Post job

Cyber security analyst jobs in Apex, NC

- 84 jobs
All
Cyber Security Analyst
Security Engineer
Information Security Engineer
Cyber Security Engineer
Network Security Analyst
Senior Security Analyst
Securities Analyst
Information Security Analyst
Information Systems Security Officer
  • Security Engineer

    Millennia 4.1company rating

    Cyber security analyst job in Cary, NC

    We are seeking a skilled Security Engineer with strong Networking and Compliance experience to join our team in Millennia. This position is required to reside in the vicinity of our Durham, NC Data Center. In this role, you will be crucial in maintaining the integrity and security of our network systems, ensuring privacy and security controls within processes, assets, and data flow within our healthcare-focused environment Responsibilities: · Maintain and manage all processes systems supporting Millennia's security posture. · Monitor, manage, and implement security infrastructure to support organizational needs · Monitor logs and alerts to identify incidents. Perform and or document Root Cause Analysis and remediation on Security Incidents. · Monitor network performance and troubleshoot issues and Security Incidents. · Plan, manage, and execute system upgrades and weekly patches to all endpoints. · Develop and enforce security policies to protect sensitive patient data. · Conduct regular system audits and vulnerability assessments. · Provide technical support for network-related issues to staff and clients. · Maintain documentation of network configurations and procedures. · Stay updated on industry trends and emerging technologies · Collaborate with IT teams to integrate new technologies into existing systems. · Provide hand-on support to our offices and data center. Qualifications: · Strong knowledge of network and security administration, controls, protocols, and best practices. · Experience with SOC2 or HITRUST, and HIPAA Security and Privacy Rule. · Proven experience as a Network Administrator or similar role. · Proficiency in configuring firewalls, routers, and switches, encryption protocols, and certificates. · Familiarity with cybersecurity principles and incident response strategies. · Excellent problem-solving skills and attention to detail. · Exceptional communication skills and ability to work independently and collaboratively in a team-oriented environment. · Experience with cloud computing platforms (AWS, Azure) is a plus. Relevant certifications (e.g., CCNA, CompTIA Security+) are preferred
    $90k-117k yearly est. 4d ago
  • Network Security Analyst

    Collabera 4.5company rating

    Cyber security analyst job in Durham, NC

    Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace. With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including. Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here) Collabera listed in GS 100 - recognized for excellence and maturity Collabera named among the Top 500 Diversity Owned Businesses Collabera listed in GS 100 & ranked among top 10 service providers Collabera was ranked: 32 in the Top 100 Large Businesses in the U.S 18 in Top 500 Diversity Owned Businesses in the U.S 3 in the Top 100 Diversity Owned Businesses in New Jersey 3 in the Top 100 Privately-held Businesses in New Jersey 66th on FinTech 100 35th among top private companies in New Jersey *********************************************** Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance. Job Description Work Location: Durham NC 27703 Job Title: Network Security Analyst Duration: 24 Months Roles & Responsibilities: • Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis. • Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired. • The Operations team supports 24x7 and an off shift work schedule may be required. Qualifications IDS/IPS "Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer" Additional Information Should you have any questions, please feel free to call: ************ Aditika Sithta
    $75k-101k yearly est. 8h ago
  • Senior Cyber Security Engineer

    Local Government Federal Credit Union 4.2company rating

    Cyber security analyst job in Raleigh, NC

    CIVIC CULTURE Our organization believes we can all do well by doing good. We value the contributions of diverse minds and prioritize the success and well-being of our employees. We also believe every person in our organization plays a role in supporting a healthy environment and helping to achieve our goal of prosperity for all. To this end, we recruit bright, energetic, and talented people to be members of our team. In return, we offer a dynamic workplace that presents opportunities for professional advancement and individual growth. We strive to always display integrity, self-awareness, courage, and respect for one another while continuing to seek opportunities to learn. We really believe that when our employees succeed, our community wins. ABOUT THE POSITION The individual who excels in this position will have demonstrated experience in multiple information security technologies, including, but not limited to: SIEM, SOAR, email security, vulnerability management, network, and endpoint security controls. The individual will also play a key role in deployment, troubleshooting, testing, risk rating, and maintaining cyber security tools, platforms, and programs within the credit union. The successful candidate will display a passion for developing new skills in the field of information security. The Senior Cyber Security Engineer will actively participate in incident response, security program and control implementation, administration, automation, and documentation. The individual will assist internal teams as well as external service providers on technical projects. NORMAL DAY-TO-DAY WORK Research, engineer, design, and implement security solutions to enhance the management of cyber security risks within the credit union. Support the day-to-day maintenance of all cyber security applications, including administration, deployment, troubleshooting and maintaining all cyber security tools. Create and maintain playbooks, standards, automation, processes, and procedures around security disciplines with a focus on administration of platforms. Identify, design and complete regular security audits related to administrative access and activities for security platforms as well as perform regular security audits as required. Research, recommend, implement changes and additions to security controls and business application solutions. Identify and track metrics related to performance and improvements to related cyber security tools. Develop, respond to and investigate alerts related to misuse of credit union technology. Create and edit scripts for integration and analysis of all cyber security controls for coverage and effectiveness. Serve as a backup for incident response, ensuring readiness to take immediate action in the event of security breaches or system incidents, providing support in containment, analysis, and remediation efforts. Stay informed of tools, techniques and components utilized in the industry through research and apply this knowledge to system(s) being secured. Work with end-users to identify and mitigate security threats. Understand and support team, department, applicable credit union regulations (NCUA), policies and procedures, strategic goals, and vision. Take ownership for actions, decisions, and results; openly accept feedback and demonstrate both the willingness and ability to improve. JOB QUALIFICATIONS Here are a few skills you MUST have to be qualified for this position. Minimum 7 - 9 years' experience in an information security, systems administration or IT engineering role. Solid experience and understanding of incident response, vulnerability management, security engineering, security automation, risk rating, network security, threat intelligence and systems administration concepts. Experience tuning rules that identify anomalous and/or suspicious behavior within SIEM, IDS/IPS, and similar platforms. Ability to work flexible hours and weekends as needed, as well as participate in a 24/7 rotation schedule. Ability to function in a Consumer business office environment and utilize standard office equipment including but not limited to: PC, copier, telephone, etc. Ability to lift a minimum of 25 lbs. (file boxes, computer). Travel required on occasion. Here are a few qualities we'd LIKE for you to have to make you more suited for this position. BA/BS in Information Technology, Information Security, Information Assurance or equivalent experience. Experience managing Active Directory, and ADFS. Experience with regular expressions and scripting (PowerShell, python, bash, etc.). Familiarity with network and systems administration and operations concepts. Comfortable with multiple operating systems, including Windows, mac OS, and Linux. Certifications in one or more Information Security Domains or on security platforms (Security+, GSEC, CISSP, GCIH, GCED, GDSA, etc.).
    $92k-117k yearly est. 15d ago
  • Cyber Security Engineer (Splunk)

