Post job

Securities Analyst jobs at Cenveo - 384 jobs

  • P2P (Purchase-to-Pay) Analyst

    Leprino 4.7company rating

    Denver, CO jobs

    Within our Corporate Supply Chain and Procurement team located in Denver - Leprino is seeking a P2P (Purchase-to-Pay) Analyst to help centralize and strengthen how indirect procurement purchase orders are created and managed across the business. This role starts hands-on, supporting day-to-day PO execution, and grows into shaping a clearer, more consistent purchasing approach for our plants. You'll partner closely with Procurement, IT, and plant teams to bring structure where today there is variation, while helping the organization move forward with confidence. At Leprino, starting compensation for this role typically ranges between $73,000 and $81,000. This position has an annual target bonus of 5%. What You'll Do: Create and manage purchase orders and change orders for indirect spend using SAP S/4HANA. Serve as the primary point of coordination for indirect PO intake, clarifying requests and routing work efficiently. Build a centralized approach to indirect PO creation that reduces duplication and confusion. Partner with IT to define purchasing workflows that are practical, scalable, and easy to adopt. Document purchasing processes and prepare clear guidance for plant teams. Roll out standardized PO practices to plants, supporting training and early adoption. Monitor purchasing activity to ensure alignment with approved processes and documentation standards. Support resolution of PO, invoice, and payment issues in partnership with Accounts Payable. Maintain accurate purchasing data, including pricing, vendors, and contracts within SAP. Provide visibility into purchasing activity to procurement leaders as processes mature. Track indirect PO activity and cycle times to identify gaps, delays, and rework in the process. Support audits and internal reviews by maintaining clear documentation for purchasing transactions and approvals. You Have At Least (Required Qualifications): Bachelor's degree in Business, Finance, Supply Chain, Operations, Engineering, or a closely related field. 3 or more years of experience in procurement operations, purchasing, or purchase-to-pay execution. Hands-on experience using SAP S/4HANA tools that support indirect purchasing and purchase-to-pay execution (e.g., PO creation, change orders, pricing updates, invoice issue resolution). Direct experience performing transactional purchasing work, not system configuration or technical SAP development. We Hope You Also Have (Preferred Qualifications): Master's degree in Business, Supply Chain, Operations, or a related discipline. Experience helping design or roll out standardized purchasing processes across multiple sites or teams. Experience partnering with IT on process definition, testing, or system-enabled improvements. Exposure to centralized purchasing models or indirect spend management in a manufacturing environment. At Leprino, we believe in equal employment opportunity and make employment decisions based on each individual's unique talents, experience, skills, and knowledge; we do not discriminate on the basis of any personal characteristics. We know we are better together and are committed to creating an inclusive and supportive culture in which all employees can thrive. Offering You In Return: A chance to be part of a global team of individuals passionate about producing and delivering high-quality products that help feed and nourish families around the world. Leprino could not be where it is today without our incredible employees. That is why we share in our success together by rewarding you for your hard work. Hiring great people who are in it for the long run is our goal. Through competitive salaries and bonuses, life, medical/dental/vision coverage, voluntary benefits, employee assistance programs, wellness incentives, tuition assistance, vacation, ten paid holidays, sick time, paid parental leave, annual merit increases, as well as the LFC Profit-Sharing & 401(k) plan. Your impact will be noticed and rewarded, as you seek to further our company, our customers, and one another. Our Story: Leprino's history dates back to the 1950s, when Jim Leprino first started making small batches of mozzarella for local markets and eateries in the Little Italy neighborhood of Denver. We've grown a bit since then. Today, Leprino is the world's largest manufacturer of mozzarella and lactose, and a leading producer of whey protein. Still owned by the Leprino family, our sights are set to be the “World's Best Dairy Food and Ingredient Company.” From a small corner grocery store we have grown to over 5,500 employees throughout the globe. Will you join us on our journey? While we review LinkedIn Easy Apply submissions and may reach out for an initial conversation, they are considered an inquiry rather than an official application. To be formally considered for this position, please apply directly at careers.leprino.com
    $73k-81k yearly 3d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • FP&A Analyst

    Oldcastle APG 4.1company rating

    Atlanta, GA jobs

    Oldcastle APG, a CRH Company, is North America's leading provider of innovative outdoor living solutions that enable customers to Live Well Outside. The manufacturer's portfolio of premier building products inspires endless possibilities while providing enduring outdoor spaces where people can connect, reflect and recharge. Award-winning brands include Belgard hardscape, Echelon Masonry, MoistureShield composite decking, RDI railing, Catalyst™ Fence Solutions, Sakrete packaged concrete, Amerimix mortar, Pebble Technology International pool finishes, Lawn & Garden mulches and landscape features, and Techniseal sands and sealant technologies. Job Summary We are looking for a highly motivated individual to join our Oldcastle APG Finance team. The FP&A Analyst will oversee the processes for budgeting, financial forecasting, business and financial performance analysis, and variance analysis. This position will report to the FP&A Manager and work closely with a variety of cross-functional stakeholders to help inform and influence critical business decisions. The ideal candidate is a hands-on self-starter with solid data analytics, business intelligence, budgeting & forecasting, financial analysis and reporting, financial modeling, and organizational communication skills. Job Location This is a hybrid opportunity based at our Corporate Office in Atlanta, GA. Job Responsibilities Build relationships and be a vital contributor to the regional FP&A team Prepare, analyze, and report key financial and operating metrics. Identify trends, track progress, and make recommendations Creating an analysis (through charts, graphs or other analytics) to provide a quick summary of what is happening with the business Develop presentation materials for executive and leadership meetings Own financial modeling process (P&L, Balance Sheet, Cash Flow), including budgeting and forecasting Articulate “the story behind the numbers” based on sound analysis and a deep understanding of the business Coordinate the weekly forecasting process (flash) and own the associated analytical and reporting deliverables Responsible for management reporting of the company's financial performance, encompassing the analysis of results and the development of insightful commentary Develop a solid understanding of manufacturing processes and production variances Be a strong business partner to sales and operations and contribute to their efficacy via insightful analysis and reporting Perform ad hoc projects and analyses to support senior management and business leaders Monthly analysis of financial results and modeling of projected performance Responsible for Working Capital and Fixed Overhead spend analysis Analyze and incorporate relevant economic and industry trends in forward-looking business analysis to influence effective decision-making Job Requirements Bachelor's Degree in Finance, Accounting, or a related field MBA a plus Demonstrated FP&A experience Relevant experience in manufacturing, construction, or related industry What CRH Offers You Highly competitive base pay Comprehensive medical, dental and disability benefits programs Group retirement savings program Health and wellness programs An inclusive culture that values opportunity for growth, development, and internal promotion About CRH CRH has a long and proud heritage. We are a collection of hundreds of family businesses, regional companies and large enterprises that together form the CRH family. CRH operates in a decentralized, diversified structure that allows you to work in a small company environment while having the career opportunities of a large international organization. If you're up for a rewarding challenge, we invite you to take the first step and apply today! Once you click apply now, you will be brought to our official employment application. Please complete your online profile and it will be sent to the hiring manager. Our system allows you to view and track your status 24 hours a day. Thank you for your interest! Oldcastle APG, a CRH Company, is an Affirmative Action and Equal Opportunity Employer. EOE/Vet/Disability CRH is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
    $58k-75k yearly est. 1d ago
  • Cyber Security Analyst

