What are the responsibilities and job description for the Security Analyst position at Tech Army, LLC?
The selected applicant will be expected to perform a combination of the following tasks:
- Monitor security platforms, including SIEM, EDR, and cloud-native security tools, for indicators of compromise (IOCs), indicators of attack (IOAs), and incident response requirements.
- Utilize Microsoft Defender XDR components (Endpoint, Cloud Apps, Identity, Office 365) for monitoring, analysis, and response.
- Identify, triage, and investigate phishing incidents, including those submitted by end users.
- Perform Identity and Access Management (IAM) activities, focusing on identifying and managing risky users, risky sign-ins, and correlating sign-in events.
- Conduct in-depth investigations of security alerts; perform triage and escalate or resolve incidents according to established procedures.
- Produce thorough documentation, including after-action reports and lessons learned, aligned with incident severity and organizational standards.
- Adhere to strict threat escalation policies based on incident classification, threat type, and statutory requirements.
- Support the full incident response lifecycle: detection, containment, eradication, recovery, and post-incident reporting.
- Maintain, tune, and optimize security detection rules, alerts, and automations to reduce false positives and improve detection accuracy (with proper approvals).
- Follow established change management processes for all configuration or detection control modifications.
- Stay informed on emerging threats, evolving attack techniques, and advancements in security technologies.
- Assist in the development and implementation of security policies and procedures.
- Prepare and maintain security documentation.
- Develop risk analyses and security reports.
- Monitor and remediate software and hardware vulnerabilities.
- Evaluate current and future security tools and systems.
- Document hours worked by task.
- Follow FWC IT processes and coordinate with IT staff to ensure compliance with FWC standards.
- Comply with and enforce all agency policies, procedures, and security requirements.
- Provide technical training (knowledge transfer) to Office of Information Technology support staff as required.
- Work location will include a combination of onsite work at FWC offices in Tallahassee, Florida, and remote work, as defined per project.
- Deliverables and performance standards for each task are further defined in the Standards and Specifications table below.
Qualification Requirements for Contractor
- Four or more years of combined IT and security experience within a cybersecurity-related discipline.
- Three or more years of experience with KQL, Python, PowerShell, or batch scripting.
- Two or more years of experience with cloud computing and cloud security.
- Knowledge of security issues, techniques, and implications across various computing platforms.
- Fundamental understanding of regulatory frameworks and standards such as NIST 800-53 Rev. 5, CJIS Security Policy, and 60GG-2.
- Strong communication and documentation skills.
- Demonstrated analytical and critical thinking skills for effective decision-making during security events.
- Ability to manage stress and remain composed during high-pressure security incidents.
- Solid understanding of the MITRE ATT&CK framework, including TTPs.
- Must be CJIS certified or able to obtain certification.
Education
- Bachelor’s degree or higher in Computer Science, Information Security, or a related field.
- Relevant experience may substitute for the recommended education on a year-for-year basis, and additional education may substitute for experience on a year-for-year basis.
- Relevant certifications may include Security , CySA , Network , SSCP, CISSP, CCSP, SecurityX/CASP , or PenTest .