drjobs Cyber Security Analyst Progression

Cyber Security Analyst Progression

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Tampa, FL - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Helpful key words:

ICS/DCS/Scada

-Check updates and install packages work w/ plant maintenance

Diff network within power plant

-Vulnerability - HP patching applicable to laptop systems

-database outdated possibly - update and maintain

-documentation updating OT standards set of rules to comply with

4 major controls systems used/security platforms

Vendor side (tool /asset deploy updates):

-Emerson ovation

-GE mark 60

-ABB

-Allen Bradley

Cyber Security Analyst Progression

Cyber Security Analyst Level 1:

POSITION CONCEPT:
The Cyber Security Analyst Operational Technology (OT) is responsible for maintaining the security and integrity of operational technology systems through routine cybersecurity maintenance activities. Manages and continuously improves the asset inventory database to ensure accurate visibility and tracking of the operational technology. Supports the development and implementation of the organizations OT Cybersecurity program and framework aligning activities with industry standards and regulatory requirements. Collaboration with cross-functional teams ensures consistent application of security controls and continuous improvement of cybersecurity posture.

Cyber Security Analyst Sr Level 2:

POSITION CONCEPT:
The Cyber Security Analyst Sr is responsible for addressing Operation Technology (OT) vulnerabilities by taking the appropriate corrective action or following the appropriate escalation procedures assessing threat landscape confirming for secure configuration of Tampa Electrics OT assets identifying vulnerabilities applicable to the OT components and developing the remediation plans. Develop cybersecurity maintenance procedures and enforce OT cybersecurity framework and standards evaluate IT related needs of OT environment and team members and identify cybersecurity awareness gaps. Evaluate OT cyber assets and assign criticality rating to cyber assets and develop remediation plan for gaps in compliance of the systems with the OT cybersecurity program. Has increased responsibilities in security intelligence monitoring incident response and development of cybersecurity maintenance procedures. May serve as a project lead and mentor Cyber Security Analyst. Works under general supervision.

Cyber Security Analyst Lead Level 3:

POSITION CONCEPT:
The Cyber Security Analyst Lead is responsible for maintaining and improving OT cybersecurity framework and standards reviewing cybersecurity maintenance procedures and threat landscape assessment implementing vulnerability management technologies and vulnerability remediation plans. Lead will facilitate asset criticality evaluation process maintain cybersecurity maintenance schedule and train staff. Lead will maintain and improve the OT cybersecurity program ensuring its alignment with the latest industry standards (NERC NIST) build cross departmental ITOT collaboration educate team members the latest cybersecurity industry trends. Has increased responsibilities in evaluating industry standards and adopting them into cybersecurity controls. May serve as a project lead and mentor to other department team members.

Level 1:

DUTIES AND RESPONSIBILITIES:
Identifies cybers assets examines and extracts asset configuration updates the OT cyber asset database to protect operational technology. Installs security patches updates antivirus definitions and creates system backups. Collects maintains updates baselines of the operational systems updates cybersecurity SharePoint site for stakeholder engagement.
Reviews the releases of new CVEs from external sources for applicability to operational assets regularly.
Assists OT team l with IT-related work: software and hardware of HMIs and network appliances remote connectivity.

Level 2:

DUTIES AND RESPONSIBILITIES:
Evaluates network architecture system configuration and external connection layout to ensure compliance of operational technology systems with cybersecurity program. Reviews vendor manuals training materials industry standards and develops cybersecurity maintenance procedures.
Provides activities planning guidance feedback on work completed and training to Cybersecurity Analysts.
Evaluates new CVEs for applicability to OT cyber assets.

Level 3:

DUTIES AND RESPONSIBILITIES:
Translate all applicable standards (NERC CIP NIST CSF NIST 800-53 etc.) into appropriate systemic and procedural solutions. Review revise and update Energy Supplys operational technology cybersecurity standards and procedures.
Evaluate the Energy Supplys operational technology systems and coordinate necessary actions to maintain compliance with applicable internal and regulatory standards.
Develop management responses to internal and external government and regulatory audits and data requests with respective management and team members.
Review operational technology cyber asset management process. Train and educate team members and facilitate ITOT collaboration.

EDUCATION: Level 1 2 and 3
Required: High School Diploma or equivalent.
Preferred: Bachelors Degree in Computer Science Information Systems or other IT related discipline.

LISCENSES/CERTIFICATIONS: Level 1 2 and 3

Required: From the list of certification vendors one related Information Security professional certification or ability to obtain via self-study within one year of hire date
(ex: CISCO (ISC)2 GIAC ISA ISACA CompTIA e-Council etc.).

