Cyber Security Engineer
Cyber security analyst job in Knoxville, TN
The Cybersecurity Engineer is responsible for the technical implementation and management of cybersecurity measures. This role involves extensive hands-on work with security technologies, developing and maintaining security protocols, and ensuring the protection of sensitive data. The Cybersecurity Engineer collaborates within the various IT teams to integrate security solutions into business projects and solutions, while supporting overall compliance with HIPAA regulations.
Technical Implementation:
Architect, deploy, and maintain enterprise-grade security technologies, including firewalls, intrusion detection/prevention systems, encryption platforms, and vulnerability management tools.
Implement and support security controls for network infrastructure such as routers, switches, and wireless access points.
Configure, administer, and secure Active Directory and Azure AD environments.
Deploy and oversee endpoint protection platforms and Security Information and Event Management (SIEM) solutions.
Manage Microsoft 365 security capabilities, including conditional access, data loss prevention (DLP), and advanced threat protection.
Evaluate, test, and recommend new security tools, processes, and technologies to strengthen the organization's security posture.
Security Operations:
Continuously monitor systems for security events, investigate alerts, and respond to incidents with appropriate documentation.
Perform ongoing risk assessments and vulnerability scans to identify exposures and drive remediation efforts.
Lead technical response efforts during security incidents or breaches in coordination with the incident response team.
Administer and monitor Identity and Access Management (IAM) systems to ensure secure and appropriate access.
Conduct routine vulnerability assessments and threat analysis to support continual improvement.
Perform digital forensics and incident response activities as needed.
Compliance:
Ensure adherence to HIPAA and all applicable regulatory and security standards.
Design and implement technical safeguards that protect sensitive information and support organizational objectives.
Collaboration:
Partner with IT and business teams to embed security controls into systems, applications, and workflows.
Educate and support staff on cybersecurity awareness, best practices, and evolving threats.
Documentation:
Create and maintain accurate documentation for security configurations, procedures, and incident activity.
Remain informed on current cybersecurity trends and recommend enhancements to existing controls.
Security Audits:
Plan and conduct scheduled and ad-hoc security audits to validate adherence to security policies and standards.
Security Standards and Policies:
Develop, review, and update security policies and standards in alignment with industry best practices and regulatory requirements.
Security Infrastructure Maintenance and Monitoring:
Configure, troubleshoot, and maintain security-related hardware and software.
Implement and manage monitoring tools to detect intrusions and potential security breaches.
Security Strategy Development:
Support the planning, execution, and ongoing refinement of the organization's information security strategy.
Adhere to organizational policies, procedures, and safety standards; complete required training annually; contribute to performance goals and quality improvement initiatives.
Perform additional duties as assigned.
Minimum Education:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related discipline required.
Minimum Experience:
Ten (10) years of overall IT experience, including at least five (5) years of hands-on cybersecurity leadership with demonstrated success designing, engineering, and deploying security solutions in an enterprise environment.
Certifications:
Relevant industry certifications such as CISSP, CISM, CISA, CCSP, CEH, Microsoft Azure Engineer, or equivalent are required.
Cyber Security Engineer
Cyber security analyst job in Knoxville, TN
Knoxville, TN | Cybersecurity Engineer | Full-time
We are actively recruiting a Cybersecurity Engineer for our client in Knoxville, TN. This is a hybrid direct placement opportunity that will require some onsite work in Knoxville. The successful candidate will be responsible for the design, implementation, and ongoing management of advanced cybersecurity measures to protect sensitive data, systems, and networks. This role involves hands-on work with a wide range of security technologies, development and enforcement of security protocols, and proactive risk mitigation. The engineer collaborates with cross-functional IT teams to integrate security solutions into enterprise projects and ensure compliance with applicable regulatory requirements, including HIPAA. Must have a minimum of five years' experience in cybersecurity engineering, with a proven track record in designing and implementing security solutions within an enterprise environment.
Due to client request, candidates must be eligible to work in the United States without sponsorship.
Equal Opportunity Employer/Veterans/Disabled
Bank Information Security Governance Senior
Cyber security analyst job in Charlotte, NC
Why USAA?
At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families.
Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful.
The Opportunity
We are seeking a dedicated Bank Information Security Governance Senior.
We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in our Phoenix, AZ; San Antonio, TX; Plano, TX; Colorado Springs, CO; Chesapeake, VA; Charlotte, NC or Tampa, FL offices. Relocation assistance is not available for this position.
