Back to jobs
New

Security Analyst

Tampa, Florida, United States

At Morgan & Morgan, the work we do matters. For millions of Americans, we’re their last line of defense against insurance companies, large corporations or defective goods. From attorneys in all 50 states, to client support staff, creative marketing to operations teams, every member of our firm has a key role to play in the winning fight for consumer rights. Our over 6,000 employees are all united by one mission: For the People.

Security Analyst  This is an ON-SITE ROLE

Tampa, Florida, United States  

Summary

We are seeking a highly motivated and skilled Security Analyst to join our cybersecurity team.  This role will support employees and partners in all time zones and may require off hours support.  The successful candidate will be responsible for providing cybersecurity support via phone calls, email, and chat. The Security Analyst will respond to inquiries, troubleshoot problems, and provide resolution or escalation as required.

Responsibilities

  • Monitor Internal Security Systems: Actively monitor security alerts and events using the firm's Security Information and Event Management (SIEM) platform, analyzing data from Endpoint Detection and Response (EDR), Identity Threat Detection and Response (ITDR), Email Security Gateway(s), Identity and Access Management (IAM) systems, Secure Web Gateway(s) (SWG), firewalls, and other internal security tools.
  • Manage Third-Party SOC Alerts: Receive, acknowledge, and validate security alerts and escalations from the firm's third-party Security Operations Center (SOC), correlating external alerts with internal security telemetry (logs and events from SIEM, EDR, network, identity systems, etc.) to confirm threats and initiate response.
  • Email Threat Analysis & Release (Primary Duty): Review and meticulously analyze emails quarantined by the firm's email security systems upon user request for release. Assess legitimacy, identify malicious indicators, and make informed decisions to safely release or block messages.
  • Alert Triage & Correlation: Triage and analyze security alerts from internal systems and the third-party SOC. Correlate alerts across diverse systems, including identity threats (from IAM and ITDR solutions), endpoint events (from EDR solutions), and network traffic (from SWG and firewalls), to identify attacks and policy violations.
  • Incident Handling & Response: Serve as a key member of the incident response team, initiating response based on validated alerts. Utilize Security Orchestration, Automation, and Response (SOAR) platforms, EDR capabilities, and IAM systems for containment (e.g., disabling accounts, isolating endpoints), eradication, and recovery. Document all incident handling steps.
  • Incident Investigation: Conduct detailed investigations into security incidents, leveraging data from SIEM, EDR, SWG, IAM, and other relevant security logs to determine scope, impact, and root cause.
  • Vulnerability Management Support: Analyze vulnerability data from the firm's vulnerability management platform(s); assist in prioritizing and tracking remediation efforts with relevant IT teams.
  • Threat Intelligence Awareness: Stay informed about emerging cybersecurity threats and vulnerabilities relevant to the legal sector and the firm's technology stack.
  • Collaborate for Security Enhancement: Partner with relevant IT teams (Infrastructure, Networking, Applications, etc.) and business departments to advise on and assist with the implementation of enhanced security controls, configurations, and processes across the firm's infrastructure and applications.
  • User Interaction & Support: Assist employees and business partners regarding security inquiries or processes (like email release requests) via appropriate channels (email, chat, phone) in a timely and professional manner, maintaining a high level of customer satisfaction.
  • Documentation: Maintain accurate and detailed documentation for security incidents, investigations, analysis decisions, and procedures.
  • Perform other duties as assigned.

