Full-time

Overview

About Public Consulting Group

Public Consulting Group LLC (PCG) is a leading public sector solutions implementation and operations improvement firm that partners with health, education, and human services agencies to improve lives.

Founded in 1986, PCG employs approximately 2,000 professionals throughout the U.S. all committed to delivering solutions that change lives for the better.

The firm is a member of a family of companies with experience in all 50 states, and clients in six Canadian provinces and Europe.

PCG offers clients a multidisciplinary approach to meet challenges, pursue opportunities, and serve constituents across the public sector.

To learn more, visit www.publicconsultinggroup.com.

Responsibilities

  • Performs security assessments of information technology (IT) systems to verify they comply with applicable security standards.
  • Performs reviews and assessments of organizational security controls (policies, processes, configurations) to verify they comply with applicable security standards.
  • Coordinates and / or conducts penetration testing or simulates attacks to look for vulnerabilities in systems before they can be exploited.
  • Coordinates with client organizations (state departments and federal agencies) to perform security audit activities.
  • Prepares reports that document findings from security assessments and testing.
  • Advises project managers of security and privacy requirements required by state and federal agencies.
  • Assists with development and implementation of security standards and best practices.
  • Interfaces with various architects, technicians, and business leaders to understand organizational needs, capabilities, and constraints related to IT security.
  • Researches the latest IT security trends.
  • Learns and adapts to new technologies in the ever-changing world of Information Security.
  • Creates and documents security and privacy policies, procedures, or contractual language, as required.
  • Recommends security enhancements.

Qualifications

  • Excellent interpersonal, verbal and written communication, including good presentations
  • Can multi-task, communicate clearly, learn new technologies and processes, and provide support to process / solution owners
  • Strong analytical and conceptual skills
  • Ability to thrive in various hierarchical situations
  • Self-motivated and quick learner
  • Pays close attention to detail
  • Ability to work within high-performing virtual teams and highly collaborative
  • Builds excellent relationships with key internal resources based on trust and confidence
  • Interested in both short-term results and long-term goals
  • Ability to work with resources in multiple locations and business units
  • Ability to get results while maintaining a service orientation
  • Broad knowledge and experience in project management methodologies including waterfall and agile (Scrum & Kanban).
  • DevOps experience and automated deployment of applications
  • Experience in working state and federal government agencies
  • Experience in working with and communicating with technical staff and subject matter expert
  • Experience with databases and SQL
  • Experience with penetration testing

Education : B.S. or B.A. degree is a plus, with related business discipline experience.

Experience : 3+ year of experience in information security or information risk management. General operating knowledge of security for application and infrastructure, security threat / risk / data classification.

Familiarity with industry standards NIST-800, HIPAA, HITECH, FERPA and various security protocols, such as PKI, SSL, Encryption, Data Redacting, DLP.

Familiarity with FireEye, Qualys, Email Security Systems, DLP, Data Encryption Antivirus, SIEM (Log Analysis), IRS Publication 1075, and Minimum Acceptable Risk Standards for Exchanges (MARS-E) a big plus.

3+ years managing or developing IT systems / solutions

Understanding of various systems, like MS Active Directory, MS Windows, MS Exchange, Unix / Linux OS.

Certification : Information security professional certifications such as CEH, CISSP, SANS, CISA, GIAC or similar are highly desired

LI-AH1

D-PCG

LI-remote

Compensation

Compensation for roles at Public Consulting Group varies depending on a wide array of factors including, but not limited to, the specific office location, role, skill set, and level of experience.

As required by applicable law, PCG provides the following reasonable range of compensation for this role : $100,000-$135,000.

In addition, PCG provides a range of benefits for this role.

Apply Now

Related Jobs

Cyber Security Consultant

Public Consulting Group Tallahassee, FL
APPLY

Overview

About Public Consulting Group

Public Consulting Group LLC (PCG) is a leading public sector solutions implementation and operations improvement firm that partners with health, education, and human services agencies to improve lives.

Founded in 1986, PCG employs approximately 2,000 professionals throughout the U.S. all committed to delivering solutions that change lives for the better.

The firm is a member of a family of companies with experience in all 50 states, and clients in six Canadian provinces and Europe.

PCG offers clients a multidisciplinary approach to meet challenges, pursue opportunities, and serve constituents across the public sector.

To learn more, visit www.publicconsultinggroup.com.