Preferred: three or more of the following or similar Information Security professional certifications (ex: ACE CCE CAP CEH CCNA CCNP CISA CISM CISSP CRISC EnCE GCCC GCDA GCED GCFA GCFE GCIA GCIH GCWN GICSP GMON GNFA GPEN GPPA GREM GWAPT GXPN OSCP SSCP).

EXPERIENCE:
Level 1: Required: 5 years of related Cyber Security industrial automation IT OT or Technical (hands-on networking telecommunications radios satellites communications etc. hardware software) experience.
May consider 2 years related experience with an Associates Degree or 1 year related experience with a Bachelors Degree in Computer Engineering/Science Cybersecurity Information Systems or other IT related discipline.

Level 2: Required: 6 years of related Cyber Security industrial automation IT OT or Technical (hands-on networking telecommunications radios satellites communications etc. hardware software) experience.
May consider 4 years related experience with an Associates Degree or 3 year related experience with a Bachelors Degree in Computer Science Information Systems or other IT related discipline.

Level 3: Required:8 years of related Cyber Security industrial automation IT OT or Technical (hands-on networking telecommunications radios satellites communications etc. hardware software) experience.
May consider 4 years related experience with an Associates Degree or 2 years related experience with a Bachelors Degree in Computer Science Information Systems or other IT related discipline.

Level 1:
KNOWLEDGE/SKILLS/ABILITIES:
Required:
Basic knowledge of industrial automation (ABB Allen Bradley Emerson GE Siemens) or basic knowledge of major operating system security (Windows Mac OS Linux/Unix) endpoint server and network security.
Basic knowledge of major security systems and functions for incident response monitoring and forensic activities: Firewalls IDS/IPS Antivirus/Antimalware SIEM Incident Response Threat Prevention Web/Application Control Filtering Email Filtering NetFlow Analysis Endpoint Security Configuration and Change Management File Integrity Monitoring and DLP.
Basic knowledge of log network and system forensic investigation techniques.
Basic working knowledge of networking protocols and systems administration.
Basic working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.
Basic working knowledge with packet analysis and malware analysis.
Basic working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP SOX and PCI.
Good analytical and risk assessment skills and strong listening written and computer communication skills for reporting and auditing purposes.

Preferred:
Performing cybersecurity maintenance activities: applying patches updating antivirus signatures creating system network appliances
Troubleshooting network communications
Supporting compliance audits
Designing implementing and supporting industrial automation systems
Designing and implementing a standard network architecture

Level 2:

KNOWLEDGE/SKILLS/ABILITIES:
Required:
Advanced working knowledge of major operating system security (Windows Mac OS Linux/Unix) web server security and network security.
Advanced working knowledge of major security systems and functions for incident response monitoring and forensic activities: Firewalls IDS/IPS Antivirus/Antimalware SIEM Incident Response Threat Prevention Web/Application Control Filtering Email Filtering NetFlow Analysis Endpoint Security Configuration and Change Management File Integrity Monitoring and DLP.
Advanced working knowledge of log network and system forensic investigation techniques.
Advanced working knowledge of networking protocols and systems administration.
Advanced working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.
Advanced working knowledge with packet analysis and malware analysis.
Advanced working knowledge (hands-on experience) of scripting in languages such as Python Bash or PowerShell.
Advanced working knowledge of penetration testing technologies and procedures.
Advanced working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP SOX and PCI.
Strong analytical and risk assessment skills as well as strong listening written and computer communication skills for reporting and auditing purposes.

Level 3:

KNOWLEDGE/SKILLS/ABILITIES:
Required:
Developing and implementing OT Cybersecurity program.
Evaluating and adopting cybersecurity controls to the OT environment.
Thorough working knowledge of major operating system security (Windows Mac OS Linux/Unix) web server security and network security.
Thorough working knowledge of major security systems and functions: Firewalls IDS/IPS Antivirus/Antimalware SIEM Incident Response Threat Prevention Web/Application Control Filtering Email Filtering NetFlow Analysis Endpoint Security Configuration and Change Management File Integrity Monitoring and DLP.
Expert working knowledge of log network and system forensic investigation techniques.
Expert working knowledge of networking protocols and systems administration.
Thorough working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.
Expert working knowledge with packet analysis and malware analysis.
Expert working knowledge (hands-on experience) of scripting in languages such as Python Bash or PowerShell.
Expert working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP SOX and PCI.
Strong analytical and risk assessment skills as well as strong listening written and computer communication skills for reporting and auditing purposes.
Preferred:
Thorough working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP SOX and PCI.
Expert working knowledge of reverse engineering malware.


Employment Type

Full-time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.