Fulltime Cloud Security Analyst openings in Miami, United States on September 18, 2022

Cyber Analyst at GAF

Location: Miami

Come Build Your Career Under OUR Roof
Job Description:
The Cyber Analyst will report to the Director of Cybersecurity.
What Part Will You Play?
+ This Cyber Analyst will be part of the Global Cyber Security Team tasked with supporting the Global Application Security and Vulnerability Program
+ S/he will be developing Key Performance Indicators for Vulnerability Management, coordinating scanning schedules and reporting on remediation activities
What Will You Be Doing?
+ This individual will ensure that vulnerabilities (infrastructure, network and endpoint) are properly identified and remediated in a timely manner in accordance with the established SLAs and with the goal of keeping GAF’s application portfolio secure.
+ Partnering with the Global Cyber Security Team and IT infrastructure professionals to assess potential impact and likelihood of application vulnerabilities and prioritize remediation activities
+ Driving program maturity, reducing the time to vulnerability remediation by integrating technology platforms and automating processes
What Do We Require From You?
+ Knowledge of industry standards relating to Vulnerability Management including:
+ Common Vulnerabilities and Exposures (CVEs),
+ Common Vulnerability Scoring System (CVSS),
+ Open Web Application Security Project (OWASP)
+ Strong written and verbal communication skills with the ability to collaborate through all parts of the business.
+ Establish rapport and credibility with key stakeholders for effective oversight of remediation activities
Responsibilities:
The Cyber Analyst’s job is composed of a variety of activities, centered primarily around improving overall vulnerability management security posture:
+ Lead the execution of vulnerability detection capabilities for on-premise and cloud environments
+ Partner with the Cybersecurity Operations team to deliver shared outcomes that improve effectiveness to detect and respond to vulnerabilities and threats
+ Perform application security assessments (dynamic application security testing) for new and existing applications
+ Work with the security architecture and engineering teams to develop and implement controls and configurations aligned with security policies and report key performance metrics.
+ Provide metrics reporting the state of the vulnerability management program and the performance of stakeholders against requirements
LEVEL BASED COMPETENCIES:
+ Good verbal, written and interpersonal communication skills
+ Detailed knowledge of the Vulnerability Management life-cycle including vulnerability identification, false negative/positive identification, and elimination
+ Experience developing and maintaining policies, procedures, standards and guidelines.
+ Knowledge of:
+ deployment in cloud environments: Azure, GCP (preferred), AWS, etc
+ bonus points for containerization
+ vulnerability management tools: Qualys, Nessus, Rapid7, etc
+ OWASP Top 10 (Open Web Application Security Project)
+ Cyber Security frameworks: MITRE ATT&CK, NIST, etc
+ Excellent analytical and organizational skills
+ Previous experience in an information security role, preferably vulnerability management.
+ A bachelor’s degree in information systems or equivalent work experience
Dimensions
No of direct reports: 0
No of indirect reports: n/a
Budget Responsibility: no
Travel Requirements: 10%
GAF is an equal opportunity employer.
We are taking a responsible approach to creating environments that allow us to do what we do best – Protect what matters most.
As part of our commitment to health and safety, COVID-19 vaccines are required for all candidates and employees in this position. Proof of vaccination is required. Should you require accommodation for medical or religious needs, GAF will engage in an interactive process with you to determine if a reasonable accommodation can be provided in accordance with applicable state and federal law.
We believe our employees are our greatest resource. We offer competitive salary, benefits, 401k, and vacation packages for all full time permanent positions. We are proud to be an equal opportunity workplace and GAF, Standard Logistics, SGI, and Siplast are proud to be affirmative action employers. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, or Veteran status. If you have a disability or special need that requires accommodation, please let us know. If applying for positions in the U.S., must be eligible to work in the U.S. without need for employer sponsored visa (work permit).
Apply Here
For Remote Cyber Analyst roles, visit Remote Cyber Analyst Roles

********

Senior SOC Analyst at Ryder

Location: Miami

Current Employees:

…] to log in to Workday to apply using the internal application process. To learn how to apply for a position using the Career worklet, please review this quick reference guide ([…] .