    ZP Group 4.0company rating

    Cyber security analyst job in Raleigh, NC

    Piper Companies is seeking a Cyber Security Engineer (Splunk) for a world leading technology firm in the Raleigh, NC area. The Cyber Security Engineer (Splunk) will join a world class security organization with a highly skilled team responsible for designing, developing, and managing the security services within the organization. An ideal candidate for the Cyber Security Engineer (Splunk) will be action oriented and a strong problem solver. Responsibilities for the Cyber Security Engineer (Splunk) include: * Manage multiple SPLUNK environments and create SPLUNK queries and dashboards as needed * Perform penetration testing, vulnerability scanning, IR, and network security configurations * Research, analyze, and help make decisions on new security tools and technologies * Develop tools and automation utilizing python scripts Requirements for the Senior Cyber Security Engineer (Splunk) include: * Active Secret Security Clearance * Over 5 years of cyber security engineering experience * Experience with Splunk - configuration, management, and querying skills * Prior experience migrating Splunk on prem to Splunk cloud * Experience in penetration testing, vulnerability scanning, IR, and overall network security * Python scripting experience * Strong verbal and written communication skills Compensation of the Senior Cyber Security Engineer (Splunk) includes: * $115,000 - $140,000 annually with a full comprehensive benefits including Medical, Dental, Vision, 401K, PTO, Sick Leave as required by law * Must be eligible to work in the United States This job opens for applications on July 30, 2025. Applications for this job will be accepted for at least 30 days from the posting date. Keywords: Splunk, Security Engineer #LI-JA1 #LI-HYBRID
    $81k-110k yearly est. 60d+ ago
  • Detection & Response Security Engineer, Threat Intelligence

    Meta 4.8company rating

    Cyber security analyst job in Raleigh, NC

    Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements. **Required Skills:** Detection & Response Security Engineer, Threat Intelligence Responsibilities: 1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects 2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work 3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services 4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions 5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network 6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences 7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations 8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems **Minimum Qualifications:** Minimum Qualifications: 9. 8+ years threat intelligence experience 10. B.S. or M.S. in Computer Science or related field, or equivalent experience 11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services 12. Experience developing and delivering information on threats, incidents and program status for leadership 13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures 14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework 15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks 16. Proven track record of managing and executing on short term and long term projects 17. Ability to work with a team spanning multiple locations/time zones 18. Ability to prioritize and execute tasks with minimal direction or oversight 19. Ability to think critically and qualify assessments with solid communications skills 20. Coding or scripting experience in one or more scripting languages such as Python or PHP **Preferred Qualifications:** Preferred Qualifications: 21. Experience recruiting, building, and leading technical teams, including performance management 22. Experience close collaborating with incident responders on incident investigations 23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems 24. Familiarity with malware analysis or network traffic analysis 25. Familiarity with nation-state, sophisticated criminal, or supply chain threats 26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort 27. Experience in one or more query languages such as SQL 28. Experience authoring production code for threat intelligence tooling 29. Experience conducting large scale data analysis 30. Experience working across the broader security community **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 48d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Raleigh, NC

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 27d ago
  • Information Security Analyst

    GDIT

    Cyber security analyst job in Liberty, NC

    Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret/SCI Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Cybersecurity, Information Security, System Security Certifications: None Experience: 3 + years of related experience US Citizenship Required: Yes : Job Description Transform technology into opportunity as an Information Security Analyst with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate. At GDIT, people are our differentiator. As an Information Security Analyst, you will help ensure today is safe and tomorrow is smarter. Our work depends on TS/SCI cleared Information Security Analysts joining our team to support our intelligence customer at Fort Liberty, NC. HOW AN INFORMATION SECURITY ANALYST WILL MAKE AN IMPACT The Information Assurance Analyst is primarily responsible for incident handling, incident response, intrusion analysis, threat hunting, digital forensic analysis, vulnerability scanning, Data Loss Prevention (DLP). Tracks and handles cyber security incidents/events from initial detection to final resolution; coordinates with appropriate parties to investigate and maintain communications. Collaborates with specialty teams to investigate and resolve complex problems. Troubleshoots security tools on the network to ensure successful operation, compatibility with other applications, and minimal impact to the users. Ensures ACAS vulnerability scanning mechanisms are operational and providing relevant results to the vulnerability management and admin teams. Performs Information Systems Security Officer (ISSO) duties, and acts as the POC between parent organization and cyber security teams. Conducts change requests, software authorizations, static code analysis, account reviews, and other Assessment & Authorization (A&A) tasks as required. Acts as a central point of contact for all inquiries potentially regarding cyber security, and if necessary, redirects to the appropriate entities. WHAT YOU'LL NEED TO SUCCEED EDUCATION Associate Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. 8570 Certification REQUIRED EXPERIENCE: 3+ years of related experience in data security administration. REQUIRED TECHNICAL SKILLS: Minimum IAT II: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, SSCP Within 6 months of hire - CSSP Incident Responder (IR): CEH, CFR, CCNA Cyber Ops, CCNA-Security, CHFI, CySA+, GCFA, GCIH, SCYBER Preferred certifications: GCIH, GCFA, GCIA, GNFA, Linux+, CCNA R&S, Splunk Power User SECURITY CLEARANCE: TS/SCI (Required) REQUIRED SKILLS AND ABILITIES: Proficient at navigating Windows 10/Server 2012/Server 2016 operating systems to perform intrusion analysis and systems maintenance Proficient at navigating Linux: Ubuntu/RHEL 6/7/8 to facilitate cyber security engineering and systems maintenance Basic scripting skills using Windows command-line, PowerShell, or BASH Understanding of network ports, protocols, and services Intrusion analysis via HBSS, Splunk or other SIEM tools, Windows Event Logging, Open Source Intelligence (OSINT) sources Incident investigations via McAfee HBSS suite, SolarWinds, Cisco ISE, Cylance, Splunk, Phantom, StealthWatch, WireShark, ForeScout, ACAS, PowerShell, command-line tools Build and maintain ACAS infrastructure; analyze vulnerability scan results and provide recommendations for remediation PREFERRED SKILLS: Strong desire to learn new skills, techniques, tactics, and procedures to improve knowledge and existing processes Must be able to multi-task and adapt to changing priorities in highly stressful situations Highly resilient and motivated to investigate unfamiliar and anomalous problems in a robust OPTEMPO environment, including follow-through to complete resolution Critical thinking skills required to apply and correlate data from multiple sources to solve complex problems Strong ability to quickly and clearly articulate operational impacts of cyber security incidents/events to leadership Ability to communicate efficiently and precisely to target audience, as well as build strong rapport with other teams Location: On Company Site Citizenship Required US citizenship GDIT IS YOUR PLACE: ● 401K with company match ● Comprehensive health and wellness packages ● Internal mobility team dedicated to helping you own your career ● Professional growth opportunities including paid education and certifications ● Cutting-edge technology you can learn from ● Rest and recharge with paid vacation and holidays The likely salary range for this position is $76,500 - $103,500. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: 25-50% Telecommuting Options: Onsite Work Location: USA NC Fort Liberty Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $76.5k-103.5k yearly Auto-Apply 8d ago
  • Sr. Security Analyst