What you'll do:
Supports the first line of defense in ensuring the effectiveness of Information Security (IS) governance, IS risk management, and compliance programs within the Bank Technology Office. Collaborates with Information Technology (IT) and IS teams, business stakeholders, Compliance, Risk Management, Audit Services, and external parties to support IS governance and IS risk and compliance-based initiatives. Acts as a key liaison between the Association's IS function and various Bank business units, ensuring alignment with enterprise security policies and standards.
Continuously monitors IS environments to identify emerging risks related to cybersecurity, infrastructure, applications, and third-party services. Provides consultative services across Bank.
Provides expert insights on the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the Bank organization's specific needs and strategic objectives.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Conducts forward-looking risk assessments for new technology initiatives, system changes, and digital transformation projects.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Partners with and leads IT/IS teams to embed IS risk considerations early in the project lifecycle and ensure timely mitigation strategies.
Leads the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the organization's specific needs and strategic objectives.
Defines, maintains, and enforces IS policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices.
Ensures IS risk compliance with legal, regulatory, and contractual requirements, coordinating audits and assessments.
Provides governance oversight for IS related initiatives, ensuring they adhere to established standards, policies, and risk management practices.
Mentors junior members of the IS governance team, providing guidance and support in their professional development.
Enhances, and maintains awareness of the risk governance framework and its elements (RCSA).
Performs root cause analysis to determine likelihood, impact, and mitigation approaches of identified risks.
Prepares metrics reporting and participates in the metrics refresh process.
Maintains awareness of cloud computing principles and AI and understands potential IS risks inherent within this discipline.
Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures.
What you have:
Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree.
6 years experience supporting IS governance, IS risk management, compliance, or IT audit activities
In-depth knowledge and application of IT governance frameworks such as COBIT, ITIL, ISO 27001, and NIST, CIS Controls and CMMC
Experience working on and implementing IT and/or IS policies, standards, and procedures.
Experience leading and coordinating IS audits and assessments and ensuring compliance with regulatory requirements.
A strong understanding of regulatory and compliance requirements applicable to the organization.
Ability to interpret complex IT/IS environments and detect early warning signals.
Experience in identifying potential failure points and simulating risk scenarios.
Proficiency in using data to identify trends, anomalies, and emerging risks.
Understanding of cloud, cybersecurity, and digital transformation risks.
Ability to articulate risk insights and influence stakeholders to take preventive actions.
Familiarity with GRC platforms, vulnerability management tools, and risk dashboards.
What sets you apart:
Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.).
Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS)
Work experience in highly regulated work environments including other large financial institutions
Experience with data-driven analysis using AI tools and collaborating to drive process innovation
Highly self-motivated individual capable of working independently and proactively handling their workload with minimal direct supervision.
Strong analytical skills and demonstrated experience collaborating effectively with leadership at all levels within an organization.
Compensation range: The salary range for this position is: $114,080-$218,030.
USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.).
Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location.
Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors.
The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.
Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals.
For more details on our outstanding benefits, visit our benefits page on USAAjobs.com.
Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting.
USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Auto-ApplySecurity Engineer
Cyber security analyst job in Cary, NC
We are seeking a skilled Security Engineer with strong Networking and Compliance experience to join our team in Millennia. This position is required to reside in the vicinity of our Durham, NC Data Center. In this role, you will be crucial in maintaining the integrity and security of our network systems, ensuring privacy and security controls within processes, assets, and data flow within our healthcare-focused environment
Responsibilities:
· Maintain and manage all processes systems supporting Millennia's security posture.
· Monitor, manage, and implement security infrastructure to support organizational needs
· Monitor logs and alerts to identify incidents. Perform and or document Root Cause Analysis and remediation on Security Incidents.
· Monitor network performance and troubleshoot issues and Security Incidents.
· Plan, manage, and execute system upgrades and weekly patches to all endpoints.
· Develop and enforce security policies to protect sensitive patient data.
· Conduct regular system audits and vulnerability assessments.
· Provide technical support for network-related issues to staff and clients.
· Maintain documentation of network configurations and procedures.
· Stay updated on industry trends and emerging technologies
· Collaborate with IT teams to integrate new technologies into existing systems.
· Provide hand-on support to our offices and data center.
Qualifications:
· Strong knowledge of network and security administration, controls, protocols, and best practices.
· Experience with SOC2 or HITRUST, and HIPAA Security and Privacy Rule.
· Proven experience as a Network Administrator or similar role.
· Proficiency in configuring firewalls, routers, and switches, encryption protocols, and certificates.