. ([…] are the driving force behind our company.

Start your career with Ryder today!

Summary

The Senior Security Operations Center Analyst will be responsible for planning and implementing security measures to protect computer systems, networks, and data. This person will handle higher level security investigations and incidents. The Senior Security Operations Center Analyst will monitor network traffic for security events and perform triage analysis to identify security incidents.

The Senior Security Operations Center Analyst will receive Incidents and performs deep analysis; correlates with threat intelligence to identify the threat actor, nature of the attack and systems or data affected. Defines and executes on strategy for containment, remediation, and recovery

The Senior Security Operations Center Analyst will deliver cyber intelligence services and material to information technology and business leaders. Identify new threat tactics, techniques and procedures used by cyber threat actors. Publish actionable threat intelligence for business and technology management.

Essential Functions
• Participate in threat hunting activities to proactively search for threats in the enterprise environment.
• Participate in the creation and maintenance of use cases for recurring investigation/incident triggers in support of the 24/7 Cyber Threat Operations and Cyber Threat Management program.
• Participate in the creation and maintenance of playbooks used in response for investigation/incident triggers in support of 24/7 Cyber Threat Operations and Cyber Threat Management program.
• Act as coordinator in the event of escalated cyber threats/incidents for Tier 1 analysts.
• Assist in escalated computer security incidents and cyber investigations including computer forensics, network forensics, root cause analysis and malware analysis.
• Interface with other teams in Information Security (e.g., EIS Engineering, Security Architecture, GRC) along with information and liability risk officers and technology management to help guide cyber security strategy.

Additional Responsibilities
• Work with team members to enhance and enrich security monitoring tools with contextual information.
• Provide mentoring for junior level analysts.
• Adhere to all policies and standards, as well as regulatory requirements regarding reporting and escalations.
• Publish actionable threat intelligence for business and technology management.
• Identify new threat tactics, techniques and procedures used by cyber threat actors.
• Performs other duties as assigned.

Skills and Abilities
• Ability to lead and persuade individuals and small teams on ideas, concepts and opportunities
• Critical thinking and problem solving skills
• Demonstrated proficiency in basic computer applications, such as Microsoft Office software products
• Ability to effectively communicate business risk as it relates to information security
• Expertise in incident response and system monitoring and analysis
• Knowledge of the incident handling procedures and intrusion analysis models, advanced required
• Foundational knowledge of processes, procedures and methods to research, analyze and disseminate threat intelligence information, advanced required
• Demonstrated advanced knowledge of cyber security operations with a focus area in two or more of the following: Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider) vulnerabilities, and exploits; incident response, investigations and remediation, advanced required
• Broad knowledge of general IT with a focus area in two or more of the following areas: operating systems, networking, computer programing, web development or database administration, advanced required

Qualifications
• Bachelor’s degree required in Information Assurance, Computer Science, Engineering, or related technical field.
• Three (3) years or more experience in information security administration, offensive tactics, monitoring, and IR. required
• Three (3) years or more experience related security systems administration with endpoint, network, application, and host-based security solutions. required
• Two (2) years or more Cloud computing (e.g., Amazon Web Services, Google Cloud Platform or Microsoft Azure) security configuration and management experience preferred. preferred
• Knowledge of the incident handling procedures and intrusion analysis models. advanced required
• Foundational knowledge of processes, procedures and methods to research, analyze and disseminate threat intelligence information. advanced required
• Demonstrated advanced knowledge of cyber security operations with a focus area in two or more of the following: Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider) vulnerabilities, and exploits; incident response, investigations and remediation. advanced required
• Broad knowledge of general IT with a focus area in two or more of the following areas: operating systems, networking, computer programing, web development or database administration. advanced required
• Other Information Risk, Privacy, or Security Certification (CISSP, CCSK, CCSP, PCSM)

Travel: 1-10%

DOT Regulated: No

Job Category: Information Security

Ryder is proud to be an Equal Opportunity Employer and Drug Free workplace. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, gender identity, age, status as a protected veteran, among other things, or status as a qualified individual with disability.

