Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Cyber Security Analyst Progression.
United States Jobs Expertini

Urgent! Cyber Security Analyst Progression Job Opening In Apollo Beach – Now Hiring Accede Solutions Inc

Cyber Security Analyst Progression



Job description

Job Title: Cyber Security Analyst Progression

Duration: Permanent

Location: Apollo Beach, FL 33572


Cyber Security Analyst – Level 1:



POSITION CONCEPT:

The Cyber Security Analyst – Operational Technology (OT) is responsible for maintaining the security and integrity of operational technology systems through routine cybersecurity maintenance activities.

Manages and continuously improves the asset inventory database to ensure accurate visibility and tracking of the operational technology.

Supports the development and implementation of the organization's OT Cybersecurity program and framework, aligning activities with industry standards and regulatory requirements.

Collaboration with cross-functional teams ensures consistent application of security controls and continuous improvement of cybersecurity posture.



Cyber Security Analyst Sr – Level 2:

POSITION CONCEPT:

The Cyber Security Analyst Sr is responsible for addressing Operation Technology (OT) vulnerabilities by taking the appropriate corrective action or following the appropriate escalation procedures, assessing threat landscape, confirming for secure configuration of assets, identifying vulnerabilities applicable to the OT components and developing the remediation plans.

Develop cybersecurity maintenance procedures and enforce OT cybersecurity framework and standards, evaluate IT related needs of OT environment and team members, and identify cybersecurity awareness gaps.

Evaluate OT cyber assets and assign criticality rating to cyber assets and develop remediation plan for gaps in compliance of the systems with the OT cybersecurity program.

Has increased responsibilities in security intelligence monitoring, incident response, and development of cybersecurity maintenance procedures.

May serve as a project lead and mentor Cyber Security Analyst.

Works under general supervision.



Cyber Security Analyst Lead – Level 3:



POSITION CONCEPT:

The Cyber Security Analyst Lead is responsible for maintaining and improving OT cybersecurity framework and standards, reviewing cybersecurity maintenance procedures and threat landscape assessment, implementing vulnerability management technologies and vulnerability remediation plans.

Lead will facilitate asset criticality evaluation process, maintain cybersecurity maintenance schedule, and train staff.

Lead will maintain and improve the OT cybersecurity program, ensuring its alignment with the latest industry standards (NERC, NIST), build cross departmental ITOT collaboration, educate team members the latest cybersecurity industry trends.

Has increased responsibilities in evaluating industry standards and adopting them into cybersecurity controls.

May serve as a project lead and mentor to other department team members.



Level 1:

DUTIES AND RESPONSIBILITIES:

Identifies cybers assets, examines and extracts asset configuration, updates the OT cyber asset database to protect operational technology.

Installs security patches, updates antivirus definitions, and creates system backups.

Collects, maintains, updates baselines of the operational systems, updates cybersecurity SharePoint site for stakeholder engagement.

Reviews the releases of new CVEs from external sources for applicability to operational assets regularly.

Assists OT team l with IT-related work: software and hardware of HMIs and network appliances, remote connectivity.



Level 2:

DUTIES AND RESPONSIBILITIES:

Evaluates network architecture, system configuration, and external connection layout to ensure compliance of operational technology systems with cybersecurity program.

Reviews vendor manuals, training materials, industry standards, and develops cybersecurity maintenance procedures.

Provides activities planning guidance, feedback on work completed, and training to Cybersecurity Analysts.

Evaluates new CVEs for applicability to OT cyber assets.



Level 3:

DUTIES AND RESPONSIBILITIES:

Translate all applicable standards (NERC CIP, NIST CSF, NIST 800-53, etc.) into appropriate systemic and procedural solutions.

Review, revise, and update Energy Supply's operational technology cybersecurity standards and procedures.

Evaluate the Energy Supply's operational technology systems and coordinate necessary actions to maintain compliance with applicable internal and regulatory standards.

Develop management responses to internal and external government and regulatory audits and data requests with respective management and team members.

Review operational technology cyber asset management process.

Train and educate team members and facilitate ITOT collaboration.



EDUCATION: Level 1, 2 and 3

Required: High School Diploma or equivalent.

Preferred: Bachelor's Degree in Computer Science, Information Systems, or other IT related discipline.



LISCENSES/CERTIFICATIONS: Level 1, 2 and 3

Required: From the list of certification vendors, one related Information Security professional certification or ability to obtain via self-study within one year of hire date

(ex: CISCO, (ISC)2, GIAC, ISA, ISACA, CompTIA, e-Council, etc.).

