Information Technology Security Professional IV jobs in United States
cer-icon
Apply on Employer Site
company-logo

University of Central Florida · 22 hours ago

Information Technology Security Professional IV

The University of Central Florida is dedicated to fostering a conducive educational environment and is seeking an Information Technology Security Professional IV. This role will manage students and support Security Operations Center (SOC) training, providing operational leadership for security monitoring and incident response while advancing cybersecurity readiness and workforce development.

EducationTrainingUniversities
badNo H1Bnote

Responsibilities

Coordinate day-to-day SOC operations, including real-time monitoring, incident response, and escalation management
Supervise, train, and mentor a blended team of professional and student cybersecurity analysts
Manage after-hours, weekend, and holiday coverage to ensure continuous protection
Administer and optimize security tools such as SIEM, SOAR, EDR, and network security platforms
Collaborate with academic units to provide hands-on learning and workforce development opportunities for students
Foster a culture of cybersecurity excellence and continuous learning through technical mentorship and student workforce development initiatives
Produce dashboards, metrics, and executive summaries to inform leadership of security posture, response performance, and emerging risk trends
Integrate automation and AI-driven analytics to enhance incident response capabilities and reduce analyst workload

Qualification

Security Operations Center (SOC)Incident ResponseSIEM PlatformsEndpoint DetectionResponse (EDR)Threat HuntingNetwork SecurityAutomation FrameworksCloud SecurityAnalytical SkillsScripting ProficiencyCybersecurity CertificationsCommunication SkillsMentoring

Required

Bachelor's degree and 5 years of relevant experience; or High School Diploma (or equivalent) and 9 years of relevant work experience in lieu of degree or an equivalent combination of education and experience pursuant to Fla. Stat. 112.219(6)

Preferred

6+ years of experience in security operations, incident response, threat hunting or SOC leadership roles
Hands-on experience with core SOC technologies, including: SIEM platforms (e.g., Splunk, QRadar, Microsoft Sentinel), SOAR tools for automation and orchestration, Endpoint detection and response (EDR) solutions, Network IDS/IPS technologies, and Firewall administration and enterprise log analysis
Previous senior technical expertise during complex incident response activities, including triage, advanced threat analysis, containment strategies, root-cause determination, and preparation of clear, actionable post-incident reports
Experience leading and mentoring teams, including early-career professionals and students
Familiarity with automation frameworks and AI-driven analytics for threat detection and response
Excellent communication skills for producing executive-level reports and presenting technical concepts to non-technical stakeholders
Experience developing and tuning detection capabilities, including creating SIEM correlation rules, alerts, and SOAR automation workflows, as well as deploying or optimizing AI-driven security tools such as anomaly-detection models, AI-assisted triage, or LLM-based threat analysis workflow
Scripting proficiency (e.g., Python, PowerShell, Bash) for automation, custom detections, data parsing, and enrichment
Knowledge of emerging AI-driven attack vectors, including prompt injection, adversarial machine learning techniques, data poisoning, and model extraction attacks
Understanding of cloud security principles and monitoring within Azure, Amazon Web Services (AWS), and/or Google Cloud environments, including hybrid infrastructure
Strong analytical, investigative, and problem-solving skills, with the ability to communicate technical findings clearly to both technical and non-technical audiences
Experience in higher-education or complex enterprise environments, including research and administrative support, data-security compliance frameworks (e.g., FERPA, HIPAA, NIST 800-171), and the unique network/security challenges of university settings
Bachelor's or Master's degree in Cybersecurity, Information Technology, Computer Science, or a related field
Relevant Industry-recognized certifications such as CompTIA Security+, CySA+, CEH, GIAC Security Essentials (GSEC), or Certified SOC Analyst (CSA)

Benefits

Benefit packages, including Medical, Dental, Vision, Life Insurance, Flexible Spending, and Employee Assistance Program
Paid time off, including annual and sick time off and paid holidays
Retirement savings options
Employee discounts, including tickets to many Orlando attractions
Education assistance
And more…For more benefits information, view the UCF Employee Benefits Guide.

Company

University of Central Florida

company-logo
University of Central Florida is an American public research university in Orlando, Forida.

Funding

Current Stage
Late Stage
Total Funding
$5.08M
Key Investors
The Duke Energy FoundationUS Department of EnergyNational Institutes of Health
2024-09-17Grant· $0.07M
2024-09-17Grant· $1.4M
2022-03-14Grant· $3.6M

Leadership Team

leader-logo
John Buckwalter
Provost and Executive Vice President for Academic Affairs
linkedin
leader-logo
Issa Batarseh
Director, Florida Power Electronics Center
linkedin
Company data provided by crunchbase