    Bluestone 4.1company rating

    San Francisco, CA jobs

    Our client seeking a Cyber Security Operations Analyst to support an operations team that supports a large government customer. The candidate will be relied upon to assist teammates and perform troubleshooting as needed. The candidate should excel in a fast-paced work environment and be willing to face new challenges. Qualifications • Proficiency with vulnerability scanning, remediation and reporting • Knowledge in web application scanning using various tools • Demonstrated proficiency with Windows, UNIX, & LINUX operating systems • Experience working in a customer service information technology environment • Network security and system security experience • Ability to discuss real world troubleshooting; problems and solutions encountered • Knowledge of IT security best practices, US federal government standards, regulations and policy (FedRamp, TIC, NIST 800-37rev1 & 800-53rev3) • Must be motivated and able to work independently • Proven project leadership (PowerPoint presenting, MS Project Planning) • Experience working with change implementation in a controlled environment • Excellent verbal, written communication and technical writing skills Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. 2-5 years of related experience in data security administration. Experience using some of the following tools: o Nessus o Tenable Security Center o Netsparker o WebInspect o BurpSite Additional Information Work with blue Stone recruiting to find your next Cyber Security role. You can find us at ******************************* We look forward to speaking with you.
    $88k-123k yearly est. 2d ago
  • Cyber Security Analyst

    Bluestone 4.1company rating

    San Francisco, CA jobs

    blue Stone Recruiting is a national search firm with a focus of placing top Cyber Security talent from the Analyst level to CISO with prestigious organizations nationwide Job Description Our client seeking a Cyber Security Operations Analyst to support an operations team that supports a large government customer. The candidate will be relied upon to assist teammates and perform troubleshooting as needed. The candidate should excel in a fast-paced work environment and be willing to face new challenges. Qualifications • Proficiency with vulnerability scanning, remediation and reporting • Knowledge in web application scanning using various tools • Demonstrated proficiency with Windows, UNIX, & LINUX operating systems • Experience working in a customer service information technology environment • Network security and system security experience • Ability to discuss real world troubleshooting; problems and solutions encountered • Knowledge of IT security best practices, US federal government standards, regulations and policy (FedRamp, TIC, NIST 800-37rev1 & 800-53rev3) • Must be motivated and able to work independently • Proven project leadership (PowerPoint presenting, MS Project Planning) • Experience working with change implementation in a controlled environment • Excellent verbal, written communication and technical writing skills Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. 2-5 years of related experience in data security administration. Experience using some of the following tools: o Nessus o Tenable Security Center o Netsparker o WebInspect o BurpSite Additional InformationWork with blue Stone recruiting to find your next Cyber Security role. You can find us at ******************************* We look forward to speaking with you.
    $88k-123k yearly est. 60d+ ago
  • Cyber Security Vulnerability Analyst

    ITR 4.2company rating

    Oak Ridge, TN jobs

    Job DescriptionEast Tennessee company is seeking a Cyber Security Vulnerability Analyst to perform defensive cyber operational tasks, respond to reported incidents, and track remediation of client system vulnerabilities to include industrial control systems. The ideal candidate will be an experienced analyst with a strong background in addressing network vulnerabilities and conducting incident response activities. This is a full-time, hybrid position that will work onsite in Oak Ridge, TN 2-3 days each week. Job Responsibilities: • Join the Defensive Cyber Operations Group's multi-disciplinary team in responding to advanced Cyber threats from targeted phishing to network-based threats, ransomware, and APT-level activity in a Tier 2 role. • Mentor the DCO's junior staff, developing their technical and incident resolution skills. • Participate in incident response activities involving multiple teams and functions. • Serve as primary coordinator for ORNL response to federal Binding Operational Directives and data calls. • Leverage internal and external vulnerability scanning scan data to maintain a comprehensive view of ORNL's threat profile and risk status. • Automate key DCO functions using Tines technology • Partner with Emerging Threat team to remediate extant vulnerabilities identified by their intelligence activities. • Maintain strong collaborative and data sharing relationships with DOE headquarters Cyber units, other DOE laboratories, and external entities. • Leverage EDR, SIEM, IDS, and PCAP tools to identify and investigate cyber threats. • Assist users with the creation, monitoring, and evaluation of policy and device exceptions. • Assist in training and awareness activities to ensure ORNL staff are aware of Cyber Security responsibilities and requirements. • Partner with Cyber Industrial Control System Engineers to monitor the lab's ICS enclaves for operational and security issues Candidates must be able to obtain a federal security clearance so US citizenship is required.
    $69k-95k yearly est. 31d ago
  • Cyber Malware Analyst