Preferred: three or more of the following or similar Information Security professional certifications (ex: ACE, CCE, CAP, CEH, CCNA, CCNP, CISA, CISM, CISSP, CRISC, EnCE, GCCC, GCDA, GCED, GCFA, GCFE, GCIA, GCIH, GCWN, GICSP, GMON, GNFA, GPEN, GPPA, GREM, GWAPT, GXPN, OSCP, SSCP).



EXPERIENCE:

Level 1: Required: 5 years of related Cyber Security, industrial automation, IT, OT, or Technical (hands-on networking, telecommunications [radios, satellites, communications, etc.], hardware, software) experience.

May consider 2 years related experience with an Associate's Degree or 1 year related experience with a Bachelor's Degree in Computer Engineering/Science, Cybersecurity, Information Systems, or other IT related discipline.

Level 2: Required: 6 years of related Cyber Security, industrial automation, IT, OT, or Technical (hands-on networking, telecommunications [radios, satellites, communications, etc.], hardware, software) experience.

May consider 4 years related experience with an Associate's Degree or 3 year related experience with a Bachelor's Degree in Computer Science, Information Systems or other IT related discipline.

Level 3: Required:8 years of related Cyber Security, industrial automation, IT, OT, or Technical (hands-on networking, telecommunications [radios, satellites, communications, etc.], hardware, software) experience.

May consider 4 years related experience with an Associate's Degree or 2 years related experience with a Bachelor's Degree in Computer Science, Information Systems or other IT related discipline.



Level 1:

KNOWLEDGE/SKILLS/ABILITIES:

Required:

Basic knowledge of industrial automation (ABB, Allen Bradley, Emerson, Client, Siemens) or basic knowledge of major operating system security (Windows, Mac OS, Linux/Unix), endpoint, server, and network security.

Basic knowledge of major security systems and functions for incident response, monitoring and forensic activities: Firewalls, IDS/IPS, Antivirus/Antimalware, SIEM, Incident Response, Threat Prevention, Web/Application Control Filtering, Email Filtering, NetFlow Analysis, Endpoint Security, Configuration and Change Management, File Integrity Monitoring, and DLP.

Basic knowledge of log, network, and system forensic investigation techniques.

Basic working knowledge of networking protocols and systems administration.

Basic working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.

Basic working knowledge with packet analysis and malware analysis.

Basic working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.

Good analytical and risk assessment skills and strong listening, written and computer communication skills for reporting and auditing purposes.

Preferred:

Performing cybersecurity maintenance activities: applying patches, updating antivirus signatures, creating system backups.Configuring network appliances

Troubleshooting network communications

Supporting compliance audits

Designing, implementing, and supporting industrial automation systems

Designing and implementing a standard network architecture





Level 2:

KNOWLEDGE/SKILLS/ABILITIES:

Required:

Advanced working knowledge of major operating system security (Windows, Mac OS, Linux/Unix), web server security, and network security.

Advanced working knowledge of major security systems and functions for incident response, monitoring and forensic activities: Firewalls, IDS/IPS, Antivirus/Antimalware, SIEM, Incident Response, Threat Prevention, Web/Application Control Filtering, Email Filtering, NetFlow Analysis, Endpoint Security, Configuration and Change Management, File Integrity Monitoring, and DLP.

Advanced working knowledge of log, network, and system forensic investigation techniques.

Advanced working knowledge of networking protocols and systems administration.

Advanced working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.

Advanced working knowledge with packet analysis and malware analysis.

Advanced working knowledge (hands-on experience) of scripting in languages such as Python, Bash or PowerShell.

Advanced working knowledge of penetration testing technologies and procedures.

Advanced working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.

Strong analytical and risk assessment skills as well as strong listening, written and computer communication skills for reporting and auditing purposes.



Level 3:

KNOWLEDGE/SKILLS/ABILITIES:

Required:

Developing and implementing OT Cybersecurity program.

Evaluating and adopting cybersecurity controls to the OT environment.

Thorough working knowledge of major operating system security (Windows, Mac OS, Linux/Unix), , web server security, and network security.

Thorough working knowledge of major security systems and functions: Firewalls, IDS/IPS, Antivirus/Antimalware, SIEM, Incident Response, Threat Prevention, Web/Application Control Filtering, Email Filtering, NetFlow Analysis, Endpoint Security, Configuration and Change Management, File Integrity Monitoring, and DLP.

Expert working knowledge of log, network, and system forensic investigation techniques.

Expert working knowledge of networking protocols and systems administration.

