tampa | Information Security Operations Analyst in Boca Raton, FL

Information Security Operations Analyst

  • Orangetheory Fitness Corp HQ
  • $55,890.00 - 128,520.00 / Year *
  • 7251 Boca Del Mar Dr
  • Boca Raton, FL 33433
  • Full-Time



Check out similar listings!

Loading some great jobs for you...




SUMMARYOBJECTIVE The Security Operations Analyst will report to the Senior Director of Technology and will be responsible for proactively maintaining cyber security and assisting in the information technology infrastructure, including hardware, software, cloud, networks, applications and services, through vulnerability management, incident response, monitoring and other security services. ESSENTIAL JOB FUNCTIONS Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Responsible for performing internal and external security assessmentstesting to validate the effectiveness of current security infrastructure through the use of commonly available security assessment tools and make recommendations to remediate identified risks or vulnerabilities. Responsible for analyzing, monitoring, tracking and reporting behaviortasks logged by assets in the form of incidents to ensure Orangetheory is protected from any potential leaks of malicious activities Identify threats and risks to the confidentiality, integrity and availability of all data residing on information systems platforms. Responsible for assisting in the development of appropriate security related policies, procedures, guidelines, standards, benchmarksmetrics andor processes for network infrastructure, servers, cloud, workstations, firewalls, intrusion detectionprevention (IDSIPS) appliances and software. Perform reviews and assessments of security controls before hardwaresoftware is migrated to production Responsible for assisting in various projects to ensure corporate governance of security and compliance with applicable regulations Monitor activities and events in Orangetheoryrsquos environment to ensure that anomalous behavior is detected, identified, classified and acted upon where appropriate Assess potential risks and vulnerabilities in the network and providing actionable recommendation in the event of malicious activity Perform ongoing reviews of all security activities and reports providing technical security oversight to detect meaningful data versus non-threatening anomalies Respond appropriately to security monitoring issues Develop and execute corrective action plans where required REQUIRED EDUCATIONEXPERIENCEQUALIFICATIONS Bachelors degree in Computer Science, Information Systems, Engineering or related major Minimum of 2 yearsrsquo experience in a security operations center andor system administration role Knowledge of security tools, such as firewalls, IDS, network security monitoring (NSM), endpoint detection and response (EDR), anti-malware, web proxies, SIEM Display flexibility and independence when asked to drive security-related initiatives and adapt to a fast paced, high growth culture Strong experience in cloud security and tools (e.g., AWS) Programming and scripting capabilities (e.g., PowerShell, Python, Perl) Knowledgeable about security issues, vulnerabilities, regulatory and legal changes, and security standards that may impact information security Solid working knowledge and understanding of multiple operating systems and commands, as well as an understanding of IT security and network best practices and softwarehardware solutions Ability to communicate security objectives orally and in writing to a variety of audiences. Ability to write security requirements and design documents Ability to analyze complex problems and recommendnegotiate solutions Maintains a broad knowledge of current and emerging network security threats Strong timeproject management skills with the ability to operate under deadlines and manage fluctuating workloads CISSP, EnCE, GSEC, GCIA, GCIH, GMON, CEH certifications are preferred SUPERIVISORY REQUIREMENTS This position does not currently manage employees.
Associated topics: attack, identity, iam, idm, malicious, phish, protect, security analyst, security engineer, violation


* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.