officer and the Government Program Manager when needed
Coordinate with internal and external stakeholders, including Other Government Agencies, to ensure protection of critical program information, execution of classified acquisition programs in accordance with approved Security Classification guides and Program Protection Plans
Facilitates compliance with OSD SAP Central Office and ASD(SO/LIC) SAPCO program policies and procedures based on changes to regulations and ongoing SAP transition activities.
Ability to establish performance goals and assess progress toward their achievement
Adjust work operations and program objectives to meet emergencies, changing programs, or production requirements within available resources
Other duties as assigned.
Qualifications/Technical Experience Requirements:
Citizenship: Must be a US citizen
Clearance: Must possess and maintain a TS w/SCI clearance
Must have SAP Experience
Certifications:
Center for Development and Security Excellence (CDSE) Security Fundamentals Professional Certification (SFPC)
CDSE Special Program Security Credential (SPSC)
Education: Bachelor's degree in acquisition/business, or related field
Years of Experience: Minimum 10 years working in federal government classified acquisition projects to include:
Facilitates compliance with OSD SAP Central Office and ASD(SO/LIC) SAPCO program policies and procedures based on changes to regulations and ongoing SAP transition activities
Creation and maintenance of secure environments for the execution of SAP acquisition programs.
supporting security administration, management, and operations of DoD Special Access Programs and SAP facilities (SAPFs)
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
Cyber Security Systems Engineer
Information security analyst job in Tampa, FL
Job Description
The Cyber Security Systems Engineer provides cyber defense analysis and engineering support for MARCENT systems, ensuring resilience and compliance against advanced threats. This role engineers security solutions for MARCENT communications systems, conducts vulnerability assessments and security audits, implements DoD cybersecurity standards, and provides documentation and training on cyber defense posture. With 7-10 years of experience, the engineer applies expertise in network security analysis, packet inspection, threat hunting, vulnerability assessment, SIEM operations, and forensic analysis. By integrating technical expertise with operational awareness, the Cyber Security Systems Engineer ensures MARCENT systems remain secure, compliant, and ready to counter evolving cyber threats. ***THIS EMPLOYMENT IS CONTINGENT UPON CONTRACT AWARD***
Responsibilities/Duties:
- Engineer security solutions for MARCENT communications and information systems.
- Conduct vulnerability assessments, penetration testing, and security audits to identify risks.
- Implement DoD cybersecurity standards and RMF requirements.
- Provide documentation, training, and guidance on MARCENT's cyber defense posture.
- Perform network security analysis, including packet inspection and traffic monitoring.
- Conduct threat hunting and vulnerability assessments to proactively identify risks.
- Operate SIEM platforms, triage alerts, and conduct malware behavior and forensic analysis.
- Apply frameworks such as the cyber kill chain and ATT&CK models to enhance defense strategies.
Supplemental Duties:
- Assist in developing SOPs for cyber defense operations and incident response.
- Support compliance audits and RMF documentation requirements.
- Contribute to after-action reviews and lessons learned from cybersecurity incidents.
Administrative Duties:
- Maintain compliance with MARCENT administrative procedures and reporting requirements.
- Ensure cybersecurity documentation is archived according to records management standards.
Supervisory Responsibilities:
None.
Education/Experience/Qualification:
- Bachelor's Degree in Cybersecurity, Computer Science, or related discipline required.
- 7-10 years of experience in cybersecurity engineering for DoD or military systems.
- DoD IAT II or above certification required (e.g., Security+, CISSP).
- Experience in network security analysis, packet inspection, and threat hunting.
- Proficiency in SIEM operations, alert triage, and forensic/malware behavior analysis.
- Experience with RMF documentation and compliance auditing.
- Familiarity with frameworks such as kill chain and ATT&CK models.
- Strong communication and briefing skills for both technical and non-technical audiences.
- TS/SCI clearance required.
Additional Skills:
- Ability to engineer innovative cybersecurity solutions tailored to operational needs.
- Strong analytical skills to assess risks and develop mitigation strategies.
- Proficiency with Microsoft Office Suite and cybersecurity tools.
- Attention to detail in documentation, compliance, and reporting requirements.
Location:
Primary workplace is MARCENT Headquarters, MacDill Air Force Base, Tampa, Florida.
Work Environment:
Office environment within a joint military/civilian/contractor staff. Includes coordination with cybersecurity teams, IT personnel, and external DoD partners.