· Familiarity with cybersecurity principles and incident response strategies.
· Excellent problem-solving skills and attention to detail.
· Exceptional communication skills and ability to work independently and collaboratively in a team-oriented environment.
· Experience with cloud computing platforms (AWS, Azure) is a plus.
Relevant certifications (e.g., CCNA, CompTIA Security+) are preferred
LEAD INFORMATION SECURITY ENGINEER
Cyber security analyst job in Herndon, VA
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
The Role
This position is a senior role implementing Managed Security Services (MSS) in a Federal Security Operations Center (FedSOC) environment. The SOC function is to provide customers with constant monitoring, protection, prevention, and detection services as well as reporting and incident analysis based on events collected from multiple sources. This position will be responsible for providing technical expertise to design and implement DDoS Mitigation for Lumen Federal Customers. This position will provide subject matter expertise to DoD customers on worldwide DDoS threats and issue posture and assessment reports
This Lead Information Security Engineer position operates in a supportive role implementing security, technology, and innovation in the Federal Security Operation Center (FedSOC) environment. The Security Operations Center operates 24x7x365. This role performs security event management functions - monitoring, detection, triage of security events and alerts in associated monitoring systems. Facilitates the ingress, implementation, and egress of advanced client trouble / change requests for the Lumen managed DDoS product.
The Lead Information Security Engineer is expected to perform as technical lead, including basic managerial duties, escalation support and on-call. Provides mentoring, training, and escalation support for Junior Engineer SOC personnel.
The Main Responsibilities
Subject Matter Expert on DDoS attacks, mitigation and threat analysis.
DDoS worldwide intelligence collection, analysis, reporting and dissemination.
Threat Feed research, recommendation, implementation and Administration.
Interface with DDoS service vendors.
Expertise in DDoS attack tools and countermeasures.
Perform complex changes within the managed security environment.
Manage and resolve customer service faults, outage, and impairment events.
Monitor, triage, and respond to alerts for client security events. Investigation and resolution of impairment scenarios on Managed DDoS Security products.
Research and implement customer generated change requests for Managed DDoS Security products.
Generate incident cases and escalate to Operation Engineering and IPNOC teams in accordance with time and severity-based SLA's.
Performs tasks associated with the installation, turn up and maintenance of Lumen security infrastructure.
Present as technical expert delivering solutions to clients, internal business, and third-party vendors.
Develop enhancements to existing solutions, promote creation of new tools, processes, and applications
Directly support, train and mentor tier I and II colleagues
Possess exceptional customer service skills
Multi-task during events
Communicate effectively with managers, customers, and vendors
Maintain solid working relationships, including collaborative technical activities with peers
Strong written and verbal communication skills
Analytical and problem-solving skills
Attention to detail with good organizational capabilities
Prioritize with good time management skills
Demonstrate collaboration/cooperation with other Service Assurance teams outside of the SOC (IP/Ethernet, Transport, etc.)
Regularly observed communication with peers and other functional SOC teams on selected collaboration platforms (Teams, Email, phone, etc.)
Work within multiple ticketing platforms and accept/update/close tickets in order received.
If not previously approved, candidate must be willing to submit for a T/S clearance with SCI
What We Look For in a Candidate
Qualifications & Skills:
Required (education/experience/skills/competencies):
Candidate must be a US Citizen with an active TOP SECRET clearance
Preferred:
5-7 years in a Security Operations environment.
Experience with Cyber Threat Intelligence and interface with intelligence community.
Experience with writing reports and making presentations to customers.
Certifications In specific security technologies such as Fortinet, Arbor, Radware, Palo Alto, Cisco or Checkpoint.
Demonstrated understanding of Denial-of-Service concepts and attack vectors, and mitigation options.
Demonstrated proficiency in routing and networking skills, including the ability to:
Troubleshoot BGP and BGP community strings
Review and analyze packet captures
Trace customers or attack traffic through our global backbone
Understand and be able to modify policies/prefix lists on multiple router platforms
Troubleshoot GRE Tunnels issues
Stay abreast of new attack vectors and interface with customers, other SOC engineers, and Ops Engineering regarding new vectors and mitigation techniques.