    AGR LLC 4.3company rating

    Beltsville, MD jobs

    Job Description Internetwork Consulting Services (ICS) is seeking Mid-level Cyber Malware Analysts - 1st Shift to become part of the Department of State (DOS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enable innovative, effective, and secure business processes. This role supports the Cyber Incident Response Team (CIRT). Location: Beltsville, Maryland First Shift - 6:00 am - 2:00 pm Program Overview The DSCM program encompasses cyber security, data analytics, engineering, technical, managerial, operational, logistical and administrative support to aid and advise DOS Cyber & Technology Security (CTS) Directorate. This includes protecting a global cyber infrastructure comprising networks, systems, information, and mobile devices all while identifying and responding to cyber risks and threats. Those supporting the DSCM program strive to leverage their expert knowledge and propose creative solutions to real-world cybersecurity challenges. About the Role Provide malware analysis support in a 24x7x365 environment. Conduct advanced analysis and recommend remediation steps for cyber security events and incidents. Respond to and assist with the resolution of any suspected or successful cyber security breach or violation. Share knowledge and intelligence gained from cyber security events with stakeholders. Protect against and prevent potential cyber security threats and vulnerabilities. Implement and use cyber security frameworks (e.g. MITRE-ATT&CK , Kill Chain, etc.). Activities include the following: Advanced code analysis (e.g. reverse engineering of malicious code) Advanced traffic analysis (at the packet level) and reconstruction of network traffic to discover anomalies, trends, and patterns Forensic analysis of suspected systems (e.g. SSD/HDD devices, on and off premise network devices, and storage media) impacted by malicious activity. Provide advanced forensic analysis of digital storage devices (e.g. GFE) with abnormalities Provide comprehensive findings and recommended remediation steps Qualifications: Bachelor's degree and at least 2 years of experience or a High School diploma and 6 years of related work experience. U.S. Citizenship. Active Secret clearance. Must possess one of the following certifications: CCNA-Security CND CySA+ GICSP GSEC Security+ CE SSCP Ability to resolve highly complex malware and intrusion issues using computer host analysis, forensics, and reverse engineering. Ability to recommend sound counter measures to malware and other malicious type code and applications which exploit customer communication systems. Knowledge in development of policies and procedures to investigate malware incidents for an entire computer network. Expertise in discovering, analyzing, diagnosing, and reporting on malware events, files and network intrusion and vulnerability issues. Incident Response experience utilizing Splunk and/or Tanium/HX Demonstrate an intermediate proficiency in debugging and disassembling x86/x64 PE files. Working knowledge of Python/Powershell/Bash/JS Experience with sandboxing/virtual environments
    $75k-98k yearly est. 11d ago
  • Cyber Incident Response Team Analyst (Tier 2)

    AGR LLC 4.3company rating

    Beltsville, MD jobs

    Job Description Work Hours: Evening Shift, 1400 - 2200 EST, TUE-SAT The DSCM program encompasses cyber security, data analytics, engineering, technical, managerial, operational, logistical and administrative support to aid and advise DOS Cyber & Technology Security (CTS) Directorate. This includes protecting a global cyber infrastructure comprising networks, systems, information, and mobile devices all while identifying and responding to cyber risks and threats. Those supporting the DSCM program strive to leverage their expert knowledge and propose creative solutions to real-world cybersecurity challenges. About the Role Detect, classify, process, track, and report on cyber security events and incidents. Perform advanced in-depth analysis of coordinated Tier 1 alert triage and requests in a 24x7x365 environment. Analyze logs from multiple sources (e.g., host logs, EDR, firewalls, intrusion detection systems, servers) to identify, contain, and remediate suspicious activity. Characterize and analyze network traffic to identify anomalous activity and potential threats. Protect against and prevent potential cyber security threats and vulnerabilities. Perform forensic analysis of hosts artifacts, network traffic, and email content. Analyze malicious scripts and code to mitigate potential threats. Conduct malware analysis to generate IOCs to identify and mitigate threats. Collaborate with Department of State teams to analyze and respond to events and incidents. Monitor and respond to the CIRT Security Orchestration and Automation Response (SOAR) platform, hotline, email inboxes. Create tickets and initiate workflows as instructed in technical SOPs. Coordinate and report incident information to the Cybersecurity and Infrastructure Security Agency (CISA). Collaborate with other local, national and international CIRTs as directed. Submit alert tuning requests. Qualifications: Bachelor's degree and at least 2 years of experience or a High School diploma and 6 years of experience. Must possess one of the following certifications prior to start date: A+ CE, CCNA-Security, CND, Network+ CE, SSCP, Security+. Demonstrated experience in the Incident Response lifecycle. Knowledge of SOAR ticketing and automated response systems (e.g. ServiceNow, Splunk SOAR, Microsoft Sentinel). Demonstrated experience with using Security Information and Event Management (SIEM) platforms (e.g. Splunk, Microsoft Sentinel, Elastic, Q-Radar). Demonstrated experience in using Endpoint Detection and Response systems (e.g. MDE, ElasticXDR, CarbonBlack, Crowdstrike). Knowledge of cloud security monitoring and incident response. Knowledge of integrating IOCs and Advanced Persistent Threat actors. Ability to analyze cyber threat intelligence reporting and understanding adversary methodologies and techniques. Knowledge of malware analysis techniques. Knowledge of the MITRE ATT&CK and D3FEND frameworks. U.S. Citizenship required. Active Interim Secret clearance in order to start. Preferred Qualifications: Proficiency with Splunk for security monitoring, alert creation, and threat hunting. Knowledge of Microsoft Azure access and identity management. Proficiency with Microsoft Defender for Endpoint and Identity for security monitoring, response, and alert generations. Experience in using digital forensics collection and analysis tools (e.g. Autopsy, MagnetForensics, Zimmerman-Tools, KAPE, CyLR, Volatility). Experience with using ServiceNow SOAR for ticketing and automated response. Knowledge of Python, PowerShell and BASH scripting languages. Experience with cloud security monitoring and incident response. Demonstrated ability to perform static/dynamic malware analysis and reverse engineering. Experience with integrating cyber threat intelligence and IOC-based hunting. Technical certifications such as: Security+, CySA+, Cloud+, Try Hack Me SAL1, Hack the Box CDSA, CyberDefenders, CCD, Azure SC-900, CCSP, GCIH, CCSK, GSEC, CHFI, GCLD, GCIA. Advanced technical certifications such as: SecurityX/CASP+, PRMP, GREM, GEIR, GNFA, or GCFA.
    $75k-98k yearly est. 18d ago
  • Information Security Analyst

    Tree Top Staffing 4.7company rating

    Aurora, CO jobs

    Benefits: 401(k) 401(k) matching Dental insurance Health insurance Opportunity for advancement Paid time off Vision insurance We are searching for an Information Security Analyst to monitor an organization's networks for security threats or breaches and investigate when one occurs. Use and maintain policies, procedures, and systems to protect sensitive information. Check for vulnerabilities in computer and network systems. Document and report issues. Installing & maintaining systems that protect from online vulnerabilities. This role is responsible for the analysis, integration, testing, operations, and maintenance of security systems. This position investigates incidents and responds to events in real time. Entry-level security analysts assist in examining information to help identify risks and threats and assist in the implementation of strategies to stop those threats from damaging corporate network or property. Responsibilities: Keep informed of the constantly changing vulnerabilities and how to effectively remediate them, as well as keeping up to date with the latest security requirements of the business. Protect Systems and IT Infrastructure Upgrade systems to ensure security software is up to date. Install and upgrade antivirus software. Monitoring IT Systems and report Issues Gather feedback from end-users & report findings. Examine information to help identify risks and threats. Assist with implementing strategies to stop threats from damage or theft of Company's networks, data, and workflows. Write detailed incident response reports. Remediate vulnerabilities found on endpoint devices. Promote best practices for information security. Conduct threat research. Qualifications: Required: Associate degree or 2-3 years' equivalent work experience. Preferred: Microsoft Security Certifications, CompTIA Security + or equivalent, Cisco CCNA/CCNP/CISSP or equivalent Flexible work from home options available. Compensation: $65,000.00 - $75,000.00 per year Our Story At Tree Top Staffing, we take pride in helping job seekers find their ideal role and employers find the right candidate for their company. Our organization is instantiated by experienced professionals providing full service employment solutions including: contract, contract-to-hire, and direct-hire placements within multiple lines of business. Our Mission We adhere to a set of 4 defining principles encapsulating: Servitude Accountability Integrity Discipline If you make a promise, keep it, as your actions prove your greatness. Our goal at Tree Top Staffing is to set our clients and consultants up for success. It is imperative to ensure an all-around fit from both sides for long term relations to thrive. Our Results Tree Top Staffing utilizes advanced recruiting tools to ensure top talent is presented to our clients when their needs arise. Our success is measured by the success of our clients. It is a privilege to help job seekers find their dream position and employers find the right fit for their company.
    $65k-75k yearly Auto-Apply 60d+ ago
  • Cyber Security Analyst

