Overview
Cyber Security Analyst Jobs in Juno Beach, FL at Five Rivers IT Inc.
Title: Cyber Security Analyst
Company: Five Rivers IT Inc.
Location: Juno Beach, FL
Location/Other Details
On Site – Juno Beach, FL- Local Resource Only
Duration = 12 month
sQualification
s5 years of experience in Cybersecurity Controls Auditin
gMust have a solid IT and Cybersecurity backgroun
dGood understanding of Cybersecurity frameworks and compliance requirement
sPossess excellent verbal and written communication skill
sAble to work with minimal supervisio
nDetail oriented with good time management skill
sOutgoing and able to foster collaborative relationship
sResponsibilitie
sReview and become familiar with internal security policie
sInteract with key stakeholders to identify changing/evolving cybersecurity controls requirement
sReview cybersecurity controls in place for critical systems including but not limited to
:Password and authenticatio
nIdentity Lifecycle Managemen
tAccess Contro
lVulnerability Management and Software Update
sEndpoint Detection and Response (EDR
)Antivirus/Antimalware Softwar
eMonitoring & Alertin
gDocument gaps identifie
dDevelop and document remediation recommendation
sCommunicate findings & recommendations to key stakeholders in the form of presentatio
nWork with business stakeholders to resolve compliance issue
sAssist FPL with the support and enhancement of the cyber security controls aimed at protecting theconfidentiality, integrity, and availability of company information and computing networks. Assist with managing a framework for communications, reporting, scheduling, and coordinating the required activities
.Develop an understanding of, and familiarity with, the Cyber Security controls currently in place at FP
LLead the Exception Management Process (ongoing monthly task
)Lead the Issues Management Process (on going monthly task
)Manage the Risk Register (on going monthly task
)Evaluate the evidence of compliance provided by “crown jewel applications” owners against controls in plac
eIdentify and documents any gaps and exposures in the evidence of complianc
eReview identified gaps and exposures with “crown jewel applications” owner
sDevelop Remediation Recommendations for identified gaps and exposure
sTrack and report on remediation implementatio
nDocument the completion and validation of implemented remediatio
nReview current controls in place with GRC team and validate against new/emerging regulatory or other compliance requirement
sWork with crown jewel applications owners to identify changing/evolving cybersecurity controls requirement
sPowered by JazzH
RUvy0W3k12O