Securities Analyst jobs at Compass Group USA - 128 jobs
Sr Cyber Defense Security Specialist
Boyd Gaming 3.9
Las Vegas, NV jobs
Boyd Gaming Corporation has been successful in gaming jurisdiction in which we operate in the United States and is one of the premier casino entertainment companies in the United States. Never content to rest upon our successes, we will continue to evolve and retain a position of leadership in our industry. Our past success, our current business philosophies and our sound business planning, combine to position Boyd Gaming Corporation to maximize value for our shareholders, our team members and our communities.
Job Description
Subject matter expert and technical leader who is passionate about complex information security technology, topics and issues. Responsible for technical and operational duties in the areas of computer network defense analysis, vulnerability assessment and management, incident response and management, threat intelligence, data loss prevention, digital forensics, and threat hunting. Provides customer service and technical support with the goal of improving the overall security posture of the organization.
Responsible for documenting, monitoring and reporting on various security related systems and processes to ensure system and data integrity, security and availability.
Creation of policy, day to day management, administration and maintenance of Information Security tool set.
Identification of any tool or visibility gap in the existing tool set.
Identification of team requirements for any given technology, documentation of the current or proposed architecture, lead any proof of concept and document results, quantify any recommendations for the use of any new security tool, process or procedure.
Cross training the team on day to day use, standard operating procedures and tuning of the security tool set.
Analyze threat intelligence and risks. Identify and document impact to Boyd and any mitigation or remediation actions required.
Lead initiatives and own the outcomes related to remediation or mitigation against identified day zero attacks. Liaise with cross functional teams to facilitate and ensure implementation of any necessary tasks to defend against the risk.
Escalation point and technical subject matter expert for SecurityAnalysts and any third-party security providers.
Responsible for tracking all security incidents to resolution.
Leading defensive protocols and programs when attacks occur.
Simulating attacks to identify potential areas of weakness in defenses and alerting.
Writing detailed reports and providing accurate metrics.
Perform the role and duties of an internal expert on matters relating to threat detection and incident response.
Lead investigations into attacks and indicators of compromise. Provide a coordinated response to applicable complex cyber-attacks.
Contribute to the ongoing development and improvement of security monitoring and incident response processes and solutions as required to support Boyd's Information Security program and exceed team objectives.
Tracking cybersecurity news and trends for applicable systems, and reporting concerns to appropriate resources.
Documenting and updating security related policies, including participation in the periodic review process and managing policy exceptions and risk acceptances in coordination with the Boyd Risk and Compliance teams.
Manage, update, modify alerts, adjust/tune event correlation rules to increase accuracy/relevance/effectiveness and create new rules based on threat changes and evolving risks.
Use creativity and innovation to automate and streamline team processes and procedures.
Perform event correlation, analysis of malicious activity indicators and appropriate response based on review and access to multiple security tools.
Qualifications
Bachelor's Degree in Information Technology or Cyber Security, and/or equivalent experience, Masters ' Degree in Computer Science or Information Security (Preferred)
7-10 years of professional Information Security Incident Response/ Forensics/ SOC experience
Proven experience with Information Security industry best practices
Proven experience with System/ Application vulnerabilities, threats and exploitation
Proven experience with malware analysis (dynamic and static) or forensic examination
Advanced knowledge and understanding of Windows, Linux, Unix and networking
Understanding of ISO 27001 / 2700 2, NIST Cybersecurity Framework, COBIT, SOX, PCI, CCPA and ITIL.
Expert level computer and IT skills.
Advanced analytical and problem-solving skills.
High levels of creativity, patience and ability to remain calm and focused in a crisis.
Highly motivated, self-starter, competitive, and attracted to challenging opportunities
Demonstrated strong decision-making skills. Having a logical and analytical approach to problem-solving, being able to assess situations and decide on the best course of action; understanding test results and developing solutions.
Demonstrated advanced organizational and time management skills. Completing tasks in a timely manner; being detail-oriented, able to perform repetitive tests in a thorough and consistent manner; being able to work on several tasks at the same time while still accomplishing goals and deadlines.
Advanced communication skills. Being able to articulate technical issues and requirements in a clear and non-technical manner.
Excellent teamwork skills. Ability to partner with the business and cross functional IT teams, working as a cohesive and effective unit.
Highest levels of honesty, integrity and objectivity. Ability to remain objective when analyzing weaknesses and proposed new solutions; being responsible and understanding the level of trust required to handle private and highly sensitive information and situations.
Additional Information
Boyd Gaming is proud to be an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Boyd Gaming is proud to be an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state, or local protected class.
$51k-74k yearly est. 5d ago
Looking for a job?
Let Zippia find it for you.
Fleet Analyst
Aramark Corp 4.3
Philadelphia, PA jobs
Reporting to the Sr. Mgr of Fleet, this role supports the daily operations, financial oversight, and performance optimization of the company's vehicle fleet. This role manages & supports key fleet programs including fuel, rentals, tolls, licensing/registrations, maintenance and collision management to ensure accuracy, cost control and operational efficiency. The ideal candidate is analytical, organized and comfortable working with data, vendors and internal stakeholders.
Job Responsibilities
Key Responsibilities
Collect and analyze large datasets from vendor platforms and/or other sources to identify trends, optimize fleet performance and enhance safety measures.
Works in close partnership with the Fleet Manager to support remarketing activities and asset management reporting
Manages daily Fleet Services email intake and supports field operators with timely responses.
Develop and maintain KPI reports, dashboards and visualizations to provide actionable insights for cost savings and process improvements for the following programs:
Fuel Program Management:
Manage the company's fuel program by monitoring fuel transactions for accuracy, fraud and policy compliance.
Analyze fuel usage trends and identify opportunities to reduce cost and improve efficiency.
Work with vendors to resolve discrepancies and maintain accurate billing.
Prepare regular reports on fuel spend to identify cost-savings opportunities and recommend process improvements.
Rental Program Management:
Coordinate short-term and long-term rentals to support operational needs - verify/approve rental drivers.
Maintain relationships with rental providers to ensure availability, competitive pricing, and service quality.
Track rental utilization, cost and return schedules to avoid unnecessary charges.
Prepare regular reports on rental usage to identify cost-savings opportunities and recommend process improvements.
Toll Program/Violations Management
Oversee toll accounts and billing for all fleet vehicles.
Reconcile toll charges and investigate anomalies or violations
Prepare regular reports on toll activity to identify cost-savings opportunities and recommend process improvements.
Accident Program Management
* Track claims, repair timelines and associated cost.
* Prepare regular reports on accident trends to identify cost-savings opportunities and recommend process improvements.
Maintenance Program Management:
Monitor preventative maintenance schedules and ensure timely service for all fleet vehicles.
Analyze maintenance spend, identify cost-saving opportunities, and track vendor performance.
Support warranty claims and recalls.
Prepare Maintenance KPI financial reports for all lines of businesses.
Licensing & Registration Management:
* Generate and distribute monthly reports to field location detailing upcoming license and registration expirations.
* Notify field teams of any inspections required to maintain vehicle licensing compliance.
Qualifications
A bachelor's degree or equivalent experience is required.
Minimum 1 year of fleet management experience.
Critical thinking - ability to break down complex problems and evaluate information objectively.
Microsoft Excel proficiency (pivot tables, formulas, data cleaning)
Understanding of KPIs and how they connect to business goals
Data visualization (Power BI, Tableau or similar tools)
Strong data analysis skills with proficiency in excel and fleet management systems
Excellent organizational skills and problem-solving abilities.
Ability to communicate effectively with vendors and internal stakeholders
Detail-oriented with a focus on accuracy and cost control.
Ability to work and think independently, possessing sound problem-solving and analytical skills.
Responsive and client-service focused.
Willingly accepts additional responsibility, challenging tasks, and/or projects.
Excellent interpersonal, communication, and presentation skills
Fully proficient in MS Office applications such as Word, Excel, Outlook, and Teams; experience with PowerPoint and Smartsheet a plus.
Benefits
Aramark offers comprehensive benefit programs and services for eligible employees including medical, dental, vision, and work/life resources. Additional benefits may include retirement savings plans like 401(k) and paid days off such as parental leave and disability coverage. Benefits vary by location and are subject to any legal requirements or limitations, employee eligibility status, and where the employee lives and/or works. For more information about Aramark benefits, click here Aramark Careers - Benefits & Compensation.
Generous PTO, Vacation and 9 paid holidays
Volunteer days, community partnerships, Employee Assistance Program
Employee discounts on select services and products
Your choice of three medical plan tiers, two carriers to choose from
Adoption Assistance & Paid Parental Leave
Tuition Funding Sources and Scholarship Programs
Retirement plan (401K or SIRP for those eligible) with match on annual contributions
About Aramark
Our Mission
Rooted in service and united by our purpose, we strive to do great things for each other, our partners, our communities, and our planet.
At Aramark, we believe that every employee should enjoy equal employment opportunity and be free to participate in all aspects of the company. We do not discriminate on the basis of race, color, religion, national origin, age, sex, gender, pregnancy, disability, sexual orientation, gender identity, genetic information, military status, protected veteran status or other characteristics protected by applicable law.
About Aramark
The people of Aramark proudly serve millions of guests every day through food and facilities in 15 countries around the world. Rooted in service and united by our purpose, we strive to do great things for each other, our partners, our communities, and our planet. We believe a career should develop your talents, fuel your passions, and empower your professional growth. So, no matter what you're pursuing - a new challenge, a sense of belonging, or just a great place to work - our focus is helping you reach your full potential. Learn more about working here at ***************************** or connect with us on Facebook, Instagram and Twitter.
