You haven't searched anything yet.
INTERNAL/EXTERNAL JOB POSTING
IT Security Analyst
Department: | Information Technology | ||
Reports to: | Information Technology Security Supervisor | ||
Location: | 330 South US HWY 301 Sumterville, FL 33585 | ||
Pay Rate: | Based on qualifications and experience | Classification: | Non-Represented –Exempt |
Posting Date(s): | Friday, August 5th, 2022* | # of Vacancies: | 1 |
*This posting will be closed and no longer available to receive applications upon SECO Energy’s discretion.
^SECO Energy is a not-for-profit electric distribution cooperative serving over 200,000 families and businesses across seven counties in
Central Florida, making SECO Energy the third largest electric co-op in Florida and the sixth largest in the nation.
^SECO Energy is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment
without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
^Qualified employees will be considered on an equal basis with external applicants.
General Purpose of Job
Thispositionisresponsibleforimplementingandsupportingsecurityofelectronicdataandcomplianceby institutingmeasurestosafeguardcooperativeinformationonnetworks;maintainsecuritybaselinesfor existingandnewtechnology.Implementandauditcybersecuritypoliciesandstandardsthatprotectthe electronicsecuritypostureofthecooperative.
Minimum Required Qualifications and Competencies
The following includes the minimum job requirements and essential duties for this position. Reasonable accommodations may be made to enable qualified individuals with disabilities to perform the essential functions. Some job requirements may exclude individuals that cannot be reasonably accommodated or who pose a direct threat or significant risk to the health and safety of themselves or other employees.
Education
Minimum | 4 Year / Bachelors Degree | Major: | computer science or closely related field |
Minimum | Earned at least one IT Security certification (e.g. Security , GCIA, GCIH, CISSP, CEH, etc.) | ||
Preferred | Comp TIA CASP certification | ||
Experience
Minimum | Three (3) years of professional work experience in Information Security. |
Minimum | Experience in System or Network Administration (Windows, Linux, Cisco, etc.). |
Preferred | Network Security Analyst experience. |
Education and/or Experience Notes
Four (4) years ofjob-related experience may be substituted for education. |
Other Requirements:
Knowledge, Skills and Abilities
•Ability to keep confidential information confidential; ability to multi-task and effectively manage stress and pressure through changing priorities; ability to remain calm in high stress situations.
•Effective communication skills including written, verbal and listening for interaction with employees, management, vendors, consultants, and others. Ability to analyze and interpret job related business periodicals and technical manuals; prepare reports, business correspondence procedures and training manuals; prepare and conduct presentations to employees, management and others.
•Excellent customer service orientation skills: ability to use tact and judgment for interaction with employees, managers, vendors, consultants, and others; ability to work independently and productively and results oriented in order to complete assignments and meet deadlines.
•Knowledge and understanding of Federal, State and local regulatory rules pertaining to security of electronic data; backup and disaster recovery systems; applicable data privacy practices and laws; and knowledge of risk mitigation best practices; developing metrics for electronic security initiatives to demonstrate effectiveness of security initiatives.
•Prioritization and project management skills; analytical and process management skills; demonstrated change management aptitude and ability.
•Proficiency in configuration tools that include: SIEM, MDM, syslog, and patching.
•Proficiency in security tools that include Port scanners, web scanners, vulnerability scanners, exploitation kits, network flow, IDS signatures, password crackers, OSINT, phishing techniques, sniffers, and PowerShell.
•Proficiency in the following areas to include, but not limited to:
•Proficiency in the operation of personal computers; computer networking, internet/web security; disaster recovery, MS Exchange; virtualization, active directory/group policy and computer software applications including MS Office products, customer information systems, etc.
Verification:The above qualifications and competencies for this position may be verified through a combination of education, experience, interview questions and technical skills exercise(s).
Essential Duties and responsibilities
This description is intended to indicate the kinds of tasks and levels of work difficulty required of the position given this title and shall not be construed as declaring what the specific duties and responsibilities of any particular position shall be. It is not intended to limit or in any way modify the right of management to assign, direct and control the work of employees under supervision. The listing of essential duties and responsibilities shall not be held to exclude other duties that may be assigned based on the needs of the Cooperative.