. ([…]
Apply Here
For Remote Senior SOC Analyst roles, visit Remote Senior SOC Analyst Roles

********

Soc analyst at eMed

Location: Miami

The Senior SOC Analyst will work collaboratively to detect and respond to information security incidents, maintain and follow procedures for security event alerting and participate in security investigations.

The Senior SOC Analyst will perform tasks including monitoring, threat intelligence research, incident response, automation and SIEM maintenance.

The Senior SOC Analyst should have familiarity with the principles of cloud computing, network and endpoint security, current threat and attack trends, and have an advanced understanding of security principals such as defense in depth.

Requirements
• BSc / BA in Computer Science, Information Technology, or related Security field.
• Professional training and certifications (Security+, CYSA+, GSEC, GCIH, CISSP) is a plus.
• At least 3+ years of experience working with information systems security and related technologies.
• Thorough understanding of the OSI model and Cloud Computing technologies.
• Experience implementing, maintaining and enhancing SIEM solutions such as Splunk, SumoLogic or Azure Sentinel.
• Recent experience with incident response process creation, understanding and involvement.
• Ability to create automation when needed for maximum process efficiency.
• Recent active role in forensic investigation and incident response events and exercises.
• Great communication skills, including written deliverables, oral presentations, and the ability to facilitate crucial conversations at all levels of the organization.

Responsibilities
• Maintain, improve and mature SIEM systems to include but not limited to log ingestion, parsing, alerting creation and maintenance, dashboard creation and report generation.
• Monitor computer networks, cloud systems, and SaaS applications for security issues and investigate violations when and if one occurs.
• Work with the Information Security team to support penetration tests and enhance findings or areas of focus.
• Create aggregated vulnerability reports to distribute current security posture to stakeholders for remediation and leadership for governance.
• Research security enhancements and make recommendations to the Security team by testing and evaluating new technologies.
• Monitor and respond to emerging threats while ensuring real time security threat feeds are reviewed and implications to eMed are reviewed.
• Utilize forensic tools to properly respond to realized threats or investigation inquiries.
• Facilitate incident response activities upon confirmation of true positive alerting or reports.
• Demonstrated problem-solving and analytical skills.
• Advanced understanding of security cloud services, container and multi-tier web applications, data lakes, and database systems.
• Proficiency with a broad of security software applications and tool such as : Extended Detection and Response (EDR), Security Information and Event Management (SIEM), Data Loss Prevention (DLP), Identity Access Management (IAM), Threat Intelligence and Vulnerability Management.
• Experience in information security policies, processes, procedures, systems, methodologies, and best practices.
• Ability to initiate and drive incident response engagements to conclusion to include lessons learned.
• Understanding of cyber security regulations : state / federal laws.
• Ability to manage ambiguity and apply problem-solving skills.
• Ability to establish and maintain internal and external relationships.
• Ability to work under pressure and demonstrated ability to meet critical deadlines.
• Ability to partner with others and lead others not reporting to you directly.
• Develop in-depth technical knowledge of Information Security principles and processes.

Benefits
• Health Care Plan (Medical, Dental & Vision)
• Retirement Plan (401k, IRA) with Company Match
• Life Insurance (Basic, Voluntary & AD&D)
• Unlimited Paid Time Off
• Short Term & Long Term Disability
• Training & Development
• Free Food & Snacks
• Wellness Resources

Last updated : 2022-09-18
Apply Here
For Remote Soc analyst roles, visit Remote Soc analyst Roles

********

Senior Security Analyst​/remote at Vitaver & Associates, Inc.

