Pinellas County Government offers an excellent Benefits Package!  Please note that Relocation is not provided.

Pinellas County Government has transitioned to a new application system.

Applicants who have not applied for employment with Pinellas County since March 2014 will be required to establish an account. 

If you have previously established an account, you can login here to apply for this position.

Previous Applicants:

If you do not remember your password click here.


If you have not created an account, click "Apply for this Position" to start the application process.




About the Position


Information Technology Analyst, Sr.

ID: 2248
Classification: Information Technology Analyst, Sr.
Working Title: Sr. Security Analyst
Specialized Field: IT Security
Classified or Exempt: Exempt
Department Vacancy: Business Technology Services
Work Site: 315 Court Street
Clearwater, FL 33756
Work Schedule: Monday - Friday; 8:00 am - 5:00pm
Post Date: 5/25/18
Close Date: 6/24/18
# of Openings: 1
Pay Grade: P1
Pay Range: Starting $70,000.00 - $90,000.00

Description

Pinellas County’s Business Technology Services Department is looking for a motivated new member for the Information Security Team. Candidates must be familiar with security technologies, including but not limited to event logging and correlation systems, computer forensics programs, vulnerability scanners and penetration testing software. Information Security Analysts should be adaptable to the needs of the organization and clients as well as capable of independent and outside-the-box thinking. In addition to our excellent benefits (Pension/Investment Plan, Health Insurance, 457 Deferred Compensation Program and many others), team members can expect opportunities to receive ongoing training, attend conferences and gain further exposure to the technologies and tools in the field of Cyber Security.

Minimum Qualifications Requirements

  • A combination of related education, training, and/or experience totaling 7 years or more in any of the 5 subject matter tasks listed below that includes customer service and 1 year of professional team leadership or supervision.
  • Associate’s degree in information technology, computer science, computer technology, or related field and 5 years’ experience in any of the 5 subject matter tasks listed below that includes customer service and 1 year of professional team leadership or supervision
  • Bachelor’s degree and 3 years’ experience in any of the 5 subject matter tasks listed below that includes customer service and 1 year of professional team leadership or supervision.
  • Master’s or higher level degree in information technology, computer science, computer technology, or related field and 1 year experience in any of the 5 subject matter tasks listed below that includes customer service and 1 year of professional team leadership or supervision.
  • An equivalent combination of education, training, and/or experience.

Subject Matter Tasks

  • Experience configuring and monitoring security technologies such as intrusions detection (Snort, Security Onion), honeypots and vulnerability management tools (Nessus and Kali, CoreImpact).
  • Log aggregation and indexing such as Splunk Enterprise & Splunk Enterprise Security (SIEM).
  • Policy & Procedure Writing and Security Frameworks like NIST, ISO, CIS
  • Experience performing risk assessments and IT audits.
  • Forensic Analysis of systems using tools like FTK, Sleuthkit, Autopsy, EnCase

Additional Requirements

  • Assignment to work a variety of work schedules including compulsory work periods in special, emergency, and/or disaster situations.
  • Must possess and maintain a valid Florida Driver’s License.

Highly Desirable

  • One or more of the following certifications:  CISSP, CEH, GIAC.

Essential Tasks

  • Perform all aspects of a security management program; vulnerability management, risk management, perimeter and endpoint security, security policy, security awareness, incident response, monitoring, and auditing
  • Install, configure and maintain all facets of the security infrastructure
  • Troubleshoot and resolve complex security issues
  • Participates in project work providing support to project teams, with the ability to lead large efforts
  • Establishes system specifications/standards
  • Collaborates on critical technology projects to ensure that security requirements are addressed throughout the project lifecycle
  • Investigates security alerts produced by security solutions, including validation, containment, remediation and root cause analysis
  • Stays current on potential information security threats, trends, emergent technologies, and best practices in order to mature the information security program
  • Reviews firewall requests and perform firewall audits
  • Plans and executes the installation, configuration, monitoring, and testing of hardware/software, while giving appropriate consideration to network limitations for production systems.
  • Identifies beneficial technology, champions its adoption, and provides direction/ leadership to the team while working through appropriate channels/processes.
  • Maintains and builds positive relationships with the Team, Department, County and Vendors while promoting the vision for cost-effective technology solutions.
  • Mentors colleagues by designing and/or conducting training programs; providing references and support. Demonstrates technical leadership that fosters commitment, team spirit, pride and trust.
  • Facilitates and fosters open communication and cooperation within the organization and with customer groups in a team environment.
  • Meets financial requirements by submitting creative solutions for complex budgets.
  • Understands complex software/hardware/service agreements and has the ability to make decisions maximizing investments.
  • Stays on the cutting edge of relevant technology by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.
  • Accomplishes organization goals by accepting ownership and driving issues to a successful close, even when accountability for those issues cross organizational boundaries.

