Information Security Analyst - KUA
General Definition of Work-
Performs technical and analytical work in support of the organization’s cyber and physical security programs. Assists in defending the enterprise network by monitoring alerts, conducting vulnerability assessments, responding to security incidents, and participates on a red/blue team. Performs threat analysis, security logging review, alert triage, and remediation assignments. Documents vulnerabilities, prepares security reports, and escalates issues as needed. Supports administration of security tools, identity management, and cybersecurity governance practices.
Provides technical support for physical security systems including video surveillance, access control, and security event retrievals. Assists with the management of data access permissions and records security in accordance with State of Florida retention standards. Work is performed under the general supervision of the Information Security Manager. Does related work as required.
- Typical Tasks
-
- Manages a SIEM environment and proactively monitors networks for security breaches, analyzing logs and alerts for potential threats to Windows, Linux, cloud services, and enterprise applications.
- Reviews and tracks threat intelligence bulletins, and vulnerability reports; documents findings and performs initial triage, recommends mitigation strategy where applicable.
- Supports vulnerability scans and penetration testing activities led by the Information Security Manager; prepares data, gathers artifacts, and documents results.
- Assists in coordinating cybersecurity incident response, including evidence collection, case documentation, and communication of status updates.
- Assists in development and implementation of security standards, procedures, and best practices for the organization using the NIST framework.
- Analyzes user access, privilege changes, and security permissions in Active Directory, enterprise applications,
- Serves as the backup administrator for Microsoft SharePoint.
- Monitors and configures security whitelisting and application control changes.
- Assists with management, configuration, and troubleshooting of physical security systems, including video surveillance and access control systems.
- Troubleshoots administration and permission issues for data enterprise, corporate intranet and secured drive structures.
- Knowledge, Skills, and Abilities
-
- Working knowledge of cybersecurity defensive and offensive principles, red/blue team methodologies, and vulnerability management.
- Working knowledge of Kali Linux tools, vulnerability and penetration testing, Windows Server, and common enterprise environments.
- Strong understanding of securing multiple systems, including Windows, Linux, cloud storage, web applications, MS SQL, and enterprise software platforms.
- Familiarity with video surveillance systems, key card controllers, magnetic locking mechanisms, and security event retrieval processes.
- Knowledge of Active Directory administration, creating and deploying group policy, identity management, and access control practices.
- Proficiency with security systems such as firewalls, intrusion detection systems, and SIEM products
- Knowledge of State of Florida records retention schedules and requirements for proper handling of public records.
- Ability to understand and carry out written and oral instructions. Ability to effectively communicate both orally and in writing, including documentation of technical cybersecurity and network terminology.
- Ability to work with confidential information, personnel investigations, and sensitive cybersecurity matters.
- Ability to lift or displace up to 20 pounds.
- Ability to establish and maintain effective working relationships with fellow workers and the public.
- Education and Experience
-
- Graduation from an accredited college or university with a bachelor’s degree in cybersecurity, information technology, computer science, or a related field.
- Five (5) years of experience in any combination of information security, cybersecurity, network engineering or network administration is required.
- Minimum of five years of experience working in an Active Directory environment required.
- A current cybersecurity certification such as EC-Council Certified Ethical Hacker, CompTIA PenTest+, CompTIA CySA+, GSEC, or equivalent required.
- Demonstratable experience conducting vulnerability scanning, penetration testing, and log analysis.
To view the complete description and to apply, visit here.
Enter your email address in the