Overview
On Site
$45 - $50 hourly
Contract - W2
Contract - Temp
Skills
Account Management
Web Applications
Vulnerability Scanning
Intrusion Detection
System Administration
Authentication
Auditing
Firewall
Encryption
Status Reports
Risk Analysis
Evaluation
Productivity
System Security
Incident Management
Research
IT Security
Endpoint Protection
Policies and Procedures
Network
Unix
Microsoft Windows NT
Information Technology
Microsoft Windows
Microsoft Operating Systems
Microsoft Windows Server
TCP
Internet
TCP/IP
Vulnerability Management
Information Security
Cyber Security
Configuration Management
Microsoft SCCM
Microsoft
Group Policy
Windows PowerShell
Operating Systems
Event Management
SEIM
Splunk
Information Systems
Computer Hardware
IT Architecture
Attention To Detail
Management
Regulatory Compliance
Security Controls
Artificial Intelligence
Messaging
Job Details
RESPONSIBILITIES:
Kforce has a client that is seeking an Endpoint Security Analyst in Tallahassee, FL.
Duties Include:
* Develops, evaluates and manages systems security across the enterprise; Areas of concentration include account management, password auditing, network based and Web application-based vulnerability scanning, virus management and intrusion detection
* Requires technical expertise in systems administration and security tools, combined with the knowledge of security practices and procedures
* Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines)
* Prepares status reports on security matters to develop security risk analysis scenarios and response procedures
* Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls; Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness; Provides direct support to the business and IT staff for systems security related issues
* Educates users on systems security standards and procedures
* Serve as a member of the Computer Security Incident Response Team; Duties includes researching incidents, identifying corrective actions, documenting status and coordinating responses to Computer Security Incidents
* Responsible for the tracking and monitoring of endpoint software viruses; Enforces endpoint security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security breaches, exceptions, updates, and maintains and documents security controls
REQUIREMENTS:
* Bachelor's degree in Computer Science, Information Systems, Business Administration, Information Security, or another related field; Or equivalent work experience
* Four years of experience in the work related to the position is required
* Must have broad technical knowledge of network operating systems (e.g., UNIX, NT)
The submitted candidate must be able to apply common knowledge, skills, and abilities in the following areas:
* Knowledge in the use of appropriate security controls to protect the confidentiality, integrity and availability of information technology resources
* Knowledge of, and experience with, various computing technologies such as, but not limited to: Windows, Windows Server, Transmission Control Protocol/Internet Protocol (TCP/IP)
* Knowledge of vulnerability management tools
* Knowledge in the use of information security practices and standards such as NIST, CIS Critical Security Controls and the Florida Cybersecurity Standards (74-2 Florida Administrative 60GG-2); Ability to review, assess and document compliance with standards
* Knowledge of Microsoft Systems Center Configuration Manager (SCCM) and other Microsoft support tools/technologies such as Group Policy and PowerShell
* Knowledge of the application of operating system security settings through direct manipulation of the registry
* Knowledge of Security Information and Event Management (SEIM) tools; Ability to utilize, configure and manage SPLUNK preferred but not required
* Skills in applying, analyzing and assessing information systems and security controls
* Skilled in the detection of software and hardware security problems
* Ability to analyze complex technical architecture for security issues
* Ability to be self-motivated, detail-oriented with excellent follow through
* Ability to assess and analyze risk and provide recommendations to successfully manage risk
* Ability to author documented analysis of systems to verify compliance with security controls
The pay range is the lowest to highest compensation we reasonably in good faith believe we would pay at posting for this role. We may ultimately pay more or less than this range. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs. This range may be modified in the future.
We offer comprehensive benefits including medical/dental/vision insurance, HSA, FSA, 401(k), and life, disability & ADD insurance to eligible employees. Salaried personnel receive paid time off. Hourly employees are not eligible for paid time off unless required by law. Hourly employees on a Service Contract Act project are eligible for paid sick leave.
