security analyst

Randstad
Tallahassee, FL Full Time
POSTED ON 5/30/2023 CLOSED ON 6/9/2023

What are the responsibilities and job description for the security analyst position at Randstad?

summary

    $55 - $65 per hour

    contract

    no requirements
    category
    computer and mathematical occupations
    reference
    1012872

job summary:
Scope of Services

Develops, evaluates and manages systems security across the enterprise. Areas of concentration include account management, password auditing, network based and Web application-based vulnerability scanning, virus management and intrusion detection. Requires technical expertise in systems administration and security tools, combined with the knowledge of security practices and procedures. Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines). Prepares status reports on security matters to develop security risk analysis scenarios and response procedures.

Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls. Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness. Provides direct support to the business and IT staff for systems security related issues. Educates users on systems security standards and procedures. Must have broad technical knowledge of network operating systems (e.g., UNIX, NT).

Education

Bachelor's Degree in Computer Science, Information Systems, Business Administration, Information Security, or another related field; or equivalent work experience.

Experience

Four years of experience in the work related to the position is required.

Primary Job Duties/ Tasks

Serve as a member of the Computer Security Incident Response Team. Duties includes researching incidents, identifying corrective actions, documenting status and coordinating responses to Computer Security Incidents. Responsible for the tracking and monitoring of endpoint software viruses. Enforces endpoint security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security breaches, exceptions, updates, and maintains and documents security controls. Work in conjunction with the Patch Management and Configuration Team in identifying secure configurations for standard products. Provide support/information as needed for implementation of secure baselines through package roll out and/or group policy. After implementation of secure baselines, use tools to review and ensure compliance with established baselines. Responsible for the administration and maintenance of endpoint vulnerability products, endpoint vulnerability risk reporting, and routine endpoint vulnerability scanning,

Job Specific Knowledge, Skills, and Abilities (KSAs)

The submitted candidate must be able to apply common knowledge, skills, and abilities in the following areas:

1. Knowledge in the use of appropriate security controls to protect the confidentiality, integrity and availability of information technology resources.

2. Knowledge of, and experience with, various computing technologies such as, but not limited to: Windows, Windows Server, Transmission Control Protocol/Internet Protocol (TCP/IP)

3. Knowledge of vulnerability management tools.

4. Knowledge in the use of information security practices and standards such as NIST, CIS Critical Security Controls and the Florida Cybersecurity Standards (74-2 Florida Administrative 60GG-2). Ability to review, assess and document compliance with standards.

5. Knowledge of Microsoft Systems Center Configuration Manager (SCCM) and other Microsoft support tools/technologies such as Group Policy and PowerShell.

6. Knowledge of the application of operating system security settings through direct manipulation of the registry.

7. Knowledge of Security Information and Event Management (SEIM) tools. Ability to utilize, configure and manage SPLUNK preferred but not required.

8. Skills in applying, analyzing and assessing information systems and security controls.

9. Skilled in the detection of software and hardware security problems.

10. Ability to analyze complex technical architecture for security issues.

11. Ability to be self-motivated, detail-oriented with excellent follow through.

12. Ability to assess and analyze risk and provide recommendations to successfully manage risk.

13. Ability to author documented analysis of systems to verify compliance with security controls.

14. Ability to effectively communicate orally and in writing to a variety of audiences. This includes the ability to communicate professionally with management, to communicate technical issues and concepts to non-technical staff, and to effectively explain security concepts and their benefit.

15. Ability to solve problems independently and with teams and exhibit sound judgement and decision-making skills.

16. Knowledge of Malwarebytes, Windows Defender, and other vulnerability scanning tools.

General Knowledge Skills and Abilities (KSAs):

The submitted candidate must be able to apply common knowledge, skills, and abilities in the following areas:

1. Initiative: Must be able to comprehend assignments, organize workload, and meet deadlines with little direction. Must be able to monitor and analyze situations to determine the next step.

2. Communication: Can clearly convey information, in both written and verbal formats, to individuals or groups in a wide variety of settings (i.e., project team meetings, management presentations, etc.). Must have the ability to effectively listen and process information provided by others.

3. Customer Service: Works well with clients and customers (i.e., business office, public, or other agencies). Able to assess the needs of the customer, provide information or assistance to satisfy expectations or resolve a problem.

4. Decision Making: Makes sound, well-informed, and objective decisions utilizing critical thinking skills and analysis.

5. Flexibility: is open to change, new processes (or process improvement), and new information. Can adapt in response to new information, changing conditions, or unexpected obstacles. Ability to receive and give constructive criticism and maintain effective work relationships with others.