Expert level knowledge and skills of at least one programming language (python preferred)
Security industry certifications (examples):
CISSP
CRISC
CISM
Security+
CCNA
ACIA
CCNA
CEH
ITIL Foundations
Compensation
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors
Location Based Pay Ranges:
$114,082 - $152,109 in these states: VA
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
Benefits
Bonus Structure
#LI-FP1 Onsite
What to Expect Next
Requisition #: 340274
Background Screening
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page. Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
Equal Employment Opportunities
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, “protected statuses”). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
Disclaimer
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
Application Deadline
12/06/2025
Security Analyst
Cyber security analyst job in Columbia, SC
Job Title: Security Analyst (Project Lead)
Work Mode: Hybrid (3 days onsite/week)
Duration: 12 Months
Responsibilities
Lead and coordinate IRS Safeguards Review preparation across technical and administrative areas.
Review and assess Corrective Action Plans (CAPs), SSRs, SSPs, and SSAs for IRS Pub 1075 compliance.
Evaluate compliance with IRS SCSEM controls and guide remediation efforts.
Manage all stages of Safeguard Review preparation using project management methodologies.
Support post-review activities, including CAP development and mitigation planning.
Additional Duties
Provide expert guidance on technical solutions to meet IRS Pub 1075 requirements.
Research technologies/processes needed for system and infrastructure compliance.
Communicate with technical and non-technical stakeholders, including state and federal partners.
Required Skills (Ranked)
5+ years security analysis (risk assessments, vulnerability management, incident response).
3+ years IRS Safeguard Review experience within a state agency.
Deep expertise with IRS SCSEM (implementation, assessments, documentation).
3+ years experience with IRS Publication 1075 (Rev. 11-2021).
Proficiency with MS Office, SharePoint, MS Teams.
Strong written and verbal communication.
Knowledge of ISO, IEEE standards.
Preferred Skills (Ranked)
Experience with Child Support Enforcement systems.
Experience with FISMA, NIST, or IRS Pub 1075 frameworks.
Strong technical documentation and audit support experience.
Education
Bachelor's Degree required.
Senior Security Engineer
Cyber security analyst job in Huntersville, NC
Direct Hire- Unable to sponsor any candidates now or in the future. NO THIRD PARTIES PLEASE.
The Security Engineer oversees the Company's SIEM infrastructure and managing critical security components such as Web Application Firewall (WAF), Domain Management, and Certificate Management. This role collaborates extensively across teams to ensure robust security monitoring, incident response, and proactive threat detection. The role requires oversight of SIEM technologies, WAF management, DNS management, certificate lifecycle management, and incident response.
The Experience and Skills You Bring:
We are looking for a Security Engineer that is self-motivated and capable of applying their knowledge, experience, and potential to a variety of applications across the entire organization. Our continued success relies on the onboarding of team members that operate with a high degree of integrity and quality in everything they do. We are looking for an experienced engineers to spearhead the implementation of our exciting new ideas. You won't be just fixing bugs or maintaining existing codebase - you will be building exciting new features, analyzing metrics, building security automation tools, and making important technical and product decisions.
Your Primary Duties and Responsibilities:
o Continually monitor and adjust cybersecurity tools
o Assisting in creating annual Security Awareness training program
o Monitoring security tools, automation platforms, tracks for compliance to CIS standards and Google best practices
o Managing centralized logs, security dashboard and Google security tools and monitors for suspicious events
o Performing vulnerability tests, risk analyses and security assessments
o Assisting with conducting/responding to internal and external security audits, and analyzing security breaches to determine root cause
o Writing and maintaining corporate security policies
o Training fellow employees in security awareness and procedures
Minimum Qualifications:
o 5+ years of experience in working with GCP or equivalent cloud platform specializing in security services, automation and compliance
o Understanding of CICD tools including Docker, Kubernetes, Terraform, Ansible.
o Experience working with Linux operating systems, Bash/Python scripting
o Excellent interpersonal skills required to interact at all levels of the organization and effectively present informational training and respond to inquiries.
o Unmatched communication skills, teamwork skills, and a strong attention to detail
o Minimum Bachelor's degree in IT or Computer Science
o 3+ years of cybersecurity, threat intelligence or IT security experience, with one or more of the following cyber-security functions; Cyber Threat Intelligence, Threat Hunting, System Administration, Intrusion Detection/Prevention, Monitoring, Incident Response, Vulnerability Management
Preferred Qualifications:
o Experience with CISSP, Google Cloud , Whitehat
o CompTIA Security Professional certificates.
Chief Information Security Officer
Cyber security analyst job in Charlotte, NC
Headquartered in Charlotte, NC, and founded in 2012 by visionary minds shaping the future of banking and payments in the US, Finzly makes bank transformation radically simple. Our core-independent platform is trusted by some of the market's leading financial institutions to transform operations and launch new products and services at speed.