    Procom Consultants Group 4.2company rating

    Cyber security analyst job in Durham, NC

    Procom is a leading provider of professional IT services and staffing to businesses and governments in Canada. With revenues over $500 million, the Branham Group has recognized Procom as the 3rd largest professional services firm in Canada and is now the largest “Canadian-Owned” IT staffing/consulting company. Procom's areas of staffing expertise include: • Application Development • Project Management • Quality Assurance • Business/Systems Analysis • Datawarehouse & Business Intelligence • Infrastructure & Network Services • Risk Management & Compliance • Business Continuity & Disaster Recovery • Security & Privacy Specialties• Contract Staffing (Staff Augmentation) • Permanent Placement (Staff Augmentation) • ICAP (Contractor Payroll) • Flextrack (Vendor Management System) Job Description Sr. Security Analyst On behalf of our client, Procom Services is searching for a Sr. Security Analyst for a contract opportunity in Durham, NC. Sr. Security Analyst Job Details Responsible for user account administration in a multi-platform environment and ensure that administration procedures are aligned with overall Information Security policies and standards. Assist in the development of access controls to safeguard customer systems against accidental or unauthorized modification, destruction or disclosure. Maintain user access to securable customer system resources (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) performing tasks such as: creation / configuration of user logon Ids and updating access control lists, access provisioning and access removals and access terminations. Perform detailed analysis of access requests/processes and provide recommendations for improvement to senior team members and Information Security management. Educate information / resource owners in the implementation of necessary information security controls. Perform standard and non-standard processing of security authorization requests. Work with resource owners to determine appropriate security policies for securable customer resources. Provide on-call support for after-hours system access issues and troubleshoot system access problems and failures. Report suspected information security misuse to manager or director. Assist resource owners and IT staff in understanding and responding to security access exceptions. Sr. Security Analyst Mandatory Skills - Bachelor's degree in Computer Science. - 2 years of security administration experience, or related technical system administration experience. - In lieu of degree 5 years of security administration experience. - Familiarity with audit and risk-related methodologies; such as COBIT and HIPAA. - Systems administration experience within other aspects of IT - Demonstrated security administration experience on two or more platforms (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) - Demonstrated experience working with a managed services organization. - Demonstrated experience working with a request ticketing system, such as Triole. - Strong analytical and problem-solving skills. - Ability to present and discuss technical information to users with varying technical expertise. - Proven ability to work under stress in emergencies. Flexibility to handle pressure from many directions simultaneously. - Must be detail-oriented with a high level of accuracy. - Excellent written and verbal communication skills. - Demonstrated ability to develop and maintain collaborative working relationships across multiple teams. - Strong customer focus and the ability to manage customer expectations. - Must have strong team-oriented interpersonal skills and the ability to effectively interface with a wide variety of people. - Demonstrated commitment to continuous process improvement. - CISSP, CISA, or other security / audit / field related certifications a plus Sr. Security Analyst Start Date ASAP Sr. Security Analyst Assignment Length 7+ months Additional Information All your information will be kept confidential according to EEO guidelines. Please send your resume in Word format only.
    $75k-95k yearly est. 8h ago
  • Lead Information Security Architect / Engineer

