Security Analyst with CJIS certification

Tallahassee, FL, US • Posted 1 day ago • Updated 15 hours ago
Contract W2
On-site
Depends on Experience
Fitment

Dice Job Match Score™

👾 Reticulating splines...

Job Details

Skills

  • Security Analyst
  • Cyber Security Engineer
  • Security Engineer
  • Analytical Skill
  • CISSP
  • Change Management
  • Cisco Certifications
  • Cloud Computing
  • Cloud Security
  • Communication
  • Computer Hardware
  • Computer Science
  • Critical Thinking
  • Cyber Security
  • Decision-making
  • Documentation
  • FOCUS
  • IT Security
  • Identity Management
  • Incident Management
  • Risk Analysis
  • SAP BASIS
  • SIEM
  • SSCP
  • SaaS
  • Security Policy
  • Policies and Procedures
  • Recovery
  • Regulatory Compliance
  • Reporting
  • Security+
  • Microsoft Office
  • NIST SP 800 Series
  • Network+
  • Penetration Testing
  • Python
  • Information Security
  • Information Technology
  • Knowledge Transfer
  • Management
  • Microsoft
  • Technical Training
  • Windows PowerShell

Summary

Education

1. Bachelor s degree or higher in Computer Science, Information Security, or a related field.

Relevant certifications :

Security+, CySA+, Network+, SSCP, CISSP, CCSP, SecurityX/CASP+, or PenTest+

Requirements.

1. Four or more years of combined IT and security work experience within a cybersecurity related discipline.

2. Three or more years of experience working with KQL, Python, PowerShell, or batch.

3. Two or more years of experience with cloud computing and cloud computing security.

4. Requires knowledge of security issues, techniques, and implications across all existing computer platforms.

5. Demonstrate fundamental understanding of regulatory frameworks and standards such as NIST 800-53r5, CJIS Security Policy, and 60GG-2.

6. Strong communication and documentation skills.

7. Apply strong analytical and critical thinking skills to drive effective decision-making during security events.

8. Demonstrates efficient stress management and remains composed during high pressure security incidents.

9. Must have a good understanding of MITRE framework including TTPs.

10. Must be CJIS certified or can become CJIS certified.

Nice to have: Local candidate & Candidates with prior state experience:

Scope of work

The selected applicant will be expected to perform some combination of the following tasks:

1. Monitor security platforms including SIEM, EDR, and cloud-native security tools for indicators of compromise, indicators of attack, and incident response requirements.

2. Utilize Microsoft Defender XDR components (Endpoint, Cloud Apps, Identity, Office 365) extensively for monitoring, analysis, and response.

3. Identify, triage, and investigate phishing incidents including those submitted manually by end-users.

4. Perform Identity and Access Management activities with a focus on identifying and managing risky users, risky sign-ins, and sign-in event correlation.

5. Conduct in-depth investigations of security alerts, perform triage, and escalate or resolve incidents according to established procedures.

6. Produce thorough documentation including after-action reports and lessons learned, aligned with incident severity and organizational standards.

7. Adhere to strict threat-escalation policies based on incident classification, threat type, and statutory requirements.

8. Support the full incident response lifecycle: detection, containment, eradication, recovery, and post-incident reporting.

9. Maintain, tune, and optimize security detection rules, alerts, and automations to reduce false positives and improve detection accuracy (with proper approvals).

10. Follow established change-management processes for all configuration or detection-control modifications.

11. Stay informed on emerging threats, evolving attack techniques, and advancements in security technologies.

12. Assist with development and implementation of security policies and procedures.

13. Prepare security documentation.

14. Develop risk analysis and security reporting.

15. Monitor and remediate software or hardware vulnerabilities.

16. Evaluate current and future security tools and systems.

17. Document hours worked by task(s).

18. Follow FWC IT processes and coordinate with other FWC IT staff to ensure compliance with FWC standards.

19. Complies with and enforces all agency policies, procedures, and security policies.

20. Provide Technical Training (Knowledge Transfer), as required for Office of Information Technology Support Staff as

related to Information Technology security.

21. Work location will be a combination of onsite at FWC offices in Tallahassee, Florida and remote work based on

situation, to be defined on a project basis.

22. The deliverables and performance standards associated with each task identified in this scope of work are further defined in Standards and Specifications table below.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 91097274
  • Position Id: 8943478
  • Posted 1 day ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Tallahassee, Florida

Today

Easy Apply

Third Party, Contract

Tallahassee, Florida

Today

Easy Apply

Third Party, Contract

Depends on Experience

Hybrid in Tallahassee, Florida

8d ago

Easy Apply

Contract

Depends on Experience

Hybrid in Tallahassee, Florida

10d ago

Easy Apply

Contract

$0 - $0

Search all similar jobs