- Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Cyber Security Analyst Progression.
Urgent! Cyber Security Analyst Progression Job Opening In Apollo Beach Florida – Now Hiring Accede Solutions Inc
Job Title: Cyber Security Analyst Progression
Duration: Permanent
Location: Apollo Beach, FL 33572
Cyber Security Analyst – Level 1:
POSITION CONCEPT:
The Cyber Security Analyst – Operational Technology (OT) is responsible for maintaining the security and integrity of operational technology systems through routine cybersecurity maintenance activities.
Manages and continuously improves the asset inventory database to ensure accurate visibility and tracking of the operational technology.
Supports the development and implementation of the organization's OT Cybersecurity program and framework, aligning activities with industry standards and regulatory requirements.
Collaboration with cross-functional teams ensures consistent application of security controls and continuous improvement of cybersecurity posture.
Cyber Security Analyst Sr – Level 2:
POSITION CONCEPT:
The Cyber Security Analyst Sr is responsible for addressing Operation Technology (OT) vulnerabilities by taking the appropriate corrective action or following the appropriate escalation procedures, assessing threat landscape, confirming for secure configuration of assets, identifying vulnerabilities applicable to the OT components and developing the remediation plans.
Develop cybersecurity maintenance procedures and enforce OT cybersecurity framework and standards, evaluate IT related needs of OT environment and team members, and identify cybersecurity awareness gaps.
Evaluate OT cyber assets and assign criticality rating to cyber assets and develop remediation plan for gaps in compliance of the systems with the OT cybersecurity program.
Has increased responsibilities in security intelligence monitoring, incident response, and development of cybersecurity maintenance procedures.
May serve as a project lead and mentor Cyber Security Analyst.
Works under general supervision.
Cyber Security Analyst Lead – Level 3:
POSITION CONCEPT:
The Cyber Security Analyst Lead is responsible for maintaining and improving OT cybersecurity framework and standards, reviewing cybersecurity maintenance procedures and threat landscape assessment, implementing vulnerability management technologies and vulnerability remediation plans.
Lead will facilitate asset criticality evaluation process, maintain cybersecurity maintenance schedule, and train staff.
Lead will maintain and improve the OT cybersecurity program, ensuring its alignment with the latest industry standards (NERC, NIST), build cross departmental ITOT collaboration, educate team members the latest cybersecurity industry trends.
Has increased responsibilities in evaluating industry standards and adopting them into cybersecurity controls.
May serve as a project lead and mentor to other department team members.
Level 1:
DUTIES AND RESPONSIBILITIES:
Identifies cybers assets, examines and extracts asset configuration, updates the OT cyber asset database to protect operational technology.
Installs security patches, updates antivirus definitions, and creates system backups.
Collects, maintains, updates baselines of the operational systems, updates cybersecurity SharePoint site for stakeholder engagement.
Reviews the releases of new CVEs from external sources for applicability to operational assets regularly.
Assists OT team l with IT-related work: software and hardware of HMIs and network appliances, remote connectivity.
Level 2:
DUTIES AND RESPONSIBILITIES:
Evaluates network architecture, system configuration, and external connection layout to ensure compliance of operational technology systems with cybersecurity program.
Reviews vendor manuals, training materials, industry standards, and develops cybersecurity maintenance procedures.
Provides activities planning guidance, feedback on work completed, and training to Cybersecurity Analysts.
Evaluates new CVEs for applicability to OT cyber assets.
Level 3:
DUTIES AND RESPONSIBILITIES:
Translate all applicable standards (NERC CIP, NIST CSF, NIST 800-53, etc.) into appropriate systemic and procedural solutions.
Review, revise, and update Energy Supply's operational technology cybersecurity standards and procedures.
Evaluate the Energy Supply's operational technology systems and coordinate necessary actions to maintain compliance with applicable internal and regulatory standards.
Develop management responses to internal and external government and regulatory audits and data requests with respective management and team members.
Review operational technology cyber asset management process.
Train and educate team members and facilitate ITOT collaboration.
EDUCATION: Level 1, 2 and 3
Required: High School Diploma or equivalent.
