Recent Searches

You haven't searched anything yet.

16 cloud security engineer Jobs in fort lauderdale, fl

RIT Solutions, Inc.
Fort Lauderdale, FL | Full Time
$104k-131k (estimate)
1 Day Ago
Motion Recruitment
Fort Lauderdale, FL | Full Time
$87k-113k (estimate)
4 Days Ago
Optimize Search Group
Fort Lauderdale, FL | Full Time
$109k-136k (estimate)
2 Weeks Ago
JAMIS Software
Fort Lauderdale, FL | Full Time
$99k-124k (estimate)
2 Weeks Ago
Deloitte
Fort Lauderdale, FL | Full Time
$121k-148k (estimate)
2 Weeks Ago
Contact Government Services
Fort Lauderdale, FL | Full Time
$92k-116k (estimate)
5 Months Ago
PRS
Fort Lauderdale, FL | Full Time
$108k-134k (estimate)
2 Months Ago
HatchPros Inc
Fort Lauderdale, FL | Contractor
$89k-115k (estimate)
1 Week Ago
Motion Recruitment Partners
Fort Lauderdale, FL | Full Time
$88k-114k (estimate)
4 Weeks Ago
Motion Recruitment Partners
Fort Lauderdale, FL | Full Time
$88k-114k (estimate)
4 Weeks Ago
HatchPros Inc
Fort Lauderdale, FL | Contractor
$91k-116k (estimate)
5 Days Ago
InfoTech Spectrum Inc
Fort Lauderdale, FL | Contractor
$100k-120k (estimate)
2 Weeks Ago
Insight Global
Insight Global
Fort Lauderdale, FL | Contractor
$81k-97k (estimate)
2 Weeks Ago
VKore Solutions LLC
Fort Lauderdale, FL | Full Time
$108k-127k (estimate)
3 Weeks Ago
Hotwire Communications
Fort Lauderdale, FL | Full Time
$89k-109k (estimate)
6 Months Ago
Lead Senior Cyber-Security Analyst/Engineer
RIT Solutions, Inc. Fort Lauderdale, FL
Apply
$104k-131k (estimate)
Full Time 1 Day Ago
Save

RIT Solutions, Inc. is Hiring a Lead Senior Cyber-Security Analyst/Engineer Near Fort Lauderdale, FL

Lead Senior Cyber-Security Analyst
Job Description
  • The Lead Senior Cyber-Security Analyst is a key member of the Information Security department and reports directly to the Manager, Security Operations Team with the primary responsibility to oversee the activities of Cyber Security Analysts within the Security Operations Team with regards to: Security Monitoring, Investigations and response, and threat intelligence.
Responsibilities include but not limited to:
  • Manage and conduct hands-on technical detection, analysis, containment, eradication, and response in support of day to day operations
  • Establish trust and business relationships with customer and other relevant stakeholders
  • Perform analysis and quality assurance for analyst product and work.
  • Technical lead for Security Incidents
  • Accountable for all Security Incidents tracked and Investigated by the Security Operations team.
  • Analyze attacker tactics, techniques, and procedures (TTPs) from security events across a large heterogeneous network of security devices and end-user systems.
  • Provide guidance and mentorship to improve analyst skill sets and ensure delivery of high quality analysis and work products
  • Capture Cybersecurity metrics in direct-support to executive-level briefings (daily, weekly, monthly)
  • Contribute to and lead improvements to the Security Operations monitoring, hunting, and incident management processes.
  • On critical security incidents, acts as incident manager and primary point of contact.
  • Lead Post-Incident Reviews.
  • Perform other related duties as assigned.
  • Creation and upkeep of attack vector specific playbooks for security incidents.
  • Accountable to lead all security incidents to timely and proper closure.
  • Responsible to be the Incident commander that drives the activities all individual involved in the incident.
    1. Each incident will also be assigned a SecOps Analyst who will have responsibilities for a majority of the activities.
    2. This role will also be responsible for driving individuals from other companies and areas, including vendors, JM TechOps, and the JM Business.
  • Timely reporting/updates on all relevant threats and incidents to management.
  • Able to oversee multiple investigations/incidents concurrently providing proper direction to each work stream.
  • Take's appropriate "Preparation" steps - creating knowledge, artifacts, and tools to be used during an actual incident.
Desired Skills:
  • Demonstrated experience working with MSFT Sentinel SIEM.
  • Possess a deep understanding of threat intelligence platforms, security automation and orchestration solutions, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), DLP and other network and system monitoring tools.
  • Needs to develop deep understanding of JM Family systems and how they might be attacked.
  • Deep understanding of popular attack vectors and how they might be used to infiltrate our systems.
  • Must understand proper handling of forensics.
  • Ability to explain complex security issues to analysts, engineers, managers, and executives
  • Highly independent and self-directed individual capable of working with minimal supervision.
  • In-depth experience of network devices such as switches and routers
  • In-depth experience of Microsoft Windows systems including active directory
  • In-depth experience performing forensics, malware reverse engineering, and penetration testing
Qualifications/Requirements:
  • Bachelor's Degree in IT related field or higher OR 10 years experience in an information technology field with a minimum of 3 years of cyber security response experience on a SOC/CIRT Team.
  • Experience leading SOC teams during cyber monitoring, hunting, and incident response investigations is required.
  • Experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE Telecommunication&CK framework.
  • Familiarity with Cloud concepts and experience performing monitoring and responding to threats in Cloud environments.
  • General knowledge and understanding of information security and privacy-related regulations.
  • Ability to effectively multi-task, prioritize and execute tasks in a high-pressure environment
  • Experience driving measurable improvement in monitoring and response capabilities at scale.
  • Critical thinking skills and the ability to solve problems as they arise
  • Experience performing forensics, malware reverse engineering, and penetration testing
  • In-depth understanding of security issues across many different platforms and capability to articulate and communicate these issues to both technical and non-technical audiences
  • Strong written and verbal communication skills required.
Possess any of the following are preferred:
Certified Information Systems Security Professional (CISSP)
GIAC Certifications 500 Level and Above

Job Summary

JOB TYPE

Full Time

SALARY

$104k-131k (estimate)

POST DATE

07/01/2024

EXPIRATION DATE

07/14/2024

RIT Solutions, Inc.
Full Time
$42k-55k (estimate)
2 Days Ago
RIT Solutions, Inc.
Contractor
$40k-52k (estimate)
2 Days Ago
RIT Solutions, Inc.
Full Time
$42k-55k (estimate)
2 Days Ago