Requirements

  • Proven experience with core security technologies, including Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), Email Security Gateways, Secure Web Gateways (SWG)/Web Security Proxies, Identity and Access Management (IAM), and Vulnerability Management tools in a midsize or enterprise environment. Strong familiarity with integrated enterprise security suites and cloud-native security tools is highly desirable.
  • Equivalent of 1-2 years of experience in a Security Operations Center (SOC), Incident Response, or technical Helpdesk/Service Desk role with a security focus.
  • Fundamental understanding of networking concepts (TCP/IP, DNS, HTTP/S) and operating systems (Windows/MAC).
  • Basic knowledge of identity management concepts (e.g., Directory Services, Cloud IAM).
  • Strong analytical and problem-solving skills with excellent attention to detail.
  • Ability to correlate security events from multiple sources.
  • Excellent communication skills (written and verbal) and professionalism.
  • Self-motivated, action-oriented, and driven to learn continuously.
  • Must embody trust, dignity, integrity, and accountability.
  • Ability and willingness to work hours aligned with supporting the Pacific time zone.
  • (Note: While specific certifications are listed as preferred, holding relevant industry certifications demonstrates a strong foundational knowledge highly valued for this role.)

Preferred Qualifications

  • Hands-on experience with SIEM platforms, integrated EDR/ITDR/Email Security suites, cloud IAM solutions, and Secure Web Gateway technologies.
  • Experience analyzing quarantined emails and identifying phishing/malware indicators.
  • Experience responding to alerts from an MSSP or third-party SOC.
  • Experience with enterprise-grade vulnerability management platforms.
  • Familiarity with security frameworks such as NIST CISv8 or ISO 27001/27002.
  • A demonstrated commitment to continuous learning and staying current with evolving cybersecurity threats, tactics, techniques, procedures (TTPs), and technologies.
  • Relevant cybersecurity certifications are highly preferred. CompTIA Security+, CompTIA CySA+; Microsoft certifications like SC-200 (Security Operations Analyst) or AZ-500 (Azure Security Engineer); (ISC)² SSCP; or equivalent practical experience will also be strongly considered.

Key Technologies Currently in Use

  • This section lists the primary tools currently deployed within our environment to fulfill the capabilities described above. While direct experience with these specific products is beneficial, the core requirement is proficiency in the underlying security concepts and functions. This list may evolve as our technology stack changes.
    • SIEM / SOAR: Microsoft Sentinel
    • Endpoint Detection & Response (EDR): Microsoft Defender for Endpoint
    • Identity & Access Management (IAM) / Identity Threat Detection: Microsoft Azure Entra ID, Microsoft Defender for Identity
    • Email Security: Microsoft Defender for Office 365
    • Secure Web Gateway (SWG): Zscaler Internet Access
    • Vulnerability Management: Microsoft Defender Vulnerability Management (among other potential tools)

#LI-MB1

Benefits

Morgan & Morgan is a leading personal injury law firm dedicated to protecting the people, not the powerful. This success starts with our staff.  For full-time employees, we offer an excellent benefits package including medical and dental insurance, 401(k) plan,  paid time off and paid holidays.

Equal Opportunity Statement

Morgan & Morgan provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.

E-Verify

This employer participates in E-Verify and will provide the federal government with your Form I-9 information to confirm that you are authorized to work in the U.S. If E-Verify cannot confirm that you are authorized to work, this employer is required to give you written instructions and an opportunity to contact Department of Homeland Security (DHS) or Social Security Administration (SSA) so you can begin to resolve the issue before the employer can take any action against you, including terminating your employment. Employers can only use E-Verify once you have accepted a job offer and completed the I-9 Form.   

Privacy Policy

Here is a link to Morgan & Morgan's privacy policy.

Apply for this job

*

indicates a required field

Resume/CV*

Accepted file types: pdf, doc, docx, txt, rtf

Cover Letter

Accepted file types: pdf, doc, docx, txt, rtf


Education

Select...
Select...

Select...
Select...
Select...
Select...
Select...
Select...
Select...
Select...

Voluntary Self-Identification

For government reporting purposes, we ask candidates to respond to the below self-identification survey. Completion of the form is entirely voluntary. Whatever your decision, it will not be considered in the hiring process or thereafter. Any information that you do provide will be recorded and maintained in a confidential file.

As set forth in Morgan & Morgan, P.A.’s Equal Employment Opportunity policy, we do not discriminate on the basis of any protected group status under any applicable law.