Preferred: Bachelor's Degree in Computer Science, Information Systems, or other IT related discipline.
LISCENSES/CERTIFICATIONS: Level 1, 2 and 3
Required: From the list of certification vendors, one related Information Security professional certification or ability to obtain via self-study within one year of hire date
(ex: CISCO, (ISC)2, GIAC, ISA, ISACA, CompTIA, e-Council, etc.).
Preferred: three or more of the following or similar Information Security professional certifications (ex: ACE, CCE, CAP, CEH, CCNA, CCNP, CISA, CISM, CISSP, CRISC, EnCE, GCCC, GCDA, GCED, GCFA, GCFE, GCIA, GCIH, GCWN, GICSP, GMON, GNFA, GPEN, GPPA, GREM, GWAPT, GXPN, OSCP, SSCP).
EXPERIENCE:
Level 1: Required: 5 years of related Cyber Security, industrial automation, IT, OT, or Technical (hands-on networking, telecommunications [radios, satellites, communications, etc.], hardware, software) experience.
May consider 2 years related experience with an Associate's Degree or 1 year related experience with a Bachelor's Degree in Computer Engineering/Science, Cybersecurity, Information Systems, or other IT related discipline.
Level 2: Required: 6 years of related Cyber Security, industrial automation, IT, OT, or Technical (hands-on networking, telecommunications [radios, satellites, communications, etc.], hardware, software) experience.
May consider 4 years related experience with an Associate's Degree or 3 year related experience with a Bachelor's Degree in Computer Science, Information Systems or other IT related discipline.
Level 3: Required:8 years of related Cyber Security, industrial automation, IT, OT, or Technical (hands-on networking, telecommunications [radios, satellites, communications, etc.], hardware, software) experience.
May consider 4 years related experience with an Associate's Degree or 2 years related experience with a Bachelor's Degree in Computer Science, Information Systems or other IT related discipline.
Level 1:
KNOWLEDGE/SKILLS/ABILITIES:
Required:
Basic knowledge of industrial automation (ABB, Allen Bradley, Emerson, Client, Siemens) or basic knowledge of major operating system security (Windows, Mac OS, Linux/Unix), endpoint, server, and network security.
Basic knowledge of major security systems and functions for incident response, monitoring and forensic activities: Firewalls, IDS/IPS, Antivirus/Antimalware, SIEM, Incident Response, Threat Prevention, Web/Application Control Filtering, Email Filtering, NetFlow Analysis, Endpoint Security, Configuration and Change Management, File Integrity Monitoring, and DLP.
Basic knowledge of log, network, and system forensic investigation techniques.
Basic working knowledge of networking protocols and systems administration.
Basic working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.
Basic working knowledge with packet analysis and malware analysis.
Basic working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.
Good analytical and risk assessment skills and strong listening, written and computer communication skills for reporting and auditing purposes.
Preferred:
Performing cybersecurity maintenance activities: applying patches, updating antivirus signatures, creating system backups.Configuring network appliances
Troubleshooting network communications
Supporting compliance audits
Designing, implementing, and supporting industrial automation systems
Designing and implementing a standard network architecture
Level 2:
KNOWLEDGE/SKILLS/ABILITIES:
Required:
Advanced working knowledge of major operating system security (Windows, Mac OS, Linux/Unix), web server security, and network security.
Advanced working knowledge of major security systems and functions for incident response, monitoring and forensic activities: Firewalls, IDS/IPS, Antivirus/Antimalware, SIEM, Incident Response, Threat Prevention, Web/Application Control Filtering, Email Filtering, NetFlow Analysis, Endpoint Security, Configuration and Change Management, File Integrity Monitoring, and DLP.
Advanced working knowledge of log, network, and system forensic investigation techniques.
Advanced working knowledge of networking protocols and systems administration.
Advanced working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.
Advanced working knowledge with packet analysis and malware analysis.
Advanced working knowledge (hands-on experience) of scripting in languages such as Python, Bash or PowerShell.
Advanced working knowledge of penetration testing technologies and procedures.
Advanced working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.
Strong analytical and risk assessment skills as well as strong listening, written and computer communication skills for reporting and auditing purposes.