Thorough working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.

Expert working knowledge with packet analysis and malware analysis.

Expert working knowledge (hands-on experience) of scripting in languages such as Python, Bash or PowerShell.

Expert working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.

Strong analytical and risk assessment skills as well as strong listening, written and computer communication skills for reporting and auditing purposes.

Preferred:

Thorough working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.

Expert working knowledge of reverse engineering malware.


Required Skill Profession

Computer Occupations



Your Complete Job Search Toolkit

✨ Smart • Intelligent • Private • Secure

Start Using Our Tools

Join thousands of professionals who've advanced their careers with our platform

Rate or Report This Job
If you feel this job is inaccurate or spam kindly report to us using below form.
Please Note: This is NOT a job application form.


    Unlock Your Cyber Security Potential: Insight & Career Growth Guide


  • Real-time Cyber Security Jobs Trends in Apollo Beach, United States (Graphical Representation)

    Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for Cyber Security in Apollo Beach, United States using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 37217 jobs in United States and 262 jobs in Apollo Beach. This comprehensive analysis highlights market share and opportunities for professionals in Cyber Security roles. These dynamic trends provide a better understanding of the job market landscape in these regions.

  • Are You Looking for Cyber Security Analyst Progression Job?

    Great news! is currently hiring and seeking a Cyber Security Analyst Progression to join their team. Feel free to download the job details.

    Wait no longer! Are you also interested in exploring similar jobs? Search now: .

  • The Work Culture

    An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at Accede Solutions Inc adheres to the cultural norms as outlined by Expertini.

    The fundamental ethical values are:
    • 1. Independence
    • 2. Loyalty
    • 3. Impartiality
    • 4. Integrity
    • 5. Accountability
    • 6. Respect for human rights
    • 7. Obeying United States laws and regulations
  • What Is the Average Salary Range for Cyber Security Analyst Progression Positions?

    The average salary range for a varies, but the pay scale is rated "Standard" in Apollo Beach. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.

  • What Are the Key Qualifications for Cyber Security Analyst Progression?

    Key qualifications for Cyber Security Analyst Progression typically include Computer Occupations and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.

  • How Can I Improve My Chances of Getting Hired for Cyber Security Analyst Progression?

    To improve your chances of getting hired for Cyber Security Analyst Progression, consider enhancing your skills. Check your CV/Résumé Score with our free Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.

  • Interview Tips for Cyber Security Analyst Progression Job Success
    Accede Solutions Inc interview tips for Cyber Security Analyst Progression

    Here are some tips to help you prepare for and ace your job interview:

    Before the Interview:
    • Research: Learn about the Accede Solutions Inc's mission, values, products, and the specific job requirements and get further information about
    • Other Openings
    • Practice: Prepare answers to common interview questions and rehearse using the STAR method (Situation, Task, Action, Result) to showcase your skills and experiences.
    • Dress Professionally: Choose attire appropriate for the company culture.
    • Prepare Questions: Show your interest by having thoughtful questions for the interviewer.
    • Plan Your Commute: Allow ample time to arrive on time and avoid feeling rushed.
    During the Interview:
    • Be Punctual: Arrive on time to demonstrate professionalism and respect.
    • Make a Great First Impression: Greet the interviewer with a handshake, smile, and eye contact.
    • Confidence and Enthusiasm: Project a positive attitude and show your genuine interest in the opportunity.
    • Answer Thoughtfully: Listen carefully, take a moment to formulate clear and concise responses. Highlight relevant skills and experiences using the STAR method.
    • Ask Prepared Questions: Demonstrate curiosity and engagement with the role and company.
    • Follow Up: Send a thank-you email to the interviewer within 24 hours.
    Additional Tips:
    • Be Yourself: Let your personality shine through while maintaining professionalism.
    • Be Honest: Don't exaggerate your skills or experience.
    • Be Positive: Focus on your strengths and accomplishments.
    • Body Language: Maintain good posture, avoid fidgeting, and make eye contact.
    • Turn Off Phone: Avoid distractions during the interview.
    Final Thought:

    To prepare for your Cyber Security Analyst Progression interview at Accede Solutions Inc, research the company, understand the job requirements, and practice common interview questions.

    Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the Accede Solutions Inc's products or services and be prepared to discuss how you can contribute to their success.

    By following these tips, you can increase your chances of making a positive impression and landing the job!

  • How to Set Up Job Alerts for Cyber Security Analyst Progression Positions

    Setting up job alerts for Cyber Security Analyst Progression is easy with United States Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!