We've been recognized with 20+ industry awards in the last two years - including three years in a row as one of the Best and Brightest Places to Work as well as accolades for Best Parallel Core Technology, Best Corporate Payments Solution, Best Payments-as-a-Service Provider, and Best Trading System. Quite simply, Finzly is known for being the best in everything we do, giving you the perfect opportunity to grow your career with impact.
About the Role:
Finzly is currently seeking a highly motivated Chief Information Security Officer to join our dynamic team based in Charlotte, NC. We are in search of an individual who thrives in a fast-moving environment and contributes to a team that embraces continuous delivery practices and places a strong emphasis on enhancing the customer experience. This role entails extensive collaboration and teamwork across various teams and organizational boundaries, playing a pivotal role in engineering services that consistently exceed customer expectations.
Our ideal candidate is a self-driven individual who excels at multitasking and flourishes as part of a collaborative team. Furthermore, we are seeking someone who possesses a genuine enthusiasm for exploring cutting-edge technologies, driving innovation, and thriving in a startup environment. If you're passionate about being part of a forward-thinking team, we encourage you to apply.
Responsibilities:
Build and maintain effective relationships with business and technology stakeholders. Partner with the stakeholders across the company to raise awareness of risk management concerns.
Develop and enhance an information security management framework (such as ISO, SOC2, etc.)
Assist with the overall business technology planning by providing a current knowledge and future vision of technology and systems.
Mitigate the risks various security threats pose to the organization's mission and goals.
Developing secure business and communication practices, objectives, and metrics.
Ability to develop and interpret standards, policies, and procedures and analyze systems and procedures, write and review standards and procedures, handle multiple projects.
Work with external audit firms to achieve and maintain compliance accreditations.
Manage client security assessments and develop internal security training programs and maintain materials for end-users.
Stay current on security practices, threat landscape, laws, and regulations.
Knowledge of network security threats and ability to implement preventative controls including firewalls, access controls, authentication systems, intrusion detection systems, VPNs, cryptography, etc.
Ability to resolve advanced security issues in diverse and fast-paced environments.
The ability to build good relationships at all levels and across all business units and organizations, and the ability to influence stakeholders of all levels.
Requirements:
Minimum of 10 years of experience in a combination of risk management, information security, and IT jobs.
2 to 4 years of CISO experience at any bank with over $20B in asset size. OCC expertise is preferred.
Advanced knowledge in the information security domain.
Experience implementing an internal information security program preferred.
Knowledge of common information security management frameworks, such as ISO/IEC 27001/27002, and NIST.
Experience with Zero Trust Security tools like Zscaler is desirable.
Familiarity with security tools such as SecureFrame and KnowBe4 is a plus.
Excellent written and verbal communication skills and high level of personal integrity
Innovative thinking and leadership with an ability to lead and motivate cross-functional teams.
Specific experience in Agile (scaled) software development practices.
Experience with cloud hosting environments such as AWS, Azure, etc.
Experience in implementing SOC2 compliance is an added advantage. Specific experience in Agile (scaled) software development practices.
Experience with cloud hosting environments such as AWS and Azure.
Experience in implementing a SOC2 compliance is an added advantage.
Qualifications:
Bachelor's degree in information systems, business administration or a technology-related field is required.
Professional security management certification is essential.
What We Offer:
Full Benefits Package - medical, dental and vision coverage with HSA option
Healthcare FSA and Dependent Care FSA
Company-paid Life Insurance
Company-paid Long-Term Disability
Paid Holidays and generous Paid-Time Off
Stock Options
401k Savings Retirement Plan
Short Term Disability, Critical Illness and Accident Insurance
Wellness Programs including Employee Assistance Program
Annual Cash Bonus and more!
Cyber Security Analyst
Cyber security analyst job in Atlanta, GA
A Southern Company Security Analyst participates in monitoring, hunting and responding to cyber security events. He or She, provides a front-line role during cyber security incidents, identifying the extent of the threat, business impacts and advising or sometimes performing the most suitable course of action to contain, eradicate and remediate an incident. A Southern Company Security Analyst maintains a good knowledge of the threat landscape, helps enhance visibility and response capabilities by identifying new methods of detecting threats. A Southern Company Security Analyst is proactive and seeks out adversaries determined to negatively impact Southern Companies reputation, financial interest or threatens the safety of our employees and customers.