    Bluestone 4.1company rating

    Boca Raton, FL jobs

    Reports to CISO and works with a team of Cyber Security specialists. The Cyber Security Analyst is responsible for identifying risks to the confidentiality, integrity, and availability of our clients products and services, while maintaining compliance with applicable regulatory standards. In this role, you will be expected to contribute to the integrity and sustainability of the service delivery network, which consists of advanced server-based applications used to support our client's customers. The successful candidate will work directly with senior team members on issues that may require some after-hours and weekend availability. Specific Job Duties: • Articulate technical and security requirements to departments/business groups • Identify gaps in security operations and develop mitigation strategies • Assist with the maintenance of application and operating system software in the Service Delivery Network • Participate in disaster recovery and business continuity planning • Perform software development lifecycle auditing • Prioritize compliance actions according to business risk Desired Preferred Skills: • Industry certifications - PMP, CISA, CISSP, Security + • Department of Defense IT experience • Pharmacy or healthcare experience Qualifications • Masters's degree in computer science or relative discipline • 5-10 years combined experience in information security • Proficient with Unix / Linux • Strong analytical problem solving • Knowledge of the software development lifecycle • Proven ability to plan and work to a deadline • Must be able to obtain Department of Defense clearance Additional Information Work with blue Stone recruiting to find your next Cyber Security role. You can find us at ******************************* We look forward to speaking with you.
    $68k-98k yearly est. 2d ago
  • Cyber Security Analyst

    Bluestone 4.1company rating

    Boca Raton, FL jobs

    blue Stone Recruiting is a national search firm with a focus of placing top Cyber Security talent from the Analyst level to CISO with prestigious organizations nationwide Job Description Reports to CISO and works with a team of Cyber Security specialists. The Cyber Security Analyst is responsible for identifying risks to the confidentiality, integrity, and availability of our clients products and services, while maintaining compliance with applicable regulatory standards. In this role, you will be expected to contribute to the integrity and sustainability of the service delivery network, which consists of advanced server-based applications used to support our client's customers. The successful candidate will work directly with senior team members on issues that may require some after-hours and weekend availability. Specific Job Duties: • Articulate technical and security requirements to departments/business groups • Identify gaps in security operations and develop mitigation strategies • Assist with the maintenance of application and operating system software in the Service Delivery Network • Participate in disaster recovery and business continuity planning • Perform software development lifecycle auditing • Prioritize compliance actions according to business risk Desired Preferred Skills: • Industry certifications - PMP, CISA, CISSP, Security + • Department of Defense IT experience • Pharmacy or healthcare experience Qualifications • Masters's degree in computer science or relative discipline • 5-10 years combined experience in information security • Proficient with Unix / Linux • Strong analytical problem solving • Knowledge of the software development lifecycle • Proven ability to plan and work to a deadline • Must be able to obtain Department of Defense clearance Additional InformationWork with blue Stone recruiting to find your next Cyber Security role. You can find us at ******************************* We look forward to speaking with you.
    $68k-98k yearly est. 60d+ ago
  • Cyber Security Analyst

    Bluestone 4.1company rating

    Alexandria, VA jobs

    Our client seeking a Cyber Security Operations Analyst to support an operations team that supports a large government customer. The candidate will be relied upon to assist teammates and perform troubleshooting as needed. The candidate should excel in a fast-paced work environment and be willing to face new challenges. Qualifications • Proficiency with vulnerability scanning, remediation and reporting • Knowledge in web application scanning using various tools • Demonstrated proficiency with Windows, UNIX, & LINUX operating systems • Experience working in a customer service information technology environment • Network security and system security experience • Ability to discuss real world troubleshooting; problems and solutions encountered • Knowledge of IT security best practices, US federal government standards, regulations and policy (FedRamp, TIC, NIST 800-37rev1 & 800-53rev3) • Must be motivated and able to work independently • Proven project leadership (PowerPoint presenting, MS Project Planning) • Experience working with change implementation in a controlled environment • Excellent verbal, written communication and technical writing skills Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. 2-5 years of related experience in data security administration. Experience using some of the following tools: o Nessus o Tenable Security Center o Netsparker o WebInspect o BurpSite Additional Information Work with blue Stone recruiting to find your next Cyber Security role. You can find us at ******************************* We look forward to speaking with you.
    $75k-104k yearly est. 2d ago
  • Cyber Defense Analyst

    ITR 4.2company rating

    Oak Ridge, TN jobs

    Job DescriptionDefensive Cyber Operations Junior Analyst East Tennessee Research and Development facility with the Department of Energy seeks to hire a Junior Cyber Security Analyst to immediately support their Defensive Cyber Operations (DCO) team. This position's primary responsibility is to conduct event triage in a tiered operational security model while training in and supporting threat hunting and threat intelligence tasks. Responsibilities: Support the DCO environment in identification and analysis of threats in Security Incident and Event Management (SIEM) alerts, dashboards, and queries Resolve or escalate alerts/events/incidents as defined in DCO service level agreements according to level of severity Help develop advanced queries and alerts to detect adversary actions and compile detailed investigation and analysis reports for internal DCO consumption, and for delivery to management Work with the Emerging Threat team to capture intelligence on threat actor tactics, techniques, and procedures (TTPs) and leverage automated and manual countermeasures in response Work with the Threat Hunting team to perform hypothesis-driven hunts of the network for undetected threats Field customer requests for support ranging from potential phishing events to abnormal system activity Triage reports from DOE entities, CISA, and external penetration testers, and coordinate resolution with system administrators in keeping with BOD 18-01, 19-02, and 22-01 requirements Analyze suspicious links and attachments in a secure malware analytics platform as part of a comprehensive phishing analysis procedure Triage malware and anomalous activity alerts generated by an EDR system Requirements: Bachelor's degree in Computer Science or related field with 1-2 years of cyber operations work experience or an equivalent amount of education and experience Experience with ServiceNow, JIRA ServiceDesk, or other ticketing system Relevant certifications (GSEC, Security+, CEH, etc) preferred The position requires eligibility to obtain a DOE security clearance. Candidates with an Active Q Clearance or Top-Secret Clearance are a plus
    $54k-79k yearly est. 15d ago
  • Cyber Security Analyst (TS/SCI Rquirement)