    Pathwayrp

    Cyber security analyst job in Durham, NC

    EmTacq specializes in EMployer Talent ACQuisitions, matching the most qualified candidates with the most competitive positions available. We pride ourselves on not just putting bodies in seats, rather matching professionals to their careers. We are headquartered in the Raleigh / Durham, NC area. However, as a recruiting agency we service companies and candidates across the United States. We are your best source for professional, value driven low cost recruitment services. Job Description The Lead Information Security Engineer will be responsible for designing and implementing a process to analyze the design of technology solutions for threats, attacks, and vulnerabilities that could affect the control environment. Must be a subject matter expert (SME) with strong collaboration skills to work with cross functional teams to ensure the design of technology solutions complies with information security policies, and regulatory obligations. The Lead Information Security Engineer must have the ability to identify, document, and recommend security safeguards and configurations in a highly complex environment with a demonstrated ability to recognize, and appropriately incorporate layered security safeguards within the network, application, and data layers from a defender's perspective. In this role you must be a positive professional, adaptable, pragmatic, and who is comfortable in delivering clear and concise information at both a technical and managerial level. Responsibilities: Design and implement a process to analyze the design of technology solutions for threats, attacks, and vulnerabilities that could affect the client's control environment. Review and approve security configuration checklists (e.g., hardening or lockdown guides) for technology platforms and solutions (e.g., operating systems, databases, firewalls, etc.) Provide security consulting services internally to the engineering organization by giving guidance and functioning as an information security SME. Must have the ability to identify, document, and recommend security safeguards and configurations in a highly complex environment with a demonstrated ability to recognize, and appropriately incorporate layered security safeguards within the network, application, and data layers from a defender's perspective. Qualifications Required Experience *5+ years of experience in one or more of the following information security domains: access management, cryptography, data loss prevention (DLP), emerging technologies (i.e., cloud, mobile, etc.), endpoint security, incident response, malware analysis and protection, network and perimeter security, or web and mobile application security. *5+ years of experience analyzing the design of technology solutions using common industry frameworks such as DREAD, SSE-CMM (ISO/IEC 21827), STRIDE, or other risk assessment models. *5+ years of working knowledge of various industry security standards and frameworks including: ISO 27001, ISF Standard of Good Practice (SoGP), NIST Special Publications, etc. *5+ years of working knowledge of modern enterprise and security architectures, their challenges, common approaches to overcome their challenges, and their inherent security strengths and weaknesses. *Teamwork and communication skills, both written and verbal. Preferred Experience *Bachelor's degree in Computer Science, Information Systems, or related field. 8+ years of equivalent work experience required in lieu of degree is acceptable. *Professional certifications such as: CISSP, CISA, CISM, GIAC, CGEIT, CRISC, CEH, or other relevant industry certification strongly preferred. Additional Information Equal Employment Opportunity Our client is proud to be an equal opportunity/affirmative action employer. We are committed to attracting, retaining and maximizing the performance of a diverse and inclusive workforce. It is their policy to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, creed, religion, national origin, alienage or citizenship status, age, sex, sexual orientation, gender identity or expression, marital or domestic/civil partnership status, disability, veteran status, genetic information or any other basis protected by law.
    $77k-104k yearly est. 8h ago
  • Junior Security Analyst - 3rd Shift

    Varonis 4.2company rating

    Cyber security analyst job in Morrisville, NC

    Description Junior Security Analyst- 3rd Shift The Company: Varonis (Nasdaq: VRNS) is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. Thousands of organizations worldwide trust Varonis to defend their data wherever it lives - across SaaS, IaaS, and hybrid cloud environments. Customers use Varonis to automate a wide range of security outcomes, including data security posture management (DSPM), data classification, data access governance (DAG), data detection and response (DDR), data loss prevention (DLP), and insider risk management. Varonis protects data first, not last. Learn more at **************** The Role: We are seeking a driven MDDR Security Analyst to join the forefront of our data security mission- working 24x7 to monitor, triage, investigate, and escalate incidents where data is at risk and to ensure we meet operational SLAs. Data is the #1 target of attackers, and Varonis' Managed Data Detection and Response (MDDR) customers entrust our team with the security of their data. They will develop a deep understanding of the Varonis platform and related technologies. This role demands knowledge of security ecosystems (ex. SIEM, SOAR, ITSM, EDR, IPS/IDS, Active Directory, DNS, IAM/PAM, etc.) and enterprise security operations. The Location: We are considering candidates who are located within physical proximity to Raleigh, North Carolina. The Requirements: 1-3 years of experience in cybersecurity Degree or certification(s) in cybersecurity and/or proven ability to execute across cyber security operations disciplines, including monitoring, detection, investigation, and incident response. Proven success in contributing to a team-oriented environment. Strong analytical and creative problem-solving skills. Excellent communication skills (written and oral) and interpersonal skills (colleagues and customers). Attention to detail and the capability to deliver outcomes autonomously. Knowledge of common security technologies and tools including network-based (firewall and IDS), host-based (EDR and AV), data-based (DLP and DSPM), and identity-based (PAM and IAM), gained through experience or study. Knowledge of operational information security disciplines including alert monitoring, threat detection, incident response, security infrastructure management, and system and architecture hardening, gained through experience or study. Demonstrated ability to learn new skills and technologies swiftly. Proficiency in critical thinking and problem-solving for complex issues. The Responsibilities: Monitor and respond to detections within the Varonis platform. Conduct thorough triage of Varonis detections through critical analysis and investigative methodologies. Validate findings and coordinate investigative and response efforts with customers and internal teams. Document and communicate investigative findings effectively, including tracking in CRM and related systems. Assist in the development, documentation, analysis, testing, and modification of Varonis' threat detection systems, playbooks, and runbooks. Logistics: Shifted Schedule: Sunday to Wednesday, or Wednesday to Saturday. 12-hour shifts with one 1-hour break and two 30-minute breaks. Night shift (9pm to 9am EST). 6 weeks of dedicated new hire training. MDDR Security Analysts are expected to complete Sec+ and CySA+ training within their first year. Work visa sponsorship is not available. We invite you to check out our Instagram Page to gain further insight into the Varonis culture! @VaronisLife Varonis is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, and other legally protected characteristics
    $82k-107k yearly est. Auto-Apply 49d ago
  • Information Systems Security Officer

