Posting Code:
Job Title:
Cyber Security Analyst
Seaboard Marine
Miami, FL
Zip Code:


The security analyst position leverages emerging threat intelligence (IOCs, updated rules, etc.) to identify affected systems and the scope of the attack. Reviews and collects asset data (configs, running processes, etc.) on these systems for further investigation. Determines and directs remediation and recovery efforts. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.  The requirements listed below are representative, but not necessarily a complete list, of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.



Applications out of the geographic region for this position will not be considered.




  • Bachelor’s Degree in Information Systems and minimum (5) years of experience in working with cyber security. In lieu of degree, minimum 10 years’ experience in information technology.

  • Strong understanding of CIS Critical Security Controls

  • Ability to differentiate between potential intrusion attempts and false alarms.
  • Risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies and security attack pathologies ISO 27001/27002, ITIL, PCI-DSS, NIST and COBIT framework analysis and applications
  • Operating systems security and system hardening.
  • Security concepts related to vulnerability assessment and monitoring of cloud technologies.
  • Practices and methods of IT strategy, enterprise architecture and security architecture.
  • Knowledge of third party auditing and cloud risk assessment methodologies.
  • Experience with data protection concepts and data loss prevention.

  • Strong written and verbal communications skills with an ability to express complex technical concepts to an executive audience.
  • Intermediate to Advanced Computer skills in programs such as Excel
  • Ability to verbally communicate in Spanish at an intermediate level.
  • Ability to think logically, follow procedures, instructions and make sound decisions
  • Ability to define problems, collect data, establish facts and draw valid conclusions
  • Possess organizational and time management skills with ability to prioritize and be detail oriented
  • Ability to work within a team or independently, with limited supervision, multitask and possess strong initiative
  • Ability to work a flexible schedule, extended hours, holidays, and/or weekends as needed.


  • Certifications (CISSP, GCIA, GCIH, GCFA, GCFE)
  • Experience with Next Generation Firewalls




  • Monitor and analyze security information and event management SIEM for remediation of security issues.
  • Monitoring and analyzing network traffic, Intrusion Detection Systems (IDS), security events and logs;
  • Prioritizing and differentiating between potential intrusion attempts and false alarms.
  • Creating and tracking security investigations to resolution.
  • Advising incident responders in the steps to take to investigate and resolve computer security incidents.
  • Staying up to date with current vulnerabilities, attacks, and countermeasures.

  • Continually evaluating system vulnerabilities and protection measures against dynamic threat scape.
  • Assist in development of risk assessment and gap analysis, identifying and prioritizing impact and reporting to senior management.
  • Assist in identifying data breaches in tracking sources for discovery and being a critical part of incident response plan (IRP).
  • Create risk mitigation and reduction proposals for IT Security Group.
  • Ensure compliance of patch management for all enterprise systems and necessary business applications.
  • Manage and collaborate with Managed Security Service Provider “MSSP” or SOC as service model.
  • Responsible for maintaining cyber audits and visibility into security events.
  • Recommend improvement in all elements of IT security; network security, identity management and logging.

  • Communicate alerts to agencies regarding intrusions or breaches.


  • Provides IT support for regulatory and compliance activities.
  • Creates helpdesk support tickets.
  • Keep users informed on tips and techniques that will enhance cyber security posture.
  • Recommends security enhancements and purchases
  • Training staff on network and information security procedures
  • Collaborate with other teams to assess risk and develop improvement strategies for security posture.
  • Additional duties as assigned.



  • The employee is continuously required to sit and use his fingers.
  • The employee frequently is required to talk and/or hear.
  • The employee is frequently required to stand and walk.
  • The employee must occasionally lift and/or move up to 10 pounds.
  • Specific vision abilities required by this job include close vision, distance vision, color vision, peripheral vision, depth perception, and ability to adjust focus.



  • Report safety hazards.
  • Immediately report incidents involving injury, illness, or property damage.
  • Wear protective PPE (Personal Protective Equipment) as instructed or necessary.
  • Comply with all company safety policies, procedures, and rules.
  • Refuse any unsafe task or operation.
  • Participate in safety meetings and training.
  • Be constantly aware of their personal safety and that of their coworkers.



Reports directly to the IT Manager.  Does not exercise supervision over other staff.



  • Work is performed primarily in office.
  • The noise level in the work environment is usually quiet to moderate when work is performed in the office environment.



  • The duties listed above are intended only as illustrations of the various types of work that may be performed. The omission of specific statements of duties does not exclude them from the position if the work is similar, related or a logical assignment to the position.
  • The job description does not constitute an employment agreement between the employer and employee and is subject to change by the employer as the needs of the employer and requirements of the job change.


No phone calls, please. We are an Equal Opportunity / Affirmative Action / Veteran / Disability employer.
In order to be considered for this position you must apply online by clicking here ยป
Please note: Applications outside of the geographic region for position applied will not be considered, unless otherwise noted in job posting.

Our online application works best with the most current version of either Chrome, Internet Explorer or Firefox. Please use these icons to download the latest version of one of these browsers.

Chrome chrome Internet Explorer internet explorer Firefox firefox