Hello,
Hope you are doing well,
Position: Security Analyst Advanced
Location: Tallahassee, FL
Duration: Long term
Client: State of Florida
Job Description:
CONTRACTOR QUALIFICATIONS AND EXPERIENCE
1. A minimum of 4 years working as a security analyst in an environment utilizing a Managed Security Services Provider (MSSP), preferably Secureworks.
2. A minimum of 4 years coordinating and conducting event collection, log management and event management using Security Information & Event Management (SIEM) or other log management systems.
3. A minimum of 4 years with identity monitoring activities using SIEM or other log management systems.
4. A minimum of 4 years with research and analysis of log sources utilized for security monitoring.
5. A minimum of 4 years configuring and monitoring IDS/IPS, log collectors, firewalls, load balancers, web gateways, and other network traffic physical and virtual appliances.
6. A minimum of 4 years with endpoint deployment solutions to enable installation of security products and telemetry gathering on computer workstations and servers of varying operating systems and versions. Examples include SCCM, Altiris, KACE, Ivanti, etc.
7. A minimum of 4 years in Microsoft Active Directory on-premises and Azure (hybrid) administration, including practices of account provisioning, enable/disable/reset, and management of Organizational Units and Groups.
DELIVERABLES
Contractor will complete and submit the following deliverables to the Department in the time and manner specified:
Annually: Security Analyst Advanced Services in the time and manner specified in Tasks 6.1.1-6.1.10.
SERVICE TASKS: Contractor will perform the following tasks in the time and manner specified:
6.1 Act as primary liaison for daily operations between the Department and the Department's Managed Security Services Provider, Secureworks, as assigned by the Department.
6.2 Review current FDOH information security policies and processes to assist management with developing project goals, as assigned by the Department.
6.3 Perform computer incident response within the scope and capabilities of the MSSP; assist with computer incident response originating from sources outside the scope of the MSSP, as assigned by the Department.
6.4 Perform advanced level analysis of security events and incidents reported by the MSSP and other monitoring platforms, as assigned by the Department.
6.5 Assist the MSSP and Security Administration Team with identification and integration of all Department information security related logs, as assigned by the Department.
6.6 Assist the MSSP and Security Administration Team in deploying and health monitoring of MSSP specific endpoint agents across multiple physical and virtual IT platforms, as assigned by the Department.
6.7 Assist the Security Administration Team in deploying and health monitoring of non-MSSP specific endpoint agents across multiple physical and virtual IT platforms, as assigned by the Department.
6.8 Assist the MSSP and Security Administration Team in maintaining the health of MSSP specific log collection and IDS/IPS physical and virtual appliances, as assigned by the Department.
6.9 Assist with continuous integration of all relevant Department data sources and systems, existing or new, into the MSSP and other SIEM and SOAR solutions, as assigned by the Department.
6.10 Provide Department management with status reports on project goals, as assigned by the Department.
Thanks & Regards.
An E-Verify Company
DISCLAIMER: The information transmitted is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material. Any review, re-transmission, dissemination or other use of, or taking of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited. If you received this in error, please contact the sender and delete the material from any computer or if you want to be REMOVED please reply with REMOVE in the Subject line of this email.
Confidentiality Notice:
This communication is transmitted by My3Tech and may contain confidential, proprietary, privileged, or legally protected information, including Protected Health Information (PHI), where applicable, and is intended solely for the use of the individual or entity to whom it is addressed. If you are not the intended recipient, any review, disclosure, copying, distribution, or use of this communication is strictly prohibited. If you have received this communication in error, please notify the sender immediately and delete or destroy all copies of the material received.