    Mag 4.6company rating

    Cyber security analyst job in Fayetteville, NC

    MAG is currently looking for an Information Systems Security Officer (ISSO) to provide a variety of services leveraging the Risk Management Framework (RMF) accreditation. Services are associated with validation, approval, and sustainment of cybersecurity accreditation packages. In this role, you will performs and analyze a range of ISSO activities and assist with the development and implementation of security policies. This position is located in Ft. Bragg, NC, supporting the Special Operations community. **Essential Duties and Responsibilities** **Duties include, but** **are not** **limited to** **:** + Gather and translate customer requirements, interact with stakeholders from many areas, and lead efforts to ensure customer products and recommendations will meet customer information security policies in an ever-changing technical environment + Categorize the IT and the information processed, store, and transmitted by the system based on an impact analysis due to a loss of Confidentiality, Integrity, and Availability (CIA) impacts + Select an initial set of baseline security controls for the Information System (IS) based on the security categorization; overlay tailoring and supplementing the security control baseline as needed based on an organizational assessment of risk and local conditions + Assess the security control using the appropriate methods and procedures to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome + Authorize the IS based on the determination of the risk to the organizational operations, organizational assets, or to individuals resulting from the operation of the IS and the decision that this risk is acceptable + Monitor the security of the IS on a continuous basis including assessing control effectiveness, documenting changes to the system, conducting security impact analyses of the associated changes, and reporting the security status of the system to appropriate organizational officials on a regular basis + Review, prepare and update RMF authorization packages + Conduct assessments of information security controls to measure the effectiveness of controls and identify any gaps + Manage remediation efforts and report on the status of control deficiencies + Provide security expertise to business units and key stakeholders + Provide timely status updates/reporting on assessments and assigned projects **Requirements** **Minimum Requirements** **Knowledge and Skills** + In compliance with DoD Cyber Workforce 8570.01 + Experience in Information Assurance / Cybersecurity, including development, integration, and implementation of cybersecurity and program protection standards for networking, computers, and custom applications + Thorough knowledge of the Department of Defense 8510.01 Risk Management Framework (RMF) for DoD Information Technology, DoD Instruction 8500.1 Cybersecurity, DoD Directive 8140.01, Cyberspace Workforce Management, NIST 800 Special Publications, Federal Information Processing Standards (FIPS), and knowledge of current authorization practices, particularly within the DoD + Experience in creating and maintaining the security configuration baselines for Windows and Linux platforms, networking equipment, cloud technologies, and custom applications (i.e., Minimum Benchmarks: CIS, STIGS) + Familiar with DIA assessments and accreditation documentation within the XACTA management platform + Familiar with eMASS - USSOCOM ENTERPRISE MISSION ASSURANCE SUPPORT SERVICES platform + Provide subject matter expertise, advice and assistance in the planning, implementation, and accreditation of technology and solutions + Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Management Level( **IAM Level II** ). IAT Level II is also considered. **Experience** + 5+ years **Education** + BS in Computer Science or Information Technology (or equivalent experience) **Desired Requirements** + Ability to read, review, and consolidate ACAS scans, DISA STIGS, and Websense results + Excellent interpersonal skills, including the ability to work on multi-functional teams + Display detailed knowledge and understanding of multiple technology infrastructures + Ability to serve as a principal advisor on all matters, technical and otherwise, involving the security of an IS + Exhibit individual initiative to influence events and achieve goals. Be proactive and a self-starter, going beyond specific job responsibilities to ensure goals and achieved or exceeded + Travel as necessary for customer projects, technology expositions, and corporate meetings **Other Qualifications** + US Citizenship and Possess an Active TS/SCI Clearance + Physical requirements for the job include the ability to work in an office and lab environment **Special Note** The position is contingent upon candidate's ability to meet physical and medical requirements as needed by the position; including compliance with all applicable federal, state, and local jurisdictional requirements. Government or customer site-specific requirements may include, but are not limited to, proof of full COVID-19 vaccination status, except in circumstances where a candidate is legally entitled to an accommodation. **Company Policy** MAG Aerospace (MAG) is an Equal Opportunity/Affirmative Action Employer and is committed to Diversity and Inclusion. We encourage diverse candidates to apply to our positions. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Click below for the "Know Your Rights" and "Pay Transparency Nondiscrimination" supplement posters. ****************************************** MAG Aerospace (MAG) is committed to providing an online application process that is accessible to all, including individuals with a disability, by offering an alternative way to apply for job openings. This alternative method is available for those who cannot otherwise complete the online application due to a disability or need for accommodation. MAG provides reasonable accommodation to applicants under the guidance of the Americans with Disabilities Act (ADA), Section 503 of the Rehabilitation Act of 1973, the Vietnam-Era Veterans' Readjustment Assistance Act of 1974, and certain state and/or local laws. If you need assistance due to a disability, please contact the MAG Aerospace Recruiting email: *********************** or call **************. **Need help finding the right job?** We can recommend jobs specifically for you! **Job Locations** _NC-Ft. Bragg_ **ID** _2025-7982_ **Work Region** _CONUS_ **Category** _Information Technology_ **Type** _Regular Full-Time_ **Clearance** _Top Secret/SCI_
    $62k-82k yearly est. 8d ago
  • Security Engineer - Threat Defense

    Insight Global

    Cyber security analyst job in Cary, NC

    Network Engineering support monitoring operations and response to cybersecurity, email threats. Use expertise in information security, SIEM, and cyber detection development to enhance client security posture. Build cybersecurity threat detections in Splunk. Modify existing detections to reduce false positives and improve accuracy. Drive initiatives with IT, Application, InfoSec teams to continuously improve security visibility. Participate in sprint planning and backlog management for continuous development. Maintain accurate and up-to-date documentation, workflows, and processes. We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: **************************************************** Skills and Requirements 5+ years of experience as a network engineer Detection Engineer, Security Engineer, or Threat Intelligence Analyst or adjacent IT field. Demonstrated ability to build and interpret Splunk Processing Language (SPL). Understanding of Incident Response frameworks and root cause analysis. Worked with enterprise customers directly for support and troubleshooting Bachelor's degree in computer science, information security, or related field or equivalent work experience. Mimecast or Proofpoint
    $80k-111k yearly est. 4d ago
  • Information Security Engineer