Physical Demands:
Primarily sedentary office work with extensive computer use. May involve occasional travel to support cybersecurity inspections, training, or incident response activities.
Work Schedule:
Full-time, 40 hours per week. Monday-Friday, 0800-1600.
May require flexibility during cybersecurity incidents or system upgrades.
License and Other Requirements:
Valid U.S. Driver's License. Eligibility for issuance of a Common Access Card (CAC).
Salary and Benefits:
As stated during the hiring process.
Security Clearance:
TS/SCI clearance required.
Travel:
May include CONUS and OCONUS travel to support cybersecurity operations, training, and system sustainment.
Senior Security Systems Analyst
Information security analyst job in Tampa, FL
Introduction This is highly responsible work in system and security administration across a variety of computer platforms and departments. Nature Of Work The Senior Security Systems Analyst plays a crucial role in safeguarding the integrity, confidentiality, and availability of sensitive information within the City of Tampa's digital infrastructure. As a key member of the Technology & Innovation Security Office, the incumbent will be responsible for designing, implementing, and maintaining robust security systems to protect against cyber threats, ensuring compliance with regulatory standards, and responding to security incidents. The Senior Security Systems Analyst will collaborate with various departments to assess security needs, recommend solutions, and contribute to the overall enhancement of the City of Tampa's cybersecurity posture.
Examples of Duties
Develops, implements, and maintains security architectures for critical systems and networks.
Designs and oversees the implementation of security measures to protect digital assets and sensitive information.
Monitors and analyzes security alerts, incidents, and vulnerabilities.
Conducts regular security assessments and penetration tests to identify and address potential weaknesses.
Responds promptly to security incidents and provides detailed post-event analyses.
Contributes to the development and enforcement of security policies, standards, and procedures.
Ensures compliance with relevant regulatory requirements and industry best practices.
Collaborates with other IT staff and departments to integrate security measures into the overall IT architecture.
Provides training and awareness programs to educate staff on security best practices.
Assess and prioritizes security risks, recommending appropriate mitigation strategies.
Conducts regular risk assessments and audits to identify and address potential vulnerabilities.
Leads the response to security incidents, including coordinating with internal and external stakeholders.
Conducts thorough investigations into security breaches, documenting findings and recommending corrective actions.
Evaluates and manages third-party security vendors and tools.
Collaborates with vendors to implement and maintain security solutions.
Knowledge, Skills & Abilities
Extensive knowledge of: cybersecurity principles, practices, and technologies; conducting internal security audits and assessments; conducting comprehensive risk assessments and presenting findings to stakeholders; coordinating with vendors and external partners to implement security solutions; implementing and managing security technologies, including firewalls, antivirus software, intrusion detection systems, and endpoint protection solutions.
Knowledge of: developing, implementing, and enforcing security policies, standards, and procedures; identifying and implementing improvements to enhance the overall security posture of the organization; security frameworks such as NIST, ISO 27001, and CIS Critical Security Controls; leading incident response efforts, including the ability to analyze and contain security incidents effectively.
Ability to: assess and prioritize security risks, understanding their potential impact on the organization; communicate technical details to non-technical stakeholders during incident response efforts; understand regulatory requirements applicable to government entities and the ability to ensure compliance; provide security training and awareness programs for staff; prioritize and manage multiple tasks efficiently, meeting deadlines and delivering high-quality results; troubleshoot and resolve security incidents promptly; pursue relevant certifications and professional development opportunities; staying current with emerging cybersecurity threats, trends, and technologies.
Skills in: critical thinking and a proactive approach to identifying and addressing security vulnerabilities; developing and implementing risk mitigation strategies and controls; conducting thorough security investigations, documenting findings, and recommending corrective actions; managing security projects from inception to completion; strong interpersonal skills for effective collaboration with cross-functional teams and various departments; strong analytical skills to assess complex security issues and provide effective solutions; excellent written and verbal communication skills to articulate complex security concepts to both technical and non-technical audiences.
Physical Requirements
Mostly sedentary, indoors, requires extended use of computer, typing and viewing monitor.
Minimum Qualifications
Bachelor's degree in Information Technology, Computer Science, or a related field. Proven experience (minimum of 5 years) in a senior-level security role, preferably within a government or public sector environment.
Licenses or Certifications
Possession of a valid drivers license may be required.
Relevant certifications (e.g., CISSP, CISM, or equivalent) is preferred.