Knowledge Skills & Abilities

  • Experience implementing anti-malware, anti-virus, web filtering, application control, and data leakage protection.
  • Knowledge of application protection technologies and secure development concepts.
  • Experience performing network and web application penetration testing.
  • Experience creating security policies and best practices.
  • Knowledge of confidentiality, integrity, and availability security principles.
  • Knowledge of Forensic Auditing of Firewalls, Network Devices and Systems
  • Knowledge of Information Privacy Standards like HIPAA, PCI, FERPA, CJIS
  • Knowledge of Linux and Windows system administration.
  • Knowledge of Virus / Malware Analysis via Cuckoo Sandbox
  • Good Social / Customer Service / Communication Skills

 

Below is a preview of the supplemental questions you will have to answer during the application process.

Supplemental Preview: What is your minimum starting salary requirement?

Subject Matter Tasks
• Experience configuring and monitoring security technologies such as intrusions detection (Snort, Security Onion), honeypots and vulnerability management tools (Nessus and Kali, CoreImpact).
• Log aggregation and indexing such as Splunk Enterprise & Splunk Enterprise Security (SIEM).
• Policy & Procedure Writing and Security Frameworks like NIST, ISO, CIS
• Experience performing risk assessments and IT audits.
• Forensic Analysis of systems using tools like FTK, Sleuthkit, Autopsy, EnCase

Of the following, which statement matches your education and work experience?

1 = I possess a combination of related education, training, and/or experience totaling at least 7 years in any of the 5 subject matter tasks listed above.
2 = I possess an Associate’s degree in information technology, computer science, computer technology, or related field and at least 6 years experience in any of the 5 subject matter tasks listed above.
3 = I possess a Bachelor’s degree in information technology, computer science, computer technology, or related field and at least 3 years experience in any of the 5 subject matter tasks listed above.
4 = I possess a Master’s or higher level degree in information technology, computer science, computer technology, or related field and at least 1 year experience in any of the 5 subject matter tasks listed above.
5 = None of the above.

Of the following, which Subject Matter Tasks do you have professional experience? To select multiple items that are not contiguous, click the first item, hold down the CTRL key, and click each of the other items you want.

1 = Experience configuring and monitoring security technologies such as intrusions detection (Snort, Security Onion), honeypots and vulnerability management tools (Nessus and Kali, CoreImpact).
2 = Log aggregation and indexing such as Splunk Enterprise & Splunk Enterprise Security (SIEM).
3 = Policy & Procedure Writing and Security Frameworks like NIST, ISO, CIS
4 = Experience performing risk assessments and IT audits.
5 = Forensic Analysis of systems using tools like FTK, Sleuthkit, Autopsy, EnCase

Please indicate how many years of professional experience you possess in each Subject Matter Task you selected. If you don’t have this type of experience, type N/A.

Do you possess at least 1 year of team leadership or supervision experience that includes service experience?
No
Yes

This position is required to work a variety of work schedules including compulsory work periods in special, emergency, and/or disaster situations. Are you willing and able to fulfill this requirement?
No
Yes

What area of information security are you most interested in? (networking, systems, auditing, compliance, forensics, etc.)

Please describe how you stay on the cutting edge of relevant technology by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.

Where did you find out about this position?

If you were referred by a current Pinellas County Government employee, please provide the first and last name of the person who referred you.

If you were not referred by a current Pinellas County Government employee, please indicate where you found out about this position, e.g. the Job/Career Fair attended, the name of the Newspaper/Magazine, the name of the School/University or if you selected “Other”, please indicate where.

EOE/AA/ADA/DFW/VP

 

Certain servicemembers and veterans, and the spouses and family members of the servicemembers and veterans, receive preference and priority in employment by the state and are encouraged to apply for the positions being filled.

Ciertos miembros del servicio y veteranos, sus esposas/os, y sus familiares reciben preferencia y prioridad en el empleo  con  el gobierno y se les recomienda que apliquen para los puestos.

Please allow 45 minutes to an hour to complete your online application and answer any Supplemental Questions that may be required for any position.

All REQUIRED fields must be completed.


Back to Search Results

New Search