Recent Searches

You haven't searched anything yet.

1 IT Security Analyst Job in Sumterville, FL

SET JOB ALERT
Details...
SECO Energy
Sumterville, FL | Full Time
7 Months Ago
IT Security Analyst
SECO Energy Sumterville, FL
Full Time | Utilities 7 Months Ago
Save

sadSorry! This job is no longer available. Please explore similar jobs listed on the left.

SECO Energy is Hiring an IT Security Analyst Near Sumterville, FL

INTERNAL/EXTERNAL JOB POSTING

IT Security Analyst

Department:

Information Technology

Reports to:

Information Technology Security Supervisor

Location:

330 South US HWY 301 Sumterville, FL 33585

Pay Rate:

Based on qualifications and experience

Classification:

Non-Represented Exempt

Posting Date(s):

Friday, August 5th, 2022*

# of Vacancies:

1

*This posting will be closed and no longer available to receive applications upon SECO Energy’s discretion.

^SECO Energy is a not-for-profit electric distribution cooperative serving over 200,000 families and businesses across seven counties in

Central Florida, making SECO Energy the third largest electric co-op in Florida and the sixth largest in the nation.

^SECO Energy is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment

without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

^Qualified employees will be considered on an equal basis with external applicants.

General Purpose of Job

Thispositionisresponsibleforimplementingandsupportingsecurityofelectronicdataandcomplianceby institutingmeasurestosafeguardcooperativeinformationonnetworks;maintainsecuritybaselinesfor existingandnewtechnology.Implementandauditcybersecuritypoliciesandstandardsthatprotectthe electronicsecuritypostureofthecooperative.

Minimum Required Qualifications and Competencies

The following includes the minimum job requirements and essential duties for this position. Reasonable accommodations may be made to enable qualified individuals with disabilities to perform the essential functions. Some job requirements may exclude individuals that cannot be reasonably accommodated or who pose a direct threat or significant risk to the health and safety of themselves or other employees.

Education

Minimum

4 Year / Bachelors Degree

Major:

computer science or closely related field

Minimum

Earned at least one IT Security certification (e.g. Security , GCIA, GCIH, CISSP, CEH, etc.)

Preferred

Comp TIA CASP certification

Experience

Minimum

Three (3) years of professional work experience in Information Security.

Minimum

Experience in System or Network Administration (Windows, Linux, Cisco, etc.).

Preferred

Network Security Analyst experience.

Education and/or Experience Notes

Four (4) years ofjob-related experience may be substituted for education.

Other Requirements:

  • Ability to operate a variety of office equipment, including a personal computer, printers, copy machines, telephone, and fax machine.
  • Ability to work irregular hours for assignment completion and flexibility to change scheduling and report to work on short notice during emergency situations.
  • Normal work hours shall be eight (8) hours between 7:00 am and 5:00 pm, Monday through Friday.
  • Occasionalbusinesstravelmayberequired.
  • Successful completion of pre-employment background check, physical and drug screen.

Knowledge, Skills and Abilities

Ability to keep confidential information confidential; ability to multi-task and effectively manage stress and pressure through changing priorities; ability to remain calm in high stress situations.

Effective communication skills including written, verbal and listening for interaction with employees, management, vendors, consultants, and others. Ability to analyze and interpret job related business periodicals and technical manuals; prepare reports, business correspondence procedures and training manuals; prepare and conduct presentations to employees, management and others.

Excellent customer service orientation skills: ability to use tact and judgment for interaction with employees, managers, vendors, consultants, and others; ability to work independently and productively and results oriented in order to complete assignments and meet deadlines.

Knowledge and understanding of Federal, State and local regulatory rules pertaining to security of electronic data; backup and disaster recovery systems; applicable data privacy practices and laws; and knowledge of risk mitigation best practices; developing metrics for electronic security initiatives to demonstrate effectiveness of security initiatives.

Prioritization and project management skills; analytical and process management skills; demonstrated change management aptitude and ability.

Proficiency in configuration tools that include: SIEM, MDM, syslog, and patching.

Proficiency in security tools that include Port scanners, web scanners, vulnerability scanners, exploitation kits, network flow, IDS signatures, password crackers, OSINT, phishing techniques, sniffers, and PowerShell.

Proficiency in the following areas to include, but not limited to:

  • Implementing, testing, and reviewing information security protocols, policies and procedures.
  • Network penetration testing and vulnerability assessments.
  • Training cooperative network users in electronic security measures.

Proficiency in the operation of personal computers; computer networking, internet/web security; disaster recovery, MS Exchange; virtualization, active directory/group policy and computer software applications including MS Office products, customer information systems, etc.

Verification:The above qualifications and competencies for this position may be verified through a combination of education, experience, interview questions and technical skills exercise(s).

Essential Duties and responsibilities

This description is intended to indicate the kinds of tasks and levels of work difficulty required of the position given this title and shall not be construed as declaring what the specific duties and responsibilities of any particular position shall be. It is not intended to limit or in any way modify the right of management to assign, direct and control the work of employees under supervision. The listing of essential duties and responsibilities shall not be held to exclude other duties that may be assigned based on the needs of the Cooperative.

