IT Business Systems Analyst III (Email Security Focus)
Location:
Juno Beach, FL (100% onsite)
Schedule:
Standard Business Hours
Duration:
6-Month Contract
Pay Rate:$41.50–$46.50/hr
Overview
We are seeking an experienced IT Business Systems Analyst
with a strong focus on email security and cybersecurity operations. This role will be responsible for designing and implementing solutions that enhance the organization’s ability to detect, investigate, and respond to email-based threats such as phishing, business email compromise (BEC), malware, and account takeover attacks.
This position combines technical security expertise
with systems analysis and process optimization, supporting enterprise-wide security initiatives.
Key Responsibilities
- Design, develop, and maintain email security policies, detection rules, and response workflows
- Integrate email security platforms with SIEM, SOAR, threat intelligence, and ticketing systems
- Analyze email threat patterns and develop strategies to improve detection and reduce response times
- Partner with SOC and incident response teams to investigate and remediate threats (phishing, BEC, spoofing, malware)
- Configure and manage email authentication protocols ( SPF, DKIM, DMARC)
- Build and maintain custom detection logic, allow/block lists, and automation workflows
- Monitor and optimize email security platform performance and effectiveness
- Support incident response and forensic analysis related to email-based threats
- Develop documentation, SOPs, and training materials for security tools and processes
- Stay current on emerging email threats and evolving cybersecurity trends
Qualifications
- Bachelor’s degree in Cybersecurity, Computer Science, or related field
- 5+ years of experience in cybersecurity operations, with a focus on email security
- Hands-on experience with email security platforms(experience with Abnormal Security is a plus)
- Strong understanding of email threat vectors and enterprise security architecture
- Experience integrating security tools and working within SOC environments
...