Location: Hollywood

12285 Senior Security Analyst (remote, 25% – 40% travel) Miami, FL

Start Date: ASAP

Type: Full-time direct employment with Vitaver Staffing Client

Work Setting: Remote, travel 25-40% of the time, including working aboard

Covid

Requirements:

Due to our size, we do not require applicants to take the vaccine s unless the client requires it.

Description:

Our Client, a cruise and vacation company, is looking to hire a Senior Security Analyst (remote, 25% – 40% travel) in Miami, FL

Requirements:

Ability to travel 25-40% of the time;

Experience in relevant industry as security engineer, penetration tester, or similar (7+ years);

Hands-on experience with APIs and programming in at least one language;

Experience with Splunk and/or competing SIEM solutions (required);

Experience with Carbon Black and/or competing EDR solutions (required);

Experience with McAfee and/or competing Anti Virus solutions (required);

Experience with O365 security and monitoring (required);

Experience with Qualys and/or competing Vulnerability Management solutions, risk reduction (required);

Experience with DNS security and OSINT;

Hands-on experience with Python and Java;

Experience with SOX IT support;

Experience in cruise industry

Responsibilities include but are not limited to the following:

Develop and enhance key business and technology executive relationships, actively manage their expectations and monitor satisfaction levels;

Ensure all IT functions within Holland America Group (HAG) are working in a secure way and assisting with all aspects of Cybersecurity;

Develop and enhance key business and technology executive relationships, actively manage their expectations and monitor satisfaction levels;

Assist with Identity Governance and reporting for critical assets (e.g., DBs, SOX applications, etc.) and entitlements (e.g., Domain Admin, etc.);

Root cause analysis for reoccurring Vulnerability Management findings, and work with HAG IT to resolve in a repeatable fashion;

Assist HAG IT Compliance team with SOX audits as required to assist with evidence collection and technology questions;

Provide continuous improvement regarding our SIEM integrations, identifying potential blind spots, and assisting with integrations, playbooks, etc;

Help to continuously improve HAG Cybersecurity Key Risk Indicators (KRI) and reporting;

Assist with Security Architecture reviews for new and proposed integrated solutions;

Assist HAG Cybersecurity PMO to build and prioritize Jira backlog;

Work well with highly technical software development and infrastructure teams;

Have excellent and professional communication skills (written and verbal) with an ability to articulate complex topics in a clear and concise manner;

Create visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs

Why apply?

Work with one of the largest global vacation and cruise providers and a recognizable brand;

Be a part of a diverse multicultural team and thrive in a fun and inclusive work environment dedicated to providing memorable and affordable vacations;

Work with the leader in cutting-edge technology and programming;

Be certain in your future as our Client is a stable and growing company with increasing revenue;

Receive plenty of coaching and support from the team and current Vitaver consultants.

Enjoy a comprehensive employee benefits program:

Get paid on a bi-weekly basis;

During the 1st year of employment – prorated amount of PTO and Sick Time. After – 14 days of PTO annually and 10 days of sick time annually;

Eight paid holidays annually;

Available health, dental, vision plans;

Flexible spending account;

401K retirement savings plan;

Employee Stock Purchase plan;

Short and long-term disability plan;

Cruise benefits;

Discount and complimentary memberships (various complimentary memberships, discount cards and passes: theme parks, various restaurants, wholesale clubs, car rental agencies and cell phone providers to name a few).