Monitor Cooperative networks and devices for security vulnerabilities, address security incidents identified via SIEM, Firewall, IPS, IDS, Antivirus, MSM, Web filter, and other security appliances and participate in Information Security help desk activities by addressing and responding to Information Security and Cyber Security alerts, and requests and participates in incident response activities and contribute as needed on endpoint protection (AV, vulnerability scanning, patch management disk encryption, and MDM systems), and network protection (firewall, VPN, IDS/IPS)

Implement and maintain security policies, procedures for electronic security, maintain cooperative training program on electronic security and be able to train employees annually and conduct incident response table top exercises

Conduct research on network security products, services, protocols, and standards in support of network procurement and development efforts, participate in planning and managing expenditures for network security hardware and software procurement and interact with vendors and contractors to secure network security products and services, as directed.

Maintain metrics for security initiatives for incremental reporting to management and board of trustees.

Perform penetration testing and vulnerability assessments on corporate networks and work stakeholders, data center, network, application programming and IT support team to ensure all SECO Energy system vulnerabilities are mitigated are compliant with applicable policies and regulatory requirements.

Audit technical controls and mitigate risks to the cooperative including security permissions on electronic systems and reporting policy violations and change recommendations to manager of Information Technology.

Physical Demands and Work Environment

The physical demands and work environment described here are representative of those that must be met by or those an employee encounters to successfully perform the essential functions of this position. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Some requirements may exclude individuals that cannot be reasonably accommodated or who pose a direct threat or significant risk to the health and safety of themselves or other employees.

While performing the duties of this job, the employee is regularly required to sit and talk or hear. The employee is occasionally required to walk; stand; use hands to finger, handle, or feel; reach with hands and arms; climb and work from ladders or balance; stoop, kneel, crouch, or crawl. The employee must regularly lift and/or move up to 10 pounds and occasionally life and/or move up to 25 pounds. Specific vision abilities required by this job include close vision, distance vision, color vision, and the ability to adjust focus.

This position has general office environment with some business travel. The noise level in the work environment is usually quiet to moderate.

Page 1 of 4

Job Summary

JOB TYPE

Full Time

INDUSTRY

Utilities

POST DATE

08/07/2022

EXPIRATION DATE

10/21/2022

WEBSITE

secoenergy.com

HEADQUARTERS

SUMTERVILLE, FL

SIZE

200 - 500

FOUNDED

1938

TYPE

Private

CEO

RAY F VICK

REVENUE

$200M - $500M

INDUSTRY

Utilities

Show more

SECO Energy
Full Time
$58k-72k (estimate)
3 Weeks Ago
SECO Energy
Full Time
$50k-64k (estimate)
2 Months Ago
SECO Energy
Full Time
$45k-66k (estimate)
3 Months Ago

The following is the career advancement route for IT Security Analyst positions, which can be used as a reference in future career path planning. As an IT Security Analyst, it can be promoted into senior positions as a Systems/Application Security Analyst that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary IT Security Analyst. You can explore the career advancement for an IT Security Analyst below and select your interested title to get hiring information.

If you are interested in becoming an IT Security Analyst, you need to understand the job requirements and the detailed related responsibilities. Of course, a good educational background and an applicable major will also help in job hunting. Below are some tips on how to become an IT Security Analyst for your reference.

Step 1: Understand the job description and responsibilities of an Accountant.

Quotes from people on IT Security Analyst job description and responsibilities

They will then help to make the necessary changes for a more secure network and may also create training programs and modules to educate employees and users on proper security protocols.

02/23/2022: Bellingham, WA

Security analysts monitor, prevent, and stop attacks on private data.

03/24/2022: Scranton, PA

Security analysts may also prepare for and respond to system breaches or attacks.

01/31/2022: Duluth, MN

They document tests, security and emergency policies, and procedures.

04/15/2022: Virginia Beach, VA

IT security analysts protect computer networks from cyberattacks and unauthorized access.

01/30/2022: Macon, GA

Step 2: Knowing the best tips for becoming an Accountant can help you explore the needs of the position and prepare for the job-related knowledge well ahead of time.

Career tips from people on IT Security Analyst jobs

The most successful analysts are detail-oriented and have an analytical mindset.

02/20/2022: New London, CT

Security analysts must demonstrate adaptability and the ability to grow with their field.

04/15/2022: Waterloo, IA

Typically, most security analysts hold a bachelor's degree at minimum.

02/01/2022: Juneau, AK

Ethical hacking certifications help prepare analysts to understand threats and protect systems.

02/02/2022: Spokane, WA

Faced with a dynamic threat landscape and continuously emerging technologies, both on the defensive and offensive sides, security analysts need to be naturally curious and always willing to learn more.

03/06/2022: Rock Hill, SC

Step 3: View the best colleges and universities for IT Security Analyst.

Butler University
Carroll College
Cooper Union
High Point University
Princeton University
Providence College
Show more