    NSS 4.4company rating

    Arlington, VA jobs

    We are seeking a Cyber Security Analyst. This position provides 24x7 cybersecurity monitoring and analysis services for Department of Defense networks above the SECRET level. This includes performing real-time cyber threat intelligence analysis, correlating actionable security events, performing network traffic analysis using raw packet data, and participating in the coordination of resources during the incident response process. Review DoD and open source intelligence for threats and to identify Indicators of Compromise (IOCs) and integrate those into sensors and SIEMs Utilize alerts from endpoints, IDS/IPS, netflow, and custom sensors to identify compromises on customer networks/endpoints Review massive log files, pivot between data sets, and correlate evidence for incident investigations Triage alerts to identify malicious actors on customer networks Report incidents to customers and USCYBERCOM Qualifications Bachelor's Degree and 4+ years of prior relevant experience; additional work experience or Cyber courses/certifications may be substituted in lieu of a degree. Demonstrated understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements. Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings DoD 8570 IAT level II or higher certification such as CompTIA Security+ CE, ISC2 SSCP, SANS GSEC prior to starting. DoD 8570 CSSP-A level Certification such as CEH, CySA+, GCIA or other certification is required within 180 days of hire. Demonstrated commitment to training, self-study and maintaining proficiency in the technical cyber security domain and an ability to think and work independently Bachelor's degree and less than 2+ years of prior relevant experience; additional work experience or Cyber courses/certifications may be substituted in lieu of degree. Strong analytical and troubleshooting skills Willing to perform shift work Must be a US Citizen Must have an active DoD TOP Secret security w/ SCI clearance eligibility. Preferred Qualifications: CND experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization. Demonstrated understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs). Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements. Demonstrated hands-on experience analyzing high volumes of logs, network data (e.g. Netflow, Full Packet Capture), and other attack artifacts in support of incident investigations. In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic). Experience and proficiency with any of the following: Anti-Virus, HIPS/HBSS, IDS/IPS, Full Packet Capture, Network Forensics. Experience with malware analysis concepts and methods. Unix/Linux command line experience. Scripting and programming experience. Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings. Familiarity or experience in Intelligence Driven Defense and/or Cyber Kill Chain methodology. Existing 8570 CSSP Analyst Certifications (CEH), CySA+ etc. Clearance Level: TSSCI Certifications: IAT Level II Baseline Certification
    $77k-105k yearly est. 60d+ ago
  • (590) Information Security Specialist III

    Arlo Solutions 3.5company rating

    Silver Spring, MD jobs

    Arlo Solutions (Arlo) is an information technology consulting services company that specializes in delivering technology solutions. Our reputation reflects the high quality of the talented Arlo Solutions team and the consultants working in partnership with our customers. Our mission is to understand and meet the needs of both our customers and consultants by delivering quality, value-added solutions. Our solutions are designed and managed to not only reduce costs, but to improve business processes, accelerate response time, improve services to end-users, and give our customers a competitive edge, now and into the future. Position Description: The Information Security Specialist III supports the National Oceanic and Atmospheric Administration (NOAA) Internal Risk Management Program (IRMP), providing advanced technical, analytical, and programmatic expertise in the prevention, detection, and mitigation of insider threats. This key personnel position executes and advances NOAA's IRMP objectives in compliance with federal security regulations, most notably Executive Order 13587, National Insider Threat Policy, NIST, FISMA, NSPM-33, and agency-specific guidance. The Information Security Specialist III collaborates with OCIO leadership, the Internal Risk Office, NOAA research teams, and interagency insider threat task forces to strengthen the security posture of NOAA's classified and unclassified environments. Location: Hybrid (Silver Spring, MD) Clearance: Active TS/SCI Responsibilities and/or Success Factors: Information Security Program Development and Implementation Lead the development and implementation of comprehensive information security policies, procedures, and protocols for insider threat detection and mitigation Design and establish security frameworks that integrate physical security, personnel security, cybersecurity, and information assurance functions Develop research security protocols in compliance with NSPM-33 to protect sensitive NOAA research activities from internal and external threats Create and maintain security guidelines for handling classified national security information (CNSI) and controlled unclassified information (CUI) Risk Assessment and Analysis Conduct comprehensive risk assessments of NOAA's information systems, networks, and data repositories Analyze security vulnerabilities and develop mitigation strategies for identified risks Evaluate and assess compliance with federal security standards including FISMA, NIST frameworks, and DoD cybersecurity requirements Perform security impact assessments for new systems, applications, and processes Security Data Integration and Monitoring Consolidate and analyze security data from multiple internal and external sources to identify potential insider threats Design and implement data integration systems that provide real-time monitoring and actionable insights to leadership Develop and maintain insider threat detection systems and behavioral monitoring capabilities Ensure ethical data collection and analysis practices that comply with privacy regulations and civil liberties requirements Incident Response and Investigation Coordinate incident response activities for suspected insider threat cases and security breaches Conduct thorough investigations of security incidents involving classified systems and sensitive information Document incident response actions and develop lessons learned for continuous program improvement Collaborate with law enforcement agencies and external partners on complex security investigations Compliance and Audit Management Ensure compliance with federal security regulations including Executive Order 13587, NSPM-33, FISMA, and NIST standards Conduct regular security compliance audits and assessments Prepare detailed compliance reports and corrective action plans for identified gaps Maintain documentation for security authorization and accreditation processes Training and Awareness Program Support Develop technical training materials and awareness programs focused on insider threat identification and mitigation Provide expert consultation on security best practices and threat scenarios Support the delivery of security training sessions for NOAA personnel, contractors, and uniformed services Create technical resources and job aids for security awareness initiatives Stakeholder Collaboration and Communication Serve as technical liaison with internal NOAA teams including the Cybersecurity Division and Human Resources Communicate complex technical security concepts to non-technical stakeholders Provide expert technical guidance to program leadership and government officials Policy Development and Documentation Develop and maintain comprehensive security policies and standard operating procedures (SOPs) Create technical documentation for security systems, processes, and procedures Review and update security policies to ensure alignment with evolving threats and regulatory requirements Contribute to the development of security guidelines and best practice documentation Minimum Qualifications Including Certificates: Must be a U.S. Citizen Active Top Secret security clearance with SCI eligibility (required before contract start) Bachelor's degree in Cybersecurity, Information Security, Computer Science, Information Technology, or related STEM field from an accredited college or university Five (5) years of experience in information security, cybersecurity, or related field Five (5) years of experience in insider threat detection, behavioral analysis, or risk management Experience with federal compliance frameworks including FISMA, NIST Cybersecurity Framework, and Risk Management Framework (RMF) Knowledge of classified information handling procedures and National Industrial Security Program Operating Manual (NISPOM) requirements Experience with security incident response and investigation methodologies Demonstrated experience with security data analysis and threat intelligence platforms Strong analytical and problem-solving skills with attention to detail Excellent written and verbal communication skills Desired Qualifications: Experience with NOAA or other federal agency cybersecurity programs Professional security certifications (CISSP, CISM, GIAC, or equivalent) Experience with behavioral analytics and insider threat detection tools Knowledge of NSPM-33 research security requirements Familiarity with NIST Special Publications (SP 800 series) and federal cybersecurity guidance Experience with Security Information and Event Management (SIEM) systems Knowledge of machine learning and artificial intelligence applications in cybersecurity Experience with cloud security frameworks and technologies Understanding of privacy protection principles and compliance requirements AAP Statement We are proud to be an Affirmative Action and Equal Opportunity Employer and as such, we evaluate qualified candidates in full consideration without regard to race, color, religion, sex, sexual orientation, gender identity, marital status, national origin, age, disability status, protected veteran status, and any other protected status.
    $83k-118k yearly est. Auto-Apply 60d+ ago
  • Information Security Analyst