Responsibilities

  • Performs security assessments of information technology (IT) systems to verify they comply with applicable security standards.
  • Performs reviews and assessments of organizational security controls (policies, processes, configurations) to verify they comply with applicable security standards.
  • Coordinates and / or conducts penetration testing or simulates attacks to look for vulnerabilities in systems before they can be exploited.
  • Coordinates with client organizations (state departments and federal agencies) to perform security audit activities.
  • Prepares reports that document findings from security assessments and testing.
  • Advises project managers of security and privacy requirements required by state and federal agencies.
  • Assists with development and implementation of security standards and best practices.
  • Interfaces with various architects, technicians, and business leaders to understand organizational needs, capabilities, and constraints related to IT security.
  • Researches the latest IT security trends.
  • Learns and adapts to new technologies in the ever-changing world of Information Security.
  • Creates and documents security and privacy policies, procedures, or contractual language, as required.
  • Recommends security enhancements.

Qualifications

  • Excellent interpersonal, verbal and written communication, including good presentations
  • Can multi-task, communicate clearly, learn new technologies and processes, and provide support to process / solution owners
  • Strong analytical and conceptual skills
  • Ability to thrive in various hierarchical situations
  • Self-motivated and quick learner
  • Pays close attention to detail
  • Ability to work within high-performing virtual teams and highly collaborative
  • Builds excellent relationships with key internal resources based on trust and confidence
  • Interested in both short-term results and long-term goals
  • Ability to work with resources in multiple locations and business units
  • Ability to get results while maintaining a service orientation
  • Broad knowledge and experience in project management methodologies including waterfall and agile (Scrum & Kanban).
  • DevOps experience and automated deployment of applications
  • Experience in working state and federal government agencies
  • Experience in working with and communicating with technical staff and subject matter expert
  • Experience with databases and SQL
  • Experience with penetration testing

Education : B.S. or B.A. degree is a plus, with related business discipline experience.

Experience : 3+ year of experience in information security or information risk management. General operating knowledge of security for application and infrastructure, security threat / risk / data classification.

Familiarity with industry standards NIST-800, HIPAA, HITECH, FERPA and various security protocols, such as PKI, SSL, Encryption, Data Redacting, DLP.

Familiarity with FireEye, Qualys, Email Security Systems, DLP, Data Encryption Antivirus, SIEM (Log Analysis), IRS Publication 1075, and Minimum Acceptable Risk Standards for Exchanges (MARS-E) a big plus.

3+ years managing or developing IT systems / solutions

Understanding of various systems, like MS Active Directory, MS Windows, MS Exchange, Unix / Linux OS.

Certification : Information security professional certifications such as CEH, CISSP, SANS, CISA, GIAC or similar are highly desired

LI-AH1

D-PCG

LI-remote

Compensation

Compensation for roles at Public Consulting Group varies depending on a wide array of factors including, but not limited to, the specific office location, role, skill set, and level of experience.

As required by applicable law, PCG provides the following reasonable range of compensation for this role : $100,000-$135,000.

In addition, PCG provides a range of benefits for this role.

Full-time
APPLY

System Security Specialist

Visium Resources, Inc. Tallahassee, FL
APPLY

IntroductionVisium Resources has been asked to identify qualified candidates for this System Security Specialist position located in Tallahassee, FL.

This position is a contract hire opportunity which is expected to be either onsite or remote (which will be at the discretion of the supervisor) for a duration of one year with a strong possibility of a contract extension.

SummaryThe selected System Security Specialist will support the development, implementation and life-cycle management of new and existing enterprise technologies required to support the IT Security Administration Team.

Job Description : Technical Analyst for IT Security Continual Service Improvement : Perform activities within the Plan, Do, Check, Act lifecycle related to the effectiveness of security controls.

Service Reviews : maintain inventories of services and infrastructure utilized by the Security Administration Team and review their applicability to accomplishing team goals.

Process Evaluations : in coordination with the IT risk management process, evaluate the effectiveness of services by identifying and analyzing metrics and benchmarks in the interest of the Security Administration Team.

Initiatives : define initiatives to improve services and processes based on reviews and evaluations.Monitoring : track initiative effectiveness and assist in troubleshooting and refining changes to security operations.

Security Analyst for Security Administration Team : Analyze large amounts of data to identify patterns and potential risks.

Use data to make informed decisions and develop mitigation strategies.Perform information security and privacy incident response.

Communicate complex technical information to technical and non-technical stakeholders while demonstrating strong written and verbal communication skills.

Provide technical expertise to users, management, vendors, and peers for issues involving other department business offices and vendors.

Support and drive continuous service improvement efforts within the risk management process.Qualified candidates would have the following : 6 years of combined IT and security work experience with infrastructure / network and multi-platform environments including on-premises and cloud environments across IaaS, PaaS, SaaS, VM, bare metal, and other common IT platforms.