6. Interpersonal: Shows friendliness, courtesy, understanding, and politeness to others

7. Leadership: Motivates, encourages, and challenges others. Can adapt leadership styles in a variety of situations.

8. Problem Solving: Able to identify, evaluate, and use sound judgement to generate and evaluate alternative actions, and make recommendations as accordingly.

9. Team Building: Encourages, inspires, and guides others toward accomplishing the common goal as an equal member of the team.

10. Quality Assurance: Knowledge of the ideologies, techniques and tools for quality assurance and control. The ability to put the ideologies, techniques, and tools into practice.

location: Tallahassee, Florida
job type: Contract
salary: $55 - 65 per hour
work hours: 8am to 5pm
education: No Degree Required

responsibilities:
Scope of Services

Develops, evaluates and manages systems security across the enterprise. Areas of concentration include account management, password auditing, network based and Web application-based vulnerability scanning, virus management and intrusion detection. Requires technical expertise in systems administration and security tools, combined with the knowledge of security practices and procedures. Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines). Prepares status reports on security matters to develop security risk analysis scenarios and response procedures.

Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls. Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness. Provides direct support to the business and IT staff for systems security related issues. Educates users on systems security standards and procedures. Must have broad technical knowledge of network operating systems (e.g., UNIX, NT).

Education

Bachelor's Degree in Computer Science, Information Systems, Business Administration, Information Security, or another related field; or equivalent work experience.

Experience

Four years of experience in the work related to the position is required.

Primary Job Duties/ Tasks

Serve as a member of the Computer Security Incident Response Team. Duties includes researching incidents, identifying corrective actions, documenting status and coordinating responses to Computer Security Incidents. Responsible for the tracking and monitoring of endpoint software viruses. Enforces endpoint security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security breaches, exceptions, updates, and maintains and documents security controls. Work in conjunction with the Patch Management and Configuration Team in identifying secure configurations for standard products. Provide support/information as needed for implementation of secure baselines through package roll out and/or group policy. After implementation of secure baselines, use tools to review and ensure compliance with established baselines. Responsible for the administration and maintenance of endpoint vulnerability products, endpoint vulnerability risk reporting, and routine endpoint vulnerability scanning,

Job Specific Knowledge, Skills, and Abilities (KSAs)

The submitted candidate must be able to apply common knowledge, skills, and abilities in the following areas:

1. Knowledge in the use of appropriate security controls to protect the confidentiality, integrity and availability of information technology resources.

2. Knowledge of, and experience with, various computing technologies such as, but not limited to: Windows, Windows Server, Transmission Control Protocol/Internet Protocol (TCP/IP)

3. Knowledge of vulnerability management tools.

4. Knowledge in the use of information security practices and standards such as NIST, CIS Critical Security Controls and the Florida Cybersecurity Standards (74-2 Florida Administrative 60GG-2). Ability to review, assess and document compliance with standards.

5. Knowledge of Microsoft Systems Center Configuration Manager (SCCM) and other Microsoft support tools/technologies such as Group Policy and PowerShell.

6. Knowledge of the application of operating system security settings through direct manipulation of the registry.

7. Knowledge of Security Information and Event Management (SEIM) tools. Ability to utilize, configure and manage SPLUNK preferred but not required.

8. Skills in applying, analyzing and assessing information systems and security controls.

9. Skilled in the detection of software and hardware security problems.

10. Ability to analyze complex technical architecture for security issues.

11. Ability to be self-motivated, detail-oriented with excellent follow through.

12. Ability to assess and analyze risk and provide recommendations to successfully manage risk.

13. Ability to author documented analysis of systems to verify compliance with security controls.

14. Ability to effectively communicate orally and in writing to a variety of audiences. This includes the ability to communicate professionally with management, to communicate technical issues and concepts to non-technical staff, and to effectively explain security concepts and their benefit.

15. Ability to solve problems independently and with teams and exhibit sound judgement and decision-making skills.

16. Knowledge of Malwarebytes, Windows Defender, and other vulnerability scanning tools.

General Knowledge Skills and Abilities (KSAs):

The submitted candidate must be able to apply common knowledge, skills, and abilities in the following areas:

1. Initiative: Must be able to comprehend assignments, organize workload, and meet deadlines with little direction. Must be able to monitor and analyze situations to determine the next step.