    Briggs and Stratton Corporation 4.4company rating

    Milwaukee, WI jobs

    As an IT Security Analyst, your goal is to ensure the safety & security of information systems while using data to improve our security posture and response capabilities #LI-LB1 #LI-Hybrid You will do this by: * Participating in security incident response and investigation efforts, following established procedures and runbooks. * Monitoring security alerts and conducting initial triage and analysis of potential threats. * Collaborating with other departments and business stakeholders to promote security best practices. * Assisting in developing and maintaining security documentation, including procedures and runbooks. * Supporting continuous improvement across vulnerability management and securing software development practices. * Assisting in managing security service providers (MSSPs) and vendors to support external security operations and toolsets. * Applying fundamental knowledge of security concepts in cloud environments (GCP/Azure), SIEM platforms, and endpoint security technologies. * Collaborating with the internal teams to align initiatives with strategic business goals and risk tolerance. * Assisting in evaluating and integrating new technologies to enhance overall security capabilities. The above statements are intended only to describe the general nature of the job and should not be construed as an all-inclusive list of position responsibilities. You are the kind of person who is/has: * Security minded * Analytical/Curious * Proactive * Pragmatic * Qualifications: * A solid grasp of Windows OS/networking, a keen interest or experience in SIEM and cloud technologies * Strong analytical and investigative skills with the ability to support team analysis. * Good organizational and interpersonal skills, with the ability to collaborate effectively within a team. * Excellent communication skills for engaging with both technical and non-technical stakeholders. Experience Requirements: Minimum 3+ years of progressive experience in information security, IT operations, and business enablement within enterprise environments. Education: Bachelor's Degree in Computer Science, Information Technology, or other related field or equivalent experience. Preferred Certifications but not Required: * Sec+/CySA+ * CISSP/CISM * GCIH Briggs & Stratton, headquartered in Milwaukee, Wisconsin, provides innovative products and diverse power solutions to help people get work done. Briggs & Stratton is the world's largest producer of engines for outdoor power equipment, and is a leading designer, manufacturer and marketer of lithium-ion battery, standby generator, energy storage system, lawn and garden, and turf care products through its Briggs & Stratton, Vanguard, Ferris, Billy Goat, and Branco brands. Briggs & Stratton products are designed, manufactured, marketed and serviced in more than 100 countries on six continents. Briggs & Stratton is committed to a policy of equal employment opportunity. The Company conducts all employment practices without regard to race, sex, color, religion, national origin, age, disability, protected veteran's status, pregnancy, genetic information, sexual orientation or any other basis prohibited by law. Briggs & Stratton also undertakes affirmative action to assure equal employment opportunity for minorities and women, for persons with disabilities, and for protected veterans. Nearest Major Market: Milwaukee
    $83k-108k yearly est. 6d ago
  • Systems Analyst - Physical Security