Nearest Major Market: Philadelphia
$59k-76k yearly est. 4d ago
Embedded Detection Analyst
Abnormal Security 4.5
Remote
About the Role
Abnormal AI is looking for an Embedded Detection Analyst to join our Threat Intelligence team. The Embedded Detection Program partners directly with our highest-value customers to rapidly identify, resolve, and demonstrate measurable improvements in detection performance. This role combines the investigative mindset of a SOC analyst with the customer-focused approach of a detection engineer-you'll own end-to-end customer outcomes by understanding pain points, using our detection analysis platform to identify root causes, implementing tuning solutions, and validating improvement. The ideal candidate will bring SOC or security operations experience, strong analytical skills, hypothesis-driven investigation approaches, and the ability to work systematically with established tools and processes.
You'll work at the intersection of security operations, customer success, and detection quality, using our suite of analysis tools and AI-powered productivity enhancers to drive measurable customer value while contributing to the operational playbook that scales this program.
Scope and scale: Own detection performance outcomes for 3-5 strategic customer accounts, with responsibility for measurable detection KPIs, cross-customer tuning patterns, and contributions to the programs playbook.
As an Embedded Detection Analyst, you are a trusted technical partner for our strategic customers. You are highly motivated to understand what attackers are doing, why detections are behaving unexpectedly, and how to systematically improve customer outcomes.
You're driven to stop email attackers and understand email security attack modes, TTPs, and threat patterns.
You like to dive into the details of complex detection systems, understand their behavior, and analyze root causes. When detection output is unexpected, you investigate systematically until the issue is identified.
You approach technical challenges methodically, following established playbooks while identifying opportunities for improvement and automation.
You document your investigations clearly, maintaining comprehensive notes that can be used for future reference and team learning.
You are a clear communicator who can explain technical detection issues to both technical and non-technical audiences, particularly customers and GTM stakeholders.
You remain calm and responsive during high-pressure situations, including customer escalations and critical misclassifications
You are a trusted team member-when you take on tasks, there is confidence they will be completed on time and to specification, with appropriate escalation when needed
You primarily operate behind the scenes, partnering closely with GTM and customer-facing teams. While you may occasionally join customer discussions to explain detection findings, your core focus is investigation, tuning, and measurable detection improvement rather than ongoing account management.
You measure your success by quantified detection improvements (for example, reduction in false positives/negative,improved precision/recall) across your portfolio of accounts and the entire system, not just by closing individual investigations.
What you will do
Own detection performance outcomes for 3-5 strategic customer accounts, ensuring the AI engine maintains high efficacy aligned to each customer's risk tolerance and priorities.
Become a reliable resource for customer detection issues, handling high-priority false positive and false negative escalations, often using investigation outputs from Email SecurityAnalysts and other Threat Intel inputs.
Monitor and analyze misclassification patterns using internal detection analysis dashboards and tools.
Perform incident triage and alert correlation to systematically diagnose why detections produce false positives or miss threats, using IOCs and TTPs.
Design and implement detection tuning strategies based on customer-specific signals, attack patterns, threat intelligence, and behavioral characteristics, following established methodologies.
Fine-tune detection thresholds and configurations to optimize precision while maintaining coverage against emerging threats, balancing detection efficacy with customer experience.
Generate and present impact reports that demonstrate measurable improvement in detection improvement to both customers, and internal stakeholders, in close partnership with GTM teams.
Maintain close alignment with Sales and Customer Success leads to understand customer pain points, renewal risks, and what matters most for securing deals, without taking on primary account management responsibilities.
Document detection issues, investigation findings, and tuning approaches in a structured, reusable format to enable team learning and program improvement.
Review audit logs and analyze system interactions using internal and external tools, including AI-based analytical tools, to identify root causes, and tuning opportunities.
Identify cross-customer patterns and contribute tuning methodologies to the operational playbook that can be leveraged across the program.
Submit D360 CFN reports and AISM submissions to improve global detection coverage based on customer findings.
Provide feedback to tooling team on analysis gaps, needed capabilities, and opportunities for automation, helping shape the roadmap for detection analysis and tuning tools.
Support training of other team members by sharing investigation insights and developing repeatable methodologies, including leveraging outputs from Email SecurityAnalysts to scale tuning impact.
Leverage AI tools (ChatGPT, Claude, Claude Code, etc.) in established workflows and investigations to accelerate research, automate routine tasks, enhance documentation, and improve problem-solving efficiency
Must Haves
2-5 years of experience in SOC operations, detection engineering, incident response, email security analysis, or related cybersecurity role.
Experience with security monitoring and detection platforms such as SIEM, EDR, email security tools, or similar technologies (experience with Abnormal Security is a plus).
Experience in email attack analysis, with ability to identify and leverage IOCs and TTPs to understand and remediate threats.
Deep understanding of precision/recall metrics (true/false negatives, true/false positives) and their business impact on security operations and customer experience.
Proven experience triaging security alerts, performing root cause analysis following established procedures, and tuning detection logic to reduce false positives while maintaining coverage.
Ability to perform standardized data analysis procedures, effectively following established runbook methodologies and debugging analysis workflows as needed
Demonstrated proficiency with AI tools (ChatGPT, Claude, Claude Code, Copilot, or similar) to enhance productivity, automate tasks, and accelerate problem-solving in both routine workflows and ad-hoc investigations.
Experience in technical writing that effectively communicates complex issues, with ability to adapt communications for audiences of varying technical expertise, particularly in customer-facing contexts.
Proven ability to work directly with customers or stakeholders on technical security issues, in collaboration with Customer Success and Sales, translating findings into business value without owning management.
Demonstrated ability to remain calm and responsive during high-pressure situations, including customer escalations and active cybersecurity incidents.
Outcome-oriented mindset that measures success by customer impact and detection improvement rather than activities completed.
Strong ownership mentality with ability to work within established processes while identifying improvement opportunities-trusted to complete tasks on time and to specification with appropriate escalation when needed.
Nice to Have
Background in email security, phishing detection, anti-abuse systems, spam analysis, or email threat containment.
Basic SQL knowledge with ability to write simple queries, perform data filtering, and understand data structures.
Familiarity with Python, data analysis scripting, or notebook environments (e.g. Databricks, Jupyter, Splunk)
Understanding of threat intelligence, IOCs (Indicators of Compromise), and threat hunting concepts.
Familiarity with the MITRE ATT&CK framework and common email attack vectors (phishing, BEC, credential harvesting, malware, account takeover)
Security certifications such as Security+, Network+, GIAC (GCIA, GCIH), CISSP, CEH, or similar
Previous experience in technical account management, customer success engineering, or customer-facing security roles
Examples of using AI tools and automation to solve security problems or accelerate learning in technical domains
Experience documenting investigation methodologies and training team members
#LI-AW1
At Abnormal AI, certain roles are eligible for a bonus, restricted stock units (RSUs), and benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications and other job-related reasons.
Base salary range:$165,000-$195,000 USD
Abnormal AI is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by law. For our EEO policy statement please
click here
. If you would like more information on your EEO rights under the law, please
click here
.
$165k-195k yearly Auto-Apply 3d ago
Senior Cyber Defense Analyst
Abnormal Security 4.5
Remote
About the Role
We at Abnormal AI are looking for a hands-on Security Operations/ Cyber Defense Analyst who thrives in a fast-paced, engineering-driven environment. You'll be responsible for monitoring, investigating, and responding to security alerts across cloud, endpoint, identity, and application layers. You'll work closely with detection engineers, cloud security, and IT teams to protect our hybrid environment from threats in real time.
This is not a “click-through-the-console” SOC role - we're looking for someone who can think critically, automate relentlessly, and own incidents end-to-end.
Key Responsibilities
Detection & Triage:
Monitor alerts from tools like SIEM, EDR, IAM, CSPM, CDR etc.
Perform initial triage, enrichment, and correlation across multiple data sources.
Identify false positives and fine-tune rules with detection engineering.
Incident Response:
Lead containment, eradication, and recovery for endpoint, cloud, and identity incidents.
Document and communicate incidents through SOAR/Jira/ServiceNow workflows.
Perform root cause analysis and propose permanent preventive controls.
Threat Hunting & Analysis:
Proactively hunt using hypotheses mapped to MITRE ATT&CK.
Investigate anomalies across CloudTrail, Okta, GitHub, and other telemetry sources.
Collaborate with threat intelligence to identify emerging TTPs.
Automation & Process Improvement:
Build or enhance playbooks in SOAR (Torq or equivalent).
Create custom enrichment scripts and automations (Python, Bash, etc.).
Suggest new detection logic and operational improvements.
Reporting & Metrics:
Track and report operational metrics (MTTD, MTTR, incident categories).
Maintain documentation and lessons learned.
Required Skills & Qualifications
5-7 years of hands-on SOC or Incident Response experience in a cloud-first or hybrid environment.
Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs.
Experience with EDR (CrowdStrike preferred), SIEM (Splunk preferred), and SOAR (Torq, XSOAR, or Phantom).
Familiarity with AWS, Okta, and SaaS platforms.
Proficiency in writing queries and automations using Python, SPL, or equivalent.
Excellent analytical and investigative skills - capable of operating independently with minimal hand-holding.
Strong documentation and communication skills for technical and executive audiences.
Nice to Have
Experience with CSPM/CDR/VM tools.
Knowledge of Containers and Kubernetes security.
Relevant certifications like CEH, Security+, GCIH, GCIA, or AWS Security Specialty.
What Success Looks Like
You consistently deliver high-quality triage with minimal false positives.
You automate repetitive tasks instead of manually doing them twice.
You can take a vague alert and turn it into a well-documented case with actionable findings.
#LI-EM5
You make measurable improvements to detection coverage, response time, or tooling maturity.
At Abnormal AI, certain roles are eligible for a bonus, restricted stock units (RSUs), and benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications and other job-related reasons.
Base salary range:$144,500-$170,000 USD
Abnormal AI is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by law. For our EEO policy statement please
click here
. If you would like more information on your EEO rights under the law, please
click here
.
$144.5k-170k yearly Auto-Apply 3d ago
Security Analyst
Abnormal Security 4.5
Remote
About You
You are a detail-oriented person with a passion for cybersecurity and a positive attitude. You feel comfortable working in a fast-paced and virtual environment. Additionally, you have the ability to communicate clearly in both verbal and written communication methods as well as be an active listener.