    First Horizon Bank 3.9company rating

    Cyber security analyst job in Raleigh, NC

    not eligible for sponsorship** **Locations: Onsite in Memphis, TN; Maryville, TN; Birmingham, AL; Lafayette, LA; New Orleans, LA; Charlotte, NC; Raleigh, NC; or Dallas, TX.** The Cyber Security Engineer - Threat Management is a mid-level Cyber Security Engineer responsible for second level security event/incident response along with the collection, analysis, and dissemination of cyber threat intelligence. These capabilities will include timely collection of advanced warning of impeding IT vulnerabilities or threats, a thorough correlation, analysis, and storage of threat intelligence information, and operational support of the incident response process. The candidate They will deliver and sustain the enterprise management strategy and solutions from a governance, process, discipline and technology standpoint, to support enterprise environments and our presence in various cloud instances and on-premises data centers covering threats / FIM / configuration management / incident response / vulnerability management. Secondary roles include IPS, EDR, TIP tools, and other information security solutions. Essential Functions of the Job: + Responding to SOC alerts performing an analysis, and containment of security events. + Provide tier II support for escalated security incidents. + Support the Cyber Incident Response Team (CIRT) in the effective detection, analysis, and containment of attacks. + Operate the configuration management program to track configuration drift over time, working with asset custodians to correct any configuration deviation from baseline. + Operate the File Integrity Management program to track changes to file systems on critical systems. + Operate the processes necessary to collect threat intelligence, analyze the data for patterns and actionable information, and create intelligence products for other teams to consume using MITRE ATT&CK Framework. + Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents. + Integrate appropriate systems and logs into the global threat management platform or Security Event and Incident Management system to properly protect critical assets. + Design, test and develop specific content and alerting to identify threats against critical assets. + Document incident response playbooks for new threat content and alerts. + Maintain an understanding of attacks, vectors and emergent threats. + Obtain and share cyber security intelligence with security partners, vendors and law enforcement as necessary. + Produce weekly and monthly operational metrics. + Work with vendors and internal customers to respond to escalations. + Recommends Preventative Security Actions. + Recommends Corrective Security Actions. + Comprehension of basic banking systems. **Job Requirements:** + High School Graduate or Equivalent. + Bachelor's Degree Preferred but not required in Computer Engineering/Computer Science or related field. + CISSP, GSEC, GCIH, CEH or other security certifications preferred, but not required. + Three year minimum working in cyber threat or information security. **Knowledge and Skills Requirements:** + Familiar with compliance regulations such as SOX, PCI-DSS, GLBA, and Federal Banking regulations. + Proficient with cloud security and monitoring capabilities in Azure + Proficient with Incident Response in Azure + Proficient with configuration management scanning tools. + Knowledgeable with Tripwire or other file integrity management tools. + Excellent team skills and integrity in a professional environment. + Ability to Map threats and vulnerabilities to MITRE. **About Us** First Horizon Corporation is a leading regional financial services company, dedicated to helping our clients, communities and associates unlock their full potential with capital and counsel. Headquartered in Memphis, TN, the banking subsidiary First Horizon Bank operates in 12 states across the southern U.S. The Company and its subsidiaries offer commercial, private banking, consumer, small business, wealth and trust management, retail brokerage, capital markets, fixed income, and mortgage banking services. First Horizon has been recognized as one of the nation's best employers by Fortune and Forbes magazines and a Top 10 Most Reputable U.S. Bank. More information is available at ******************** (https://urldefense.com/v3/\_\_https:/********************/\_\_;!!Cz2fjcuE!hpq9hPnrucZCPIAVPojVESItIq-FPzhurNdCrQ3JE8Rkx3gMd70nIk6\_kmPxl66\_oJCEsXs0gNunPowMAMHCmBYPOtUxUGI$) . **Benefit Highlights** - Medical with wellness incentives, dental, and vision - HSA with company match - Maternity and parental leave - Tuition reimbursement - Mentor program - 401(k) with 6% match - More -- FirstHorizon.com/First-Horizon-National-Corporation/Careers/Our-Benefits **Follow Us** Facebook (****************************************** X formerly Twitter LinkedIn (*************************************************** Instagram YouTube (********************************************************** Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights (**************************** notice from the Department of Labor.
    $80k-100k yearly est. 60d+ ago
  • Network Security Analyst

    Collabera 4.5company rating

    Cyber security analyst job in Durham, NC

    Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace. With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including. Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here) Collabera listed in GS 100 - recognized for excellence and maturity Collabera named among the Top 500 Diversity Owned Businesses Collabera listed in GS 100 & ranked among top 10 service providers Collabera was ranked: 32 in the Top 100 Large Businesses in the U.S 18 in Top 500 Diversity Owned Businesses in the U.S 3 in the Top 100 Diversity Owned Businesses in New Jersey 3 in the Top 100 Privately-held Businesses in New Jersey 66th on FinTech 100 35th among top private companies in New Jersey *********************************************** Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance. Job Description Work Location: Durham NC 27703 Job Title: Network Security Analyst Duration: 24 Months Roles & Responsibilities: • Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis. • Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired. • The Operations team supports 24x7 and an off shift work schedule may be required. Qualifications IDS/IPS "Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer" Additional Information Should you have any questions, please feel free to call: ************ Aditika Sithta
    $75k-101k yearly est. 60d+ ago
  • Security Engineer

    Meta 4.8company rating

    Cyber security analyst job in Raleigh, NC

    Meta Platforms, Inc. (Meta), formerly known as Facebook Inc., builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps and services like Messenger, Instagram, and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology. To apply, click "Apply to Job" online on this web page. **Required Skills:** Security Engineer Responsibilities: 1. Build tools that enable connectivity to our infrastructure only from Meta owned and managed devices. 2. Build machine attestation and secure certificate storage solutions to enable strong client trust. 3. Deploy systems that help mitigate security risks by understanding and controlling what software is allowed to execute on our client devices. 4. Develop, validate, and enforce our client security policies. 5. Build and deploy tools and automation that proactively detect and respond to security risks and threats to internal corporate services. 6. Advise and collaborate with other teams. 7. Telecommuting from anywhere in the U.S. allowed. **Minimum Qualifications:** Minimum Qualifications: 8. Requires Bachelor's Degree (or foreign equivalent) in Computer Science, Engineering or a related field and 1 year of experience in the job offered or a computer-related occupation 9. Requires 12 months of experience involving the following: 10. PHP, Golang, Python, C/C++, Rush, or Ruby 11. Designing and deploying security infrastructure such as PKI, key management, and certificate management 12. Endpoint Security & Management 13. Certificate Lifecycle 14. Devices & OS hardening and security policies 15. Identity & Access Management (Authentication & Authorization, SSO) 16. Network Security and 17. Programming and Code Review **Public Compensation:** $178,041/year to $200,200/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $178k-200.2k yearly 33d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Raleigh, NC

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 27d ago
  • Sr. Security Analyst

