Endpoint Security Analyst Position Available In Leon, Florida

Tallo's Job Summary: The Endpoint Security Analyst position at ARK Solutions Inc. in Tallahassee, FL involves developing, evaluating, and managing systems security, with a focus on account management, vulnerability scanning, virus management, and intrusion detection. The job requires technical expertise in systems administration, security tools, and knowledge of security practices. The role also includes enforcing security policies, preparing security risk analysis scenarios, and providing support to business and IT staff. The job entails serving as a member of the Computer Security Incident Response Team, tracking and monitoring endpoint software viruses, enforcing endpoint security policies, and working with the Patch Management and Configuration Team. The position requires knowledge of security controls, computing technologies, vulnerability management tools, and information security practices and standards. Candidates must have four years of related experience, a Bachelor's Degree in a relevant field, and expertise in SIEM, SCCM, vulnerability management, Florida Administrative Code "60GG", and incident response. The job is on a contract basis with a pay range of $55.00 - $60.00 per hour, and requires working in person in Tallahassee, FL.

Company:
ARK Solutions
Salary:
$119600
JobFull-timeOnsite

Job Description

Endpoint Security Analyst ARK Solutions Inc. Tallahassee, FL 32301

Position:
Endpoint Security Analyst Location:

Tallahassee, FL (Onsite)

Job Type:
Contract About The Role:

Develops, evaluates and manages systems security across the enterprise. Areas of concentration include account management, password auditing, network based and Web application-based vulnerability scanning, virus management and intrusion detection. Requires technical expertise in systems administration and security tools, combined with the knowledge of security practices and procedures. Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines). Prepares status reports on security matters to develop security risk analysis scenarios and response procedures. Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls. Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness. Provides direct support to the business and IT staff for systems security related issues. Educates users on systems security standards and procedures. Must have broad technical knowledge of network operating systems (e.g., UNIX, NT).

Primary Job Duties/ Tasks:

Serve as a member of the Computer Security Incident Response Team. Duties includes researching incidents, identifying corrective actions, documenting status and coordinating responses to Computer Security Incidents. Responsible for the tracking and monitoring of endpoint software viruses. Enforces endpoint security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security breaches, exceptions, updates, and maintains and documents security controls. Work in conjunction with the Department’s Patch Management and Configuration Team in identifying secure configurations for standard products. Provide support/information as needed for implementation of secure baselines through package roll out and/or group policy. After implementation of secure baselines, use tools to review and ensure compliance with established baselines. Responsible for the administration and maintenance of endpoint vulnerability products, endpoint vulnerability risk reporting, and routine endpoint vulnerability scanning. Job Specific Knowledge, Skills, and Abilities (KSAs): Knowledge in the use of appropriate security controls to protect the confidentiality, integrity and availability of information technology resources. Knowledge of, and experience with, various computing technologies such as, but not limited to: Windows, Windows Server, Transmission Control Protocol/Internet Protocol (TCP/IP) Knowledge of vulnerability management tools. Knowledge in the use of information security practices and standards such as

NIST, CIS

Critical Security Controls and the Florida Cybersecurity Standards (74-2 Florida Administrative 60GG-2). Ability to review, assess and document compliance with standards. Knowledge of Microsoft Systems Center Configuration Manager (SCCM) and other Microsoft support tools/technologies such as Group Policy and PowerShell. Knowledge of the application of operating system security settings through direct manipulation of the registry. Knowledge of Security Information and Event Management (SEIM) tools. Ability to utilize, configure and manage SPLUNK preferred but not required. Skills in applying, analyzing and assessing information systems and security controls. Skilled in the detection of software and hardware security problems. Ability to analyze complex technical architecture for security issues. Ability to be self-motivated, detail-oriented with excellent follow through. Ability to assess and analyze risk and provide recommendations to successfully manage risk. Ability to author documented analysis of systems to verify compliance with security controls. Ability to effectively communicate orally and in writing to a variety of audiences. This includes the ability to communicate professionally with management, to communicate technical issues and concepts to non-technical staff, and to effectively explain security concepts and their benefit. Ability to solve problems independently and with teams and exhibit sound judgement and decision-making skills. Knowledge of Malwarebytes, Windows Defender, and other vulnerability scanning tools.

Experience:

Four years of experience in the work related to the position is required.

Education:

Bachelor’s Degree in Computer Science, Information Systems, Business Administration, Information Security, or another related field; or equivalent work experience.

Job Type:
Contract Pay:

$55.00 – $60.00 per hour

Schedule:

8 hour shift

Experience:
SIEM:

4 years (Required)

SCCM:

4 years (Required) Vulnerability management: 5 years (Required) Florida Administrative Code “60GG”: 1 year (Required) Incident response: 5 years (Required)

Location:

Tallahassee, FL 32301 (Required)

Work Location:

In person

Other jobs in Leon

Other jobs in Florida

Start charting your path today.

Connect with real educational and career-related opportunities.

Get Started