In this job, you will bring these skills
Typically requires less than 1 year of related experience
Typically requires a Bachelor's degree, or working towards Bachelor's degree
Proficiency with G Suite (Google) applications
Familiarity with Zoom
Role Responsibilities
Perform operational tasks, such as handling high volume intake queues or labeling machine learning data, in a timely manner
Propose improvements for processes, workflows, product and policies
Support investigation efforts across a range of critical issues
Learn about email fraud attack strategies and patterns to prevent an event from occurring
Works on (a subset) Live Queue, POV data sets, ATO cases, VAC cases
Task work to help team grow, scale, and mature
#LI-AJ1
At Abnormal AI, certain roles are eligible for a bonus, restricted stock units (RSUs), and benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications and other job-related reasons.
Base salary range:$20.19-$20.19 USD
Abnormal AI is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by law. For our EEO policy statement please
click here
. If you would like more information on your EEO rights under the law, please
click here
.
$20.2-20.2 hourly Auto-Apply 3d ago
Senior Security Analyst
Blackcloak 3.5
Remote
BlackCloak's mission is to protect corporate executives and high-profile individuals in their personal lives, mitigating risks to their families, companies, reputation, and finances. We defend our clients' digital lives from hackers, privacy leaks, and identity theft. If you are passionate about helping to protect others, then keep reading - this may be your next great opportunity.
Ready to be on the front lines of cybersecurity? BlackCloak is looking for a sharp and proactive SecurityAnalyst to join our team. In this role, you'll be the first responder, monitoring and triaging security alerts from a variety of sources and leading the charge on security incidents. You'll play a critical part in our continuous compliance program, help develop our threat detection capabilities, and analyze emerging threats. If you're passionate about protecting against cyber threats and thrive in a fast-paced environment, we want to hear from you.What You Will Do
Monitor and triage security alerts from a variety of sources including SIEM (SecOps, Sentinel), EDR (SentinelOne, CrowdStrike) and cloud security platforms like Wiz, Orca.
Serve as a primary responder for security incidents, executing the incident response lifecycle from initial detection and containment to eradication and recovery.
Support development of threat detection library, including incorporating threat intelligence, tuning within security tools, and SOAR response actions.
Maintain and draft SOP's and supporting documents for the Incident Response Plan and strategy
Analyze phishing attempts, malware, and other cyber threats; partner with Security Engineering to devise additional security controls, administer email security, EDR, ZTNA, and other security tooling configurations to block emerging threats.
Participate in a 24/7 on-call rotation to respond to critical security incidents.
Support triage and response for compliance alerts and requests, enabling the continuous compliance program at BlackCloak using tools such as Vanta, Drata.
Prepare and present detailed incident reports and security metrics to technical and leadership audiences.
What You Need To Be Successful
4-6 years of direct experience in a Security Operations Center, incident response, threat intelligence, or similar cybersecurity role.
Ability to navigate complex problems, stay cool under pressure, and be highly inquisitive.
Hands-on experience with SIEM, SOAR, and other security platforms for log analysis, correlation, automated response, and maturation of detections/runbooks.
Deep understanding and practical experience with Endpoint Detection and Response (EDR) tools and their investigative capabilities.
Good knowledge of cloud security principles and services in AWS, Azure, or GCP, including experience with security tools like Wiz or Prisma Cloud.
Solid understanding of network protocols, operating systems (Windows, Linux, mac OS), and common attack vectors (OWASP, MITRE)
Familiarity with identity and access management concepts, including SAML, OAuth, and role-based access control (RBAC)
Relevant industry certifications are highly desirable, such as GIAC (GCIH, GCFA), CISSP, or CompTIA Security+.
Excellent problem-solving skills and the ability to communicate complex technical concepts to both technical and non-technical audiences.
$100,000 - $130,000 a year
Final offer amounts are determined by multiple factors, including but not limited to geographic location as well as candidate experience and expertise, and may vary from the amounts listed above.
About BlackCloakBlackCloak is an extremely fast-growing company in an entirely new product category. We have amazing product fit validated by industry awards and an impressive client base of Fortune 500 companies across all industries.
BlackCloak offers a competitive salary, exceptional benefits, and a dynamic work environment. Below is a quick summary of BlackCloak's generous benefits package for full-time employees includes:
- 100% Remote Company, within the USA - Comprehensive Medical, Dental, and Vision plans with a 100% employer-paid monthly premium option for employees & 50% employer-paid monthly premiums for dependents. - Health Savings Account with company contribution for eligible medical plans. - Flexible Vacation Plan - 10 Paid Company Holidays - 100% employer-paid Life, AD&D and Short- and Long-Term Disability Insurance - 401k with Traditional and Roth options, including employer match. - Company Equity - Paid Parental and Pregnancy Recovery Leave - Company and team off-sites and virtual events throughout the year - Home office stipend
We are an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic.
Learn More about UsWebsite: ********************* LinkedIn: /blackcloak Twitter: @BlackCloakCyberWhite Paper: *******************************************************************************************************
#liremote
$100k-130k yearly Auto-Apply 60d+ ago
CSOC Sr. Cyber Defense Analyst
Theta 4.0
Martinsburg, WV jobs
theta. is a. SBA-Certified 8(a) & HUBZone digital integration and management firm based in Baltimore, MD, working to create a world where tech works for everybody. Our mission is to bridge the gap between the intersection of innovation & technology and practical applications that serve the public interest.
We specialize in delivering software, services, and tools that enhance efficiency, security, and accessibility in government operations. Our commitment to be of service, be passionate, and be different drives us to deliver projects that make a significant impact.
Position Overview
We're seeking a Sr. Cyber Defense Analyst to join our team, supporting the Department of Veterans Affairs' Cybersecurity Operations Center (CSOC).
In this role, you'll serve as a technical leader in detection engineering and automation, building, tuning, and operationalizing advanced cybersecurity analytics that defend national systems serving veterans and the public.
You'll lead initiatives that integrate data across SIEM, SOAR, and EDR platforms, craft custom detections using Splunk SPL and KQL, and apply the MITRE ATT&CK framework to identify and mitigate adversary behaviors.
As a senior member of the SOC, you'll mentor analysts, drive automation improvements, and collaborate across threat intel, forensics, and engineering teams to evolve VA's cyber defense posture.
Key Responsibilities:
Engineer and tune detections across Splunk, Microsoft Sentinel, Defender for Endpoint, and other monitoring tools to detect advanced threats in real time.
Design and implement detection logic, map activity to MITRE ATT&CK, and reduce false positives through feedback loops and automated correlation.
Leverage SOAR platforms to automate enrichment, containment, and remediation workflows for high-priority threats.
Onboard and operationalize new data sources, ensuring data quality, completeness, and performance consistency.
Apply machine learning and pattern analysis techniques to identify anomalies and improve detection accuracy.
Lead detection optimization efforts across cloud, SaaS, identity, and networking environments.
Collaborate with cross-functional teams (IR, Forensics, Threat Intel, IT, and Network Engineering) to align threat detection with enterprise operations.
Participate in cybersecurity exercises, simulations, and continuous improvement of analytics and automation processes.
Basic Qualifications:
Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or related discipline -or equivalent practical experience.
8+ years of experience supporting large-scale IT or cybersecurity programs, including 4+ years in enterprise SOC or IR environments.
Deep understanding of security analytics, detection engineering, and incident response methodologies.
Proficiency with SIEM, IDS/IPS, EDR, and SOAR platforms (e.g., Splunk, Microsoft Sentinel, Defender for Endpoint).
Experience mapping detections to MITRE ATT&CK and tuning detections for high signal fidelity.
Strong scripting or query development skills (SPL, KQL, or Python).
Excellent written and verbal communication skills.
U.S. Citizenship required.
Must be able to meet any other requirements for government contracts for which they are hired (
e.g., must reside in the U.S., Security Clearances
)
Some of our clients may occasionally request or require travel. If this concerns you, we encourage you to apply and discuss it with us at your initial interview.
Preferred Qualifications
SANS certifications such as GCFE, GCIH, GNFA, or equivalent level are strongly preferred.
Experience operationalizing detections in cloud-native security tooling (Azure Sentinel, AWS GuardDuty, Google Chronicle).
Familiarity with machine learning models and behavioral analytics for anomaly detection.
Experience developing and implementing feedback processes for continuous tuning and performance improvement.
Why Join theta.?:
Collaborate with a talented and passionate team committed to making a difference.
Work on impactful projects that directly contribute to the efficiency and effectiveness of our country's operations.
Enjoy a supportive and inclusive work environment that fosters growth and development.
Benefit from a competitive compensation package, including comprehensive health benefits, retirement plans, and flexible work arrangements.
If you are a mission-driven Cyber Defense Analyst eager to design, automate, and lead next-generation detection strategies that protect critical government systems, we encourage you to apply and join our team at theta.
Salary Range: $120,000 - $150,000
(DOE and project-specific details)
$120k-150k yearly Auto-Apply 60d+ ago
Security Analyst
Abnormal 4.5
Los Angeles, CA jobs
About You
You are a detail-oriented person with a passion for cybersecurity and a positive attitude. You feel comfortable working in a fast-paced and virtual environment. Additionally, you have the ability to communicate clearly in both verbal and written communication methods as well as be an active listener.
In this job, you will bring these skills
Typically requires less than 1 year of related experience
Typically requires a Bachelor's degree, or working towards Bachelor's degree
Proficiency with G Suite (Google) applications
Familiarity with Zoom
Role Responsibilities
Perform operational tasks, such as handling high volume intake queues or labeling machine learning data, in a timely manner
Propose improvements for processes, workflows, product and policies
Support investigation efforts across a range of critical issues
Learn about email fraud attack strategies and patterns to prevent an event from occurring
Works on (a subset) Live Queue, POV data sets, ATO cases, VAC cases
Task work to help team grow, scale, and mature
#LI-AJ1
$80k-116k yearly est. Auto-Apply 20d ago
Security Analyst I
Palms 4.4
Las Vegas, NV jobs
Under the direction of the Executive Director Compliance, Information Security Operations, the SecurityAnalyst I supports efforts to ensure that information assets are adequately protected, and proper security controls are in place for all current and future IT and Information Security systems.