Examination
Evaluation of education and experience. Drug testing is included in all pre-employment processing.
Comments
Employees may be required to work rotating shifts, including nights, weekends, holidays, and overtime as needed. During periods when the Mayor issues an emergency declaration for the City of Tampa, all employees may be required to work in preparation, response or recovery activities related to the stated emergency.
Conclusion
HELPFUL HINTS FOR COMPLETING YOUR APPLICATION: Please register before you begin the application process. This will enable you to view and re-use information from previously submitted applications to complete and submit any future applications. Please make certain your application is complete and the information you provide clearly demonstrates that you possess the minimum job qualifications as stated in the job announcement. Resumes can be submitted in support of an application, but not in lieu of an application. Resumes and copies of certifications or other required documents may be attached to your online application.
Security Systems Field Laborer
Information security analyst job in Tampa, FL
At LaForce, we specialize in delivering access control, video surveillance, and intercom solutions that keep people and businesses secure. We're looking for a dedicated and skilled Security Integration Field Laborer in our Tampa, FL location to join our team. This role assists with installing and maintaining access control systems, video surveillance, and other electro-mechanical security products for commercial businesses.
What You'll Do:
As a Field Laborer, you will help with ensuring secure and functional installations for our customers. Every day will bring new challenges, from problem solving complex technical issues to learning new technologies in the security industry. Your day-to-day will include:
* Helping with installing and programming access control systems, CCTV, intercoms, security systems, and electrical hardware with precision and efficiency.
* Troubleshooting and adjusting new or existing systems to meet customer needs.
* Safely handling disassembly and removal of electrical products and door hardware.
* Training customers on new and existing systems and software.
* Producing quality results on time and within budget, representing the company professionally, and fostering strong customer relationships.
* Helping with accurate wiring diagrams upon project completion for future reference.
* Maintaining clear, professional communication with customers, sales staff, and supervisors.
* Operating a company vehicle safely and respectfully in accordance with company policy.
What You'll Bring:
We welcome applicants with technical certificates, equivalent professional experience, or relevant military experience in electrical or mechanical fields. The ideal candidate has knowledge of low-voltage electrical wiring, the ability to read wiring diagrams and blueprints, strong problem-solving skills, and a valid driver's license with a clean record.
Physical Requirements
This role demands physical stamina and precision, including:
* Frequently standing, walking, climbing ladders, and lifting up to 40 pounds.
* Occasionally carrying loads up to 75 pounds
* Performing tasks requiring elevated activity.
Why Join LaForce?
At LaForce, you're part of a team dedicated to growth, innovation, and excellence. From competitive pay to a supportive culture that values your ideas, we're here to help you thrive. You'll receive a cell phone stipend, company-provided tools, and comprehensive hands-on training.
How to Apply
Screening includes a drug test, background check, and driver's license verification. If you're passionate about security systems and looking to make a difference in the field, apply today! We look forward to meeting you!
Manager of Information Security
Information security analyst job in Tampa, FL
Manager of Information Security
(Tampa FL highly preferred)
Will be expected to come on-site 1-3 times a month on an as needed basis
Duration: Direct Hire
Salary: $130K - $150K + Bonus (based on experience)
Required Skills & Experience
7+ years of experience in enterprise security architecture design and enterprise security document creation, including 5 years of management experience
Proven ability in managing a maturing security program and a growing team
Experience with designing and delivering employee security awareness training
Experience with developing Business Continuity Plans and Disaster Recovery Plans
Experience with various network protocols, firewalls, vulnerability assessment, penetration testing tools, remote access, network vulnerabilities, endpoint systems, vulnerabilities, and network management tools
Proficient knowledge of security policies, standards, and procedures
Nice to Have Skills & Experience
Bachelor's degree in information technology, information security, or related field
Experience working with third party vendors
Strong understanding of IP, TCP/IP, and other network administration protocols.
Job Description
Insight Global is seeking a Manager of Information Security for a finance/banking company in the Tampa area. This individual will establish an enterprise security stance through policy implementation, architecture, and training processes. Key responsibilities include selecting appropriate security solutions and overseeing vulnerability audits and assessments. An ideal candidate is an ambassador who will interface with peers in the Systems and Network departments, along with other leaders, to share the organization's security vision and solicit involvement in achieving higher levels of enterprise security.
Exact compensation may vary based on several factors, including skills, experience, and education.
Benefit packages for this role include: 401K, Medical, Dental, and Vision Benefits