Onsite perks:

Fitness center;

Child Development Center;

Caf and coffee shop;

Learning Resource Center (LRC);

Discounted dry cleaning service;

Fuel service & car wash.
Apply Here
For Remote Senior Security Analyst​/remote roles, visit Remote Senior Security Analyst​/remote Roles

********

Senior Security Analyst at Kforce Technology

Location: Doral

• Kforce has a client in Doral, FL that is seeking a Senior Security Analyst.
• Summary: In this role, the Senior Security Analyst will ensure all IT functions are working in a secure way and assisting with all aspects of Cybersecurity.
• All responsibilities transverse shoreside and shipboard across the fleet.
• Success for this role entails project execution with consistent and effective budget controls, risk mitigation strategies and achievement of desired business outcomes.
• The Senior Security Analyst must develop and enhance key business and technology executive relationships, actively manage their expectations and monitor satisfaction levels.
• Assist with Identity Governance and reporting for critical assets (e.g., DB’s, SOX applications, etc.)
• and entitlements (e.g., Domain Admin, etc.)
• Augment and assist Security Operations, monitoring and triaging security events (Security Operations)
• As part of Security Operations, accessing Splunk and performing queries necessary to prioritize and triage security events in coordination with the team and Managed Security Service Provider (MSSP)
• Accessing EDR and AntiVirus solutions as necessary to prioritize and triage security events in coordination with the team and MSSP
• Accessing firewalls to triage and prioritize security events and anomalies in coordination with the team and MSSP
• Continuous improvement of Vulnerability Management people, process and technology analyzing Qualys scan output, prioritizing, and working with IT to make Vulnerability Management data actionable and understandable
• Root cause analysis for reoccurring Vulnerability Management findings, and work with IT to resolve in a repeatable fashion
• Assist IT Compliance team with SOX audits as required to assist with evidence collection and technology questions
• 7+ years of relevant industry experience as security engineer, penetration tester, or similar
• Hands-on experience with Splunk and/or competing SIEM solutions required
• Hands-on experience with Carbon Black and/or competing EDR solutions required
• Hands-on experience with McAfee and/or competing AntiVirus solutions required
• Hands-on experience with O365 security and monitoring required
• Hands-on experience with Qualys and/or competing Vulnerability Management solutions required
• Hands-on experience with DNS security and OSINT
• Expert hands-on experience with APIs and programming in at least one language
• Proven track record of taking ownership of strategic initiatives and driving results in complex environments
• Demonstrated ability to manage multiple workstreams simultaneously
• Ability to work in a fast-paced setting
• Proven success in contributing to a team-oriented environment
• Proven ability to work creatively and analytically in a problem-solving environment
• Excellent communication (written and oral) and interpersonal skills
• Travel is required 25% to 40%
• Kforce is an Equal Opportunity/Affirmative Action Employer.
• All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
Apply Here
For Remote Senior Security Analyst roles, visit Remote Senior Security Analyst Roles

********

Security Analyst III at Anthem

Location: Miami

Description
SHIFT: Day Job

SCHEDULE: Full-time

Security Analyst III

Indianapolis, IN & Denver, CO

Be a part of an extraordinary team

We are looking for leaders at all levels of the organization who are passionate about making an impact on our members and the communities we serve. You will thrive in a complex and collaborative environment where you take action and ownership to solve problems and lead change. Do you want to be a part of a larger purpose and evolving, high-performance culture that empowers you to make an impact?

Your Talent. Our Vision. At Anthem, Inc., it’s a powerful combination, and the foundation upon which we’re creating greater access to care for our members, greater value for our customers, and greater health for our communities. Join us and together we will drive the future of health care.

This is an exceptional opportunity to do innovative work that means more to you and those we serve at one of America’s leading health care companies and a Fortune Top 50 Company.

The Security Analyst III is responsible for providing enterprise security solutions for business, regulatory, and legal requirements, and assuring the confidentiality, integrity, and availability of information assets.
• Provides trouble resolution on complex issues. Performs system and network upgrade tasks.
• Designs and analyzes vendor services and information security requirements; maintains relationship with key vendors.
• Participates and completes lights-on initiatives to consolidate equipment and/or implement business relocations.
• Performs complex configuration changes to meet business and information security requirements.
• Performs capacity analysis; recommends and implements capacity increases.
• Responds to Level 3 and 4 change and problem requests; leads Level 1 and 2 incident recoveries and root cause analysis.