Champions a security mindset to all enterprise team members and recognizes the value of standards, policy and procedures, operational effectiveness, and high availability. This role supports incident response activities and post-incident actions.
Core Responsibilities:
Executes incident response and issue management resulting from security investigations. Works with technical experts and leadership on security incident follow up, assists with the resolution of daily incidents such as intrusion detection, malware infections, denial of service attacks, data leak protections, privileged account misuse and network breaches.
Analyzes and validates environment controls validation to ensure systems are operating securely and data is protected from both internal and external attacks.
Monitors security logs and alerts to identify and investigate potential security incidents. Participates in on-call rotation to support after-hours security incidents and operational support.
Assists with security controls remediation and enhancements to reduce risk throughout enterprise systems, data, and network.
Documents existing enterprise security systems configuration, processes, procedures and recommend improvements and/or alternatives.
Supports the cybersecurity toolset lifecycle management including assisting with SMEs on design, acquisition, inventory, process documentation, deployment, maintenance, change management, monitoring, reporting, decommission and other service assurance activities.
Conducts research on emerging security technologies to support system development efforts and submits findings to support decision making on technologies to increase cost effectiveness and flexibility in a holistically secure environment.
Performs other duties as assigned to support the efficient operation of the department.
Qualifications:
Bachelor's degree in information security, technology, statistics, mathematics, or related field required.
Minimum two (2) years of experience in an information technology or information security role required.
Experience with Casino & Tribal government technology and security goals strongly preferred.
Ability to troubleshoot through Open Systems Interconnection (OSI) Model:
Network security monitoring, traffic analysis, packet capture.
Transmission Control Protocol and the Internet Protocol (TCP/IP) networking and routing protocols.
Implementing two-factor authentication.
Experience with the following technology preferred:
Artificial Intelligence.
Data Loss Protection.
Endpoint Detection & Response
Vulnerability Management
Network Infrastructure.
Network Security.
Email Security.
Related, relevant, and/or direct experience may be considered in lieu of minimum educational requirements indicated above.
Must have strong communication and presentation skills.
Must understand the value of standards, policy and procedures, operational effectiveness, and high availability.
Regular and predictable attendance is expected and an essential function of this position.
Licenses, Certifications & Registration:
At the discretion of Palms Casino Resort, you may be required to obtain and maintain a gaming license.
Certifications in one or more of the following: Information Technology Infrastructure Library (ITIL), Information Systems Audit and Control Association (ISACA), The Computing Technology Industry Association (CompTIA), International Information System Security Certification Consortium (ISC2), SysAdmin, Audit, Network, and Security (SANS), Global Information Assurance Certification (GIAC) strongly preferred.
No Driving Responsibilities: Role does not require a driver's license or insurance.
Physical Demands & Work Environment:
The physical demands and working environment described here are representative of those that an employee encounters and must be met by an employee to successfully perform the essential functions of this job.
Primary work environment is in a climate-controlled office setting.
Work requires travel to attend meetings, trade shows, and conferences.
Incumbents may be required to work evening, weekend and holiday shifts.
Must be able to work in a fast-paced, high-demand environment.
Strength sufficient to exert up to 10 pounds of force occasionally and/or a negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects and/or move up to 40 pounds occasionally.
Sedentary work: involves sitting most of the time. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine, and computer printer.
Physical activities that apply to the essential functions of the position are balancing, stooping, kneeling, crouching, reaching, pushing, pulling, lifting, grasping, talking, hearing, and repetitive motions.
Hearing sufficient to hear conversational levels in person, via videoconference and over the telephone.
Speech sufficient to make oneself heard and understood in person, in front of groups, in meetings, via videoconference and over the telephone.
Visual acuity that meets the requirements of the position: The worker is required to have close visual acuity to perform an activity such as preparing and analyzing data and figures; transcribing; viewing a computer terminal; expansive reading and visual inspection of employees, visitors or facility.
Mobility sufficient to safely move in an office environment, walk, stoop, bend and kneel, and enter, exit and operate a motor vehicle in the course of travel to promotional events, meetings, conferences, trade shows and Palms Casino Resort properties.
Endurance sufficient to sit, walk and stand for extended periods, and maintain efficiency throughout the entire work shift and during extended work hours.
The employee may be exposed to fumes or airborne particles including secondhand smoke.
Reasonable accommodation will be made in compliance with all applicable law.
Equal Opportunity Employer:
At Palms Casino Resort, we are committed to creating a work environment where the growth and well-being of our Team Members is the top priority. We provide equal employment opportunities to all Team Members and applicants for employment, and we prohibit discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
Palms Casino Resort, its affiliates and subsidiaries will make reasonable accommodations in compliance with applicable law.
Join our team today!
$70k-114k yearly est. Auto-Apply 40d ago
Senior Cyber Defense Analyst
Abnormal 4.5
San Francisco, CA jobs
About the Role
We at Abnormal AI are looking for a hands-on Security Operations/ Cyber Defense Analyst who thrives in a fast-paced, engineering-driven environment. You'll be responsible for monitoring, investigating, and responding to security alerts across cloud, endpoint, identity, and application layers. You'll work closely with detection engineers, cloud security, and IT teams to protect our hybrid environment from threats in real time.
This is not a "click-through-the-console" SOC role - we're looking for someone who can think critically, automate relentlessly, and own incidents end-to-end.
Key Responsibilities
Detection & Triage:
Monitor alerts from tools like SIEM, EDR, IAM, CSPM, CDR etc.
Perform initial triage, enrichment, and correlation across multiple data sources.
Identify false positives and fine-tune rules with detection engineering.
Incident Response:
Lead containment, eradication, and recovery for endpoint, cloud, and identity incidents.
Document and communicate incidents through SOAR/Jira/ServiceNow workflows.
Perform root cause analysis and propose permanent preventive controls.
Threat Hunting & Analysis:
Proactively hunt using hypotheses mapped to MITRE ATT&CK.
Investigate anomalies across CloudTrail, Okta, GitHub, and other telemetry sources.
Collaborate with threat intelligence to identify emerging TTPs.
Automation & Process Improvement:
Build or enhance playbooks in SOAR (Torq or equivalent).
Create custom enrichment scripts and automations (Python, Bash, etc.).
Suggest new detection logic and operational improvements.
Reporting & Metrics:
Track and report operational metrics (MTTD, MTTR, incident categories).
Maintain documentation and lessons learned.
Required Skills & Qualifications
5-7 years of hands-on SOC or Incident Response experience in a cloud-first or hybrid environment.
Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs.
Experience with EDR (CrowdStrike preferred), SIEM (Splunk preferred), and SOAR (Torq, XSOAR, or Phantom).
Familiarity with AWS, Okta, and SaaS platforms.
Proficiency in writing queries and automations using Python, SPL, or equivalent.
Excellent analytical and investigative skills - capable of operating independently with minimal hand-holding.
Strong documentation and communication skills for technical and executive audiences.
Nice to Have
Experience with CSPM/CDR/VM tools.
Knowledge of Containers and Kubernetes security.
Relevant certifications like CEH, Security+, GCIH, GCIA, or AWS Security Specialty.
What Success Looks Like
You consistently deliver high-quality triage with minimal false positives.
You automate repetitive tasks instead of manually doing them twice.
You can take a vague alert and turn it into a well-documented case with actionable findings.
#LI-EM5
You make measurable improvements to detection coverage, response time, or tooling maturity.
$89k-122k yearly est. Auto-Apply 60d+ ago
Computer Network Defense Analyst
Markon 3.7
Fort Meade, MD jobs
Eager to join a team where your skills are valued, your growth is nurtured, and your impact is profound? Look no further than Markon, a premier consulting firm deeply dedicated to advancing our nation's most critical missions.
At Markon, we don't just offer jobs - we offer opportunities for personal and professional transformation. Empowering our employees to lead, innovate, and excel, we foster an environment where new ideas are not just welcomed but celebrated. As a perennial Washington Post Top Workplace, we prioritize the well-being and success of our team members, ensuring they can bring their best selves to work.
Headquartered in Falls Church, Virginia, Markon has garnered national recognition for our unwavering dedication to excellence in serving the intelligence community, as well as federal civilian and defense agencies. Our growing reach extends across 17 states, 116 countries, and 5 continents, where our team of dynamic professionals collaborates to deliver unparalleled program and project management services.
Markon values people and the tremendous impact each individual can make - which is why we're consistently recognized as one of the best places to work in federal government consulting. Here, you can help solve the nation's most important challenges, surrounded by colleagues who help you grow, advance, and succeed. We are deeply dedicated to what matters - bringing out the best in each other to advance our clients' missions.
Join us and make a meaningful impact.
Markon is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, national origin, age, protected veteran status, or disability status. This job posting will remain open until the position is filled.
Benefits Offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Training and Tuition Assistance, Paid Time Off, and Holidays.
Description
Markon is looking for multiple Computer Network Defense Analysts to support our Fort Meade Customer.
Responsibilities
The Computer Network Defense Analyst will:
Thoroughly understand all aspects of computer and network security, including firewall administration, encryption technologies and network protocols
Protect, monitor, detect, analyze, and respond to unauthorized activity within assigned information systems and computer networks
Have the ability to identify and convert data; analyze system alerts; and report on computer probe and network infiltration attempts on network infrastructure
Keep abreast of industry security trends and developments, as well as applicable Government regulations
Qualifications
Required Qualifications:
A Bachelor's degree plus 5 years of relevant experience, or a Master's degree plus 3 years of relevant experience, or a Doctoral degree and 2 years of relevant experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an Associate's degree plus 7 years of relevant experience; or at least 18 semester hours of military coursework/training in networking, computer science, or cyber topics plus 7 years of relevant experience.