4 years of experience in operations and maintenance of endpoint-related security products (AV, EDR, XDR, drive encryption).

2 years of experience in operations and maintenance of Azure Active Directory security (events, incidents, login events, MFA).

2 years of experience in operations and maintenance of Office 365 Security and Compliance (one or all of Exchange online, SharePoint, Teams, OneDrive, Purview).

2 years of experience working in IT security identifying and assessing risks, developing risk management strategies, and implementing risk mitigation measures.

2 years of experience working in IT security operations in all stages of the Identify, Protect, Detect, Respond, and Recover lifecycle.

2 years of experience analyzing and investigating security alerts, events, and logs from various security tools and systems to determine the cause and extent of security breaches.

2 years of experience designing, implementing, and maintaining management systems to track progress of complex IT projects at an enterprise scale, to completion.

2 years of experience working with automated IT performance reporting (any tools).2 years of experience applying outcomes of incident analysis, risk management, and performance reporting to enable Continual Service Improvement (CSI).

Visium Resources is an award-winning employment firm with a mission to match talented individuals with highly successful organizations.

At Visium, our company"s success is based on your success. When you work with us, you are never 'just a number'. You are our most important asset.

Here, you will know us by name through our regular visits to client sites and even occasional luncheons. We will always be there when you need assistance and will always go the extra mile to ensure that you are as successful as possible.

Whether you're looking for contract, contract-to-hire or permanent opportunities, we firmly believe there is no employment agency that will work harder for you than Visium.

Visium Resources is an equal opportunity employer and values diversity. All employment is decided based on qualifications, merit and business need.

Permanent
APPLY

Okta Security Analyst

Gravity IT Resourcing Tallahassee, FL
APPLY

Apply Now

Job Title : Okta Security Analyst

Location : Remote

Job Type : Contract

Referral Fee :

Salary Range : 115-145k

Employment Eligibility : Gravity cannot transfer nor sponsor a work visa for this position. Applicants must be eligible to work in the U.S. for any employer directly

Position Overview

Our client is seeking a skilled Okta IAM Security Analyst / Specialist to join their team. This person will have Expertise in OKTA, Access Gateway, Single Sign-On, Adaptive MFA, Universal directory, Advanced Server Access, API Access Management, Secure authentication, access management systems, Identity as a Service (IDaaS), WS-Federation, OAuth, OpenID Connect and Life Cycle Management to support design, implementation and support for end to end deployment.

Duties and Responsibilities

  • Expertise in OKTA, Access Gateway, Single Sign-On, Adaptive MFA, Universal directory, Advanced Server Access, API Access Management, Secure authentication, access management systems, Identity as a Service (IDaaS), WS-Federation, OAuth, OpenID Connect and Life Cycle Management.
  • Extensive and demonstrated experience in end-to-end deployment of OKTA solution.
  • Experience with OKTA planning, implementation, and operations.
  • Experience in integrating Okta with on-premises directory and Cloud.
  • Analyze, design, develop, implement, and support Okta integrations for various business functions.
  • Configure Okta to provide enterprise Single Sign-On services and enable Multi-Factor Authentication (MFA) platform features for internal and external applications.
  • Identify required attributes, customizing login pages and implement security policies.
  • Follow SDLC (Agile), change management and document the procedures on OKTA solutions to meet compliance requirements.
  • Assist application teams through the SDLC process (including requirements gathering, configuration, testing to integrate applications with Okta).
  • Contribute to support repeatable processes for Access Management using Okta.
  • Understanding of cloud computing architecture, technical design and implementations, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) delivery models.
  • Experience in various authentication standards such as Security Assertion Markup Language (SAML), OAuth and OpenID Connect.
  • Experience with various LDAP products including AD.
  • Managing cloud identity profiles.
  • Mentoring and training others in the use and functionality of the Okta SaaS products including MFA and ensuring analysis, design, implementation, and support artifacts meet or exceed established Service Level objectives
  • Anticipate, identify, track and resolve technical issues

Required Experience and Skills

  • Bachelor’s degree in Business Administration, Computer Science, Engineering, MBA or related field preferred
  • 5 + years in experience in Okta Identity Access Management
  • Experience in developing and supporting and administering Okta IAM
  • Experience in working with large IT teams to execute and lead successful project implementations
  • Ability to effectively prioritize and execute tasks in a fast paced, high velocity, environment; ability to stay focused on responsibilities, meet deadlines and manage competing priorities under pressure.
  • Ability to drive effective meetings : workshops, design, and problem-solving sessions. Ability to present ideas in business friendly and user-friendly language;

demonstrated aptitude for working with, supporting and communicating with

Apply Now

Temporary
APPLY

Physical Security Analyst

Acuren Tallahassee, FL
APPLY

Job Details

Description

GENERAL DESCRIPTION OF POSITION

The position of Physical Security Analyst reports to the Sr Physical Security Officer.This job is responsible for ensuring that company employees and customers have a safe and secure environment from which to work and transact business.

