State of Florida

Information Security Support Specialist

State of Florida

full-time

Posted on:

Location Type: Office

Location: Tallahassee • Florida • 🇺🇸 United States

Visit company website
AI Apply
Apply

Salary

💰 $54,674 per year

Job Level

JuniorMid-Level

Tech Stack

Cyber Security

About the role

  • Serve as liaison between internal programs to safeguard GTA's information assets from security risks, threats, and vulnerabilities.
  • Coordinate and respond to federal audits and reviews by addressing findings and implementing security controls.
  • Develop information security policies and procedures.
  • Execute corrective action plans.
  • Coordinate system security requirements as needed with the Information Services Program (ISP).
  • Perform information security risk assessments to ensure compliance and system integrity.
  • Process access requests for the System for Unified Taxation (SUNTAX), SUNVISN, and MVST systems.

Requirements

  • Two years of experience in cybersecurity compliance, internal auditing, or coordinating remediation activities for audit corrective action plans.
  • Experience reviewing contracts and agreements for Information Technology (IT) security and compliance requirements.
  • Experience researching and interpreting rules, statutes, or regulations.
  • Familiarity with NIST Cybersecurity Framework (CSF), Rule 60GG-2, F.A.C., Florida Cybersecurity Standards, and IRS Publication 1075.
  • Experience writing or reviewing IT security–related policies and procedures.
  • Experience in role-based access control (RBAC), including supporting enterprise system role redesign, access remediation efforts, and security gap analysis.
Benefits
  • Health insurance
  • Life insurance
  • Tuition waivers
  • Paid sick and personal leave
  • 10 paid holidays annually
  • Retirement savings
  • Vision and dental insurance

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
cybersecurity complianceinternal auditingremediation activitiesrisk assessmentsIT security policiesrole-based access controlsecurity gap analysissecurity controlscorrective action planscontract review