    Procom Consultants Group 4.2company rating

    Cyber security analyst job in Durham, NC

    Procom is a leading provider of professional IT services and staffing to businesses and governments in Canada. With revenues over $500 million, the Branham Group has recognized Procom as the 3rd largest professional services firm in Canada and is now the largest “Canadian-Owned” IT staffing/consulting company. Procom's areas of staffing expertise include: • Application Development • Project Management • Quality Assurance • Business/Systems Analysis • Datawarehouse & Business Intelligence • Infrastructure & Network Services • Risk Management & Compliance • Business Continuity & Disaster Recovery • Security & Privacy Specialties• Contract Staffing (Staff Augmentation) • Permanent Placement (Staff Augmentation) • ICAP (Contractor Payroll) • Flextrack (Vendor Management System) Job Description Sr. Security Analyst On behalf of our client, Procom Services is searching for a Sr. Security Analyst for a contract opportunity in Durham, NC. Sr. Security Analyst Job Details Responsible for user account administration in a multi-platform environment and ensure that administration procedures are aligned with overall Information Security policies and standards. Assist in the development of access controls to safeguard customer systems against accidental or unauthorized modification, destruction or disclosure. Maintain user access to securable customer system resources (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) performing tasks such as: creation / configuration of user logon Ids and updating access control lists, access provisioning and access removals and access terminations. Perform detailed analysis of access requests/processes and provide recommendations for improvement to senior team members and Information Security management. Educate information / resource owners in the implementation of necessary information security controls. Perform standard and non-standard processing of security authorization requests. Work with resource owners to determine appropriate security policies for securable customer resources. Provide on-call support for after-hours system access issues and troubleshoot system access problems and failures. Report suspected information security misuse to manager or director. Assist resource owners and IT staff in understanding and responding to security access exceptions. Sr. Security Analyst Mandatory Skills - Bachelor's degree in Computer Science. - 2 years of security administration experience, or related technical system administration experience. - In lieu of degree 5 years of security administration experience. - Familiarity with audit and risk-related methodologies; such as COBIT and HIPAA. - Systems administration experience within other aspects of IT - Demonstrated security administration experience on two or more platforms (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) - Demonstrated experience working with a managed services organization. - Demonstrated experience working with a request ticketing system, such as Triole. - Strong analytical and problem-solving skills. - Ability to present and discuss technical information to users with varying technical expertise. - Proven ability to work under stress in emergencies. Flexibility to handle pressure from many directions simultaneously. - Must be detail-oriented with a high level of accuracy. - Excellent written and verbal communication skills. - Demonstrated ability to develop and maintain collaborative working relationships across multiple teams. - Strong customer focus and the ability to manage customer expectations. - Must have strong team-oriented interpersonal skills and the ability to effectively interface with a wide variety of people. - Demonstrated commitment to continuous process improvement. - CISSP, CISA, or other security / audit / field related certifications a plus Sr. Security Analyst Start Date ASAP Sr. Security Analyst Assignment Length 7+ months Additional Information All your information will be kept confidential according to EEO guidelines. Please send your resume in Word format only.
    $75k-95k yearly est. 60d+ ago
  • Lead Information Security Architect / Engineer

    Pathwayrp

    Cyber security analyst job in Durham, NC

    EmTacq specializes in EMployer Talent ACQuisitions, matching the most qualified candidates with the most competitive positions available. We pride ourselves on not just putting bodies in seats, rather matching professionals to their careers. We are headquartered in the Raleigh / Durham, NC area. However, as a recruiting agency we service companies and candidates across the United States. We are your best source for professional, value driven low cost recruitment services. Job Description The Lead Information Security Engineer will be responsible for designing and implementing a process to analyze the design of technology solutions for threats, attacks, and vulnerabilities that could affect the control environment. Must be a subject matter expert (SME) with strong collaboration skills to work with cross functional teams to ensure the design of technology solutions complies with information security policies, and regulatory obligations. The Lead Information Security Engineer must have the ability to identify, document, and recommend security safeguards and configurations in a highly complex environment with a demonstrated ability to recognize, and appropriately incorporate layered security safeguards within the network, application, and data layers from a defender's perspective. In this role you must be a positive professional, adaptable, pragmatic, and who is comfortable in delivering clear and concise information at both a technical and managerial level. Responsibilities: Design and implement a process to analyze the design of technology solutions for threats, attacks, and vulnerabilities that could affect the client's control environment. Review and approve security configuration checklists (e.g., hardening or lockdown guides) for technology platforms and solutions (e.g., operating systems, databases, firewalls, etc.) Provide security consulting services internally to the engineering organization by giving guidance and functioning as an information security SME. Must have the ability to identify, document, and recommend security safeguards and configurations in a highly complex environment with a demonstrated ability to recognize, and appropriately incorporate layered security safeguards within the network, application, and data layers from a defender's perspective. Qualifications Required Experience *5+ years of experience in one or more of the following information security domains: access management, cryptography, data loss prevention (DLP), emerging technologies (i.e., cloud, mobile, etc.), endpoint security, incident response, malware analysis and protection, network and perimeter security, or web and mobile application security. *5+ years of experience analyzing the design of technology solutions using common industry frameworks such as DREAD, SSE-CMM (ISO/IEC 21827), STRIDE, or other risk assessment models. *5+ years of working knowledge of various industry security standards and frameworks including: ISO 27001, ISF Standard of Good Practice (SoGP), NIST Special Publications, etc. *5+ years of working knowledge of modern enterprise and security architectures, their challenges, common approaches to overcome their challenges, and their inherent security strengths and weaknesses. *Teamwork and communication skills, both written and verbal. Preferred Experience *Bachelor's degree in Computer Science, Information Systems, or related field. 8+ years of equivalent work experience required in lieu of degree is acceptable. *Professional certifications such as: CISSP, CISA, CISM, GIAC, CGEIT, CRISC, CEH, or other relevant industry certification strongly preferred. Additional Information Equal Employment Opportunity Our client is proud to be an equal opportunity/affirmative action employer. We are committed to attracting, retaining and maximizing the performance of a diverse and inclusive workforce. It is their policy to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, creed, religion, national origin, alienage or citizenship status, age, sex, sexual orientation, gender identity or expression, marital or domestic/civil partnership status, disability, veteran status, genetic information or any other basis protected by law.
    $77k-104k yearly est. 60d+ ago
  • Tealeaf Security Engineer

