The selected applicant will be expected to perform a combination of the following tasks:
Monitor security platforms, including SIEM, EDR, and cloud-native security tools, for indicators of compromise (IOCs), indicators of attack (IOAs), and incident response requirements.
Utilize Microsoft Defender XDR components (Endpoint, Cloud Apps, Identity, Office 365) for monitoring, analysis, and response.
Identify, triage, and investigate phishing incidents, including those submitted by end users.
Perform Identity and Access Management (IAM) activities, focusing on identifying and managing risky users, risky sign-ins, and correlating sign-in events.
Conduct in-depth investigations of security alerts; perform triage and escalate or resolve incidents according to established procedures.
Produce thorough documentation, including after-action reports and lessons learned, aligned with incident severity and organizational standards.
Adhere to strict threat escalation policies based on incident classification, threat type, and statutory requirements.
Support the full incident response lifecycle: detection, containment, eradication, recovery, and post-incident reporting.
Maintain, tune, and optimize security detection rules, alerts, and automations to reduce false positives and improve detection accuracy (with proper approvals).
Follow established change management processes for all configuration or detection control modifications.
Stay informed on emerging threats, evolving attack techniques, and advancements in security technologies.
Assist in the development and implementation of security policies and procedures.
Prepare and maintain security documentation.
Develop risk analyses and security reports.
Monitor and remediate software and hardware vulnerabilities.
Evaluate current and future security tools and systems.
Document hours worked by task.
Follow FWC IT processes and coordinate with IT staff to ensure compliance with FWC standards.
Comply with and enforce all agency policies, procedures, and security requirements.
Provide technical training (knowledge transfer) to Office of Information Technology support staff as required.
Work location will include a combination of onsite work at FWC offices in Tallahassee, Florida, and remote work, as defined per project.
Deliverables and performance standards for each task are further defined in the Standards and Specifications table below.
Qualification Requirements for Contractor
Four or more years of combined IT and security experience within a cybersecurity-related discipline.
Three or more years of experience with KQL, Python, PowerShell, or batch scripting.
Two or more years of experience with cloud computing and cloud security.
Knowledge of security issues, techniques, and implications across various computing platforms.
Fundamental understanding of regulatory frameworks and standards such as NIST 800-53 Rev. 5, CJIS Security Policy, and 60GG-2.
Strong communication and documentation skills.
Demonstrated analytical and critical thinking skills for effective decision-making during security events.
Ability to manage stress and remain composed during high-pressure security incidents.
Solid understanding of the MITRE ATT&CK framework, including TTPs.
Must be CJIS certified or able to obtain certification.
Education
Bachelor’s degree or higher in Computer Science, Information Security, or a related field.
Relevant experience may substitute for the recommended education on a year-for-year basis, and additional education may substitute for experience on a year-for-year basis.
Relevant certifications may include Security+, CySA+, Network+, SSCP, CISSP, CCSP, SecurityX/CASP+, or PenTest+.