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirement, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).
TS/SCI with Active Polygraph through this customer.
Required experience may include, but is not limited to, the following:
Experience identifying and analyzing anomalies at the packet level
Demonstrate experience performing intrusion incident response
Experience identifying malicious cyber activity
Ability to respond to unknown, suspicious, or exploitation activity
Ability to provide formal briefings on intrusion activity
Expertise in documenting information, analysis, and processes
Experience with tools like WIRESHARK, SNORT, and audit/event logs
Desired Qualifications:
CEH Certified Ethical Hacker
CFR CyberSec First Responder
CySA+ CompTIA Cybersecurity Analyst
GCFA GIAC Certified Forensics Analyst
GCIH GIAC Certified Incident Handler
SCYBER Cisco Cybersecurity Specialty Certification
CNDSP Computer Network Defense Service Provider
CSSP-IR DoD Cyber Security Service Provider for Incident Responder
Salary Range USD $110,000.00 - USD $230,000.00 /Yr.
The Markon pay range for this position is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
$69k-99k yearly est. Auto-Apply 21d ago
Information Security Intermediate Analyst
Gordon Food Service 4.4
Wyoming, MI jobs
Welcome to Gordon Food Service! We are excited that you are thinking about opportunities with us, and we have an amazing story to share. See below for a quick glance of who we are and the impact you could have on the food service industry. There's a seat at our table for you...
Position Summary:
Monitor Gordon Food Service Information Systems environment for cyber-security related events, anomalies, and malicious activities. Triage, respond, and escalate appropriately as needed. Lead in process improvement and implementation of cyber-security and forensics solutions.
What you will do:
Monitor the cyber-security environment
Evaluate risk of cyber-security alerts & events
Triage cyber-security alerts & events then escalate as needed
Mentor associate securityanalysts
Assist with or support for detection engineering
Monitor cyber-security intelligence feeds for indicators of compromise
Actively participate in incident response
Experience in other related information technology domains
Other duties and responsibilities as assigned.
When you will work:
Monday to Friday, 8 am to 5 pm
Hybrid schedule, 4 days in office in Wyoming, MI with 1 day remote
What you will bring to the table:
Bachelor's Degree in Computer Science, Information Technology, or a related field required
Three to five years previous related experience strongly preferred
Security+, Network+, GIAC,CEH certifications preferred.
Must have excellent written, verbal, organizational and communication skills.
Must have the ability to multi-task, prioritize and be able to work independently or within a team environment.
Must have good customer service and time management skills.
Ability to develop solutions to a variety of complex problems, and reference established precedents and policies.
Knowledge of investigative theory practices
Knowledge of cyber-security system design tools, methods, and techniques
BE PART OF AN AMAZING CULTURE WHERE WHAT MATTERS TO YOU, MATTERS TO US!
Gordon Food Service values our customers and understands that their success is largely dependent upon their workforce. To demonstrate our commitment to our partnership, we will require any candidate who works for a Gordon Food Service customer to provide a letter of support from their management if they are selected for the interview process.
Equal Employment Opportunity is a matter of policy at Gordon Food Service, Inc. and we are committed to a work environment in which all individuals are treated with respect and dignity.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, status as a protected veteran, or status as a qualified individual with disability. If you require reasonable accommodation for any part of the application or hiring process due to a disability, please submit your request to ************** and use the words “Accommodation Request” in your subject line.
All Gordon Food Service locations are tobacco-free.
Gordon Food Service is a drug-free workplace and conducts pre-employment drug tests.
$63k-97k yearly est. Auto-Apply 2d ago
Analyst Sr., Cloud Security
Carnival Corporation 4.3
Miami, FL jobs
The Senior Cloud SecurityAnalyst is responsible for daily management of security posture pertaining to our digital environment operations as well as support of identity access management (IAM) for the Holland America, Seabourn, and Holland America Princess (Brands). This role requires assisting the GCS IAM team with bringing the Brands into and maintaining compliance in accordance with GCS policies and directives. All responsibilities transverse shoreside and shipboard across the fleets. This role requires experience in evaluation of cloud environment security posture, security directives and project creation, as well as risk mitigation to achieve and maintain desired business outcomes. This position requires working with brand stakeholders in pursuit of security and compliance solutions across the Brands.
Essential Functions:
* Management, evaluation, maintenance, and enhancement of the cloud security posture.
* Continuous improvement of the brand vulnerability management people, process, and technology analyzing cloud environment reporting, prioritizing, and working with brand IT to make Cloud Security Management data actionable and understandable.
* Operation of identity and access processes and controls for SailPoint, Active Directory, Email, and Collaboration Platforms and cloud-based solutions.
* Evaluation and providing directives and guidance regarding our SIEM integrations, identifying potential blind spots, and assisting with configuration validations. Augment and assist GISCS Security Operations, monitoring and triaging brand security events (Security Operations).
* Creates visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs. Provides regular information briefs to Senior Leadership.
* Helping to continuously improve the brands cybersecurity Key Risk Indicators (KRI) and reporting.
* Assisting with security architecture reviews for new and proposed integrated solutions.
* Evaluating and assisting with managing shoreside and shipboard access management and cloud processes and solutions.
* Providing consultation and training to brand IT team members on new configurations and solutions.
* Assisting the Cybersecurity PMO to build and prioritize backlog.
Qualifications:
* High School Diploma or GED in Computer Science or other technical degree or equivalent experience.
* Bachelor's Degree preferred.
* Minimum 5+ years of relevant industry experience with access management and cloud security.
Knowledge, Skills, and Abilities:
* Hands-on experience with Azure administration
* Hands-on experience with Orca Security
* Hands-on experience with AWS security administration
* Hands-on experience with PowerShell scripting
* Hands-on experience with SailPoint IAM solution
* Hands-on experience with Active Directory
* Hands-on experience with Windows workstations and server operating systems
* Hands-on experience with managing security for AWS cloud environment tenants
* Proven track record of taking ownership of strategic initiatives and driving results in complex environments
* Proven success in contributing to a team-oriented environment
* Proven ability to work creatively and analytically in a problem-solving environment
Physical Demands: Must be able to remain in a stationary position at a desk and/or computer for extended periods of time.
Travel: Less than 25% with shipboard travel likely
Work Conditions: Work primarily in a climate-controlled environment with minimal safety/health hazard potential.
This position is classified as "in-office." As an in-office role, it requires employees to work from a designated Carnival office in South Florida Tuesday through Thursday each week. Employees may work from their homes on Mondays and Fridays. Candidates must be located in (or willing to relocate to) the Miami/Ft. Lauderdale area.
Offers to selected candidates will be made on a fair and equitable basis, taking into account specific job-related skills and experience.
At Carnival, your total rewards package is much more than your base salary. All non-sales roles participate in an annual cash bonus program, while sales roles have an incentive plan. Director and above roles may also be eligible to participate in Carnival's discretionary equity incentive plan. Plus, Carnival provides comprehensive and innovative benefits to meet your needs, including:
* Health Benefits:
* Cost-effective medical, dental and vision plans
* Employee Assistance Program and other mental health resources
* Additional programs include company paid term life insurance and disability coverage
* Financial Benefits:
* 401(k) plan that includes a company match
* Employee Stock Purchase plan
* Paid Time Off
* Holidays - All full-time and part-time with benefits employees receive days off for 8 company-wide holidays, plus 2 additional floating holidays to be taken at the employee's discretion.
* Vacation Time - All full-time employees at the manager and below level start with 14 days/year; director and above level start with 19 days/year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 84 hours/year. All employees gain additional vacation time with further tenure.
* Sick Time - All full-time employees receive 80 hours of sick time each year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 60 hours each year.
* Other Benefits
* Complementary stand-by cruises, employee discounts on confirmed cruises, plus special rates for family and friends
* Personal and professional learning and development resources including tuition reimbursement
* On-site Fitness center at our Miami campus
#LI-Hybrid
#Corp
#LI-SH1
About Us
Carnival Corporation & plc is the world's largest leisure travel company, our mission to deliver unforgettable happiness to our guest through our diverse portfolio of leading cruise brands and island destinations, including Carnival Cruise Line, Holland America Line, Princess Cruises, and Seabourn in North America and Australia; P&O Cruises and Cunard Line in the United Kingdom; AIDA in Germany; Costa Cruises in Southern Europe.
Join us and embark on a career that offers not only the chance to grow professionally but also the opportunity to be part of a global community that makes a difference.
In addition to other duties/functions, this position requires full commitment and support for promoting ethical and compliant culture. More specifically, this position requires integrity, honesty, and respectful treatment of others, as well as a willingness to speak up when they see misconduct or have concerns.
Carnival Corporation & plc and Carnival Cruise Line is an equal employment opportunity/affirmative action employer. In this regard, it does not discriminate against any qualified individual on the basis of sex, race, color, national origin, religion, sexual orientation, age, marital status, mental, physical or sensory disability, or any other classification protected by applicable local, state, federal, and/or international law.
*****************************************************************
******************************************************************
$86k-104k yearly est. 60d+ ago
Analyst Sr., Cloud Security
Carnival Corporation 4.3
Miami, FL jobs
The Senior Cloud SecurityAnalyst is responsible for daily management of security posture pertaining to our digital environment operations as well as support of identity access management (IAM) for the Holland America, Seabourn, and Holland America Princess (Brands). This role requires assisting the GCS IAM team with bringing the Brands into and maintaining compliance in accordance with GCS policies and directives. All responsibilities transverse shoreside and shipboard across the fleets. This role requires experience in evaluation of cloud environment security posture, security directives and project creation, as well as risk mitigation to achieve and maintain desired business outcomes. This position requires working with brand stakeholders in pursuit of security and compliance solutions across the Brands.
Essential Functions:
Management, evaluation, maintenance, and enhancement of the cloud security posture.
Continuous improvement of the brand vulnerability management people, process, and technology analyzing cloud environment reporting, prioritizing, and working with brand IT to make Cloud Security Management data actionable and understandable.