In doing so, the SAI will assist in overseeing security policies and procedures, monitor and respond to security incidents, as well as conduct security scans of company facilities (both in person and virtually) to ensure adherence to policies and procedures.

Additionally, the Physical Security Analyst is responsible for assisting in the assessment of risks and the offering solutions for mitigation.

ESSENTIAL DUTIES AND RESPONSIBILITIES

1. Conduct physical security and risk vulnerability inspections, evaluate and provide recommendations for mitigation.

2. Develop and implement physical security standards and procedures. This duty is performed as needed.

3. Evaluate existing security policies and procedures.

4. Assist in the development of security training for company personnel.

5. Recommend actions to avoid conditions conducive to threats such as vandalism, terrorism or theft.

6. Evaluate clearances for management and personnel according to the information and property they may access.

7. Review facilities designs and assist in designing the appropriate security measures for the property to include access, alarms, cameras, DVRs, etc.

8. Prepare reports related to security incidents, access,effectiveness of the security program, and risk assessments.

9. Serve as a conduit between retail staff and third party security providers.

10. Assist with developing a strategic framework to ensure security upgrades are completed timely and in order of risk posed to the company.

11. Conduct video reviews such as pulls for Law Enforcement , HRand Subpoenas and respond in a timely manner.

12.Completes required BSA / AML training and other compliance training as assigned.

13. The ability to work in a constant state of alertness and in a safe manner.

14. Perform any other related duties as required or assigned.

QUALIFICATIONS

To perform this job successfully, an individual must be able to perform each essential duty mentioned satisfactorily.The requirements listed below are representative of the knowledge, skill, and / or ability required.

EDUCATION AND EXPERIENCE

Knowledge of a specialized field (however acquired), such as basic accounting, computer, etc. Equivalent of four years in high school, plus night, trade extension, or correspondence school specialized training, equal to two years of college, plus 2 years related experience and / or training, and 1 to 6 months related management experience, or equivalent combination of education and experience.

COMMUNICATION SKILLS

Ability to effectively communicate information and respond to questions in person-to-person and small group situations with customers, clients, general public and other employees of the organization.

ability to write reports, business correspondence, and policy / procedure manuals; ability to effectively present information and respond to questions from groups of managers, clients, customers, and the general public.

MATHEMATICAL SKILLS

Ability to add, subtract, multiply, and divide in all units of measure, using whole numbers, common fractions, and decimals.

Ability to compute rate, ratio, and percent and to prepare and interpret bar graphs.

CRITICAL THINKING SKILLS

Ability to solve practical problems and deal with a variety of known variables in situations where only limited standardization exists.

Ability to interpret a variety of instructions furnished in written, oral, or diagram formats.

REQUIRED CERTIFICATES, LICENSES, REGISTRATIONS

Not indicated.

PREFERRED CERTIFICATES, LICENSES, REGISTRATIONS

CompTIA A+ Certification

CompTIA Security+ Certification

SOFTWARE SKILLS REQUIRED

Intermediate : 10-Key, Alphanumeric Data Entry, Contact Management, Presentation / PowerPoint, Spreadsheet, Word Processing / Typing

Basic : Accounting, Database

WORKING CONDITIONS

Periodically exposed to such elements as noise, intermittent standing, walking, pushing, carrying, or lifting; but none are present to the extent of being disagreeable.

ENVIRONMENTAL CONDITIONS

The following work environment characteristics described here are representative of those an employee encounters while performing essential functions of this job.

Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

The noise level in the work environment is usually moderate.

PHYSICAL ACTIVITIES

The following physical activities described here are representative of those that must be met by an employee to successfully perform the essential functions of this job.

Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions and expectations.

Semi-repetitive, low physical. Semi-repetitive type work which requires periods of concentration for varied time cycles as prescribed by the tasks.

While performing the functions of this job, the employee is regularly required to sit, use hands to finger, handle, or feel, talk or hear;

frequently required to reach with hands and arms; and occasionally required to stand, walk, climb or balance, stoop, kneel, crouch, or crawl.

The employee must occasionally lift and / or move up to 25 pounds. Specific vision abilities required by this job include close vision; and distance vision.

ADDITIONAL INFORMATION

General knowledge related to physical security, DVRs, and video surveillance preferred.