Level 3:
KNOWLEDGE/SKILLS/ABILITIES:
Required:
Developing and implementing OT Cybersecurity program.
Evaluating and adopting cybersecurity controls to the OT environment.
Thorough working knowledge of major operating system security (Windows, Mac OS, Linux/Unix), , web server security, and network security.
Thorough working knowledge of major security systems and functions: Firewalls, IDS/IPS, Antivirus/Antimalware, SIEM, Incident Response, Threat Prevention, Web/Application Control Filtering, Email Filtering, NetFlow Analysis, Endpoint Security, Configuration and Change Management, File Integrity Monitoring, and DLP.
Expert working knowledge of log, network, and system forensic investigation techniques.
Expert working knowledge of networking protocols and systems administration.
Thorough working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.
Expert working knowledge with packet analysis and malware analysis.
Expert working knowledge (hands-on experience) of scripting in languages such as Python, Bash or PowerShell.
Expert working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.
Strong analytical and risk assessment skills as well as strong listening, written and computer communication skills for reporting and auditing purposes.
Preferred:
Thorough working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.
Expert working knowledge of reverse engineering malware.
✨ Smart • Intelligent • Private • Secure
Practice for Any Interview Q&A (AI Enabled)
Predict interview Q&A (AI Supported)
Mock interview trainer (AI Supported)
Ace behavioral interviews (AI Powered)
Record interview questions (Confidential)
Master your interviews
Track your answers (Confidential)
Schedule your applications (Confidential)
Create perfect cover letters (AI Supported)
Analyze your resume (NLP Supported)
ATS compatibility check (AI Supported)
Optimize your applications (AI Supported)
O*NET Supported
O*NET Supported
O*NET Supported
O*NET Supported
O*NET Supported
European Union Recommended
Institution Recommended
Institution Recommended
Researcher Recommended
IT Savvy Recommended
Trades Recommended
O*NET Supported
Artist Recommended
Researchers Recommended
Create your account
Access your account
Create your professional profile
Preview your profile
Your saved opportunities
Reviews you've given
Companies you follow
Discover employers
O*NET Supported
Common questions answered
Help for job seekers
How matching works
Customized job suggestions
Fast application process
Manage alert settings
Understanding alerts
How we match resumes
Professional branding guide
Increase your visibility
Get verified status
Learn about our AI
How ATS ranks you
AI-powered matching
Join thousands of professionals who've advanced their careers with our platform
Unlock Your Cyber Security Potential: Insight & Career Growth Guide
Real-time Cyber Security Jobs Trends in Apollo Beach, Florida, United States (Graphical Representation)
Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for Cyber Security in Apollo Beach, Florida, United States using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 37204 jobs in United States and 291 jobs in Apollo Beach, Florida. This comprehensive analysis highlights market share and opportunities for professionals in Cyber Security roles. These dynamic trends provide a better understanding of the job market landscape in these regions.
Great news! Accede Solutions Inc is currently hiring and seeking a Cyber Security Analyst Progression to join their team. Feel free to download the job details.
Wait no longer! Are you also interested in exploring similar jobs? Search now: Cyber Security Analyst Progression Jobs Apollo Beach Florida.
An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at Accede Solutions Inc adheres to the cultural norms as outlined by Expertini.
The fundamental ethical values are:The average salary range for a Cyber Security Analyst Progression Jobs United States varies, but the pay scale is rated "Standard" in Apollo Beach Florida. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.
Key qualifications for Cyber Security Analyst Progression typically include Other General and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.
To improve your chances of getting hired for Cyber Security Analyst Progression, consider enhancing your skills. Check your CV/Résumé Score with our free Resume Scoring Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.
Here are some tips to help you prepare for and ace your job interview:
Before the Interview:To prepare for your Cyber Security Analyst Progression interview at Accede Solutions Inc, research the company, understand the job requirements, and practice common interview questions.
Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the Accede Solutions Inc's products or services and be prepared to discuss how you can contribute to their success.
By following these tips, you can increase your chances of making a positive impression and landing the job!
Setting up job alerts for Cyber Security Analyst Progression is easy with United States Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!