Employment Opportunity

Cyber Security Analyst

City of Miami Information Technology, Miami, Florida

Salary: $82,167.07 - $154,938.37 Annually

Final Filing Date: Open until filled

This is technical, specialized work in the Information Technology Department responsible at the macro-level for analyzing, collecting and operating, investigating, maintaining, protecting and defending, as well as formulating the organization's cybersecurity and risk requirements across all information technology (IT) systems.

Duties and Requirements Click to read more


  • Performs real-time proactive security monitoring, detection and response to security events and incidents across multiple security solutions within the organization.
  • Triage and conducts initial investigation of security events generated by detection mechanisms such as security information and event management (SIEM), intrusion detection/prevention systems (IDS/IPS), end point security, ticketing, and customer contact, including the use of advanced network and hosts forensic tools.
  • Categorizes security events and raises necessary incidents after thorough quality check of the event.
  • Conducts configuration and vulnerability scanning for reporting and making recommendation to improve security posture.
  • Writes custom scripts, employs authorized utilities, and utilizes advanced security tools to identify and eliminate security threats.
  • Analyzes all available data sources to locate threats within the environment, predict future threat behavior, devise methods to eliminate threats and perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
  • Characterizes and analyzes network traffic to identify anomalous activity and potential threats to network resources, and documents and escalates incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
  • Ensures that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level, and recommends and/or develops content for cyber defense tools.
  • Writes incident response summary reports, including cyber defense trend analysis and reporting, for internal and external audiences.
  • Maintains situational awareness of latest cybersecurity threats, vulnerabilities and mitigation strategies.
  • Performs security reviews and periodic audits to identify security gaps, violations and inefficiencies in the security architecture to make recommendations for inclusion in the risk mitigation strategy.
  • Incorporates threat intelligence feeds into analysis of the organization's security posture and incident response.
  • Uses statistics and advanced analytics to identify anomalies, trends, and relationships within information security related data to propose recommendations for improvement.
  • Protects data and information systems against unauthorized access, modification or destruction.
  • Analyzes malicious activity and security breaches to determine their root cause, weaknesses exploited, exploitation methods, and impact on systems, and proposes solutions to correct and improve, as well as monitoring external data sources to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.
  • Upgrades and maintains information security systems
  • Continuously improves the organization's security posture by implementing and maintaining security controls.
  • Conducts web application testing.
  • Configures and maintains data loss prevention solutions and performs data classification related tasks.
  • Uses authorized exploitation techniques and tools to identify vulnerabilities.
  • Conducts forensic analysis on systems to identify root cause of security issues and/or events.
  • Prepares and provides cybersecurity recommendations including security posture trends to leadership based on significant threats and vulnerabilities, as well as security awareness materials and training for department staff.
  • Works with stakeholders to resolve computer security incidents and vulnerability remediation, and compliance.
  • Performs other related work as required.


  • Bachelor's degree in Management Information Systems, Computer Science, Information Technology or closely related field;
  • Thorough four (4) years experience at the macro-level for analyzing, collecting and operating, investigating, maintaining, protecting and defending, as well as formulating the organization's cybersecurity and risk requirements within its information technology (IT) systems, which must have included at least two (2) years of working with current releases of Microsoft Windows Operating Systems (Server & Workstation), Anti-virus programs and endpoint security solutions, Backup and Disaster Recovery, Data encryption, Firewalls, Network Intrusion Prevention, Content filtering, Auditing, various Virtual Private Network (VPN) software and protocols, or testing security controls;
  • Possess at least one of the following certifications at time of application and maintain it valid throughout employment in the classification: GIAC Security Essentials (GSEC), Systems Security Certified Practitioner (SSCP), EC-Council Certified Security Analyst (ESCA), CompTIA Security+ (Security+), or Cisco Certified Network Associate – Security (CCNA-S).
  • OR
  • Equivalent combination of education and experience beyond a high school diploma or its equivalent.

Do you have the Education Required? See available on-line and campus-based degree programs now!

How to apply: Apply online

Posted: April 20, 2018

NOTE: The crime-scene-investigator.net is not responsible for typographical errors or omissions in employment notices on this web site. Often, employers change final filing dates, change duties and/or requirements, or close employment openings without notice. If you are interested in a job posted on this site be sure to contact the employer to see if changes in the filing date or job announcement have been made. Employers can also provide more information about open positions that does not appear in the announcements on these pages.