•Monitor Cooperative networks and devices for security vulnerabilities, address security incidents identified via SIEM, Firewall, IPS, IDS, Antivirus, MSM, Web filter, and other security appliances and participate in Information Security help desk activities by addressing and responding to Information Security and Cyber Security alerts, and requests and participates in incident response activities and contribute as needed on endpoint protection (AV, vulnerability scanning, patch management disk encryption, and MDM systems), and network protection (firewall, VPN, IDS/IPS)
•Implement and maintain security policies, procedures for electronic security, maintain cooperative training program on electronic security and be able to train employees annually and conduct incident response table top exercises
•Conduct research on network security products, services, protocols, and standards in support of network procurement and development efforts, participate in planning and managing expenditures for network security hardware and software procurement and interact with vendors and contractors to secure network security products and services, as directed.
•Maintain metrics for security initiatives for incremental reporting to management and board of trustees.
•Perform penetration testing and vulnerability assessments on corporate networks and work stakeholders, data center, network, application programming and IT support team to ensure all SECO Energy system vulnerabilities are mitigated are compliant with applicable policies and regulatory requirements.
•Audit technical controls and mitigate risks to the cooperative including security permissions on electronic systems and reporting policy violations and change recommendations to manager of Information Technology.
Physical Demands and Work Environment
The physical demands and work environment described here are representative of those that must be met by or those an employee encounters to successfully perform the essential functions of this position. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Some requirements may exclude individuals that cannot be reasonably accommodated or who pose a direct threat or significant risk to the health and safety of themselves or other employees.
While performing the duties of this job, the employee is regularly required to sit and talk or hear. The employee is occasionally required to walk; stand; use hands to finger, handle, or feel; reach with hands and arms; climb and work from ladders or balance; stoop, kneel, crouch, or crawl. The employee must regularly lift and/or move up to 10 pounds and occasionally life and/or move up to 25 pounds. Specific vision abilities required by this job include close vision, distance vision, color vision, and the ability to adjust focus.
This position has general office environment with some business travel. The noise level in the work environment is usually quiet to moderate.
Page 1 of 4
Full Time
Utilities
08/07/2022
10/21/2022
secoenergy.com
SUMTERVILLE, FL
200 - 500
1938
Private
RAY F VICK
$200M - $500M
Utilities
The following is the career advancement route for IT Security Analyst positions, which can be used as a reference in future career path planning. As an IT Security Analyst, it can be promoted into senior positions as a Systems/Application Security Analyst that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary IT Security Analyst. You can explore the career advancement for an IT Security Analyst below and select your interested title to get hiring information.
If you are interested in becoming an IT Security Analyst, you need to understand the job requirements and the detailed related responsibilities. Of course, a good educational background and an applicable major will also help in job hunting. Below are some tips on how to become an IT Security Analyst for your reference.
Step 1: Understand the job description and responsibilities of an Accountant.
Quotes from people on IT Security Analyst job description and responsibilities
They will then help to make the necessary changes for a more secure network and may also create training programs and modules to educate employees and users on proper security protocols.
02/23/2022: Bellingham, WA
Security analysts monitor, prevent, and stop attacks on private data.
03/24/2022: Scranton, PA
Security analysts may also prepare for and respond to system breaches or attacks.
01/31/2022: Duluth, MN
They document tests, security and emergency policies, and procedures.
04/15/2022: Virginia Beach, VA
IT security analysts protect computer networks from cyberattacks and unauthorized access.
01/30/2022: Macon, GA
Step 2: Knowing the best tips for becoming an Accountant can help you explore the needs of the position and prepare for the job-related knowledge well ahead of time.
Career tips from people on IT Security Analyst jobs
The most successful analysts are detail-oriented and have an analytical mindset.
02/20/2022: New London, CT
Security analysts must demonstrate adaptability and the ability to grow with their field.
04/15/2022: Waterloo, IA
Typically, most security analysts hold a bachelor's degree at minimum.
02/01/2022: Juneau, AK
Ethical hacking certifications help prepare analysts to understand threats and protect systems.
02/02/2022: Spokane, WA
Faced with a dynamic threat landscape and continuously emerging technologies, both on the defensive and offensive sides, security analysts need to be naturally curious and always willing to learn more.
03/06/2022: Rock Hill, SC
Step 3: View the best colleges and universities for IT Security Analyst.