Overview
On Site
USD 85,000.00 - 140,000.00 per year
Full Time
Skills
Inventory
Security Controls
Continuous Improvement
Corrective And Preventive Action
Supervision
Vulnerability Management
Evaluation
Project Management
Mentorship
Database
Stakeholder Engagement
HMIS
Layout
Training
NIST 800-53
Energy
Management
Asset Management
Educate
Collaboration
Cisco
CompTIA
Computer Engineering
Science
Telecommunications
Satellite
Computer Hardware
Allen-Bradley
Siemens
Penetration Testing
Operating Systems
Microsoft Windows
OS X
Linux
Unix
Web Servers
Network Security
Firewall
IDS
IPS
SIEM
Incident Management
Web Applications
NetFlow
Endpoint Protection
Change Management
DLP
Forensics
Computer Networking
System Administration
Packet Analysis
Scripting
Python
Bash
Windows PowerShell
Analytical Skill
Risk Assessment
Communication
Reporting
Computer Science
Information Systems
Information Security
Certified Ethical Hacker
Cisco Certifications
CISA
CISM
CISSP
ISACA
GCFA
GCIA
GCIH
GPEN
OSCP
SSCP
Cyber Security
Antivirus
Backup Administration
Network
Auditing
Network Design
Regulatory Compliance
NERC
Sarbanes-Oxley
Payment Card Industry
Reverse Engineering
Malware Analysis
MEAN Stack
Customer Service
Training And Development
SAP BASIS
Job Details
Software Guidance & Assistance, Inc., (SGA), is searching for a Cyber Security Analyst Progression for a direct placement assignment with one of our premier Utility services clients in Apollo Beach, FL.
POSITION CONCEPT:
Cyber Security Analyst - Level 1: The Cyber Security Analyst - Operational Technology (OT) is responsible for maintaining the security and integrity of operational technology systems through routine cybersecurity maintenance activities. Manages and continuously improves the asset inventory database to ensure accurate visibility and tracking of the operational technology. Supports the development and implementation of the organization's OT Cybersecurity program and framework, aligning activities with industry standards and regulatory requirements. Collaboration with cross-functional teams ensures consistent application of security controls and continuous improvement of cybersecurity posture.
Cyber Security Analyst Sr - Level 2: The Cyber Security Analyst Sr is responsible for addressing Operation Technology (OT) vulnerabilities by taking the appropriate corrective action or following the appropriate escalation procedures, assessing threat landscape, confirming for secure configuration of the firm's OT assets, identifying vulnerabilities applicable to the OT components and developing the remediation plans. Develop cybersecurity maintenance procedures and enforce OT cybersecurity framework and standards, evaluate IT related needs of OT environment and team members, and identify cybersecurity awareness gaps. Evaluate OT cyber assets and assign criticality rating to cyber assets and develop remediation plan for gaps in compliance of the systems with the OT cybersecurity program. Has increased responsibilities in security intelligence monitoring, incident response, and development of cybersecurity maintenance procedures. May serve as a project lead and mentor Cyber Security Analyst. Works under general supervision.
Cyber Security Analyst Lead - Level 3: The Cyber Security Analyst Lead is responsible for maintaining and improving OT cybersecurity framework and standards, reviewing cybersecurity maintenance procedures and threat landscape assessment, implementing vulnerability management technologies and vulnerability remediation plans. Lead will facilitate asset criticality evaluation process, maintain cybersecurity maintenance schedule, and train staff. Lead will maintain and improve the OT cybersecurity program, ensuring its alignment with the latest industry standards (NERC, NIST), build cross departmental ITOT collaboration, educate team members the latest cybersecurity industry trends. Has increased responsibilities in evaluating industry standards and adopting them into cybersecurity controls. May serve as a project lead and mentor to other department team members.
Responsibilities :
SGA is an Equal Opportunity Employer and does not discriminate on the basis of Race, Color, Sex, Sexual Orientation, Gender Identity, Religion, National Origin, Disability, Veteran Status, Age, Marital Status, Pregnancy, Genetic Information, or Other Legally Protected Status. We are committed to providing access, equal opportunity, and reasonable accommodation for individuals with disabilities in employment, and our services, programs, and activities. Please visit our company to request an accommodation or assistance regarding our policy.
POSITION CONCEPT:
Cyber Security Analyst - Level 1: The Cyber Security Analyst - Operational Technology (OT) is responsible for maintaining the security and integrity of operational technology systems through routine cybersecurity maintenance activities. Manages and continuously improves the asset inventory database to ensure accurate visibility and tracking of the operational technology. Supports the development and implementation of the organization's OT Cybersecurity program and framework, aligning activities with industry standards and regulatory requirements. Collaboration with cross-functional teams ensures consistent application of security controls and continuous improvement of cybersecurity posture.