Operation of identity and access processes and controls for SailPoint, Active Directory, Email, and Collaboration Platforms and cloud-based solutions.
Evaluation and providing directives and guidance regarding our SIEM integrations, identifying potential blind spots, and assisting with configuration validations. Augment and assist GISCS Security Operations, monitoring and triaging brand security events (Security Operations).
Creates visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs. Provides regular information briefs to Senior Leadership.
Helping to continuously improve the brands cybersecurity Key Risk Indicators (KRI) and reporting.
Assisting with security architecture reviews for new and proposed integrated solutions.
Evaluating and assisting with managing shoreside and shipboard access management and cloud processes and solutions.
Providing consultation and training to brand IT team members on new configurations and solutions.
Assisting the Cybersecurity PMO to build and prioritize backlog.
Qualifications:
High School Diploma or GED in Computer Science or other technical degree or equivalent experience.
Bachelor's Degree preferred.
Minimum 5+ years of relevant industry experience with access management and cloud security.
Knowledge, Skills, and Abilities:
Hands-on experience with Azure administration
Hands-on experience with Orca Security
Hands-on experience with AWS security administration
Hands-on experience with PowerShell scripting
Hands-on experience with SailPoint IAM solution
Hands-on experience with Active Directory
Hands-on experience with Windows workstations and server operating systems
Hands-on experience with managing security for AWS cloud environment tenants
Proven track record of taking ownership of strategic initiatives and driving results in complex environments
Proven success in contributing to a team-oriented environment
Proven ability to work creatively and analytically in a problem-solving environment
Physical Demands: Must be able to remain in a stationary position at a desk and/or computer for extended periods of time.
Travel: Less than 25% with shipboard travel likely
Work Conditions: Work primarily in a climate-controlled environment with minimal safety/health hazard potential.
This position is classified as “in-office.” As an in-office role, it requires employees to work from a designated Carnival office in South Florida Tuesday through Thursday each week. Employees may work from their homes on Mondays and Fridays. Candidates must be located in (or willing to relocate to) the Miami/Ft. Lauderdale area.
Offers to selected candidates will be made on a fair and equitable basis, taking into account specific job-related skills and experience.
At Carnival, your total rewards package is much more than your base salary. All non-sales roles participate in an annual cash bonus program, while sales roles have an incentive plan. Director and above roles may also be eligible to participate in Carnival's discretionary equity incentive plan. Plus, Carnival provides comprehensive and innovative benefits to meet your needs, including:
Health Benefits:
Cost-effective medical, dental and vision plans
Employee Assistance Program and other mental health resources
Additional programs include company paid term life insurance and disability coverage
Financial Benefits:
401(k) plan that includes a company match
Employee Stock Purchase plan
Paid Time Off
Holidays - All full-time and part-time with benefits employees receive days off for 8 company-wide holidays, plus 2 additional floating holidays to be taken at the employee's discretion.
Vacation Time - All full-time employees at the manager and below level start with 14 days/year; director and above level start with 19 days/year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 84 hours/year. All employees gain additional vacation time with further tenure.
Sick Time - All full-time employees receive 80 hours of sick time each year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 60 hours each year.
Other Benefits
Complementary stand-by cruises, employee discounts on confirmed cruises, plus special rates for family and friends
Personal and professional learning and development resources including tuition reimbursement
On-site Fitness center at our Miami campus
#LI-Hybrid
#Corp
#LI-SH1
$86k-104k yearly est. Auto-Apply 60d+ ago
Analyst Sr., Cloud Security
Carnival Cruise Line 4.3
Miami, FL jobs
The Senior Cloud SecurityAnalyst is responsible for daily management of security posture pertaining to our digital environment operations as well as support of identity access management (IAM) for the Holland America, Seabourn, and Holland America Princess (Brands). This role requires assisting the GCS IAM team with bringing the Brands into and maintaining compliance in accordance with GCS policies and directives. All responsibilities transverse shoreside and shipboard across the fleets. This role requires experience in evaluation of cloud environment security posture, security directives and project creation, as well as risk mitigation to achieve and maintain desired business outcomes. This position requires working with brand stakeholders in pursuit of security and compliance solutions across the Brands.
**Essential Functions:**
+ Management, evaluation, maintenance, and enhancement of the cloud security posture.
+ Continuous improvement of the brand vulnerability management people, process, and technology analyzing cloud environment reporting, prioritizing, and working with brand IT to make Cloud Security Management data actionable and understandable.
+ Operation of identity and access processes and controls for SailPoint, Active Directory, Email, and Collaboration Platforms and cloud-based solutions.
+ Evaluation and providing directives and guidance regarding our SIEM integrations, identifying potential blind spots, and assisting with configuration validations. Augment and assist GISCS Security Operations, monitoring and triaging brand security events (Security Operations).
+ Creates visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs. Provides regular information briefs to Senior Leadership.
+ Helping to continuously improve the brands cybersecurity Key Risk Indicators (KRI) and reporting.
+ Assisting with security architecture reviews for new and proposed integrated solutions.
+ Evaluating and assisting with managing shoreside and shipboard access management and cloud processes and solutions.
+ Providing consultation and training to brand IT team members on new configurations and solutions.
+ Assisting the Cybersecurity PMO to build and prioritize backlog.
**Qualifications:**
+ High School Diploma or GED in Computer Science or other technical degree or equivalent experience.
+ Bachelor's Degree preferred.
+ Minimum 5+ years of relevant industry experience with access management and cloud security.
**Knowledge, Skills, and Abilities:**
+ Hands-on experience with Azure administration
+ Hands-on experience with Orca Security
+ Hands-on experience with AWS security administration
+ Hands-on experience with PowerShell scripting
+ Hands-on experience with SailPoint IAM solution
+ Hands-on experience with Active Directory
+ Hands-on experience with Windows workstations and server operating systems
+ Hands-on experience with managing security for AWS cloud environment tenants
+ Proven track record of taking ownership of strategic initiatives and driving results in complex environments
+ Proven success in contributing to a team-oriented environment
+ Proven ability to work creatively and analytically in a problem-solving environment
Physical Demands: Must be able to remain in a stationary position at a desk and/or computer for extended periods of time.
Travel: Less than 25% with shipboard travel likely
Work Conditions: Work primarily in a climate-controlled environment with minimal safety/health hazard potential.
This position is classified as "in-office." As an in-office role, it requires employees to work from a designated Carnival office in South Florida Tuesday through Thursday each week. Employees may work from their homes on Mondays and Fridays. Candidates must be located in (or willing to relocate to) the Miami/Ft. Lauderdale area.
Offers to selected candidates will be made on a fair and equitable basis, taking into account specific job-related skills and experience.
At Carnival, your total rewards package is much more than your base salary. All non-sales roles participate in an annual cash bonus program, while sales roles have an incentive plan. Director and above roles may also be eligible to participate in Carnival's discretionary equity incentive plan. Plus, Carnival provides comprehensive and innovative benefits to meet your needs, including:
+ Health Benefits:
+ Cost-effective medical, dental and vision plans
+ Employee Assistance Program and other mental health resources
+ Additional programs include company paid term life insurance and disability coverage
+ Financial Benefits:
+ 401(k) plan that includes a company match
+ Employee Stock Purchase plan
+ Paid Time Off
+ Holidays - All full-time and part-time with benefits employees receive days off for 8 company-wide holidays, plus 2 additional floating holidays to be taken at the employee's discretion.
+ Vacation Time - All full-time employees at the manager and below level start with 14 days/year; director and above level start with 19 days/year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 84 hours/year. All employees gain additional vacation time with further tenure.
+ Sick Time - All full-time employees receive 80 hours of sick time each year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 60 hours each year.
+ Other Benefits
+ Complementary stand-by cruises, employee discounts on confirmed cruises, plus special rates for family and friends
+ Personal and professional learning and development resources including tuition reimbursement
+ On-site Fitness center at our Miami campus
\#LI-Hybrid
\#Corp
\#LI-SH1
About Us
Carnival Corporation & plc is the world's largest leisure travel company, our mission to deliver unforgettable happiness to our guest through our diverse portfolio of leading cruise brands and island destinations, including Carnival Cruise Line, Holland America Line, Princess Cruises, and Seabourn in North America and Australia; P&O Cruises and Cunard Line in the United Kingdom; AIDA in Germany; Costa Cruises in Southern Europe.
Join us and embark on a career that offers not only the chance to grow professionally but also the opportunity to be part of a global community that makes a difference.
In addition to other duties/functions, this position requires full commitment and support for promoting ethical and compliant culture. More specifically, this position requires integrity, honesty, and respectful treatment of others, as well as a willingness to speak up when they see misconduct or have concerns.
Carnival Corporation & plc and Carnival Cruise Line is an equal employment opportunity/affirmative action employer. In this regard, it does not discriminate against any qualified individual on the basis of sex, race, color, national origin, religion, sexual orientation, age, marital status, mental, physical or sensory disability, or any other classification protected by applicable local, state, federal, and/or international law.
*****************************************************************
******************************************************************
$86k-104k yearly est. 60d+ ago
Information Security Risk Analyst
The Cheesecake Factory 4.2
Calabasas, CA jobs
Compensation Range $123,000 - $134,000 / Year Eligible for a hybrid work schedule split between home & office, with a minimum of 3 days in the office each week. You may be familiar with our extensive menu of delectable dishes and our recognition by Fortune Magazine as one of the "100 Best Companies to Work For" since 2014! But what you might not know is that we're a company driven by cutting-edge technology.
As an Information Security Risk Analyst reporting to the Information Security Manager, you'll be at the center of enterprise risk, compliance, and third-party oversight. This role is instrumental in building scalable security and governance processes that support growth, enhance resilience, and enable teams across the organization to move faster with confidence.
You'll thrive in this role if you are:
Stakeholder Savvy: You work confidently with auditors and senior leaders, communicating with clarity and professionalism that strengthens collaboration and drives alignment.
Precision Driven: You thrive in structured environments, bringing a process minded approach that ensures accurate, consistent, and high quality work every time.
Business Focused Translator: You turn complex security and risk concepts into clear business insights, helping leaders make informed, practical decisions with confidence.
Governance Minded: You're energized by policy, structure, and accountability-preferring governance, compliance, and risk work over hands on security engineering.
Here's more of what you'll get to do:
Enterprise Governance & Compliance
* Lead and support audits including PCI DSS, SOX, and NIST CSF
* Coordinate evidence collection, control testing, and remediation tracking
* Maintain and enhance security policies, procedures, and audit documentation
* Partner with Internal Audit and Accounting on annual and quarterly audit requirements
Third-Party Risk Management (TPRM)
* Own the end-to-end third-party risk lifecycle
* Perform security assessments for new and existing vendors
* Partner with Legal, Procurement, and business teams on vendor risk decisions
* Develop risk scoring, reporting, and ongoing monitoring processes
Identity, Access & Directory Risk Oversight
* Review and analyze Active Directory and Entra ID access reports
* Support SOX access reviews and privilege validation
* Identify access anomalies and partner with IT/Security for remediation
* Ensure access changes follow approval and ticketing workflows
Risk Reporting, Automation & Insights
* Produce risk assessment and audit reports for leadership
* Assist with automating recurring audit and compliance reporting
* Track control failures, root causes, and remediation plans
What we require:
* 3+ years of experience in Governance, Risk & Compliance, IT Audit, or Security Risk
* Hands-on experience with at least one framework: PCI DSS, SOX, or NIST
* Working knowledge of identity governance concepts
* Strong analytical, documentation, and communication skills
What we prefer:
* Experience with TPRM programs or GRC platforms
* Exposure to public accounting, consulting, or regulated enterprises
* Relevant certifications (CISA, CISSP, ISO 27001) a plus
What we offer:
* Vacation and sick time
* Medical, Dental & Vision
* 401K with company match
* Tuition Reimbursement
* 25%-35% discount when dining as a guest
* Annual stipend for dining in our restaurants
About the Company:
Named to FORTUNE Magazine's "100 Best Companies to Work For" list every year since 2014, The Cheesecake Factory Incorporated is a leader in experiential dining. We are culinary-forward and relentlessly focused on hospitality. Delicious, memorable experiences created by passionate people-this defines who we are and where we are going.
We currently own and operate 353 restaurants throughout the United States and Canada under brands including The Cheesecake Factory, North Italia, Flower Child and a collection of other FRC brands. Internationally, 34 The Cheesecake Factory restaurants operate under licensing agreements. Our bakery division operates two facilities that produce quality cheesecakes and other baked products for our restaurants, international licensees and third-party bakery customers.
We are committed to creating an inclusive and welcoming workplace for all. We welcome applicants from a wide variety of identities, ideas, perspectives, backgrounds and experiences to apply. The Cheesecake Factory offers reasonable accommodations to job applicants with disabilities.
#SoCheesecake #LifeAtCheesecake
To notify of a non-compliant job posting, please send a notice to ****************************.
* 3+ years of experience in Governance, Risk & Compliance, IT Audit, or Security Risk
* Hands-on experience with at least one framework: PCI DSS, SOX, or NIST
* Working knowledge of identity governance concepts
* Strong analytical, documentation, and communication skills
What we prefer:
* Experience with TPRM programs or GRC platforms
* Exposure to public accounting, consulting, or regulated enterprises
* Relevant certifications (CISA, CISSP, ISO 27001) a plus
Enterprise Governance & Compliance
* Lead and support audits including PCI DSS, SOX, and NIST CSF
* Coordinate evidence collection, control testing, and remediation tracking
* Maintain and enhance security policies, procedures, and audit documentation
* Partner with Internal Audit and Accounting on annual and quarterly audit requirements
Third-Party Risk Management (TPRM)
* Own the end-to-end third-party risk lifecycle
* Perform security assessments for new and existing vendors
* Partner with Legal, Procurement, and business teams on vendor risk decisions
* Develop risk scoring, reporting, and ongoing monitoring processes
Identity, Access & Directory Risk Oversight
* Review and analyze Active Directory and Entra ID access reports
* Support SOX access reviews and privilege validation
* Identify access anomalies and partner with IT/Security for remediation
* Ensure access changes follow approval and ticketing workflows
Risk Reporting, Automation & Insights
* Produce risk assessment and audit reports for leadership
* Assist with automating recurring audit and compliance reporting
* Track control failures, root causes, and remediation plans
$123k-134k yearly Auto-Apply 7d ago
Temporary- Cyber Security Analyst
The College System of Tennessee 3.9
Nashville, TN jobs
Title: Temporary - Cyber SecurityAnalyst Under the directive of the Information Security Officer, the cyber securityanalyst will implement security strategies and best practices in accordance with regulatory standards. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES
Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned.
REQUIRED QUALIFICATIONS
High School Diploma or GED
One year of experience in information security and compliance regulations.
Proficiency with Microsoft applications.
PREFERRED QUALIFICATIONS
Certificate in information security, i.e., Security+, Pen+, Ethical Hacker.
Experience with SIEM (Microsoft Defender).
Experience in phishing campaign/training.
KNOWLEDGE, SKILLS AND ABILITIES
Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of Information Security Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels.
Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures.
Open Until Filled: Yes
Rate of Pay: $20.00 per hour
Work Hours: Up to 28 hours per week
Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check.
Nashville State offers flexible work arrangements for positions that qualify.
$20 hourly 31d ago
Sr Target Security Specialist
Dev 4.2
Minneapolis, MN jobs
Company DescriptionJobs for Humanity is partnering with Target to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located.
Company Name: Target
Location: 1000 Nicollet Mall, Minneapolis, Minnesota, United States, 55403-2542
The pay range per hour is $19.23 - $34.62
Pay is based on several factors which vary based on position. These include labor markets and in some instances may include education, work experience and certifications. In addition to your pay, Target cares about and invests in you as a team member, so that you can take care of yourself and your family. Target offers eligible team members and their dependents comprehensive health benefits and programs, which may include medical, vision, dental, life insurance and more, to help you and your family take care of your whole selves. Other benefits for eligible team members include 401(k), employee discount, short term disability, long term disability, paid sick leave, paid national holidays, and paid vacation. Find competitive benefits from financial and education to well-being and beyond at **********************************************
Job Title: Sr Specialist - Corporate Security & Safety
Classification: L2
Date: November 2023
About Us:
As a Fortune 50 company with more than 350,000 team members worldwide, Target is an iconic brand and one of America's leading retailers.
Working at Target means the opportunity to help all families discover the joy of everyday life. Caring for our communities is woven into who we are, and we invest in the places we collectively live, work and play. We prioritize relationships, fuel and develop talent by creating growth opportunities, and succeed as one Target team. At our core, our purpose is ingrained in who we are, what we value, and how we work. It's how we care, grow, and win together.
To match the signature style and passion of Target's distinctive retail brand, Target Legal Affairs is a dynamic and deeply knowledgeable team of experts. Whether specializing in law, government affairs, employee relations, risk, compliance, ethics, security or food safety, we use our expertise and influence to advocate for Target, support Target's business and mitigate risk for the company. We work with both internal and external entities on key issues that affect Target's ability to productively, ethically and securely conduct business. Through our understanding of Target's business models and operations, we help facilitate Target's growth, and provide guidance that leaders rely on to make appropriate, well-informed decisions. Simultaneously, we help protect the business by applying our comprehensive understanding of risk and the law on issues that impact our brand, guests, team members, stores, distribution centers and corporate locations.
Here, you'll enjoy working autonomously with a healthy work-life balance. Your passion for learning the business, collaborating with others and building relationships with senior leaders and key business partners that you support will be essential to tackling the ever-changing legal and risk-based challenges we face in a dynamic and fast-paced retail environment.
A role within Corporate Security means working with a team dedicated to protecting the Target team, guests, property, and brand. You will use our comprehensive understanding and management of evolving security risks to protect our Target community throughout the world. You may support Target's Crisis and Threat Management, Preparedness and Continuity, Forensics, Intelligence, Physical Security and Safety, Executive Services, or Operations teams.
As a Target Sr. Security Specialist, no two days are ever the same, but a typical day will most likely include the following responsibilities. You'll support safe and secure operations by engaging with team members, partners, and guests at entry points of our buildings. Leveraging Target's policies and procedures, you'll provision building access to all our Target community members. Using intelligence-led tactics and remaining situationally aware, you'll maintain safe and secure standards throughout our buildings and properties. In addition, you'll respond to and accurately document security incidents and activities, sharing your expertise to educate and empower team members on what to do during emergencies. Furthering our culture of ethical conduct, safety, and compliance, you'll encourage team members to report security concerns to Corporate Security. You'll also execute select security routines and projects that advance our goal to minimize risk at Target. Lastly, you'll provide a Target-brand experience and environment by supporting the needs of others.
Core responsibilities of this job are described within this job description. Job duties may change at any time due to business needs.
About you:
High school diploma or equivalent.
Possess a valid driver's license and ability to complete routines and patrols utilizing a company vehicle.
Meet any state or local licensure and/or other legal requirements related to the position.
Welcoming and helpful attitude towards team members, partners, and guests.
Learn and adapt to current technology needs and changing work environments.
Effective communication and de-escalation skills.
Work both independently and with a team.
Manage workload and prioritize tasks independently during crisis situations.
Be reliable and dependable as it relates to assigned tasks.
Trustworthy to work with highly confidential information.
Climb up and down stairs and ladders.
Provide life-saving actions, including CPR and other first aid.
Ability to sit, stand, or be mobile for extended periods of time and effectively move items up to 40 pounds.
Flexibility to work a set schedule and adjust as business needs dictate, with regular attendance necessary.
Americans with Disabilities Act (ADA)
Target will provide reasonable accommodations with the application process upon your request as required to comply with applicable laws. If you have a disability and require assistance in this application process, please visit your nearest Target store or Supply Chain Facility or reach out to Guest Services at ************** for additional information.