    GM 2.9company rating

    Warren, MI jobs

    The Role: The Systems Analysts in physical security play a pivotal role in designing, developing, and implementing innovative software solutions that drive our global security operations. What You'll Do: The ideal candidate can take a concept and drive it through technical implementation while managing changing priorities. As an IT Systems Analyst, this role is responsible for working with our business partners in the Global Security business organization to deliver technical solutions that meet the business and system requirements that are part of the strategic roadmap and support the transformation of General Motors. Our projects are typically complex and large. What You'll Do (Responsibilities): Support design, development, and maintenance of our physical security applications and systems. Analyze business requirements and translate them into technical specifications and computer program designs. Act as the technical contact between business and IT teams. Maintain strong knowledge of business processes, best practices, and technologies. Promote technical best practices and drive process improvements. Stay updated on supplier systems and GM IT platforms for HR. Provide technical training and mentorship within the team. Improve IT customer satisfaction through transparent communication. Collaborate with cross-functional teams to integrate new systems and features, ensuring seamless operation and user experience. Participate in the entire software development lifecycle, from conceptualization and design to testing, deployment, and ongoing support, using Jira. Proactively identify and resolve technical issues, performing root cause analysis and implementing corrective actions. Manage and implement Identity Access Management (IAM) solutions to secure sensitive data and systems. Ability to learn quickly and think creatively. Document technical specifications, program designs, and system architectures for future reference and knowledge transfer. Stay abreast of emerging technologies and industry best practices to continuously improve systems and processes. Create and execute SIT and QA testing. Your Skills & Abilities (Required Qualifications): Bachelor's in Information Systems or equivalent field 5+ years of technical experience in systems engineering or HR technology roles in complex, high-growth, or global tech-forward environments. Ability to implement and support software integration solutions with existing or new software/systems. Technical understanding and working knowledge with Windows, Ubuntu, SQL, Postgres, Oracle, IIS, Apache etc,.. Ability to interpret and apply API documentation for integration and troubleshooting. Databases working knowledge: SQL Server, PostgreSQL, and DB2 (highly preferred). Web Application Servers: WebLogic, TomCat (highly preferred). Knowledge of physical security software(s) standards compliance. Experienced in Agile, Iterative, and Waterfall methodologies using Jira. Team player with strong interpersonal skills and leadership capabilities. Work autonomously with diverse teams and clients. What Will Give You A Competitive Edge (Preferred Qualifications): Master's in Information Systems or equivalent field 7+ years of technical experience in systems engineering or HR technology roles in complex, high-growth, or global tech-forward environments. #LI-SB3 GM does not provide immigration-related sponsorship for this role. Do not apply for this role if you will need GM immigration sponsorship now or in the future. This includes direct company sponsorship, entry of GM as the immigration employer of record on a government form, and any work authorization requiring a written submission or other immigration support from the company (e.g., H1-B, OPT, STEM OPT, CPT, TN, J-1, etc). This role is categorized as hybrid. This means the selected candidate is expected to report to a specific location at least 3 times a week {or other frequency dictated by their manager}. This job is not eligible for relocation benefits. Any relocation costs would be the responsibility of the selected candidate. About GM Our vision is a world with Zero Crashes, Zero Emissions and Zero Congestion and we embrace the responsibility to lead the change that will make our world better, safer and more equitable for all. Why Join Us We believe we all must make a choice every day - individually and collectively - to drive meaningful change through our words, our deeds and our culture. Every day, we want every employee to feel they belong to one General Motors team. Benefits Overview From day one, we're looking out for your well-being-at work and at home-so you can focus on realizing your ambitions. Learn how GM supports a rewarding career that rewards you personally by visiting Total Rewards resources. Non-Discrimination and Equal Employment Opportunities (U.S.) General Motors is committed to being a workplace that is not only free of unlawful discrimination, but one that genuinely fosters inclusion and belonging. We strongly believe that providing an inclusive workplace creates an environment in which our employees can thrive and develop better products for our customers. All employment decisions are made on a non-discriminatory basis without regard to sex, race, color, national origin, citizenship status, religion, age, disability, pregnancy or maternity status, sexual orientation, gender identity, status as a veteran or protected veteran, or any other similarly protected status in accordance with federal, state and local laws. We encourage interested candidates to review the key responsibilities and qualifications for each role and apply for any positions that match their skills and capabilities. Applicants in the recruitment process may be required, where applicable, to successfully complete a role-related assessment(s) and/or a pre-employment screening prior to beginning employment. To learn more, visit How we Hire. Accommodations General Motors offers opportunities to all job seekers including individuals with disabilities. If you need a reasonable accommodation to assist with your job search or application for employment, email us or call us at ************. In your email, please include a description of the specific accommodation you are requesting as well as the job title and requisition number of the position for which you are applying.
    $78k-113k yearly est. Auto-Apply 2d ago
  • Information Security Specialist (Regional)

    Liebherr Mining Equipment 4.6company rating

    Newport News, VA jobs

    The Information Security Specialist is responsible for Information Security within the Americas region. Duties include designing, implementing, and improving security controls, incident response strategies, and risk mitigation measures to safeguard IT systems and sensitive data. * This position is office-based in Newport News, VA.* Responsibilities * Designs and implements security solutions to protect IT infrastructure * Develops and enforces security policies, standards, and risk mitigation strategies * Conducts penetration testing, vulnerability scanning, and security audits * Investigates and responds to security incidents, performing forensic analysis * Ensures compliance with regulatory frameworks (GDPR, NIS2, ISO 27001) * Evaluates and integrates new security tools and technologies * Automates security processes and threat mitigation where possible * Works with IT, DevOps, and risk management teams * Engages with regulatory bodies and compliance auditors * Coordinates with external cybersecurity partner Competencies * Education and Experience: Bachelor's degree in Cybersecurity, Computer Science, Information Technology or related discipline and 4 years of IT experience focused on Information Security relevant technologies; or combination of equivalent education, training, certification, and 8 years relevant experience. Information Security certifications (such as CISSP: Certified Information Systems Security Professional; CEH: Certified Ethical Hacker; CISM: Certified Information Security Manager; GIAC: Global Information Assurance Certification) can be accepted in lieu of bachelor's degree. Security+ preferred. * Knowledge of Information Security engineering principles (least privilege, zero trust) * Knowledge of IAM solutions (Active Directory, Okta, SSO, MFA) * Knowledge of threat modeling and risk analysis techniques * Knowledge of Information Security automation tools (Ansible, PowerShell, Python) * Knowledge of Compliance frameworks (NIST CSF, CIS Controls, ISO 27001) * Skilled in designing and implementing security architectures * Skilled in automating security processes and threat mitigation * Skilled in managing security operations and improving response efficiency * Ability to work independently and take ownership of security initiatives * Strong problem-solving skills in high-pressure situations * Excellent teamwork and collaboration in cross-functional security projects * Clear and concise communication to bridge technical and non-technical audiences * Travel domestically and internationally occasionally. * Ability to obtain and maintain a valid driver license and passport. Our Offer An interesting and ambitious role in a successful international company. We offer a secure work environment with a comprehensive benefits package that includes major medical, dental and vision insurance, 401K plan with company match, paid vacation and personal days and competitive salary. Referral Bonus: Tier III Have we awoken your interest? Then we look forward to receiving your online application. If you have any questions, please contact Thomas Steele. Liebherr-America, Inc. and its US affiliates are Equal Opportunity Employers. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law. If you are a California resident, please visit Liebherr USA, Co. Privacy Statement for more information regarding how Liebherr-America, Inc. and its US affiliates collect and process your personal information. One Passion. Many Opportunities.
    $89k-119k yearly est. 60d+ ago
  • YourLiebherrCareer: Information Security Specialist (Regional)