Cyber Security Analyst Sr - Level 2: The Cyber Security Analyst Sr is responsible for addressing Operation Technology (OT) vulnerabilities by taking the appropriate corrective action or following the appropriate escalation procedures, assessing threat landscape, confirming for secure configuration of the firm's OT assets, identifying vulnerabilities applicable to the OT components and developing the remediation plans. Develop cybersecurity maintenance procedures and enforce OT cybersecurity framework and standards, evaluate IT related needs of OT environment and team members, and identify cybersecurity awareness gaps. Evaluate OT cyber assets and assign criticality rating to cyber assets and develop remediation plan for gaps in compliance of the systems with the OT cybersecurity program. Has increased responsibilities in security intelligence monitoring, incident response, and development of cybersecurity maintenance procedures. May serve as a project lead and mentor Cyber Security Analyst. Works under general supervision.
Cyber Security Analyst Lead - Level 3: The Cyber Security Analyst Lead is responsible for maintaining and improving OT cybersecurity framework and standards, reviewing cybersecurity maintenance procedures and threat landscape assessment, implementing vulnerability management technologies and vulnerability remediation plans. Lead will facilitate asset criticality evaluation process, maintain cybersecurity maintenance schedule, and train staff. Lead will maintain and improve the OT cybersecurity program, ensuring its alignment with the latest industry standards (NERC, NIST), build cross departmental ITOT collaboration, educate team members the latest cybersecurity industry trends. Has increased responsibilities in evaluating industry standards and adopting them into cybersecurity controls. May serve as a project lead and mentor to other department team members.
Responsibilities :
- Level 1:
- Identifies cybers assets, examines and extracts asset configuration, updates the OT cyber asset database to protect operational technology. Installs security patches, updates antivirus definitions, and creates system backups. Collects, maintains, updates baselines of the operational systems, updates cybersecurity SharePoint site for stakeholder engagement.
- Reviews the releases of new CVEs from external sources for applicability to operational assets regularly.
- Assists OT team l with IT-related work: software and hardware of HMIs and network appliances, remote connectivity.
- Level 2:
- Evaluates network architecture, system configuration, and external connection layout to ensure compliance of operational technology systems with cybersecurity program. Reviews vendor manuals, training materials, industry standards, and develops cybersecurity maintenance procedures.
- Provides activities planning guidance, feedback on work completed, and training to Cybersecurity Analysts.
- Evaluates new CVEs for applicability to OT cyber assets.
- Level 3:
- Translate all applicable standards (NERC CIP, NIST CSF, NIST 800-53, etc.) into appropriate systemic and procedural solutions. Review, revise, and update Energy Supply's operational technology cybersecurity standards and procedures.
- Evaluate the Energy Supply's operational technology systems and coordinate necessary actions to maintain compliance with applicable internal and regulatory standards.
- Develop management responses to internal and external government and regulatory audits and data requests with respective management and team members.
- Review operational technology cyber asset management process. Train and educate team members and facilitate ITOT collaboration.
- EDUCATION: Level 1, 2 and 3
- High School Diploma or equivalent.
- LISCENSES/CERTIFICATIONS: Level 1, 2 and 3
- From the list of certification vendors, one related Information Security professional certification or ability to obtain via self-study within one year of hire date (ex: CISCO, (ISC)2, GIAC, ISA, ISACA, CompTIA, e-Council, etc.).
- EXPERIENCE:
- Level 1:
- 5 years of related Cyber Security, industrial automation, IT, OT, or Technical (hands-on networking, telecommunications [radios, satellites, communications, etc.], hardware, software) experience.
- May consider 2 years related experience with an Associate's Degree or 1 year related experience with a Bachelor's Degree in Computer Engineering/Science, Cybersecurity, Information Systems, or other IT related discipline.
- Level 2:
- 6 years of related Cyber Security, industrial automation, IT, OT, or Technical (hands-on networking, telecommunications [radios, satellites, communications, etc.], hardware, software) experience.
- May consider 4 years related experience with an Associate's Degree or 3 year related experience with a Bachelor's Degree in Computer Science, Information Systems or other IT related discipline.
- Level 3:
- 8 years of related Cyber Security, industrial automation, IT, OT, or Technical (hands-on networking, telecommunications [radios, satellites, communications, etc.], hardware, software) experience.
- May consider 4 years related experience with an Associate's Degree or 2 years related experience with a Bachelor's Degree in Computer Science, Information Systems or other IT related discipline.