    GDIT

    Cyber security analyst job in Morrisville, NC

    Type of Requisition: Pipeline Clearance Level Must Currently Possess: None Clearance Level Must Be Able to Obtain: None Public Trust/Other Required: MBI (T2) Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Analytics, Collaborating, IBM Tealeaf Certifications: None Experience: 5 + years of related experience US Citizenship Required: No Job Description: Seize your opportunity to make a personal impact as a Tealeaf Security Engineer supporting the United States Postal Service. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career. At GDIT, people are our differentiators. As a Tealeaf Security Engineer, you will help ensure today is safe and tomorrow is smarter. Our work depends on a Tealeaf Security Engineer joining our team to analyze design, develop, implement, and support code for our government customer, the United States Postal Service. HOW A TEALEAF SECURITY ENGINEER WILL MAKE AN IMPACT In this role, a typical day will include: Responsible for web application security to monitor, analyze, and report on suspicious activities in support of USPS CSOC and the Fraud team. Deploying, configuring, and maintaining Tealeaf components (cx Impact, cx Replay, cx View, Overstat, SDK, PCA, Canisters, Portal, Replay server) Supporting secure integration with websites, mobile apps, proxies, and backend services. Maintaining and optimizing sessions capture fidelity, replay accuracy, and overall system stability. This role sits at the intersection of customer experience analytics, data security, and enterprise cybersecurity, ensuring that all Tealeaf data capture and replay functions are implemented securely, reliably, and in compliance with organizational and regulatory requirements. WHAT YOU'LL NEED TO SUCCEED: Education: Bachelor's or master's degree in computer science, Information Systems, Cybersecurity or other related fields. Or equivalent work experience. NOTE: If resources do not have a relevant college degree, an additional 4 years of relevant work experience is required. Required Experience: 3+ years Tealeaf analytics and replay configuration - Events, dimensions, privacy rules, replay rules Good understanding of website and web server architecture, cloud computing, including web 2.0 (JSON, JavaScript) Understanding of AI and LLM and how it can be leveraged to automate some of the Tealeaf activities and notifications. Professional communication/presentation skills, focus on value-added delivery On-call availability for, cybersecurity issues, network impacting or network outage situations outside of business hours Effectively work within a Security team, and support and collaborate with other teams Build and maintain dashboards to monitor Tealeaf infrastructure health and capture quality. Develop alerts for anomalies, unauthorized access attempts, or abnormal capture behaviors. Support incident response teams by providing Tealeaf session data during investigations. Hands-on experience with: Tealeaf capture mechanisms (PCF, SDK, JavaScript Event Capture) Maintaining capture servers, replay servers, and data pipelines Log parsing and structured data formats Proficiency in at least one scripting language (Python, Bash, PowerShell). Experience integrating telemetry with SIEMs (Splunk, QRadar, Elastic, etc.). Security Clearance Level: Ability to obtain and maintain a Public Trust clearance and successfully pass a thorough Government background screening process requiring the completion of detailed forms and fingerprinting This position has a U.S. residency requirement. The USPS security clearance process requires the selected candidate to have resided in the U.S. (including U.S. Territories) for the last five years as follows: U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 6 months consecutively in the last 3 years (unless they meet certain exceptions). Non-U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 90 days consecutively in the last 3 years. Location: Morrisville, NC Falls Church, VA Eagan, MN Remote considered GDIT IS YOUR PLACE: 401K with company match Comprehensive health and wellness packages Internal mobility team dedicated to helping you own your career. Professional growth opportunities including paid education and certifications. Cutting-edge technology you can learn from Rest and recharge with paid vacation and holidays #GDITCareers #Tealeaf #SecurityEngineer The likely salary range for this position is $128,039 - $173,229. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: Less than 10% Telecommuting Options: Onsite Work Location: USA NC Morrisville Additional Work Locations: USA VA Falls Church Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $128k-173.2k yearly Auto-Apply 2d ago
  • Varonis Careers - Junior Security Analyst - 1st Shift

    Varonis Systems 4.2company rating

    Cyber security analyst job in Morrisville, NC

    Junior Security Analyst- 1st Shift The Company: Varonis (Nasdaq: VRNS) is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. Thousands of organizations worldwide trust Varonis to defend their data wherever it lives - across SaaS, IaaS, and hybrid cloud environments. Customers use Varonis to automate a wide range of security outcomes, including data security posture management (DSPM), data classification, data access governance (DAG), data detection and response (DDR), data loss prevention (DLP), and insider risk management. Varonis protects data first, not last. Learn more at **************** The Role: We are seeking a driven MDDR Security Analyst to join the forefront of our data security mission- working 24x7 to monitor, triage, investigate, and escalate incidents where data is at risk and to ensure we meet operational SLAs. Data is the #1 target of attackers, and Varonis' Managed Data Detection and Response (MDDR) customers entrust our team with the security of their data. They will develop a deep understanding of the Varonis platform and related technologies. This role demands knowledge of security ecosystems (ex. SIEM, SOAR, ITSM, EDR, IPS/IDS, Active Directory, DNS, IAM/PAM, etc.) and enterprise security operations. The Requirements: * 1-3 years of experience in cybersecurity * Degree or certification(s) in cybersecurity and/or proven ability to execute across cyber security operations disciplines, including monitoring, detection, investigation, and incident response. * Proven success in contributing to a team-oriented environment. * Strong analytical and creative problem-solving skills. * Excellent communication skills (written and oral) and interpersonal skills (colleagues and customers). * Attention to detail and the capability to deliver outcomes autonomously. * Knowledge of common security technologies and tools including network-based (firewall and IDS), host-based (EDR and AV), data-based (DLP and DSPM), and identity-based (PAM and IAM), gained through experience or study. * Knowledge of operational information security disciplines including alert monitoring, threat detection, incident response, security infrastructure management, and system and architecture hardening, gained through experience or study. * Demonstrated ability to learn new skills and technologies swiftly. * Proficiency in critical thinking and problem-solving for complex issues. The Responsibilities: * Monitor and respond to detections within the Varonis platform. * Conduct thorough triage of Varonis detections through critical analysis and investigative methodologies. * Validate findings and coordinate investigative and response efforts with customers and internal teams. * Document and communicate investigative findings effectively, including tracking in CRM and related systems. * Assist in the development, documentation, analysis, testing, and modification of Varonis' threat detection systems, playbooks, and runbooks. Logistics: * Shifted Schedule: * Wednesday to Saturday (7:00AM - 5:00PM EST) * Wednesday to Saturday (11:00AM - 9:00PM EST) * Monday to Friday (11:00AM - 7:00PM EST) * 6 weeks of dedicated new hire training. * MDDR Security Analysts are expected to complete Sec+ and CySA+ training within their first year. * Work visa sponsorship is not available. We invite you to check out our Instagram Page to gain further insight into the Varonis culture! @VaronisLife Varonis is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, and other legally protected characteristics Please review our Notice of E-Verify Participation and our Right to Work Statements.
    $82k-107k yearly est. Auto-Apply 32d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Apex, NC?

The average cyber security analyst in Apex, NC earns between $64,000 and $115,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Apex, NC

$86,000
Job type you want
Full Time
Part Time
Internship
Temporary