Select...
Select...
Race & Ethnicity Definitions

If you believe you belong to any of the categories of protected veterans listed below, please indicate by making the appropriate selection. As a government contractor subject to the Vietnam Era Veterans Readjustment Assistance Act (VEVRAA), we request this information in order to measure the effectiveness of the outreach and positive recruitment efforts we undertake pursuant to VEVRAA. Classification of protected categories is as follows:

A "disabled veteran" is one of the following: a veteran of the U.S. military, ground, naval or air service who is entitled to compensation (or who but for the receipt of military retired pay would be entitled to compensation) under laws administered by the Secretary of Veterans Affairs; or a person who was discharged or released from active duty because of a service-connected disability.

A "recently separated veteran" means any veteran during the three-year period beginning on the date of such veteran's discharge or release from active duty in the U.S. military, ground, naval, or air service.

An "active duty wartime or campaign badge veteran" means a veteran who served on active duty in the U.S. military, ground, naval or air service during a war, or in a campaign or expedition for which a campaign badge has been authorized under the laws administered by the Department of Defense.

An "Armed forces service medal veteran" means a veteran who, while serving on active duty in the U.S. military, ground, naval or air service, participated in a United States military operation for which an Armed Forces service medal was awarded pursuant to Executive Order 12985.

Select...

Voluntary Self-Identification of Disability

Form CC-305
Page 1 of 1
OMB Control Number 1250-0005
Expires 04/30/2026

Why are you being asked to complete this form?

We are a federal contractor or subcontractor. The law requires us to provide equal employment opportunity to qualified people with disabilities. We have a goal of having at least 7% of our workers as people with disabilities. The law says we must measure our progress towards this goal. To do this, we must ask applicants and employees if they have a disability or have ever had one. People can become disabled, so we need to ask this question at least every five years.

Completing this form is voluntary, and we hope that you will choose to do so. Your answer is confidential. No one who makes hiring decisions will see it. Your decision to complete the form and your answer will not harm you in any way. If you want to learn more about the law or this form, visit the U.S. Department of Labor’s Office of Federal Contract Compliance Programs (OFCCP) website at www.dol.gov/ofccp.

How do you know if you have a disability?

A disability is a condition that substantially limits one or more of your “major life activities.” If you have or have ever had such a condition, you are a person with a disability. Disabilities include, but are not limited to:

  • Alcohol or other substance use disorder (not currently using drugs illegally)
  • Autoimmune disorder, for example, lupus, fibromyalgia, rheumatoid arthritis, HIV/AIDS
  • Blind or low vision
  • Cancer (past or present)
  • Cardiovascular or heart disease
  • Celiac disease
  • Cerebral palsy
  • Deaf or serious difficulty hearing
  • Diabetes
  • Disfigurement, for example, disfigurement caused by burns, wounds, accidents, or congenital disorders
  • Epilepsy or other seizure disorder
  • Gastrointestinal disorders, for example, Crohn's Disease, irritable bowel syndrome
  • Intellectual or developmental disability
  • Mental health conditions, for example, depression, bipolar disorder, anxiety disorder, schizophrenia, PTSD
  • Missing limbs or partially missing limbs
  • Mobility impairment, benefiting from the use of a wheelchair, scooter, walker, leg brace(s) and/or other supports
  • Nervous system condition, for example, migraine headaches, Parkinson’s disease, multiple sclerosis (MS)
  • Neurodivergence, for example, attention-deficit/hyperactivity disorder (ADHD), autism spectrum disorder, dyslexia, dyspraxia, other learning disabilities
  • Partial or complete paralysis (any cause)
  • Pulmonary or respiratory conditions, for example, tuberculosis, asthma, emphysema
  • Short stature (dwarfism)
  • Traumatic brain injury
Select...

PUBLIC BURDEN STATEMENT: According to the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless such collection displays a valid OMB control number. This survey should take about 5 minutes to complete.