Note: Pay is not considered compensation until it is earned, vested and determinable. The amount and availability of any compensation remains in Kforce's sole discretion unless and until paid and may be modified in its discretion consistent with the law.
This job is not eligible for bonuses, incentives or commissions.
Kforce is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
By clicking ?Apply Today? you agree to receive calls, AI-generated calls, text messages or emails from Kforce and its affiliates, and service providers. Note that if you choose to communicate with Kforce via text messaging the frequency may vary, and message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You will always have the right to cease communicating via text by using key words such as STOP.
Kforce has a client that is seeking an Endpoint Security Analyst in Tallahassee, FL.
Duties Include:
* Develops, evaluates and manages systems security across the enterprise; Areas of concentration include account management, password auditing, network based and Web application-based vulnerability scanning, virus management and intrusion detection
* Requires technical expertise in systems administration and security tools, combined with the knowledge of security practices and procedures
* Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines)
* Prepares status reports on security matters to develop security risk analysis scenarios and response procedures
* Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls; Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness; Provides direct support to the business and IT staff for systems security related issues
* Educates users on systems security standards and procedures
* Serve as a member of the Computer Security Incident Response Team; Duties includes researching incidents, identifying corrective actions, documenting status and coordinating responses to Computer Security Incidents
* Responsible for the tracking and monitoring of endpoint software viruses; Enforces endpoint security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security breaches, exceptions, updates, and maintains and documents security controls
REQUIREMENTS:
* Bachelor's degree in Computer Science, Information Systems, Business Administration, Information Security, or another related field; Or equivalent work experience
* Four years of experience in the work related to the position is required
* Must have broad technical knowledge of network operating systems (e.g., UNIX, NT)
The submitted candidate must be able to apply common knowledge, skills, and abilities in the following areas:
* Knowledge in the use of appropriate security controls to protect the confidentiality, integrity and availability of information technology resources
* Knowledge of, and experience with, various computing technologies such as, but not limited to: Windows, Windows Server, Transmission Control Protocol/Internet Protocol (TCP/IP)
* Knowledge of vulnerability management tools
* Knowledge in the use of information security practices and standards such as NIST, CIS Critical Security Controls and the Florida Cybersecurity Standards (74-2 Florida Administrative 60GG-2); Ability to review, assess and document compliance with standards
* Knowledge of Microsoft Systems Center Configuration Manager (SCCM) and other Microsoft support tools/technologies such as Group Policy and PowerShell
* Knowledge of the application of operating system security settings through direct manipulation of the registry
* Knowledge of Security Information and Event Management (SEIM) tools; Ability to utilize, configure and manage SPLUNK preferred but not required
* Skills in applying, analyzing and assessing information systems and security controls
* Skilled in the detection of software and hardware security problems
* Ability to analyze complex technical architecture for security issues
* Ability to be self-motivated, detail-oriented with excellent follow through
* Ability to assess and analyze risk and provide recommendations to successfully manage risk
* Ability to author documented analysis of systems to verify compliance with security controls
The pay range is the lowest to highest compensation we reasonably in good faith believe we would pay at posting for this role. We may ultimately pay more or less than this range. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs. This range may be modified in the future.
We offer comprehensive benefits including medical/dental/vision insurance, HSA, FSA, 401(k), and life, disability & ADD insurance to eligible employees. Salaried personnel receive paid time off. Hourly employees are not eligible for paid time off unless required by law. Hourly employees on a Service Contract Act project are eligible for paid sick leave.
Note: Pay is not considered compensation until it is earned, vested and determinable. The amount and availability of any compensation remains in Kforce's sole discretion unless and until paid and may be modified in its discretion consistent with the law.
This job is not eligible for bonuses, incentives or commissions.
Kforce is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
By clicking ?Apply Today? you agree to receive calls, AI-generated calls, text messages or emails from Kforce and its affiliates, and service providers. Note that if you choose to communicate with Kforce via text messaging the frequency may vary, and message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You will always have the right to cease communicating via text by using key words such as STOP.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.