Knowledge and experience with Verint Systems' Ops-Center and Vid-Center preferred.

Knowledge and experience with Pacom Systems preferred.

1 year of experience in Retail Banking / Financial Services preferred

Full-time
APPLY

Security Analyst - Advanced

TECKpert Tallahassee, FL
APPLY

We are looking for an Security Analyst - Advanced to support our client based in Tallahassee, FL US BASED CANDIDATES ONLY.

This is an on-site position. Candidates must be located in Tallahassee, FL. Who we are Founded in 2009 and headquartered in beautiful Miami, FL, TECKpert is a tech consulting and staff augmentation firm.

At TECKpert, we offer a contingent workforce built for any size digital transformation project. Experts in design, development, IT, analytics and marketing, provide innovative digital solutions to achieve success in our new economy.

Our leaders identify the technical talent best suited to bolster our client’s capabilities, across all industries, including, healthcare, government, finance, legal, real estate, and startups.

The project TECKpert seeks to hire an Network Security Analyst - Advanced to support our client, a government agency based in Tallahassee, FL.

The contractor shall provide technical capability, knowledge, industry partnerships, experience, and expertise / proficiency required to design, code, modify, and support the Department’s information technology security solutions. Job duties shall include -

  • Monitoring the department’s IT systems and networks for security threats, vulnerabilities, and anomalies.
  • Responding to security incidents, containing incidents, and investigating root cause.
  • Identifying and remediating vulnerabilities, to include the implementation of scanning tools, disaster response plans, incident response plans, and firewalls and the conducting of penetration testing.
  • Designing and implementing security architecture that ensures confidentiality, integrity, and availability of the department’s data and applications.
  • Ensuring that the department complies with applicable regulatory requirements and industry standards.
  • Promoting security awareness with the department. Compensation and Term This opportunity is for a full-time, one year contract position with possible extensions and pay commensurate with experience up to $50 / hour or $104,000 per year.

Medical, dental, vision and life insurance available after 30 days of hire. Candidates are expected to work onsite at our client’s location.

Interview will be held either virtually or in person Qualifications you need A successful Network Security Analyst - Advanced candidate possesses or provides the following : Bachelor's degree in computer science, software engineering, or a related field

  • Four years of experience working in an IT security capacity
  • A current security certifications (e.g. CompTIA Security+, CISSP, CEH, GCIH, etc.)
  • A strong understanding of the latest security threats, vulnerabilities, and exploits
  • Knowledge of cybersecurity frameworks such as NIST, CIS, and ISO
  • Knowledge of cloud security
  • A demonstratable track record of incident response experience Additional Skills - 1. Technical Understanding
  • Network Security : A deep understanding of network security protocols, including TCP / IP, DNS, VPN, and SSL. The candidate should be able to monitor and secure network traffic, detect network-based attacks, and configure network security devices.
  • Operating Systems : The candidate should be proficient in Windows, Linux, and other operating systems. They should be able to secure the operating systems by hardening them, configuring firewalls, and monitoring system logs for signs of intrusion.
  • Databases : The candidate should have experience with database security and be familiar with database management systems such as Oracle, Microsoft SQL Server, and MySQL.

They should be able to implement security measures such as access control, encryption, and auditing.

Cloud Security : The candidate should have knowledge of cloud security concepts, including identity and access management, virtualization, and cloud-based security services.

They should be able to assess and mitigate the security risks associated with cloud computing.

  • Programming : The candidate should have knowledge of programming languages such as Python, Perl, and Bash, and be able to write scripts for automating security tasks such as log analysis and vulnerability scanning.
  • Cyber Threats : The candidate should have an in-depth understanding of various cyber threats such as malware, phishing, social engineering, and zero-day attacks.

They should be able to identify, analyze, and respond to these threats in real time.

Planning : The candidate should have knowledge and experience relating to the development of disaster recovery plans and incident response plans.

2. Communication, Problem Solving. Leadership, Team work *no third parties and no sponsorship* Working with us Working with TECKpert means more options.

As new opportunities arise, you tell us what you think is a good fit for you. What industries interest you most? Do you prefer an on-location, 9-5?

Or would you want a flexible schedule and remote work? We proudly offer a wide variety of roles. Many of our TECKperts enjoy coworking and skills training coupled with the stability of full-time employment.

We believe TECKpert gives today's digital professionals an agile path to start and advance their career. All of our opportunities require at least 20 hours per week and can be one to twelve months in length.

Choose the opportunity that matches your interest and desired cadence. TECKpert provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Powered by JazzHR

Full-time
APPLY