Job Description

BTG in partnership with the top ranked Insurance company in Florida has an immediate need for a Information Security Analyst.

Requirements of the Information Security Analyst

  • Bachelor's degree in computer science, or other security/technology related degree or 4 years of cyber security experience would be considered in lieu of a degree
  • 2+ years of experience in multiple disciplines of information security
  • Certified Identity Management Specialist (CAMS), Certified Identity Management Professional (CIMP) Desired
  • CISSP Preferred
  • Demonstrated knowledge and understanding of the key principles of Identity Access Management
  • Demonstrated knowledge of development and implementation of IAM systems, components and periphery systems
  • Demonstrated knowledge of Authentication, Authorization, and Accounting implementation and governance

Benefits of the Information Security Analyst

  • Up to $52 per hour
  • Flexible Hours
  • Full time hours
  • Medical / Dental / Vision
  • 401k

Responsibilities of the Information Security Analyst

  • Works with Business and IT partners in defining/creating Role-based Onboarding Profiles
  • Ensures that the Role-based Onboarding Profiles are current, approved and when necessary changed, edited, or modified in a controlled manner
  • Performs initial reviews of New Onboarding Profile Requests
  • Maintains records of review and approvals of Role-based Onboarding Profiles
  • Provides information related to business Role-based Onboarding Profiles to management as necessary
  • On an annual basis, ensures that the approved Role-based Onboarding Profiles are reviewed for continuing suitability
  • Ensures the Access Control Matrix is maintained and periodically reviewed to ensure access permissions are valid and accurate
  • Ensures that IAM processes are fully documented and auditable
  • Seeks ways to improve and streamline processes, especially as it relates to scalability
  • Monitors IAM controls to ensure users and their approvers are properly identified, access is approved and granted on a timely basis, access is removed timely and completely when users change jobs or roles and user activities are recorded and maintained
  • Coordinates with Business/IT partners to implement new IAM controls as required
  • Ensure management are aware of any access related risks through verbal and written communication
  • Supports Management in analytical reviews of control design and operational effectiveness issues, working through remediation and resolution

If you believe that your skills and experience are a match for this position, please submit your most current resume and a recruiter will be in contact. Resumes can be submitted via e-mail to or apply on line at You may also give us a call at 904-998-9414 to speak to a Recruiter.

Application Instructions

Please click on the link below to apply for this position. A new window will open and direct you to apply at our corporate careers page. We look forward to hearing from you!

Apply Online