×
Register Here to Apply for Jobs or Post Jobs. X

Information Security Analyst Iv

Job in Tallahassee, Franklin County, Florida, 32318, USA
Listing for: State of Florida
Full Time position
Listed on 2026-02-28
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 53000 - 60000 USD Yearly USD 53000.00 60000.00 YEAR
Job Description & How to Apply Below
Position: INFORMATION SECURITY ANALYST IV - 37011231
Location: Tallahassee

Requisition No: 870717

Agency:
Environmental Protection

Working Title:

INFORMATION SECURITY ANALYST IV -

Pay Plan:
Career Service

Position Number:

Salary: $53,000 - $60,000

Posting Closing Date: 02/27/2026

Position Overview and Responsibilities

DEP’s Office of Technology and Information Services (OTIS) is currently recruiting for an Information Security Analyst IV. This is a highly technical position that assists in the creation and execution of operational security initiatives on a continuing basis to improve the agency’s information security posture. The incumbent of this position will represent OTIS and must be helpful, cooperative, polite, respectful, and courteous at all times in interactions with customers.

Specific duties and responsibilities include:

  • Assist in the creation, maintenance, and establishment of information security incident response plans and procedures. Per Rule 60GG-2, F.A.C. Information Technology Standards, this includes, but is not limited to:
      • Developing and maintaining processes or protocols to ensure security requirements are incorporated into the change control process.
      • Establishing and maintaining policy and regulatory expectations for protection of the physical operating environment for agency-owned or managed IT resources.
      • Establishing and maintaining a policy and procedure review process that facilitates continuous improvement to protection processes.
  • Assist with the following ISM duties required per Rule 60GG-2:
      • Establishing and maintaining an information security program that includes information security policies, procedures, standards, and guidelines.
      • Establishing and maintaining an information security awareness program.
      • Establishing and maintaining information security risk management process, including the comprehensive risk assessment required by section 282.318, F.S.
      • Establishing and maintaining Computer Security Incident Response Team.
      • Establishing and maintaining a disaster recovery program that aligns with the agency’s Continuity of Operations (COOP) Plan.
      • Proactively research latent security threats and recommend risk mitigation actions.
      • Performing information security investigations that could potentially impact the employment status of employees (OPS, career service, SES, SMS, contractors).
      • Performing information security investigations in conjunction with the Inspector General’s Office and law enforcement agencies.
  • Review and modify firewall rules iteratively to be more secure.
  • Manage and configure the agency’s endpoint security solution.
  • Respond to information security incidents and execute countermeasures.
  • Create, maintain, establish, and review application security standards and implementation plans and procedures as part of a secure software development lifecycle process.
  • Review access requests and provide access control oversight.
  • Maintain technical skillset to adapt to new technologies as they emerge including researching and recommending security-focused training for themselves and others in the division.
  • Ensure cryptographic standards are maintained in systems and applications.
  • Maintain compliance with CJIS systems and recommend technologies and procedures, if required, for on-premises and cloud-based CJIS infrastructure.
  • Evaluate desktop policies to ensure proper patching levels and security policies are maintained.
  • Assist with non-routine and unforeseen administrative tasks because of incidents, activations, or direction of leadership.
  • Research, analyze, draft, and implement cybersecurity policies and best practices which support DEP Enterprise.
  • Monitor trends and coordinate with the Information Security Manager in order to identify needed changes to cybersecurity rules and policies.
  • Perform other duties as assigned.

Attendance is an essential function of this position.

Required Knowledge, Skills, and Abilities
  • 4 years’ experience in an Information Technology customer service position.
  • 2 years’ experience working to create, maintain, establish, and review complex programmatic scripting languages such as Power Shell, WSH, Python, or Perl.
  • 1 year’s experience in a technical position requiring status updates and communication directly with customers and/or leadership…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary