Cryptographic vulnerability analyst jobs near me - 101 jobs
Let us run your job search
Sit back and relax while we apply to 100s of jobs for you - $25
Analyst, Vulnerability & Threat
People Inc. 3.0
Remote cryptographic vulnerability analyst job
The Analyst of Vulnerability and Threat will assist in identifying, assessing, and mitigating cybersecurity vulnerabilities and threats to the organization. This individual will work closely with the manager and other team members to ensure the confidentiality, integrity, and availability of the organization's information assets. As a visible member within the Security team, you will be responsible for supporting the technical direction of security, participating in multiple, complex technical projects, and partnering with other groups within the organization to deliver tools and services that align with our security roadmaps.
II. Essential Job Functions
Weight
%
| Accountabilities, Actions and Expected Measurable Results
45% | Threat Management:
Gather and analyze threat intelligence from various sources.
Correlate data from SIEMs, EDRs, and network telemetry to validate findings and escalate confirmed incidents to incident response teams.
Assist in the development and support incident response plans to address security incidents effectively.
Conduct regular threat assessments and testing, including penetration testing/red teaming to evaluate the organization's security posture.
25% | Threat Hunting, Research and Analysis:
Perform in-depth analysis of publicly disclosed vulnerabilities and assess organizational exposure.
Assess and test the effectiveness of current detection and prevention technologies, identifying gaps and recommending improvements.
Proactively identify potential threats by developing and executing threat-hunting campaigns across networks, endpoints and cloud environments.
Leverage threat intelligence, behavioral analytics, and anomaly detection to uncover indicators of compromise (IOCs) or advanced persistent threats (APTs) that evade standard detection tools..
Refine and create new alerting logic, detection signatures, and playbooks based on hunting outcomes.
Develop and maintain security documentation and procedures.
20% | Vulnerability Management:
Assist in conducting regular and ad-hoc vulnerability scans and assessments using a variety of tools (SAST, DAST, IAST, etc.) and techniques.
Analyze scan results and identify critical vulnerabilities.
Help maintain vulnerability assessment tools and technologies.
Research and document vulnerabilities based on risk and potential impact.
Collaborate with IT, Engineering and business units to ensure timely remediation in accordance to SLAs.
Track remediation progress and ensure timely closure of vulnerabilities.
10% | Collaboration and Communication:
Work closely with IT, engineering, operations and other stakeholders to ensure effective collaboration.
Communicate security risks and recommendations to management and stakeholders.
Assist in the development and delivery of security awareness training programs.
III. Minimum Qualifications and Job Requirements |
All must be met to be considered.
Education: Bachelor's degree in Computer Science, Information Security, or a related field or equivalent experience.
Experience: Minimum of 1-3 years of experience in cybersecurity, with a focus on vulnerability and threat management.
Relevant certifications such as CEH, OSCP, Security+, or GIAC certifications are desirable.
Specific Knowledge, Skills and Abilities:
Cybersecurity expertise: Security principles, vulnerabilities, threats, container security and cloud security (AWS, GCP, Azure).
Vulnerability and Threat Management: Assessment, threat modelling (STRIDE / MAESTRO methods preferred), penetration testing, intelligence gathering and analysis.
OS Security and Compliance: Linux, Windows, Mac, G-Suite, GWS Administration, SOC 2, NIST CSF, SOX, PCI-DSS.
Technical skills: Scripting (Python, Powershell, Bash), incident investigation and response.
Soft skills: Communication, interpersonal skills, organization, time management, teamwork, and the ability to work independently in a fast-paced environment.
Additional requirements: Occasional travel and on-call availability.
It is the policy of People Inc. to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, the Company will provide reasonable accommodations for qualified individuals with disabilities. Accommodation requests can be made by emailing *************.
The Company participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: **********************************
Pay Range
Salary: Remote US: $75,000 - $85,000
The pay range above represents the anticipated low and high end of the pay range for this position and may change in the future. Actual pay may vary and may be above or below the range based on various factors including but not limited to work location, experience, and performance. The range listed is just one component of People Inc's total compensation package for employees. Other compensation may include annual bonuses, and short- and long-term incentives. In addition, People Inc. provides to employees (and their eligible family members) a variety of benefits, including medical, dental, vision, prescription drug coverage, unlimited paid time off (PTO), adoption or surrogate assistance, donation matching, tuition reimbursement, basic life insurance, basic accidental death & dismemberment, supplemental life insurance, supplemental accident insurance, commuter benefits, short term and long term disability, health savings and flexible spending accounts, family care benefits, a generous 401K savings plan with a company match program, 10-12 paid holidays annually, and generous paid parental leave (birthing and non-birthing parents), all of which may vary depending on the specific nature of your employment with People Inc. and your work location. We also offer voluntary benefits such as pet insurance, accident, critical and hospital indemnity health insurance coverage, life and disability insurance.
#NMG#
$75k-85k yearly Auto-Apply 3d ago
Looking for a job?
Let Zippia find it for you.
Vulnerability Analyst
Delan Associates
Remote cryptographic vulnerability analyst job
Background: Companys Cyber Security Program Office (CSPO) promotes the safe and secure use of technology. The CSPO serves Company by providing a variety of cybersecurity services including consultation, protection technologies, detection technologies, cybersecurity education and awareness, cybersecurity incident management, vulnerability management, compliance, and cybersecurity risk management.
The Cyber Security Program Office is seeking a full-time VulnerabilityAnalyst.
Contract Position: Full Time, 40 hour work week
Period of Performance: 1 Year
Scope:
This is an opportunity for a VulnerabilityAnalyst within the Cyber Security Program Office (CSPO). The VulnerabilityAnalyst will play an important role to identify, assess, prioritize, report, and assist others in mitigating vulnerabilities within an organization's information systems. This engagement will free up other cybersecurity resources to work in other critical Company areas.
Possess a working level expertise with the National Institute of Standards and Technologies (NIST) Cybersecurity Framework (CSF) and the NIST 800-53 series of control families and approaches.
Using automated tools and manual techniques to Client security weaknesses (i.e. Tenable Security Center, Nucleus Security, etc...)
Conducting regular scans and assessments of systems, applications, and networks to identify potential vulnerabilities.
Analyzing the identified vulnerabilities to determine their potential impact on the organization.
Prioritizing vulnerabilities based on their severity and the risk they pose to the organization.
Performing routine assignment of tickets to IT and other teams to address vulnerabilities as part of a 'cyber hygiene' process.
Recommending mitigation strategies to address identified vulnerabilities.
Working with IT and development teams to apply patches, configure systems securely, and implement other remediation measures. This position is not expected to perform patching activities.
Creating detailed reports on the findings of vulnerability assessments and risk analyses.
Documenting the status of vulnerabilities and the actions taken to mitigate them.
Communicating the results of vulnerability assessments, risk analyses, and other cyber hygiene work to stakeholders, including management and technical teams.
Staying up to date with the latest cybersecurity threats, vulnerabilities, and best practices.
Continuously improving the organization's vulnerability management processes and tools.
Attend online/Teams meetings with team and others as appropriate
Work with team to provide status on current task, suggest improvements, discuss implementation, etc.
Objectives:
The ideal candidate will support the projects and tasks associated with
Vulnerability Management Program
Technical Direction of Work:
Report to the Lead Cybersecurity Engineer within the Cyber Security Program Office (CSPO); including daily guidance and collaboration with others in the Cyber Security Program Office (CSPO).
Task and Time Reporting:
The project managers measure work performed by the contractor on a task basis. The tasks typically represent 8 to 80 hours of effort with performance being measured at the completion of each of the assigned tasks. Hours will be recorded on a weekly time sheet; progress against planned tasks will be reported weekly.
Typically, the work is performed remotely. For the candidate within driving distance of the Lab, there may be rare times to be onsite for in-person meetings, assessments, or presentations. Most of the Business Information Services (BIS) Division works remotely and are rarely onsite. If the candidate is out of state, too far away from the Lab, onsite meetings are not feasible to attend and not required.
Management and Remediation Plan:
Collaborate with IT and system administrators to create a patch management policy.
Provide a prioritization of vulnerabilities for remediation based on risk assessment.
Run "Hygiene Improvement Process? (HIP) vulnerability tasks (e.g., generating prioritized list of systems or vulnerabilities to remediate, creating and assigning tickets, follow-up on tickets, enforcing mitigation requirements, reporting).
Develop a schedule, aligned with existing policy, for applying patches and updates to systems and applications.
Monitor the effectiveness of patching efforts and adjust the plan as needed.
Provide bi-weekly, monthly, and quarterly reports of vulnerability and patching efforts to various stakeholders.
Cloud, Container, and DevSecOps
Cloud posture and vulnerabilities:
Implement CSPM/agent-based scanning for IaaS/PaaS; cover images, VMs, serverless, and managed services.
Ensure tagging/ownership standards in cloud for routing remediation.
Containers and Images:
Scan images in registries and at build time; block critical vulns from promotion.
Application Dependencies:
Introduce SCA for third-party libraries; integrate auto-dependency updates.
Add SAST/DAST where applicable; tune to reduce false positives.
IaC hygiene:
Scan Terraform/CloudFormation/Kubernetes manifests; enforce guardrails in CI.
Expectation/Deliverables:
Assisting and guiding business units with their vulnerability remediation as well as technical debt cleanup.
Create and update Vulnerability risk acceptance/modification review/analysis and approval/non-approval
Document entire workflow of current system in current state and future state
Provide opportunities for automation within current and future state processes (i.e. python, bash, etc.)
Assist in vulnerability tool review/tuning
Qualifications:
Technical Skills:
Vulnerability Assessment Tools:
Proficiency in using vulnerability scanning tools such as Tenable, Nessus, Qualys, OpenVAS, and Nexpose.
Familiarity with penetration testing tools like Metasploit, Burp Suite, and Nmap.
Operating Systems:
Strong knowledge of various operating systems, including Windows, Linux, and mac OS.
Understanding of system administration and security configurations.
Networking:
In-depth understanding of network protocols, architecture, and security.
Experience with network scanning and monitoring tools.
Scripting and Programming:
Ability to write scripts in languages such as Python, Bash, or PowerShell to automate tasks and analyze data.
Basic programming skills to understand and analyze code for vulnerabilities.
Security Frameworks and Standards:
Familiarity with cybersecurity frameworks and standards such as NIST, ISO 27001, CIS Controls, and OWASP.
Understanding of the Cybersecurity Framework (CSF) and NIST 800-53 controls.
Certifications (Optional):
Certified Information Systems Security Professional (CISSP):
Certified Ethical Hacker (CEH):
CompTIA Security :
Certified Information Security Manager (CISM):
Offensive Security Certified Professional (OSCP):
GIAC Security Essentials (GSEC):
Experience:
Practical experience in conducting vulnerability assessments and/or penetration tests.
Experience in system and network administration.
Familiarity with security concerns and vulnerabilities common in an enterprise environment, including application development, IT/OT environments, virtualization, containers, etc.
Staying up to date with the latest cybersecurity threats, vulnerabilities, and best practices.
Strong analytical and problem-solving skills to identify and assess vulnerabilities.
Meticulous attention to detail to ensure thorough assessments and accurate reporting.
Excellent written and verbal communication skills to effectively convey findings and recommendations to technical and non-technical stakeholders.
Ability to work collaboratively with other cybersecurity professionals, IT staff, and external vendors.
Considerable knowledge/experience of assessing security controls.
Experience and skill in conducting audits or reviews of technical systems.
Experience working in a government environment.
Experience working in a distributed IT environment.
Ability to obtain HSPD-12 card for use in two-factor authentication.
Able to work both independently and as a contributing member of a small technical team
Able to disseminate knowledge to current staff.
Government-Furnished Property:
Companys will supply a government-furnished laptop, PIV Card, and PIV Card reader.
Computer Protection Program:
The contractor shall adhere to all policies and procedures of the ANL Computer Protection Program, must not bypass any procedures established to protect data, applications, hardware, or communications at ANL, must maintain a work environment that will satisfy audit, privacy, and protection requirements, and must report any findings of inadequacies to the technical contact and the BIS Computer Protection Program Representative.
The following expectations are part of working remote:
Working remotely outside of scheduled times requires supervisor approval prior to performing that remote work.
While working remotely, just like when onsite, all scheduled meetings must be attended (using approved remote communication tools).
The candidate must be available for consultation during all scheduled work time, reachable by email, phone, chat, or other approved means.
Performance will be monitored to determine productivity for remote work at least matches that when onsite. If performance and deliverables decline, remote work may be suspended.
Should a situation arise that requires the candidate to be onsite while scheduled to work remotely, accommodation will be made to reschedule the remote work, if desired.
The remote work privilege may be revoked at any time at the discretion of Companys.
A flexible work schedule may also be possible if the schedule is agreed to by the candidate and approved by the supervisor and sponsor.
Should the laboratory close operations due to weather or other circumstances, remote work is preferred.
Lastly, the candidate must track their remote work schedule into the CSPO absence calendar and be approved by CSPO supervisor.
Place of Performance :
Work will be performed remotely (within the confines of the United States of America), and team communication will be done through Microsoft tools such as Microsoft Teams and Microsoft Outlook
Period of Performance:
Work would begin October 2025, for 40 hours per week for 1 year.
$75k-101k yearly est. Auto-Apply 60d+ ago
Principal Analyst - Responsible AI (Remote)
United Airlines 4.6
Remote cryptographic vulnerability analyst job
Achieving our goals starts with supporting yours. Grow your career, access top-tier health and wellness benefits, build lasting connections with your team and our customers, and travel the world using our extensive route network. Come join us to create what's next. Let's define tomorrow, together.
Description
United's Digital Technology team is comprised of many talented individuals all working together with cutting-edge technology to build the best airline in the history of aviation. Our team designs, develops and maintains massively scaling technology solutions brought to life with innovative architectures, data analytics, and digital solutions.
Job overview and responsibilities
The Principal Analyst - Responsible Artificial Intelligence validates that our services, applications, and websites are designed and implemented in accordance with United's secure development and responsible AI standards. The Principal Analyst is a senior level position that works closely with development teams, product teams, and other teams across the organization to integrate security into the product lifecycle from design, deployment, and recurring testing.
The Principal Analyst is a recognized subject matter expert in defining security requirements, performing application assessments, and providing application teams with remediation guidance and advice. On any given day, the Principal Analyst for Responsible AI can be pulled in to evaluate a new system, review a proposed application change, or provide guidance on application security/coding best practices.
* Leads responsible architecture design evaluations and threat modelling of our products (both bought and built)
* Recommends and implements products/services that support operational needs and responsible AI requirements
* Promotes and contributes to the continuous improvement of our Responsible AI strategy through accurate, reusable documentation and education materials
* Perform code analysis of applications, manually and using SAST, DAST, and SCA scanning solutions as well as conducting manual vulnerability analysis
* Technical point of contact for product teams as it relates to Responsible AI at United
* Sought out as a trusted advisor/consultant and assists in the creation of security designs, requirements, risk monitoring and mitigation guidance in alignment with industry best practices and regulatory requirements
* Assist in leading the design, definition and implementation of security best practices and standards and ensure product development teams understand them
Qualifications
What's needed to succeed (Minimum Qualifications):
* Bachelor's degree in STEM, Computer Science, or related field
* Minimum of 9 years of experience in related field
* Deep understanding of Generative Artificial Intelligence and its associated risks
* Ability to collaborate with development teams to build secure solutions, communicating risks and bringing consensus to diverse priorities
* Knowledge of common vulnerabilities and attack vectors against a GenAI model such as prompt attacks, training data extraction, and data poisoning
* Assessment, risk categorization, and application security testing tools
* Excellent problem solving, critical thinking, interpersonal, collaboration, written and verbal communication skills
* Knowledge of the fast-evolving industry standards, best practices, and reference architectures
* Solid understanding of secure network and system design in both cloud and conventional environments, as well as of network and web related protocols
* Excellent understanding of web applications, web servers, layer 7 application technologies, frameworks and protocols with respect to application development and deployment
* Ability to work independently and self-motivate
* Ability to strategically evaluate SaaS providers and their data storage policies
* Must be legally authorized to work in the United States for any employer without sponsorship
* Successful completion of interview required to meet job qualification
* Reliable, punctual attendance is an essential function of the position
* Must be available for domestic travel approximately 10-20% annually
What will help you propel from the pack (Preferred Qualifications):
* Master's degree
* Certified Ethical Hacker (CEH)
* GIAC Security Essentials (GSEC)
* Certified Information Security Manager (CISM)
* Comp TIA Security +
* Certified Information Systems Security Professional (CISSP)
* Certified Information Systems Auditor (CISA)
* Systems Security Certified Practitioner (SSCP)
* CompTIA Advanced Security Practitioner (CASP+)
* Offensive Security Certified Professional (OSCP)
* Minimum of 12 years of experience in related field, including any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security, cloud computing
* Thought leadership publishing within the Responsible AI or Generative AI categy
* Familiar with waterfall and agile development processes and ability to integrate secure development practices into both models
* Experience with multiple programming languages
* Success in implementing effective Secure SDLC frameworks across a large corporation
The base pay range for this role is $143,450.00 to $186,778.00.
The base salary range/hourly rate listed is dependent on job-related, factors such as experience, education, and skills. This position is also eligible for bonus and/or long-term incentive compensation awards.
You may be eligible for the following competitive benefits: medical, dental, vision, life, accident & disability, parental leave, employee assistance program, commuter, paid holidays, paid time off, 401(k) and flight privileges.
United Airlines is an equal opportunity employer. United Airlines recruits, employs, trains, compensates and promotes regardless of race, religion, color, national origin, gender identity, sexual orientation, physical ability, age, veteran status and other protected status as required by applicable law. Equal Opportunity Employer - Minorities/Women/Veterans/Disabled/LGBT.
We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform crucial job functions. Please contact JobAccommodations@united.com to request accommodation.
$143.5k-186.8k yearly 1d ago
Analyst, Vulnerability & Threat
Meredith 4.4
Remote cryptographic vulnerability analyst job
The Analyst of Vulnerability and Threat will assist in identifying, assessing, and mitigating cybersecurity vulnerabilities and threats to the organization. This individual will work closely with the manager and other team members to ensure the confidentiality, integrity, and availability of the organization's information assets. As a visible member within the Security team, you will be responsible for supporting the technical direction of security, participating in multiple, complex technical projects, and partnering with other groups within the organization to deliver tools and services that align with our security roadmaps.
II. Essential Job Functions
Weight
%
| Accountabilities, Actions and Expected Measurable Results
45% | Threat Management:
Gather and analyze threat intelligence from various sources.
Correlate data from SIEMs, EDRs, and network telemetry to validate findings and escalate confirmed incidents to incident response teams.
Assist in the development and support incident response plans to address security incidents effectively.
Conduct regular threat assessments and testing, including penetration testing/red teaming to evaluate the organization's security posture.
25% | Threat Hunting, Research and Analysis:
Perform in-depth analysis of publicly disclosed vulnerabilities and assess organizational exposure.
Assess and test the effectiveness of current detection and prevention technologies, identifying gaps and recommending improvements.
Proactively identify potential threats by developing and executing threat-hunting campaigns across networks, endpoints and cloud environments.
Leverage threat intelligence, behavioral analytics, and anomaly detection to uncover indicators of compromise (IOCs) or advanced persistent threats (APTs) that evade standard detection tools..
Refine and create new alerting logic, detection signatures, and playbooks based on hunting outcomes.
Develop and maintain security documentation and procedures.
20% | Vulnerability Management:
Assist in conducting regular and ad-hoc vulnerability scans and assessments using a variety of tools (SAST, DAST, IAST, etc.) and techniques.
Analyze scan results and identify critical vulnerabilities.
Help maintain vulnerability assessment tools and technologies.
Research and document vulnerabilities based on risk and potential impact.
Collaborate with IT, Engineering and business units to ensure timely remediation in accordance to SLAs.
Track remediation progress and ensure timely closure of vulnerabilities.
10% | Collaboration and Communication:
Work closely with IT, engineering, operations and other stakeholders to ensure effective collaboration.
Communicate security risks and recommendations to management and stakeholders.
Assist in the development and delivery of security awareness training programs.
III. Minimum Qualifications and Job Requirements |
All must be met to be considered.
Education: Bachelor's degree in Computer Science, Information Security, or a related field or equivalent experience.
Experience: Minimum of 1-3 years of experience in cybersecurity, with a focus on vulnerability and threat management.
Relevant certifications such as CEH, OSCP, Security+, or GIAC certifications are desirable.
Specific Knowledge, Skills and Abilities:
Cybersecurity expertise: Security principles, vulnerabilities, threats, container security and cloud security (AWS, GCP, Azure).
Vulnerability and Threat Management: Assessment, threat modelling (STRIDE / MAESTRO methods preferred), penetration testing, intelligence gathering and analysis.
OS Security and Compliance: Linux, Windows, Mac, G-Suite, GWS Administration, SOC 2, NIST CSF, SOX, PCI-DSS.
Technical skills: Scripting (Python, Powershell, Bash), incident investigation and response.
Soft skills: Communication, interpersonal skills, organization, time management, teamwork, and the ability to work independently in a fast-paced environment.
Additional requirements: Occasional travel and on-call availability.
It is the policy of People Inc. to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, the Company will provide reasonable accommodations for qualified individuals with disabilities. Accommodation requests can be made by emailing *************.
The Company participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: **********************************
Pay Range
Salary: Remote US: $75,000 - $85,000
The pay range above represents the anticipated low and high end of the pay range for this position and may change in the future. Actual pay may vary and may be above or below the range based on various factors including but not limited to work location, experience, and performance. The range listed is just one component of People Inc's total compensation package for employees. Other compensation may include annual bonuses, and short- and long-term incentives. In addition, People Inc. provides to employees (and their eligible family members) a variety of benefits, including medical, dental, vision, prescription drug coverage, unlimited paid time off (PTO), adoption or surrogate assistance, donation matching, tuition reimbursement, basic life insurance, basic accidental death & dismemberment, supplemental life insurance, supplemental accident insurance, commuter benefits, short term and long term disability, health savings and flexible spending accounts, family care benefits, a generous 401K savings plan with a company match program, 10-12 paid holidays annually, and generous paid parental leave (birthing and non-birthing parents), all of which may vary depending on the specific nature of your employment with People Inc. and your work location. We also offer voluntary benefits such as pet insurance, accident, critical and hospital indemnity health insurance coverage, life and disability insurance.
#NMG#
$75k-85k yearly Auto-Apply 3d ago
Senior Analyst II/Principal Analyst - Space Payloads (Secret Clearance)
Rocket Lab 3.8
Remote cryptographic vulnerability analyst job
Rocket Lab is an end-to-end space company delivering responsive launch services, complete spacecraft design and manufacturing, payloads, satellite components, and more - all with the goal of opening access space. The rockets and satellites we build, and launch enable some of the most ambitious and vital space missions globally, supporting scientific exploration, Earth observation and missions to combat climate change, national security, and exciting new technology demonstrations.
Our Electron rocket has become the second most frequently launched U.S. rocket annually and has delivered more than 230 satellites to orbit, all while we work to develop Neutron, our upcoming medium-lift, reusable launch vehicle for larger constellation deployment. Our Space Systems business designs and builds our extensive line of satellites, payloads, and their components, including spacecraft that have been selected to support NASA missions to the Moon and Mars and components used on the James Webb Space Telescope.
SPACE SYSTEMS
At Rocket Lab, we're not just launching rockets - we're building the future of space. Our Space Systems team builds everything from complete spacecraft, precision payloads to the components and subsystems that allow them to thrive in space, like solar panels, flight software, star trackers, optical systems, separation systems, radios, and more.
Our Space Systems team has enabled more than 1,700 missions, ranging from interplanetary exploration, in-space manufacturing to national security and defense initiatives. The team has built spacecraft, payloads, and components for missions to the Moon and Mars, working with partners including NASA, the Space Development Agency, and the U.S. Space Force. Whether it's a single high-performance spacecraft, constellation, or the vertically integrated components that help them get to space - our world class Space Systems team is empowering some of the boldest and most ambitious space missions.
SENIOR ANALYST II/PRINCIPAL ANALYST - SPACE PAYLOADS (SECRET CLEARANCE)
Rocket Lab's Optical Systems division solves mission-critical space domain and Intelligence, Surveillance, and Reconnaissance (ISR) challenges for Department of Defense (DoD) and Intelligence Community (IC) customers. Our vision is to revolutionize the space-based payload market with innovative and novel designs for space, terrestrial, and airborne environments. Building on more than 20 years of electro-optical and infrared systems innovation from Geost, Optical Systems delivers solutions to the warfighter for responsive, scalable sensing solutions across all orbital domains.
As a Senior Analyst II/Principal Analyst - Space Payloads (Secret Clearance) based at our Optical Systems site in Tucson, AZ, you will work closely with design and systems engineering team members to provide quantitative technical guidance and performance assessment. Join a driven team of pioneers relentlessly tackling challenging projects, delivering on the impossible, and making an impact on the future of space!
(Please note: this position can be hired at the Senior Analyst II or Principal Analyst level)
WHAT YOU'LL GET TO DO:
Collaborate with researchers on projects related to machine learning, artificial intelligence, and computer vision
Preform rapid prototyping and enhanced development to be integrated into operational systems
Contribute your strong programming ability and experience to develop robust solutions for real-world problems
Validate, optimize, and deploy advanced exploitation algorithms
Perform troubleshooting, bug fixes, and maintenance of existing and new code to ensure stability and robustness
Guide/author data collection and analysis software
Collaborate closely with firmware development and electronics interface control
Design calibration and characterization experiments
Use excellent investigative and trouble-shooting skills to assess issues and develop resolutions in the lab and in the field
Work proactively to complete tasks with little direction
Communicate effectively with project management, customers, and team members across disciplines
Attend technical interchange meetings with team members and other project personnel, and represent the organization in matters pertaining to the development of projects
Provide status on assigned tasks and program schedules
Review documents and resolve technical engineering and integration issues
Manage time and resources in order to meet assigned deadlines
Ability to support travel or off-site work, as needed
Perform other duties as assigned
YOU'LL BRING THESE QUALIFICATIONS AS SENIOR ANALYST II:
Bachelor's degree in science, or other technical discipline
Active U.S. Government Security Clearance with TS/SCI eligibility
8+ years of professional experience
Ability to contribute to the completion of program and project milestones
YOU'LL BRING THESE QUALIFICATIONS AS PRINCIPAL ANALYST:
Bachelor's degree in science, or other technical discipline
Active U.S. Government Security Clearance with TS/SCI eligibility
12+ years of professional experience
Ability to contribute to the completion of program and project milestones
THESE QUALIFICATIONS WOULD BE NICE TO HAVE:
Master's or PhD in science, or other technical discipline
Hands-on expertise with electro-optical systems, imaging systems, light sources, and/or military/space payloads
Working knowledge of MATLAB, python, and C++ computer languages, and expertise in computer interfacing techniques
Expertise in modeling and simulation
Excellent communication and documentation skills
Experience in a dynamic and high-visibility role
Team player incorporating a team-based success philosophy
ADDITIONAL REQUIREMENTS:
Specific vision abilities required by this job include close vision, distance vision, peripheral vision, depth perception, and the ability to focus
Regularly required to sit, use hands and fingers, operate computer keyboard and controls, and communicate verbally and in writing
Must be physically able to commute to buildings
Occasional exposure to dust, fumes and moderate levels of noise
WHAT TO EXPECT
We're on a mission to unlock the potential of space to improve life on Earth, but that's not an easy task. It takes hard work, determination, relentless innovation, teamwork, grit, and an unwavering commitment to achieving what others often deem impossible. Our people out-think, out-work and out-pace. We pride ourselves on having each other's backs, checking our egos at the door, and rolling up our sleeves on all tasks big and small. We thrive under pressure, work to tight deadlines, and our focus is always on how we can deliver, rather than dwelling on the challenges that stand in the way.
Important information:
FOR CANDIDATES SEEKING TO WORK IN US OFFICES ONLY:
To conform to U.S. Government space technology export regulations, including the International Traffic in Arms Regulations (ITAR), Rocket Lab Employees must be a U.S. citizen, lawful U.S. permanent resident (i.e., current Green Card holder), or lawfully admitted into the U.S. as a refugee or granted asylum, or be eligible to obtain the required authorizations from the U.S. Department of State and/or the U.S. Department of Commerce, as applicable. Learn more about ITAR here.
Rocket Lab provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. This policy applies to all terms and conditions of employment at Rocket Lab, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.
Applicants requiring a reasonable accommodation for the application/interview process for a job in the United States should contact Giulia Johnson at ***********************.This dedicated resource is intended solely to assist job seekers with disabilities whose disability prevents them from being able to apply/interview. Only messages left for this purpose will be considered. A response to your request may take up to two business days.
FOR CANDIDATES SEEKING TO WORK IN NEW ZEALAND OFFICES ONLY:
For security reasons background checks will be undertaken prior to any employment offers being made to an applicant. These checks will include nationality checks as it is a requirement of this position that you be eligible to access equipment and data regulated by the United States' International Traffic in Arms Regulations.
Under these Regulations, you may be ineligible for this role if you do not hold citizenship of Australia, Japan, New Zealand, Switzerland, the European Union or a country that is part of NATO, or if you hold ineligible dual citizenship or nationality. For more information on these Regulations, click here ITAR Regulations.
Make a difference. Be happy. Grow your career.
A Nordic consultant is more than just an Epic expert. Our analysts take ownership for their work and the greater success of the organization. We're also looking for someone who listens to the client and understands that each project and each organization is unique. You'll need to tackle tough projects to help those organizations succeed. Experience implementing Epic is required, and if you have experience on a Connect or optimization project, that's a plus. Here are a couple things you'll need:
-At least 3 years of Epic experience
-At least 1 current Epic certification (Security, Security Coordinator) Senior Consultant
A Senior Consultant provides consulting services to clients on Epic-related projects in an analyst, project management, project leadership or training capacity.
Key Responsibilities
Perform Epic-related consulting and administrative computer services for Nordic clients
Apply technical expertise to individual client system build in order to identify, troubleshoot, and resolve problems.
Mentor client project teams as necessary in project and system build strategy.
Track and document risks and issues.
Analyze and document workflows.
Work closely with project leadership, including documentation and facilitation.
Work directly with Epic end users. Monitor workflows, provide documentation, and optimization suggestions.
Lead meetings regarding project status and on-going work-product coordination.
Additional specific duties related to the project as may be required and dictated by individual clients. These duties are documented on a per-contract basis in the client's statement of work.
May be invited to attend corporate functions as a representative of the company to meet prospective consultants, as well as solidify relationships with client and Nordic co-workers.
#LI-AB1
EEO Language:
Nordic is an equal opportunity employer dedicated to a policy of non-discrimination on any protected basis including race, creed, color, age, gender, religion, national origin, disability, marital or veteran status, sexual orientation, or any other legally protected status under applicable local, state or federal law. EEO/AA Employer: M/F/Disabled and Vet.
Nordic is an equal opportunity employer. We are committed to creating an inclusive environment for all employees and applicants. We do not discriminate on the basis of race, color, religion, sex, national origin, age, disability, genetic information, marital or veteran status, or any other protected status under applicable federal, state, or local laws. We encourage individuals of all backgrounds to apply, including women, minorities, individuals with disabilities, and veterans.
$94k-130k yearly est. Auto-Apply 60d+ ago
Information Security Compliance Senior Analyst
Crypto.com 3.3
Remote cryptographic vulnerability analyst job
At Crypto.com, our dedication to user security is led by our highly experienced Security Team. Comprising an international roster of seasoned cybersecurity experts, our team leads the company's Security, Privacy, and Security Compliance endeavors. The team includes holders of international patents for technologies integrated in our security architecture. Under the stewardship of a distinguished CISO recognized by the Forbes Technology Council and among the Global Top 100 CISOs, our team has consistently championed industry standards, acquiring certifications like ISO27001, ISO27701, ISO22301, PCI:DSS 3.2.1 (Level 1), NIST Tier 4, and SOC 2 Type II, in addition to the MPI License from Singapore MAS. Our Chief Information Security Officer reports directly to the CEO, underscoring the prioritization of security in our organization's hierarchy.
Our Security Team not only places great emphasis on credentials and expertise but also deeply values hands-on experience, rapid cognition, and dynamic learning. The challenges in the world of crypto are ever-evolving, and as such, our team prides itself on quick adaptability and robust teamwork, ensuring that we stay ahead of potential threats and always safeguard our user base.
About the Role
As our Security Compliance Senior Analyst, you will be tasked with security compliance activities along with our journey. You are expected to take the initiative to assist us with several security compliance programs and certifications. You are required to address and review compliance gaps and give recommendations and support on remediation activities. You will also be trusted to provide technical advice to ensure that security compliance requirements are met throughout all business units. This role requires technical knowledge of network security, especially on-prem and cloud native architectures. A familiarity with US derivatives regulatory frameworks would be advantageous. Job Responsibilities:
Assist in our security compliance programs, including ISO27001, ISO27701, PCI-DSS, SOC2 Type 2, and local regulations
Participate in internal security and privacy assessments, internal and external audits, compliance certifications, and risk management
Provide complete and accurate responses to internal and third-party enquiries on security compliance
Perform security compliance assessment activities, including periodic technical, organizational, and third-party risk and control assessments, and managing remediation activities to completion
Design and manage necessary control and framework required to comply with international standards and US local regulations
Identify and drive process improvements for streamlining global security compliance operations
Qualifications:
3-5 years of experience in information security, privacy, IT audit or IT risk management related roles.
Prefer experience with one or more of the following: In-house security and privacy operations, conducting security control assessments, risk assessments or audits.
Prefer experience with any of the following: ISO27001, ISO27701, SOC1, SOC2, PCI, SOX, COSO, cloud technologies, and data protection regulations and requirements.
Ability to analyze and review US and Global privacy and information security compliance and provide guidance.
Holders of security-related certifications/qualifications will be an advantage: CISSP, CRISC, CISM, CISA, ISO27001 LA, CIPT, CIPP/E, or other relevant certifications
Experience leading compliance initiatives and working with auditors and/or external regulators
It's a plus if you:
Have experience in information security and privacy management in virtual assets, fintech, online services, platform services, or global services.
Have experience in establishing information security and privacy framework to meet US regulations, (CFTC, FINRA, SEC, and other US based regulators.)
Are a strong commitment to personal learning and development
Are detail minded with an analytical mindset
Have good communication skills with an ability to explain complex technical issues to non-technical business users
Have prior experience with project management
Have an interest and understanding of Blockchain and AI technologies
***************** Empowered to think big. Try new opportunities while working with a talented, ambitious and supportive team.Transformational and proactive working environment. Empower employees to find thoughtful and innovative solutions.Growth from within. We help to develop new skill-sets that would impact the shaping of your personal and professional growth.Work Culture. Our colleagues are some of the best in the industry; we are all here to help and support one another.One cohesive team. Engage stakeholders to achieve our ultimate goal - Cryptocurrency in every wallet. Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us - our internal mobility program offers employees a new scope.
Are you ready to kickstart your future with us?
BenefitsCompetitive salary Attractive annual leave entitlement including: birthday, work anniversary 401(k) plan with employer match Eligible for company-sponsored group health, dental, vision, and life/disability insurance Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us. Our internal mobility program can offer employees a diverse scope.
Our Crypto.com benefits packages vary depending on region requirements, you can learn more from our talent acquisition team.
About Crypto.com:Founded in 2016, Crypto.com serves more than 150 million customers and is the world's fastest growing global cryptocurrency platform. Our vision is simple: Cryptocurrency in Every Wallet™. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating the adoption of cryptocurrency through innovation and empowering the next generation of builders, creators, and entrepreneurs to develop a fairer and more equitable digital ecosystem.
Learn more at *******************
Crypto.com is an equal opportunities employer and we are committed to creating an environment where opportunities are presented to everyone in a fair and transparent way. Crypto.com values diversity and inclusion, seeking candidates with a variety of backgrounds, perspectives, and skills that complement and strengthen our team.
Personal data provided by applicants will be used for recruitment purposes only.
Please note that only shortlisted candidates will be contacted.
$81k-120k yearly est. Auto-Apply 3d ago
Cloud Security Analyst (Remote)
Knowbe4 4.4
Remote cryptographic vulnerability analyst job
Join the cybersecurity company that puts security first; literally and without compromise. At KnowBe4, our AI-driven Human Risk Management platform empowers over 70,000 organizations worldwide to strengthen their security culture and transform their workforce from their biggest vulnerability into their strongest security asset. As the undisputed industry standard with unusually high customer retention rates and recognition as a Leader by G2 and TrustRadius, we're not just providing security awareness training - we're redefining what it means to be a trusted security partner in an increasingly complex threat landscape.
Our team values radical transparency, extreme ownership, and continuous professional development in a welcoming workplace that encourages all employees to be themselves. Whether working remotely or in-person, we strive to make every day fun and engaging; from team lunches to trivia competitions to local outings, there is always something exciting happening at KnowBe4.
Remote positions open to the US only.
The Opportunity
Join our Information Security team as the person responsible for monitoring and protecting KnowBe4's cloud infrastructure. As Cloud Security Analyst, you'll be the first responder for security alerts across our AWS and Azure environments; triaging, investigating, and coordinating responses that protect both company and customer data. You'll own the day-to-day security operations that keep our cloud ecosystem secure: analyzing alerts, hunting threats, investigating incidents, and partnering with engineering teams to ensure vulnerabilities get fixed before they become problems. The successful candidate stays calm under pressure, stays curious about new attack vectors, builds tools to make their job easier, and is passionate about cybersecurity.
What You'll Do
Security Monitoring & Response: Continuously monitor and triage alerts from SIEM, CSPM, CWPP, and cloud security tools - identifying what's a real threat, what needs immediate action, and what requires deeper investigation.
Incident Management: Serve as primary responder for cloud security incidents, leading investigation efforts from initial detection through containment, eradication, and recovery while keeping stakeholders informed throughout.
Threat Hunting & Analysis: Proactively hunt for threats across security log feeds, perform root cause analysis on vulnerabilities and incidents, and stay ahead of emerging attack patterns using frameworks like MITRE ATT&CK.
Alert Engineering: Build and refine security alerts and dashboards that catch the signals that matter - reducing noise while ensuring critical issues surface quickly and clearly.
Security Testing & Validation: Conduct security reviews and penetration testing across cloud infrastructure, identifying weaknesses before attackers do and validating that our defenses actually work.
Cross-Team Collaboration: Partner closely with IT, engineering, and development teams to ensure security findings are understood, prioritized appropriately, and remediated with solid engineering principles-not just quick fixes.
What You Bring
2+ years of hands-on experience in cloud security, information security operations, or similar roles where you've monitored alerts, investigated incidents, and worked within AWS and/or Azure environments.
Practical cloud security knowledge with demonstrated ability to navigate cloud environments, understand misconfigurations, and think like an attacker to anticipate where vulnerabilities hide.
Builder mindset with AI-assisted development skills - you actively leverage AI tools to write scripts, automate repetitive tasks, and solve your own problems rather than waiting for someone else to build solutions for you.
Security operations foundation - you understand how to triage alerts, distinguish true positives from noise, investigate incidents methodically, and communicate findings clearly to both technical and non-technical audiences.
Strong organizational skills and time management - you can juggle multiple security investigations simultaneously, prioritize what needs attention now versus what can wait, and keep track of incidents through resolution without dropping details.
Some experience with offensive security - you know your way around infosec testing tools, understand OWASP Top 10, can think through how attackers exploit cloud environments, and have some exposure to penetration testing concepts.
Comfort across technical domains - basic scripting ability, Linux command line navigation, understanding of application concepts (APIs, containers, databases), and some experience working with infrastructure-as-code tools like Terraform or CloudFormation.
Bonus points if you have:
Cloud security certifications (AWS Security Specialty, Azure Security Engineer, or similar professional credentials that validate your expertise).
Bachelor's degree in information security, information systems, computer science, or related technical field.
Experience with MITRE ATT&CK Framework in practical incident response scenarios where you've mapped adversary techniques to actual alerts.
Background deploying security tooling as code - building alerts, automation, or security solutions using proper engineering principles that others can actually use and maintain.
Why You'll Love It Here
Builder-Friendly Culture: We encourage you to solve your own problems with good engineering principles; everything is deployed through Terraform, following the same standards as our development teams-you'll write solutions that scale, not just quick scripts.
Remote Flexibility: Fully remote position open across the US, giving you the autonomy to work where you're most effective while staying connected to a collaborative security team.
Continuous Learning: Budgets for certifications, conferences, and dedicated exploration time to research new tools and stay current
Transparency and Trust: Radical candor, low ego, high accountability
Global Scale: Your work will help protect users across 70,000+ organizations worldwide.
The base pay for this position ranges from $80,000 - $85,000, which will vary depending on how well an applicant's skills and experience align with the job description listed above.
We will accept applications until 1/30/2026.
Our Fantastic Benefits
We offer company-wide bonuses based on monthly sales targets, employee referral bonuses, adoption assistance, tuition reimbursement, certification reimbursement, and certification completion bonuses - all in a modern, high-tech, and fun work environment. For more details about our benefits in each office location, please visit *********************************
Note: An applicant assessment and background check may be part of your hiring procedure.
Individuals seeking employment at KnowBe4 are considered without prejudice to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, sexual orientation or any other characteristic protected under applicable federal, state, or local law. If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please visit **********************************************
No recruitment agencies, please.
$80k-85k yearly Auto-Apply 17d ago
Senior Security GRC Analyst
Lambda 4.2
Remote cryptographic vulnerability analyst job
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
*Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
Manage IT Risk Register including risk identification, tracking, and prioritization.
Assist with and drive remediation of control deficiencies and gaps
Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
Assist control owners with root cause analysis and track risk management action plan progress.
Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements
You
Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
Experience in the machine learning or computer hardware industry
Experience with Security by Design and/or Privacy by Design principles
Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
Founded in 2012, with 500+ employees, and growing fast
Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
Our values are publicly available: *************************
We offer generous cash & equity compensation
Health, dental, and vision coverage for you and your dependents
Wellness and commuter stipends for select roles
401k Plan with 2% company match (USA employees)
Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
$93k-129k yearly est. Auto-Apply 60d+ ago
Senior Security Analyst - Architecture
Victoria's Secret 4.1
Cryptographic vulnerability analyst job in Reynoldsburg, OH
Your Role We are seeking a Senior Security Analyst reporting to the Cybersecurity Architecture team that will have a critical role in translating enterprise security standards into actionable technical controls and processes. This position acts as a security subject matter expert, focusing on ensuring the security integrity of technology solutions from the initial phases of a project through deployment. The successful candidate is analytical and detail-oriented, has intellectual curiosity, focus on problem solving, and proactive in adapting and anticipating risks.
Why You Belong Here
At Victoria's Secret & Co, you'll join a world-leading specialty retail brand recognized globally for innovation and excellence in lingerie and fashion. You'll work alongside industry leaders to set the standard for what a retail brand can achieve, placing customers at the center of everything we do to create products and experiences that bring them joy.
We believe everyone deserves a place where they truly belong. We celebrate individuality and know that your passion, experience, and unique perspective strengthen our team and business. Here, you'll be empowered to perform, grow, and engage through unmatched opportunities to develop your skills, gain real-world experience, and learn from the best in the business.
Your Impact
Architectural Guidance and Review:
* Conduct thorough project security assessments (including risk analysis, penetration test coordination, and vulnerability reviews) on existing infrastructure and new application designs.
* Develop and socialize robust security requirements and technical specifications for new systems, platforms, and architectural patterns, ensuring alignment with risk, regulatory, and compliance needs.
* Diagram and document the security posture of critical enterprise assets, creating clear, technical representations of control mapping, data flow, and threat models.
* Inform and update internal security standards and requirements.
Security Technology Portfolio:
* Research and evaluate the latest security threats, technologies, and industry best practices.
* Oversee the effective implementation and maintenance of defined security controls (e.g., identity management, data protection, network segmentation) across various cloud and on-premises environments.
Collaboration:
* Educate teams on secure design principles, defensive programming techniques, and proper configuration of security tools and services.
* Develop and grow relationships with system and technology owners across the business.
Ad-hoc duties as assigned
Click here for benefit details related to this position.
Minimum Salary: $96,500.00
Maximum Salary: $131,775.00
VS&Co provides a range of compensation for this role as shown. Your actual salary will be determined by a number of factors, including: your specific skills and experience, geographic region, or other relevant factors.
Qualifications
Your Experience
Required Qualifications
* Strong understanding of IT security concepts and technologies. Have experience with specific security tools and applications, such as firewalls, intrusion detection systems, and vulnerability scanners.
* Strong communication skills, the ability to problem solve, and work as part of a team.
* Work effectively with other IT and security professionals, as well as business stakeholders.
* Experience with security frameworks (e.g., NIST CSF, SABSA, TOGAF) and risk methodologies (e.g., FAIR, OCTAVE).
Preferred Qualifications
* 5+ years of progressive experience in security, with at least 1 year in a dedicated security architecture role.
* Relevant industry certifications such as ISA/IEC 62443 (Cybersecurity Risk Assessment Specialist), CISA (ISACA Certified Information Systems Auditor), CSA CGC (Cloud Security Alliance Cloud Governance and Compliance), GCIP (GIAC Critical Infrastructure Protection)
* Bachelor's degree in Computer Science, Information Technology, or a related field; or equivalent practical experience.
We will consider for employment all qualified applicants, including those with arrest records, conviction records, or other criminal histories, in a manner consistent with the requirements of any applicable state and local laws. Please see links: California Fair Chance Act, Los Angeles Fair Chance Initiative for Hiring Ordinance, Philadelphia Fair Chance Law, San Francisco Fair Chance Ordinance, Los Angeles County Fair Chance Ordinance
An equal opportunity employer, we do not discriminate in hiring or terms and conditions of employment because of an individual's race, color, religion, gender, gender identity, national origin, citizenship, age, disability, sexual orientation, marital status or any other protected category recognized by state, federal or local laws. We only hire individuals authorized for employment in the United States.
$96.5k-131.8k yearly 27d ago
Information Security Specialist/Analyst III - Information Solutions (Remote)
Musckids
Remote cryptographic vulnerability analyst job
The Information Security Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the Information Security Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC005101 SYS - IS Tidelands Integration
Pay Rate Type
Salary
Pay Grade
Health-29
Scheduled Weekly Hours
40
Work Shift
We are seeking a highly skilled and experienced Senior Information Security Analyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards.
Key Responsibilities:
45% - Network Security Monitoring and Incident Response:
Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired.
Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches.
Perform cyber security incident handling, tracking and reporting.
Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts.
Respond to relevant service requests received from end users (e.g. for investigation of security events).
Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents.
20% - Security Technology management:
Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities.
Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements.
10% - Vulnerability Management:
Conduct vulnerability assessments to identify security risks and report findings to system owners.
Manage workflows to ensure that protected assets are properly assessed in a timely manner.
15% - Threat Analysis
Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs).
Perform risk assessments and translate business requirements into effective security controls.
Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner.
10% - Security Awareness:
Create and deliver security awareness training for technical and non-technical audiences.
Additional Job Description
Required Education/Skills/Work Experience:
A Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required.
Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.).
Strong analytical and problem-solving skills with the ability to make decisions under pressure.
Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools.
Familiarity with cloud security (Azure, AWS) and identity management solutions.
Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices.
Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language.
Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks.
Highly Desired Certifications:
CISSP, CISM, GIAC, or equivalent.
Physical Requirements
Mobility & Posture
Standing: Continuous
Sitting: Continuous
Walking: Continuous
Climbing stairs: Infrequent
Working indoors: Continuous
Working outdoors (temperature extremes): Infrequent
Working from elevated areas: Frequent
Working in confined/cramped spaces: Frequent
Kneeling: Infrequent
Bending at the waist: Continuous
Twisting at the waist: Frequent
Squatting: Frequent
Manual Dexterity & Strength
Pinching operations: Frequent
Gross motor use (fingers/hands): Continuous
Firm grasping (fingers/hands): Continuous
Fine manipulation (fingers/hands): Continuous
Reaching overhead: Frequent
Reaching in all directions: Continuous
Repetitive motion (hands/wrists/elbows/shoulders): Continuous
Full use of both legs: Continuous
Balance & coordination (lower extremities): Frequent
Lifting & Force Requirements
Lift/carry 50 lbs. unassisted: Infrequent
Lift/lower 50 lbs. from floor to 36”: Infrequent
Lift up to 25 lbs. overhead: Infrequent
Exert up to 50 lbs. of force: Frequent
Examples:
Transfer 100 lb. non-ambulatory patient = 50 lbs. force
Push 400 lb. patient in wheelchair on carpet = 20 lbs. force
Push patient stretcher one-handed = 25 lbs. force
Vision & Sensory
Maintain corrected vision 20/40 (one or both eyes): Continuous
Recognize objects (near/far): Continuous
Color discrimination: Continuous
Depth perception: Continuous
Peripheral vision: Continuous
Hearing acuity (with correction): Continuous
Tactile sensory function: Continuous
Gross motor with fine motor coordination: Continuous
Selected Positions:
Olfactory (smell) function: Continuous
Respirator use qualification: Continuous
Work Environment & Conditions
Effective stress management: Continuous
Rotating shifts: Frequent
Overtime as required: Frequent
Latex-safe environment: Continuous
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
$82k-116k yearly est. Auto-Apply 3d ago
Senior Information Security Specialist-SECRET CLEARANCE REQUIRED
Latitude Inc.
Remote cryptographic vulnerability analyst job
Primary Responsibilities:
Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization.
Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation.
Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts.
Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment.
Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats.
Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps.
Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment.
Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures.
Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance.
Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments.
All other duties as assigned by management.
Qualifications
Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education.
Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies.
Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS).
Minimum of (5) years of experience with Security Information and Event Management (SIEM).
Minimum of five (5) years of experience in the risk management framework.
Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases.
Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred.
Must have an active DoD Secret Clearance.
$82k-116k yearly est. Auto-Apply 60d+ ago
IT Security Specialist 4/ITSS2 (39604)
Idealforce
Cryptographic vulnerability analyst job in Columbus, OH
IDEALFORCE has a CONTRACT position available immediately for a IT Security Specialist(ITSS2) to join our customer in Columbus, OH. This is an ONSITE position and require in person interview. Please find below additional details about this job.
Job Description
Security Consultant to help IT Augment the security staff until OIT can take over all Security related needs for the agency. This position will function as a highly skilled Security Consultant with specific responsibilities that include:
-Monitor network and information system activity.
-Respond to alerts (analyze, interpret, investigate, resolve) based on monitoring activity, for security (malware, malicious actor), and other purposes (malicious activity, misuse, etc.) Uses creativity and innovation to automate and streamline processes and procedures.
-Understands customer support, likes to work with people and can ensure that the customer is satisfied.
-Manage, update, modify alerts, adjust/fine tune event correlation rules, etc. (e.g. filter false positives, increase accuracy/relevance/effectiveness), create new rules based on threat changes/evolving risk, etc.
-Understanding of basic Networking principles, including network troubleshooting for connectivity issues, DHCP, DNS, use of tools like PING, NSLOOKUP and NETSTAT
-Perform specialized security functions (e.g. forensics for incident response).
-Perform event correlation, analysis of malicious activity indicators, and appropriate response, based on review and access to multiple security tools and services.
-Provide routine security and general support (tickets, ad-hoc requests, etc.) to all DPS departments/users, IT groups/resources, external (other state agencies, public), etc.
SPECIAL NOTE: Client is running a 24/7 operation. Consultant may need to come in during incident or emergency situations.
During the interview process with the ODPS staff, the resource consultant must demonstrate competence/experience in their specific area(s) of project assignment. The resource's experience must also be documented for review and verification. Offered resources not showing technical or functional competence/experience will be sufficient reason to reject the Offeror's proposal. It is the responsibility of the Offeror to pre-screen their candidates to ensure compliance. Resource will have a background check conducted by ODPS.
Qualifications
-1-2 Years SIEM (Q-Radar preferred)
-8 years customer service experience
-8 Years Troubleshooting experience
-8+ years knowledge of Networking to including PING, NETSTAT, DHCP, DNS, and NSLOOKUP.
-8 years' experience with Active Directory.
-4 Years experience with Web and Email Filtering and Security (Ironport)
-5+ Years experience with Imperva (DAM/WAF)
-1 years of Vulnerability scanning experience (Qualys)
-3 years A/V suite experience McAfee
-3 years IPS (IBM)
-Contributes to continuous process improvements to increase the efficiency of section.
-Excellent communication skills both written and oral.
-Strong communication/ leadership skills.
-Strong influence, collaboration and negotiation experience.
-Ability to collaborate with supporting resources across business and/or functional lines.
-Have excellent oral and written skills/possess strong meeting and work session facilitation skills.
-Have the ability to work independently and as part of a team, the ability to manage time and resources to meet assigned deadlines.
-Have strong understanding of prioritization stemming from the elicitation of system and/or user requirements.
-Have excellent organizational skills, proven analytical, planning, problem solving, and decision-making skills.
-Must be knowledgeable in the English language/speak clearly and understandably use the English language.
Desired Skills
-Q-Radar
-Ironport Web and Email Security
-Imperva
-Certifications in Microsoft
-Powershell 3.0 scripting background.
-Qualys
-McAfee Enterprise solutions
-IPS
-Splunk
-Other security related tools.
-ITIL Knowledge and ITSM Tools.
Additional Information
Additional Information :
- "All your information will be kept confidential according to EEO guidelines".
- All candidates who are authorized to work in US are encouraged to apply.
- Candidates must clear the Background check prior to commencing the assignment.
THIRD PARTY CANDIDATES:
Email your candidate/s resume to joseph dot shelton at idealforce.com along with the following details: Rate, Current location and Availability.
Disclaimer :
The above statements are intended to describe the general nature and level of work being performed by people assigned to this classification. They are not to be construed as an exhaustive list of all responsibilities, duties, and skills required of personnel so classified. All personnel may be required to perform duties outside of their normal responsibilities from time to time, as needed.
$71k-100k yearly est. 60d+ ago
Staff Information Security Analyst
Playstation 4.8
Remote cryptographic vulnerability analyst job
Why PlayStation?
PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more.
PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team.
The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation.
Sony Interactive Entertainment LLC seeks a Staff Information Security Analyst in San Mateo, CA to define strategic GRC (Governance, Risk and Compliance) input in global initiatives, including Artificial Intelligence (AI) and Machine Learning (ML) adoption, cloud security, and enterprise wide policies, ensuring resilience while balancing business and regulatory needs. Requires a Master's degree in Cybersecurity, Information Security, or related field or equivalent, and four (4) years of experience conducting risk assessments on critical information systems to maintain and manage risk registers; facilitating the Security Risk Assessment methodology, policy, strategy and process; writing security assessment reports following security breaches and detailing the associated impact; monitoring and reviewing IT Security controls to identify operational effectiveness; mapping security controls to policies, standards, procedures and processes to ensure compliance with security measures; managing security remediation efforts and tracking status of security deficiencies; translating security risk mitigation plans into actionable items to mitigate risk in coordination with technical and business teams; developing and implementing policy frameworks for emerging technologies, including AI/ML and cloud security, with governance and legal stakeholders; applying industry standards including NIST, ISO 27001, and PCI DSS in support of organizational security objectives; supporting the evaluation of third-party vendor security through documentation review and risk assessment; contributing to the enhancement of vendor onboarding and compliance workflows; and, in executing duties, utilizing Archer GRC, ServiceNow, Splunk, JIRA, Confluence, SharePoint, Palo Alto Prisma Cloud and AWS. Telecommuting and/or working from home may be permissible pursuant to company policies. Sony is an EOE.
Salary range: $185,639.00 - $261,000.00/year
Equal Opportunity Statement:
Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category.
We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond.
PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
$185.6k-261k yearly Auto-Apply 9d ago
Information Security Expert
Cyberthink 4.2
Cryptographic vulnerability analyst job in Columbus, OH
Title: Information Security SME/Developer with .NET development Duration : 5 Months contract (High possibility of Extension) Interview Type: Both iLinc Web Cam and In Person Interview Skills Required Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
.NET development experience Required 5 Years
Thanks
Naimesh Solanki
Sr. Technical Recruiter
Phone: ************ x 6578
Qualifications
Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
Additional Information
All your information will be kept confidential according to EEO guidelines.
$62k-80k yearly est. 10h ago
Information Security Specialist/Analyst III - Information Solutions (Remote)
MUSC (Med. Univ of South Carolina
Remote cryptographic vulnerability analyst job
The Information Security Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the Information Security Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC005101 SYS - IS Tidelands Integration
Pay Rate Type
Salary
Pay Grade
Health-29
Scheduled Weekly Hours
40
Work Shift
We are seeking a highly skilled and experienced Senior Information Security Analyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards.
Key Responsibilities:
45% - Network Security Monitoring and Incident Response:
* Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired.
* Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches.
* Perform cyber security incident handling, tracking and reporting.
* Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts.
* Respond to relevant service requests received from end users (e.g. for investigation of security events).
* Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents.
20% - Security Technology management:
* Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities.
* Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements.
10% - Vulnerability Management:
* Conduct vulnerability assessments to identify security risks and report findings to system owners.
* Manage workflows to ensure that protected assets are properly assessed in a timely manner.
15% - Threat Analysis
* Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs).
* Perform risk assessments and translate business requirements into effective security controls.
* Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner.
10% - Security Awareness:
* Create and deliver security awareness training for technical and non-technical audiences.
Additional Job Description
Required Education/Skills/Work Experience:
* A Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required.
* Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.).
* Strong analytical and problem-solving skills with the ability to make decisions under pressure.
* Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools.
* Familiarity with cloud security (Azure, AWS) and identity management solutions.
* Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices.
* Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language.
* Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks.
Highly Desired Certifications:
* CISSP, CISM, GIAC, or equivalent.
Physical Requirements
* Mobility & Posture
* Standing: Continuous
* Sitting: Continuous
* Walking: Continuous
* Climbing stairs: Infrequent
* Working indoors: Continuous
* Working outdoors (temperature extremes): Infrequent
* Working from elevated areas: Frequent
* Working in confined/cramped spaces: Frequent
* Kneeling: Infrequent
* Bending at the waist: Continuous
* Twisting at the waist: Frequent
* Squatting: Frequent
* Manual Dexterity & Strength
* Pinching operations: Frequent
* Gross motor use (fingers/hands): Continuous
* Firm grasping (fingers/hands): Continuous
* Fine manipulation (fingers/hands): Continuous
* Reaching overhead: Frequent
* Reaching in all directions: Continuous
* Repetitive motion (hands/wrists/elbows/shoulders): Continuous
* Full use of both legs: Continuous
* Balance & coordination (lower extremities): Frequent
* Lifting & Force Requirements
* Lift/carry 50 lbs. unassisted: Infrequent
* Lift/lower 50 lbs. from floor to 36": Infrequent
* Lift up to 25 lbs. overhead: Infrequent
* Exert up to 50 lbs. of force: Frequent
* Examples:
* Transfer 100 lb. non-ambulatory patient = 50 lbs. force
* Push 400 lb. patient in wheelchair on carpet = 20 lbs. force
* Push patient stretcher one-handed = 25 lbs. force
* Vision & Sensory
* Maintain corrected vision 20/40 (one or both eyes): Continuous
* Recognize objects (near/far): Continuous
* Color discrimination: Continuous
* Depth perception: Continuous
* Peripheral vision: Continuous
* Hearing acuity (with correction): Continuous
* Tactile sensory function: Continuous
* Gross motor with fine motor coordination: Continuous
* Selected Positions:
* Olfactory (smell) function: Continuous
* Respirator use qualification: Continuous
* Work Environment & Conditions
* Effective stress management: Continuous
* Rotating shifts: Frequent
* Overtime as required: Frequent
* Latex-safe environment: Continuous
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
$65k-92k yearly est. 2d ago
Information Security Controls Analyst
United Community Bank 4.5
Remote cryptographic vulnerability analyst job
United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization.
What You'll Do
Review and document the adequacy of security and technology controls across business and IT environments.
Evaluate control posture through interviews, documentation reviews, and workflow analysis.
Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls.
Partner with risk management and security leadership to align controls with organizational risk tolerance.
Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance.
Document and advocate for control improvements that balance risk with operational efficiency.
Support control development across testing, QA, and production environments.
Present control effectiveness reports to senior risk leadership.
Stay current on regulatory requirements, internal policies, and industry best practices.
Requirements For Success
Experience:
3+ years in cybersecurity or IT practitioner roles.
2+ years in IT risk or controls analysis.
Practical experience with risk management and IT control frameworks.
Education: Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field.
Required Skills:
Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST).
Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA).
Experience with CIS CSC, ISO 2700, or NIST CSF.
Excellent written and verbal communication across all organizational levels.
Strong organizational skills and ability to meet SLAs.
Sound judgment and decision-making in complex scenarios.
High integrity, trustworthiness, and adaptability.
Preferred Skills:
Certifications such as CISSP, CISA, CRISC, or CISM.
Technical experience with enterprise networks, applications, and directory services.
Familiarity with enterprise GRC platforms.
Conditions of Employment
Must be able to pass a criminal background & credit check
This is a full-time, non-remote position
FLSA Status:
Exempt
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Pay Range USD $49,972.00 - USD $76,958.00 /Yr.
$50k-77k yearly Auto-Apply 47d ago
Principal, Workday PAT Analyst
Toast 4.6
Remote cryptographic vulnerability analyst job
Toast creates technology to help restaurants and local businesses succeed in a digital world, helping business owners operate, increase sales, engage customers, and keep employees happy.
Toast is a leading cloud-based restaurant and retail management software company based in Boston, Massachusetts. The company provides an all-in-one point of sale system, driven by a commitment to fostering a world-class customer and employee experience, recognized as a key competitive advantage. The People Products team, a strategic arm of the People and Places organization, is dedicated to amplifying this ambition by pioneering AI-powered, conversational, self-service products. These solutions are designed to deliver hyper-personalized employee experiences and actionable workforce intelligence, thereby profoundly enhancing global productivity and engagement.
We are seeking a Principal Workday Architect to serve as a techno-functional Workday PAT expert (70%) and a Benefits configuration expert (30%) and thought partner. This is a highly visible, strategic role that demands a blend of deep technical mastery in Workday and the ability to influence organizational process and technology roadmaps. As a strategic architect and trusted executive-level advisor to the People, Payroll, Finance, IT, and Benefits departments, you will be responsible for configuring and leading the development of robust, scalable, compliant, and impactful Workday solutions that directly drive transformational change in the employee experience and operational efficiency across the enterprise.
A day in the life (Responsibilities)
PAT Global Architecture and Strategic Leadership (70%)
Act as the definitive global Workday architecture Subject Matter Expert (SME) for global Payroll, Absence, and Time Tracking (PAT). Provide thought leadership and deep technical guidance on these domains, including the optimal architecture for data management between Workday and Cloudpay/external systems.
Define the multi-year technical roadmap for the Workday PAT ecosystem, ensuring all configurations meet evolving global labor laws and tax regulations.
Provide strategic, executive-level counsel on Workday capabilities, compliance risks, and technical debt, driving decisions on major global policy changes, country rollouts, and legislative compliance (e.g., FLSA, EMEA/APAC working time directives).
Workday Benefits Architecture and Administration (30%)
Architect Global Benefits: Own the strategic design and configuration of all Benefit Plans, Plan Types, Coverage Levels, and complex Eligibility Rules across the enterprise, ensuring alignment with global and regional compensation philosophies.
Lead Enrollment Events: Configure and manage end-to-end Open Enrollment and Life Events/Change Benefits Events, defining workflow rules, validation processes, and employee self-service experience.
Own Carrier Integrations: Serve as the technical owner for the Workday Cloud Connect for Benefits, architecting and validating the secure and accurate transmission of enrollment and deduction data to external carriers.
Benefits-to-Payroll Integration: Ensure the seamless integration of Benefit Deductions into the Payroll system, setting up the necessary Pay Components and mappings to guarantee accurate gross-to-net calculations and compliance (e.g., ACA reporting).
Hybrid Global Payroll Integration Architecture
Lead the End-to-End Design and Expansion of the Workday <> CloudPay Integration: Serve as the primary architect for the Workday-CloudPay connection, utilizing certified frameworks (e.g., Global Payroll Connect) to manage the secure and efficient bi-directional flow of complex time, absence, and payroll data as Toast scales globally.
Determine the global payroll delivery architecture, defining the criteria for which countries utilize Workday Native Payroll versus the CloudPay integration, optimizing the distribution of PAT functionality (Time, Absence, and Payroll) for each new market.
Manage Cross-System PAT Data Configuration and Integrity: Own the governance, validation rules, and error-handling protocols for all critical data exchanged between Workday HCM, Time/Absence, and CloudPay, ensuring data consistency and reliability for global payroll execution.
Lead the design and deployment of the integration for new country rollouts, specifically utilizing certified frameworks like Workday Global Payroll Connect (GPC), Additional Payroll Data (APD), and Data Changes on Demand (DCOD).
Complex Configuration and Compliance Assurance
Lead the end-to-end configuration and design of the most complex PAT and Benefits processes, including advanced calculation rules for overtime/shift differentials, complex accrual and balance plans, regional/country-specific time policies, and Evidence of Insurability (EOI) rules.
Establish and enforce rigorous design principles to ensure system stability, data integrity, and seamless integration to minimize pay cycle risk across all payroll methodologies (Workday and CloudPay).
Partner with Finance and People Operations to redesign and transform complex processes, maximizing automation to achieve a "touchless payroll" environment by designing innovative, future-state Workday solutions.
What you'll need to thrive (Requirements)
A minimum of ten (10) years of hands-on, expert-level Workday configuration experience.
At least seven (7) years of deep, primary functional expertise specifically within Workday Payroll, Absence, and Time Tracking (PAT).
Mandatory: Proven architectural expertise in configuring and managing Workday Benefits (Plan Setup, Eligibility, Enrollment Events, and Carrier Integrations).
Mandatory: Proven, hands-on architectural experience managing and expanding Workday Global Payroll Integrations with a third-party provider (CloudPay experience is a significant advantage).
A minimum of ten (10) years of demonstrated experience architecting, building, and governing complex Workday security, reporting, and calculated fields within high-risk functional areas.
Proven track record as a Principal Architect/Lead for at least two major global Workday payroll implementation programs, managing a complex hybrid payroll environment.
Expert-level knowledge of global labor compliance requirements and how they translate into integrated Workday/CloudPay configuration.
Direct, end-to-end ownership of SOX-compliant programs and processes related to payroll sign-off, time approvals, system changes, and Benefits deductions in an integrated environment.
Exceptional executive-level written and verbal communication and negotiation skills, with a proven ability to influence CFO, VP of People, and CIO-level stakeholders on high-risk PAT and Benefits decisions.
AI at Toast
At Toast, one of our company values is that we're hungry to build and learn. We believe learning new AI tools empowers us to build for our customers faster, more independently, and with higher quality. We provide these tools across all disciplines, from Engineering and Product to Sales and Support, and are inspired by how our Toasters are already driving real value with them. The people who thrive here are those who embrace changes that let us build more for our customers; it's a core part of our culture.
Our Total Rewards Philosophy
We strive to provide competitive compensation and benefits programs that help to attract, retain, and motivate the best and brightest people in our industry. Our total rewards package goes beyond great earnings potential and provides the means to a healthy lifestyle with the flexibility to meet Toasters' changing needs. Learn more about our benefits at ********************************************
The base salary range for this role is listed below. The starting salary will be determined based on skills and experience. In addition to base salary, our total rewards components include cash compensation (overtime, bonus/commissions, if eligible), benefits, and equity (if eligible).
Pay Range$108,000-$173,000 USD
Diversity, Equity, and Inclusion is Baked into our Recipe for Success
At Toast, our employees are our secret ingredient-when they thrive, we thrive. The restaurant industry is one of the most diverse, and we embrace that diversity with authenticity, inclusivity, respect, and humility. By embedding these principles into our culture and design, we create equitable opportunities for all and raise the bar in delivering exceptional experiences.
We Thrive Together
We embrace a hybrid work model that fosters in-person collaboration while valuing individual needs. Our goal is to build a strong culture of connection as we work together to empower the restaurant community. To learn more about how we work globally and regionally, check out: *********************************************
Apply today!
Toast is committed to creating an accessible and inclusive hiring process. As part of this commitment, we strive to provide reasonable accommodations for persons with disabilities to enable them to access the hiring process. If you need an accommodation to access the job application or interview process, please contact candidateaccommodations@toasttab.com.
------
For roles in the United States, it is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
$108k-173k yearly Auto-Apply 1d ago
Information Security & Systems Analyst
Friendship Village of Dublin 3.2
Cryptographic vulnerability analyst job in Dublin, OH
Join a team dedicated to making a real difference in the lives of our community. Our Mission at Friendship Village of Dublin is
“To care for, engage, and inspire our community to reimagine and maximize quality of life at every age”
.
At Friendship Village our Values Drive us to RISE to any Occasion
Values:
Respect
Integrity and Innovation
Stewardship
Excellence
We are seeking a Information Security & Systems Analyst to contribute to our mission by:
The Entry to Mid-Level System Analyst performs security, compliance and administration of systems and is responsible for the design, installation and management, configuration and reliable operation of security/compliance mechanisms, systems and policies that protect the computer network and information systems against cyber events. Participate in research and development to continuously improve and keep up with the IT business needs of the organization. Actively resolve problems and issues with computer and server systems to limit work disruptions within the company.
Essential Duties:
Design, install and manage security mechanisms that protect the computer network and information systems against threats including but not limited to hackers, breaches, viruses and spyware.
Educate and provide awareness to users regarding security policies and procedures as well as threats.
Develop and maintain security policies and guidelines around information classification, system integrity, incident response and user access.
Monitor, audit and review systems for and identify violations or attempted violations of security procedures, processes and access.
Plan and implement appropriate measures to safeguard data from accidental or unauthorized modification, destruction or disclosure.
Respond to incidents, investigate potential incidents and recommend enhancements to close potential security gaps and serve as a backup to other members of the Technology department.
Responsible for post breach/data loss activities including but not limited preservation of evidence, review of data to determine scope and support of legal and other processes.
Participate in supporting efforts, making sure all networks, systems, applications, servers, technology tools and related equipment problems are resolved in a timely manner with limited disruptions.
Monitor performance and maintain systems according to requirements.
Ensure security through access controls, backups and firewalls.
Recommend when to upgrade systems with new releases and models.
Timely completion of IT Projects.
All other duties as assigned.
Information Security & Systems Analyst Responsibilities:
Safeguard and help prevent cyber-attacks:
Implement industry best practices for cyber security.
Be up to date about the latest security trends and newest security technology.
Assist other technical support staff in identifying and implementing appropriate security safeguards, including patch applications and anti-malware strategies.
Operate, administer and monitor network and host-based intrusion detection/prevention systems.
Ensure ongoing compliance with industry standards for information security:
Participating in risk assessments to identify potential security threats
Conducting employee training on security policies and responsibilities
Auditing IT systems to ensure compliance with regulations.
Reporting security breaches to management for prompt resolution.
Collaborating with vendors to ensure proper data handling security measures.
Monitoring compliance with state and federal data privacy and security regulations.
Developing policies and procedures for maintaining data security.
Monitor and report on devices and networks including:
Maintain, configure, secure and provide reliable operation of computers systems, network servers, and virtualization.
Network switch and firewall health
Internet traffic and usage metrics
Design and install network devices and systems (including maintaining current software versions on all network equipment) Demonstrates ability to independently troubleshoot and diagnose network, telephone, Internet, Wi-Fi, network.
Assists with work order requests:
Helps the IT Team meet service levels of quality and responsiveness:
Satisfaction goal of 90%
2-business-day response time (resolution time dependent on issue SLA)
Creates, updates and closes tickets in incident management system.
Qualifications:
• Bachelor's degree in computer science, programming, or a related field or equivalent industry experience.
• 2-4 Years of Security or Systems Analyst experience
REQUIRED NON TECHNICAL QUALIFICATIONS
• Must have the ability to work under pressure, without constant direction and to react in a positive and spontaneous manner to the needs of residents, staff, visitors, and vendors.
• Must be able to independently handle multiple simultaneous tasks, following specific instructions carefully and general instructions completely.
• Excellent communication skills
• Resourcefulness and problem-solving aptitude
• Self-starter mentality willing to make constant improvements in the technical support process.
• Takes pride and ownership of the support role.
• Excellent customer service and communication skills
• Ability to assess resident and staff complaints and resolve disputes in a friendly professional manner.
REQUIRED TECHNICAL QULAIFICATION
• Strong understanding of cybersecurity tools, concepts and best practices.
• Knowledge of information security frameworks (e.g.,HIPAA, NIST) and relevant regulations.
• Knowledge of Windows Operating Systems - Desktop (10 and 11) and Server (2016+)
• Windows desktop device configuration, management, and operation.
• IOS Device configuration, management, and operation.
• Networking Concepts and basic troubleshooting (DNS, DHCP, IP Addressing).
• Switching and Routing Concepts (basic troubleshooting and configuration).
• Meraki Network and Camera Equipment
• VOIP/PBX
• Demonstrated working in a helpdesk ticketing environment.
$47k-70k yearly est. 60d+ ago
Information Security Data and Risk Analyst
Ivanti 4.5
Remote cryptographic vulnerability analyst job
Are you an experienced Security Data and Risk Analyst that wants to develop and create awareness around security-relevant key performance and key risk indicators? At Ivanti, we work passionately and authentically, striving to win together and make a real impact for our customers and each other. Join us to elevate your career and help deliver innovative solutions in a dynamic, empowering environment.
Why this role matters
As the Security Data and Risk Analyst, you will generate enterprise visibility, awareness and understanding of major risk and security issues in a comprehensive and easily consumed manner to support the corporate objectives and especially the reduction of risk. You will be a leader in our Information Security Group which is a global team of experienced professionals dedicated to ensuring the security of Ivanti's products, corporate and production networks, environments, and of course, its data
What you'll do:
Lead the execution of multiple functions: Taking ownership of and creating awareness around security-relevant key performance and key risk indicators
Develop automation for data gathering, analysis and presentation using Python and Go
Educate as well as inform audiences of a wide variety of security and risk expertise, including building libraries of material to support understanding of benefits and costs of security management.
Generating insights and supporting information for decisions to be made including wrangling data from complex data sets and data sources
Create dynamic dashboards and presentations
Articulate risk and risk management as realistic, measurable harm; Create dynamic dashboards and presentations
Support the Security Governance and executive workstreams, including analysis and presentations materials.
Coordinate, chair and present data to management, leadership and C-suite stakeholders in their languages.
What you will bring:
Minimum of a bachelor's degree, preferably in information systems or data analytics.
4+ years' experience with Python or Go automation and scripting
2+ experience with Risk Management
1 years' experience with Risk Modeling
4+ years Data Analytics experience
Familiarity with information security and security terms
Experience conducting reporting operations such as presentations, metrics, dashboards, KPIs, KRIs, OKRs.
1 year experience executing/leading project management efforts in a technology-related arena.
Can show evidence has created effective KPIs, KRIs and OKRs and a means to measure and report each.
Experience with cloud, onprem, corporate, remote, solutions/products dev and transformative environments.
Ability to articulate themes from: NIST, ISO, SOC 2, FedRAMP, GDPR and DORA, and Security, Privacy principles.
Preferred knowledge or certification in 1 or more of the following: CISSP, CISA/CISM, or CRISC or PMP
Why Ivanti?
Friendly flexible working model: Empower excellence whether you're at home or in the office and support work-life balance.
Competitive compensation & total rewards: Including health, wellness, and financial plans tailored for you and your family.
Global, diverse teams: Collaborate with talented people from 23+ countries.
Learning & development: Grow your skills with access to best-in-class learning tools and programs.
Equity & belonging: We value every voice. Your story helps inform our solutions for a changing world.
What drives us
Ivanti's mission is to elevate human potential within organizations by managing, protecting and automating technology for continuous innovation.
It is through diverse and inclusive hiring, decision-making, and commitment to our employees and partners that we will continue to build and deliver world-class solutions for our customers.
To learn more about Ivanti's
Mission and Core Values.
Inclusion at Ivanti
Ivanti is proud to be an Equal Opportunity Employer. We're committed to building a diverse team and fostering an inclusive environment where everyone belongs. We welcome applicants from all backgrounds and walks of life.
Need adjustments during the process? Reach out to ***************** we're happy to help.
#LI-Remote
$84k-119k yearly est. Auto-Apply 1d ago
Learn more about cryptographic vulnerability analyst jobs