Qualifications

Minimum Qualificaitons:
• Requires an BA/BS degree in Information Technology, Computer Science or related field of study and a minimum of 3 years of experience in a support and operations or design and engineering role; or any combination of education and experience, which would provide an equivalent background.

Data-At-Rest/Data-In-Motion Encryption experience preferred
• Tokenization experience preferred
• Experience with scripting and automation preferred
• Knowledge and understanding of industry-accepted data processing controls and concepts as applied to hardware, software, data, network communications, and people preferred
• Cloud encryption key management experience preferred
• Software development experience preferred
• Scrum/Agile experience preferred

[email protected] for assistance.
Apply Here
For Remote Security Analyst III roles, visit Remote Security Analyst III Roles

********

Principal Information Security Analyst at Request Technology, LLC

Location: Hollywood

Principal Information Security Analyst

Salary: $120k-$140k + 10% bonus

Location:

Primarily Remote with some travel to office 1-2 times per month

Dallas, TX / Miramar, FL
• * We are unable to provide sponsorship for this role**
• * Bonus Eligible**

The Principal Security Analyst is responsible for designing, developing, and integrating identity & access management, governance, and privileged access system and solutions. Builds tasks, builds workflows, builds capabilities

Qualifications
• Bachelor’s degree in related field or equivalent experience
• 5 s of experience in Identity Access Management and Governance
• Experienced with Cyber Ark, PAM solutions and tools
• Experience with Saviynt (a plus but not needed)
• Working experience with Azure and Active Directory
• Relevant industry experience with a technical background
• Ability to find patterns and trends when analyzing data
• Experience with Project Management methodology
• Ability to work effectively with technical and non-technical personnel in a cross-functional setting
• Strong balance of business acumen and technology knowledge
• Stay current on trends and current identity threats and make recommendations to leadership on mitigating strategies

Responsibilities
• Lead the development of information security standards and procedures for IAM
• Collaboration with other teams and business partners regarding Identity and Access Management best practices for both on premise and cloud-based solutions for employees, contractors, partners, and customers
• Serve as Access Control advocate for incident response program
• Formulate documentation
• Create functional specs based on requirements gathering
• Point of ctives and scope deliverables
• Submit reports to the relevant department heads and management
• Identify authorization and authentication risks, define mitigation plan

Principal Information Security Analyst

Salary: $120k-$140k + 10% bonus

Location:

Primarily Remote with some travel to office 1-2 times per month

Dallas, TX / Miramar, FL
• * We are unable to provide sponsorship for this role**
• * Bonus Eligible**

The Principal Security Analyst is responsible for designing, developing, and integrating identity & access management, governance, and privileged access system and solutions. Builds tasks, builds workflows, builds capabilities

Qualifications
• Bachelor’s degree in related field or equivalent experience
• 5 s of experience in Identity Access Management and Governance
• Experienced with Cyber Ark, PAM solutions and tools
• Experience with Saviynt (a plus but not needed)
• Working experience with Azure and Active Directory
• Relevant industry experience with a technical background
• Ability to find patterns and trends when analyzing data
• Experience with Project Management methodology
• Ability to work effectively with technical and non-technical personnel in a cross-functional setting
• Strong balance of business acumen and technology knowledge
• Stay current on trends and current identity threats and make recommendations to leadership on mitigating strategies

Responsibilities
• Lead the development of information security standards and procedures for IAM
• Collaboration with other teams and business partners regarding Identity and Access Management best practices for both on premise and cloud-based solutions for employees, contractors, partners, and customers
• Serve as Access Control advocate for incident response program
• Formulate documentation
• Create functional specs based on requirements gathering
• Point of ctives and scope deliverables
• Submit reports to the relevant department heads and management
• Identify authorization and authentication risks, define mitigation plan
Apply Here
For Remote Principal Information Security Analyst roles, visit Remote Principal Information Security Analyst Roles

********

The Tech Career Guru
We will be happy to hear your thoughts

Leave a reply

Tech Jobs Here
Logo