$19.2-34.6 hourly 60d+ ago
CLOUD INFORMATION SECURITY ENGINEER
Seminole Hard Rock Support Services 4.4
Fort Lauderdale, FL jobs
Job Description
Cloud Security Engineers are responsible for the secure operations of cloud infrastructure, platforms, and software, including the installation, maintenance, and improvement of cloud computing environments. They also help develop new designs and security strategies across cloud-based and hybrid applications, infrastructure, platforms, and SaaS.
Leads the analysis, implementation, execution, and improvement of proactive security controls to prevent external threat actors from infiltrating company information or systems. Conducts research and provides leadership updates regarding advanced attempts/efforts to compromise security protocols. Maintains and reviews security systems while assessing security policies that control access to systems. Provides status updates and recommendations to the leadership team regarding the impact of theft, destruction, alteration, or denial of access to information. Follows standard practices and procedures in analyzing situations or data.
This position reports to the Director of Information Security.
Responsibilities
The primary duties and responsibilities of the Cloud Security Engineer are:
Assessing Existing Infrastructure and Identifying Threats.
Providing recommendations on New Infrastructure and Threat Modeling to assist in stakeholder decisions.
Developing, solutioning, operating, maintaining, and supporting a secure cloud environment with technologies including but not limited to: Servers, Storage, Network services, Enterprise applications, Cloud platform support, Automation, CI/CD, Managing cryptography and encryption, IAM, Threat Detection, Logging, PKI, SaaS, and PaaS.
Monitoring for and responding to incidents in cloud environments.
Keeping cloud infrastructure current, making recommendations, and continually improving cloud security technologies.
Analyzing, designing, and developing programs, shell scripts, tests, and infrastructure automation capabilities.
Develop security standards in partnership with Engineering, Infrastructure Services, and Application Development.
Representing the cloud security team in change control activities and ensure proposed changes are in alignment with security best practices.
Staying abreast with security standards and emerging vulnerabilities/threats to proactively resolve/remediate/mitigate.
Engage in digital forensics to investigate breaches or security incidents in the cloud.
Collaborate with Disaster Recovery and Business Continuity Teams and play a pivotal role in developing, testing, and refining disaster recovery plans tailored for cloud environments.
Empower the Security Compliance and Data Protection Team to audit cloud environments to ensure compliance and pinpoint areas of improvement. Using metrics and KPIs to drive and further Security Posture Initiatives.
Establish and maintain a feedback mechanism where security measures are not only implemented but also refined based on feedback to enhance security protocols continuously.
Performing other security team relevant duties and responsibilities as assigned.
Participate in incident response activities as assigned.
Preferred Experience
Experience in designing, deploying and operating secure cloud solutions, including design documentation, assessment of risk, cost impact, and proposal of savings.
Experience with Cloud Security Posture Management, Cloud Workload Management, SaaS Security Posture Management, Cloud Network Security, Cloud Native Application Protection and Cloud Identity Security.
Deep technical knowledge of on-prem Data Center technologies as well as Cloud Service, PaaS and SaaS Providers.
Has experience writing formal security assessments and ad-hoc security reports.
Experience working as part of a security incident response team as needed and key escalation point for all cloud related incidents.
Experience delivering security metrics and measurement capability to demonstrate operational security posture.
Experience in data protection and privacy management.
Skills Required
Team player able to work effectively at all levels of an organization with the ability to influence others to move toward consensus.
Clear ability to build strong relationships and establish trust with stakeholders at all levels.
Excellent verbal and written communications skills. Multiple language abilities preferred - fluency in English (written and spoken) required.
Strong leadership skills with demonstrated ability to prioritize and execute in a methodical and disciplined manner.
Ability to solve complex problems in a timely manner by working with multiple stakeholders.
Ability to manage multiple tasks and work streams effectively.
Ability to follow detailed procedures and processes with a high degree of accuracy.
Customer-focused mindset, with demonstrated skill in managing expectations, providing proactive status updates, and producing high-quality work product.
Deep understanding of Cyber Security control environments and their relationship to zero-trust networks.
Display a keen ability to adapt to new tools, technologies, and evolving threat landscapes in the realm of cloud security.
Experience in 3 or more of the following: network design, mobile security, network and firewall security technologies, SaaS/PaaS Security, vulnerability management or penetration testing.
Flexibility to travel as required up to 15% overnight travel.
Qualifications
Experience / Education / Certifications
Bachelor's degree preferred in Computer Sciences, Information Technology, Information Security or other related field
Three (3) years or more experience with architecting and operating solutions involving one or more cloud service providers Microsoft Azure, AWS, GCP, etc.
Five (5) years of Cyber Security related work experience
Practical knowledge of any combination of Payment Card Industry (PCI), GDPR, NIST standards, or ISO27000 series.
At least one industry standard certification such as CCSK, CCSP, Certified Information Systems Security Professional (CISSP), or other Cloud Security certification.
#IndeedSHRSS
#LI-Hybrid
#zipcorpor
$68k-87k yearly est. 28d ago
CLOUD INFORMATION SECURITY ENGINEER
Seminole Hard Rock Hotel & Casino 4.0
Davie, FL jobs
Cloud Security Engineers are responsible for the secure operations of cloud infrastructure, platforms, and software, including the installation, maintenance, and improvement of cloud computing environments. They also help develop new designs and security strategies across cloud-based and hybrid applications, infrastructure, platforms, and SaaS.
Leads the analysis, implementation, execution, and improvement of proactive security controls to prevent external threat actors from infiltrating company information or systems. Conducts research and provides leadership updates regarding advanced attempts/efforts to compromise security protocols. Maintains and reviews security systems while assessing security policies that control access to systems. Provides status updates and recommendations to the leadership team regarding the impact of theft, destruction, alteration, or denial of access to information. Follows standard practices and procedures in analyzing situations or data.
This position reports to the Director of Information Security.
Responsibilities
The primary duties and responsibilities of the Cloud Security Engineer are:
* Assessing Existing Infrastructure and Identifying Threats.
* Providing recommendations on New Infrastructure and Threat Modeling to assist in stakeholder decisions.
* Developing, solutioning, operating, maintaining, and supporting a secure cloud environment with technologies including but not limited to: Servers, Storage, Network services, Enterprise applications, Cloud platform support, Automation, CI/CD, Managing cryptography and encryption, IAM, Threat Detection, Logging, PKI, SaaS, and PaaS.
* Monitoring for and responding to incidents in cloud environments.
* Keeping cloud infrastructure current, making recommendations, and continually improving cloud security technologies.
* Analyzing, designing, and developing programs, shell scripts, tests, and infrastructure automation capabilities.
* Develop security standards in partnership with Engineering, Infrastructure Services, and Application Development.
* Representing the cloud security team in change control activities and ensure proposed changes are in alignment with security best practices.
* Staying abreast with security standards and emerging vulnerabilities/threats to proactively resolve/remediate/mitigate.
* Engage in digital forensics to investigate breaches or security incidents in the cloud.
* Collaborate with Disaster Recovery and Business Continuity Teams and play a pivotal role in developing, testing, and refining disaster recovery plans tailored for cloud environments.
* Empower the Security Compliance and Data Protection Team to audit cloud environments to ensure compliance and pinpoint areas of improvement. Using metrics and KPIs to drive and further Security Posture Initiatives.
* Establish and maintain a feedback mechanism where security measures are not only implemented but also refined based on feedback to enhance security protocols continuously.
* Performing other security team relevant duties and responsibilities as assigned.
* Participate in incident response activities as assigned.
Preferred Experience
* Experience in designing, deploying and operating secure cloud solutions, including design documentation, assessment of risk, cost impact, and proposal of savings.
* Experience with Cloud Security Posture Management, Cloud Workload Management, SaaS Security Posture Management, Cloud Network Security, Cloud Native Application Protection and Cloud Identity Security.
* Deep technical knowledge of on-prem Data Center technologies as well as Cloud Service, PaaS and SaaS Providers.
* Has experience writing formal security assessments and ad-hoc security reports.
* Experience working as part of a security incident response team as needed and key escalation point for all cloud related incidents.
* Experience delivering security metrics and measurement capability to demonstrate operational security posture.
* Experience in data protection and privacy management.
Skills Required
* Team player able to work effectively at all levels of an organization with the ability to influence others to move toward consensus.
* Clear ability to build strong relationships and establish trust with stakeholders at all levels.
* Excellent verbal and written communications skills. Multiple language abilities preferred - fluency in English (written and spoken) required.
* Strong leadership skills with demonstrated ability to prioritize and execute in a methodical and disciplined manner.
* Ability to solve complex problems in a timely manner by working with multiple stakeholders.
* Ability to manage multiple tasks and work streams effectively.
* Ability to follow detailed procedures and processes with a high degree of accuracy.
* Customer-focused mindset, with demonstrated skill in managing expectations, providing proactive status updates, and producing high-quality work product.
* Deep understanding of Cyber Security control environments and their relationship to zero-trust networks.
* Display a keen ability to adapt to new tools, technologies, and evolving threat landscapes in the realm of cloud security.
* Experience in 3 or more of the following: network design, mobile security, network and firewall security technologies, SaaS/PaaS Security, vulnerability management or penetration testing.
* Flexibility to travel as required up to 15% overnight travel.
Qualifications
Experience / Education / Certifications
* Bachelor's degree preferred in Computer Sciences, Information Technology, Information Security or other related field
* Three (3) years or more experience with architecting and operating solutions involving one or more cloud service providers Microsoft Azure, AWS, GCP, etc.
* Five (5) years of Cyber Security related work experience
* Practical knowledge of any combination of Payment Card Industry (PCI), GDPR, NIST standards, or ISO27000 series.
* At least one industry standard certification such as CCSK, CCSP, Certified Information Systems Security Professional (CISSP), or other Cloud Security certification.
#IndeedSHRSS
#LI-Hybrid
#zipcorpor