Information Security Analyst IV

State of FloridaJacksonville Beach, FL

About The Position

The mission of the Florida Department of Military Affairs is to provide management oversight of the Florida National Guard and provide units and personnel ready to support national security objectives; to protect the public safety of citizens and to contribute to the national, state and community programs that add value to the United States of America and to the State of Florida.

Requirements

  • A High School Diploma or equivalent; AND
  • Three (3) years of professional, full-time-equivalent experience in Cybersecurity and/or Information Technology; AND
  • COMPTIA Security+ Certified; OR
  • College degree in Cybersecurity and/or Information Technology with one year of related job experience.
  • Experience with Microsoft SharePoint
  • The ability to effectively interpret and write policy.

Nice To Haves

  • Experience on Tanium Preferred – Not Required.
  • Experience on Big Fix Preferred – Not Required.
  • Experience on ReliaQuest Greymatter Preferred – Not Required.
  • Experience on SentinelOne Preferred – Not Required.

Responsibilities

  • Serves as the principle advisor to the G6/J6 Director and the ISSM on the latest industry and technological projections as they pertain to Cyber Security / information assurance for the state network enclave infrastructure for Department of Military Affairs. Develops policies, directives, and procedures to establish minimum security standards for ensuring confidentiality, integrity and availability of state data, information, and IT resources, referred to as the Florida Cybersecurity Standards per Chapter 60GG Florida Administrative Code. Must anticipate the effects of new emerging technology and develop policies to control it to prevent security violations. Duties include oversight and accreditation of all systems IAW with National Institute of Standards and Technology (NIST) Cybersecurity Framework, DOD security directive, policies, and procedures. Ensures that all elements are in compliance with guidance concerning accreditation of automated information systems, risk management, control of computer viruses, and other similar issues. Ensures security incidents are investigated and reported to the AO/CIO, ISSM, Florida Digital Services SOC, and/or Law Enforcement Agencies; IAW with DOD security directives, policies and procedures to include highly classified information from the organization.
  • Establish an information security program that includes information security policies, procedures, standards, and guidelines; an information security awareness program; an information security risk management process, including the comprehensive risk assessment required by section 282.318, F.S.; a Cybersecurity Incident Response Plan; and a disaster recovery program that aligns with the agency’s Continuity of Operations Plan (COOP).
  • Monitor compliance with cybersecurity policy, as appropriate, and review the results of such monitoring. Ensure that Cybersecurity inspections, tests, and reviews are synchronized and coordinated with affected parties and organizations. Ensure implementation of IS security measures and procedures including reporting incidents to the AO and appropriate reporting chains and coordinating system-level responses to unauthorized disclosures in accordance with DoD, Army, and NGB guidelines. Ensure handling of possible or actual data spills of PII/PHI and classified data resident in ISs, are conducted in accordance with applicable guidelines and reported to AO/CIO, ISSM, Florida Digital Services SOC, and/or Law Enforcement Agencies.
  • Coordinate with Agency Inspector General to conduct cybersecurity audit plan annually and report audit planning processes. This initiative aligns with the Office of the Chief Inspector General's leadership in an annual cybersecurity enterprise audit, involving the state agency Offices of Inspector General. The purpose of these enterprise audits is to evaluate agency controls and compliance with Chapter 60GG, F.A.C., and the NIST Framework.
  • Provide cybersecurity awareness training to all state agency employees within 30 days after commencing employment, and annually thereafter, concerning cybersecurity risks and the responsibility of employees to comply with policies, standards, guidelines, and operating procedures adopted by the Department Of Military Affairs to reduce those risks.
  • Provides oversight in the daily operations for security activities for the network and corresponding endpoints connected to the Department of Military Affairs Network. Coordinates with team members to ensure short-term and long-term goals and objectives are met. Manages, and monitors a system of internal controls that ensure effective and appropriate use of resources. FOIA secondary. Update and manage Inspection Program for CRI. Including coordinating inspectors, travel, assist in uploading to ENGIS, tracking issues and due outs, tracking trends, and updating calls for inspection based on G6 CIO mission and goals.
  • Collaborates with other supervisors and managers within the directorate to negotiate, decide on, or coordinate work-related changes affecting their operations. Communicate with supervisors with broader and higher responsibilities on problems involving the relationship of the work of the cybersecurity efforts to broader programs, and its impact on IT Services. Serves as a technical advisor to management. Participates as a member and advisor on special committees and special projects designed to study methods to enhance the use of IT throughout the Command. Participate in developing strategic plans for enhancement of the system environment, developing functional and technical requirements for acquisitions, conducting cost-benefit analyses, feasibility studies, and related activities. Develops strategies to incorporate into the organization’s inventory such technologies and advancements found to be compatible with user requirements, taking into consideration any affect these technologies and techniques will have on existing architecture and infrastructure. Participates in plans for acquisition and implementation of new equipment, including development of contract documentation. May serve as the contractor’s liaison/consultant, providing technical advice and support throughout the acquisition, installation, and maintenance stages. Plans and schedules the installation of new or modified hardware, operating systems, and software applications. Considers factors such as compatibility, conversion or implementation costs, and impact on existing equipment. Directs testing of vendor-provided software. Advises staff on issues pertaining to operating systems and hardware status.

Benefits

  • Health Insurance
  • Life Insurance
  • Dental, Vision and Supplemental Insurance
  • Retirement Benefits
  • Vacation and Sick Leave
  • Paid Holidays
  • Opportunities for Career Advancement
  • Tuition Waiver for Public College Courses
  • Training Opportunities
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service