2. Communication: Can clearly convey information, in both written and verbal formats, to individuals or groups in a wide variety of settings (i.e., project team meetings, management presentations, etc.). Must have the ability to effectively listen and process information provided by others.

3. Customer Service: Works well with clients and customers (i.e., business office, public, or other agencies). Able to assess the needs of the customer, provide information or assistance to satisfy expectations or resolve a problem.

4. Decision Making: Makes sound, well-informed, and objective decisions utilizing critical thinking skills and analysis.

5. Flexibility: is open to change, new processes (or process improvement), and new information. Can adapt in response to new information, changing conditions, or unexpected obstacles. Ability to receive and give constructive criticism and maintain effective work relationships with others.

6. Interpersonal: Shows friendliness, courtesy, understanding, and politeness to others

7. Leadership: Motivates, encourages, and challenges others. Can adapt leadership styles in a variety of situations.

8. Problem Solving: Able to identify, evaluate, and use sound judgement to generate and evaluate alternative actions, and make recommendations as accordingly.

9. Team Building: Encourages, inspires, and guides others toward accomplishing the common goal as an equal member of the team.

10. Quality Assurance: Knowledge of the ideologies, techniques and tools for quality assurance and control. The ability to put the ideologies, techniques, and tools into practice.

qualifications:
  • Experience level: Experienced
  • Minimum 4 years of experience
  • Education: No Degree Required (required)

skills:
  • Endpoint Software Security
  • Network Security
  • UNIX
  • NT
  • Transmission Control Protocol
  • Internet Protocol
  • CIS Critical Security Controls
  • NIST
  • Cyber Security
  • SCCM
  • Group Policy
  • PowerShell
  • SIEM
  • Splunk
  • Windows
  • Windows Server

    Equal Opportunity Employer: Race, Color, Religion, Sex, Sexual Orientation, Gender Identity, National Origin, Age, Genetic Information, Disability, Protected Veteran Status, or any other legally protected group status.

    At Randstad, we welcome people of all abilities and want to ensure that our hiring and interview process meets the needs of all applicants. If you require a reasonable accommodation to make your application or interview experience a great one, please contact HRsupport@randstadusa.com.

    Pay offered to a successful candidate will be based on several factors including the candidate's education, work experience, work location, specific job duties, certifications, etc. In addition, Randstad offers a comprehensive benefits package, including health, an incentive and recognition program, and 401K contribution (all benefits are based on eligibility).




    For certain assignments, Covid-19 vaccination and/or testing may be required by Randstad's client or applicable federal mandate, subject to approved medical or religious accommodations. Carefully review the job posting for details on vaccine/testing requirements or ask your Randstad representative for more information.

Salary : $55 - $65

Security Analyst
Radiant.digital -
Tallahassee, FL
Security Analyst
Stellar Professionals -
Tallahassee, FL
Security Analyst – GRC
TekIntegral -
Tallahassee, FL

For Employer
Looking for Real-time Job Posting Salary Data?
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

Sign up to receive alerts about other jobs with skills like those required for the security analyst.

Click the checkbox next to the jobs that you are interested in.

  • Cloud Security Skill

    • Income Estimation: $163,196 - $208,515
    • Income Estimation: $178,977 - $226,472
  • Cybersecurity Skill

    • Income Estimation: $87,232 - $114,424
    • Income Estimation: $92,405 - $117,541
This job has expired.
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at Randstad

Randstad
Hired Organization Address Baltimore, MD Contractor
Are you an organized, detail-oriented professional looking for a meaningful opportunity to showcase your administrative ...
Randstad
Hired Organization Address North Billerica, MA Contractor
Pharmaceutical Packaging and Labeling Specialist - 1st and 2nd shift Join a pioneering healthcare company with over 60 y...
Randstad
Hired Organization Address Aurora, IL Full Time
TO APPLY IMMEDIATELY TEXT YOUR NAME, EMAIL, PHONE NUMBER AND THE WORD PRODUCTION to Susan at (331)-625-3545 Are you look...
Randstad
Hired Organization Address Spokane, WA Full Time
* This is a direct hire/permanent opening, not temporary* Pay: $20.50/hr for Day shift PLUS benefits! $22/hr for Night s...

Not the job you're looking for? Here are some other security analyst jobs in the Tallahassee, FL area that may be a better fit.

Security Analyst

IT Engagements, Inc., Tallahassee, FL

Security Analyst

Qwalifize LLC, Tallahassee, FL