- Level 1:
- KNOWLEDGE/SKILLS/ABILITIES:
- Level 1:
- Basic knowledge of industrial automation (ABB, Allen Bradley, Emerson, GE, Siemens) or basic knowledge of major operating system security (Windows, Mac OS, Linux/Unix), endpoint, server, and network security.
- Basic knowledge of major security systems and functions for incident response, monitoring and forensic activities: Firewalls, IDS/IPS, AntivirAntimalware, SIEM, Incident Response, Threat Prevention, Web/Application Control Filtering, Email Filtering, NetFlow Analysis, Endpoint Security, Configuration and Change Management, File Integrity Monitoring, and DLP.
- Basic knowledge of log, network, and system forensic investigation techniques.
- Basic working knowledge of networking protocols and systems administration.
- Basic working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.
- Basic working knowledge with packet analysis and malware analysis.
- Basic working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.
- Good analytical and risk assessment skills and strong listening, written and computer communication skills for reporting and auditing purposes.
- Level 2:
- Advanced working knowledge of major operating system security (Windows, Mac OS, Linux/Unix), web server security, and network security.
- Advanced working knowledge of major security systems and functions for incident response, monitoring and forensic activities: Firewalls, IDS/IPS, AntivirAntimalware, SIEM, Incident Response, Threat Prevention, Web/Application Control Filtering, Email Filtering, NetFlow Analysis, Endpoint Security, Configuration and Change Management, File Integrity Monitoring, and DLP.
- Advanced working knowledge of log, network, and system forensic investigation techniques.
- Advanced working knowledge of networking protocols and systems administration.
- Advanced working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.
- Advanced working knowledge with packet analysis and malware analysis.
- Advanced working knowledge (hands-on experience) of scripting in languages such as Python, Bash or PowerShell.
- Advanced working knowledge of penetration testing technologies and procedures.
- Advanced working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.
- Strong analytical and risk assessment skills as well as strong listening, written and computer communication skills for reporting and auditing purposes.
- Level 3:
- Developing and implementing OT Cybersecurity program.
- Evaluating and adopting cybersecurity controls to the OT environment.
- Thorough working knowledge of major operating system security (Windows, Mac OS, Linux/Unix), , web server security, and network security.
- Thorough working knowledge of major security systems and functions: Firewalls, IDS/IPS, AntivirAntimalware, SIEM, Incident Response, Threat Prevention, Web/Application Control Filtering, Email Filtering, NetFlow Analysis, Endpoint Security, Configuration and Change Management, File Integrity Monitoring, and DLP.
- Expert working knowledge of log, network, and system forensic investigation techniques.
- Expert working knowledge of networking protocols and systems administration.
- Thorough working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.
- Expert working knowledge with packet analysis and malware analysis.
- Expert working knowledge (hands-on experience) of scripting in languages such as Python, Bash or PowerShell.
- Expert working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.
- Strong analytical and risk assessment skills as well as strong listening, written and computer communication skills for reporting and auditing purposes.
- Level 1:
- EDUCATION: Level 1, 2 and 3
- Bachelor's Degree in Computer Science, Information Systems, or other IT related discipline.
- LISCENSES/CERTIFICATIONS: Level 1, 2 and 3
- three or more of the following or similar Information Security professional certifications (ex: ACE, CCE, CAP, CEH, CCNA, CCNP, CISA, CISM, CISSP, CRISC, EnCE, GCCC, GCDA, GCED, GCFA, GCFE, GCIA, GCIH, GCWN, GICSP, GMON, GNFA, GPEN, GPPA, GREM, GWAPT, GXPN, OSCP, SSCP).
- KNOWLEDGE/SKILLS/ABILITIES:
- Level 1:
- Performing cybersecurity maintenance activities: applying patches, updating antivirus signatures, creating system backups. Configuring network appliances
- Troubleshooting network communications
- Supporting compliance audits
- Designing, implementing, and supporting industrial automation systems
- Designing and implementing a standard network architecture
- Level 3:
- Thorough working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.
- Expert working knowledge of reverse engineering malware.
- Level 1:
SGA is an Equal Opportunity Employer and does not discriminate on the basis of Race, Color, Sex, Sexual Orientation, Gender Identity, Religion, National Origin, Disability, Veteran Status, Age, Marital Status, Pregnancy, Genetic Information, or Other Legally Protected Status. We are committed to providing access, equal opportunity, and reasonable accommodation for individuals with disabilities in employment, and our services, programs, and activities. Please visit our company to request an accommodation or assistance regarding our policy.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.