    Liebherr 4.6company rating

    Newport News, VA jobs

    The Information Security Specialist is responsible for Information Security within the Americas region. Duties include designing, implementing, and improving security controls, incident response strategies, and risk mitigation measures to safeguard IT systems and sensitive data. *This position is office-based in Newport News, VA.* Responsibilities Designs and implements security solutions to protect IT infrastructure Develops and enforces security policies, standards, and risk mitigation strategies Conducts penetration testing, vulnerability scanning, and security audits Investigates and responds to security incidents, performing forensic analysis Ensures compliance with regulatory frameworks (GDPR, NIS2, ISO 27001) Evaluates and integrates new security tools and technologies Automates security processes and threat mitigation where possible Works with IT, DevOps, and risk management teams Engages with regulatory bodies and compliance auditors Coordinates with external cybersecurity partner Competencies Education and Experience: Bachelor's degree in Cybersecurity, Computer Science, Information Technology or related discipline and 4 years of IT experience focused on Information Security relevant technologies; or combination of equivalent education, training, certification, and 8 years relevant experience. Information Security certifications (such as CISSP: Certified Information Systems Security Professional; CEH: Certified Ethical Hacker; CISM: Certified Information Security Manager; GIAC: Global Information Assurance Certification) can be accepted in lieu of bachelor's degree. Security+ preferred. Knowledge of Information Security engineering principles (least privilege, zero trust) Knowledge of IAM solutions (Active Directory, Okta, SSO, MFA) Knowledge of threat modeling and risk analysis techniques Knowledge of Information Security automation tools (Ansible, PowerShell, Python) Knowledge of Compliance frameworks (NIST CSF, CIS Controls, ISO 27001) Skilled in designing and implementing security architectures Skilled in automating security processes and threat mitigation Skilled in managing security operations and improving response efficiency Ability to work independently and take ownership of security initiatives Strong problem-solving skills in high-pressure situations Excellent teamwork and collaboration in cross-functional security projects Clear and concise communication to bridge technical and non-technical audiences Travel domestically and internationally occasionally. Ability to obtain and maintain a valid driver license and passport. Our Offer An interesting and ambitious role in a successful international company. We offer a secure work environment with a comprehensive benefits package that includes major medical, dental and vision insurance, 401K plan with company match, paid vacation and personal days and competitive salary. Referral Bonus: Tier III Have we awoken your interest? Then we look forward to receiving your online application. If you have any questions, please contact Thomas Steele. Liebherr-America, Inc. and its US affiliates are Equal Opportunity Employers. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law. If you are a California resident, please visit Liebherr USA, Co. Privacy Statement for more information regarding how Liebherr-America, Inc. and its US affiliates collect and process your personal information. One Passion. Many Opportunities. The company In line with its international growth, Liebherr's venture into the United States began in 1970. Within a couple of years, the company expanded and completed its production facilities in Newport News, Virginia, for its product line of hydraulic excavators. It was later converted into Liebherr's manufacturing facility for mining trucks and remains home to Liebherr Mining Equipment Newport News, Co. In addition to its production facility, Liebherr markets a wide variety of products and technologies through its companies located across the United States. The companies are Liebherr-Aerospace Saline, Inc., Liebherr Gear Technology, Inc., Liebherr Automation Systems, Co., and Liebherr USA, Co., the umbrella company for 12 product segments that are positioned across the United States. Location Liebherr USA Co. 4800 Chestnut Avenue 23607 Newport News, VA United States (US) Contact Thomas Steele ************************ [Not translated in selected language]
    $89k-119k yearly est. Easy Apply 60d+ ago
  • Information Security Analyst

    Hunter Fan Co 4.3company rating

    Memphis, TN jobs

    WHAT YOU WILL DO Support a complex security architecture that includes but not limited to: Next generation firewalls, web filtering, e-mail security, DLP, Identity Access Management, Vulnerability management, Endpoint Protection, SIEM and forensic analysis Design and implement network security controls for multiple locations Lead large and complex projects while managing resources effectively. Develop and maintain appropriate Information Security technical documentation as well as providing reviews and updates of existing policies and procedures. Identify opportunities and recommend solutions for improving service, efficiency and effectiveness. Provide inputs for formulating security architecture recommendations and design of security services. Enforce the organization's security policies and mitigate security risks to preserve the confidentiality, integrity and availability of business services Provide IT support for end users as needed Requirements: BS degree in Information technology, computer science or relevant field preferred A minimum of 2 years' experience in a role as an IT Security professional Information Security Certifications like CISSP, GCIH, CCNA, Security+, CEH a plus Experience with supporting end users in a technical support role Experience with implementing security solutions in an enterprise environment Experience with network security management (Firewalls, Switches, IDS/IPS; VLAN, ACLs, NAC, SDWAN) Experience with security frameworks like NIST 800-171, ISO 27002 & CIS Experience with SOX audit and compliance requirement functions Strong written, oral, interpersonal and organizational skills; attention to detail; highly collaborative; ability to and interested in interacting with individuals at all levels of the organization Working knowledge of various privacy, risk and security standards and practices Experience in Cloud security (Azure & AWS) as plus
    $71k-97k yearly est. Auto-Apply 60d+ ago
  • Information Security Analyst (On Site)

    Fiber Materials 4.1company rating

    Biddeford, ME jobs

    Fiber Materials Inc. | solutions for the most extreme places in the universe FMI's manufacturing facility has been a leading solutions provider of high temperature materials and composites for more than 50 years, serving the Department of Defense and NASA. The focus in Maine is on multidirectional reinforced Carbon/Carbon (C/C) and Ceramic Matrix Composites (CMCs) that enable high-temperature components such as: thermal protection systems, re-entry vehicle nose tips as well as rocket motor throats and nozzles. Our materials are being used on ground-breaking space initiatives such as the Orion Multi-Purpose Crew Vehicle and the heat shield for NASA's Mars 2020 mission, important missile programs, airfoils in commercial and military jet engines, and as lightweight armor for U.S. military ground vehicles. Your role: FMI is seeking an Information Security Analyst to support a small, stand-alone classified information system(s) in support of a U.S. Government contract(s). As the Information Security Analyst, you will encompass the responsibilities of an Information System Security Officer (ISSO) and Information System Security Engineer (ISSE). To be successful, you will be responsible for compliance, operations, and technical security engineering of the classified environment. Please keep in mind this role is on site. Job Responsibilities: Operational Security (ISSO Duties): Perform continuous monitoring and day-to-day security administration of the system. Manage user access, account creation, and audit log reviews. Conduct security training and briefings for system users. Document and report security incidents, vulnerabilities, and mitigation actions. Engineering & Technical Security (ISSE Duties): Design, implement, and maintain technical security controls for the system. Evaluate, recommend, and integrate security solutions for classified IT environments. What we need from you: Associate's degree in Cybersecurity, Information Technology, or related field; equivalent experience considered 1-3 years of experience in information system security Active or ability to obtain and maintain an U.S. Government security clearance (Secret or above) Effective time management Technical proficiency Detail oriented Strong listening skills Customer focus Self-motivated Strong interpersonal skills Ability to work independently and as part of a team in a fast-paced environment Knowledge of NIST and or CMMC cybersecurity frameworks and standards Understanding in cyber security assessment tools and methodologies Understanding network and system security, intrusion detection and prevention, and incident response Excellent analytical and problem-solving skills Commitment to continuous learning and staying current with industry developments Excellent communication and documentation skills What you'll get from us: 16 ETO days 12 paid holidays (including Winter Closure!) Medical / Dental / Vision 401k Company Match Tuition Reimbursement $1000 Sign-On Bonus
    $96k-133k yearly est. 60d+ ago

Learn more about Cenveo jobs