Candidates are expected to discuss and demonstrate they meet required qualifications for applicable roles.
Responsibilities
Take action on security events presented to Analyst via SIEM, user submissions, dashboards, etc.
Self-initiate hunting initiatives to discover potential breaches or undiscovered cyber threats
Remain abreast of emerging threat patterns and provide recommendations to detect threats
Assists with patching recommendations and workarounds for zero-day threats.
Coordinate mitigation or remediations task with stakeholders or supporting teams
Communicates with management on incident updates.
Monitors SIEM and analyzes security events to determine appropriate actions
Monitors emails containing links/attachments associated with potential phishing attempts to determine appropriate actions
Identify and tune false positives associated with current security events
Document analytical steps and findings associated with security event investigations
Qualifications Required for Cyber Security Analyst
2 years IT security experience
Minimum 2 years of experience in performing analysis on Windows and LINUX/UNIX systems
Minimum 2 years of experience and/or familiarity in the following areas:
Network/Endpoint: analysis tools
Scripting languages
Windows/Unix command line utilities
Reputation analysis associated with IP's, Domains, Email Addresses
Ticketing Systems
Required to submit to a background examination.
Experience operating within a security application such as Kali, Metasploit, and etc.
Familiar with and have worked within Cyber Security Frameworks such as:
NIST 800 - 61
Attack Life Cycle
SANS Security Controls
MITRE
SANS Security 500 Series or other industry standard equivalent
Experience with PCAP analysis
Experience investigating endpoint and network security events
Experience investigating user reported Phishing events (specifically investigating suspicious links and attachments)
Experience analyzing security events utilizing sandbox technology
Experience operating within a security application such as Kali, Metasploit, and etc.
Oral and written communication skills
Experience taking ownership of incidents from acknowledgement to resolution
Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies
Experience initiating security event investigations
Preferred capabilities:
Oral and written communication skills
Ability to take ownership of incidents from acknowledgement to resolution
Ability to initiate security event investigations
Ability to comprehend and articulate business impact associated with security events
Interacting with vendors to support proof of concepts
Proficient in Microsoft Office products: Excel, Word, Outlook and etc.
Exposure, experience and/or knowledge of cloud technology
Familiar with NIST 800-61 and SANS Critical Security Controls
Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies
Desired certifications:
GIAC Security Essentials (GCIH)
GIAC Certified Intrusion Analyst (GCIA)
Security+
Other certifications within IT Security
Characteristics of an Southern Company Cyber Analyst
Self-Motivated - Cyber Analysts do not only act when security tools trigger alerts, we are suspicious by nature and can generate security events based on self-initiated task.
Perseverance - Cyber Analysts identify resources that allow us to move through or around barriers as we analyze cyber security events.
Dependable - Cyber Analysts work within a team environment and thus, we rely on one another for knowledge-sharing and dependence.
Integrity - As Cyber Analysts, our reputation is our code of ethics. We are not perfect. We admit our mistakes. We do the right thing.
Sense of Humor - Although this may vary, just have one; I promise we can work with it. We have a lot of fun in what we do, so you will need a sense of humor to keep up.
This position falls under the company's Insider Threat Program and will have access to, and control over sensitive data, systems or assets. Enhanced personnel screening, which includes a background review, drug screen and psychological assessment, will be required if you are selected for this position
Auto-ApplyCyber Security Threat Analyst
Cyber security analyst job in Newport News, VA
Who We Are:
Headquartered in Washington, DC, Versar Global Solutions provides full mission lifecycle solutions for challenges faced by our government and commercial Customers in the natural, built, and digital environments. With nearly 2,000 team members around the world, and a rich legacy spanning more than 70 years, Versar Global Solutions delivers a broad array of planning, analysis and risk management solutions, project and program management, operations and maintenance services, and information technology applications for environmental management and remediation projects, mission critical facilities and installations, and in support of readiness and contingency operations.
Who You Are:
Are you a talented and innovative cyber security specialist that wants to make a difference in the world? Join us as a Cyber Security Threat Analyst and lead the charge in developing, implementing, and supporting cutting-edge geospatial technologies. In this pivotal role, you will collaborate with our dynamic Geospatial & Digital Solutions (GDS) Market Sector team to support diverse IR&D and customer-focused projects within a multi-disciplinary organization to achieve specific goals and objectives. The ideal candidate will focus on leveraging AI solutions and digital tools to improve efficiency, scalability, and the overall digital experience for both internal teams and external customers.
Reporting directly to our Director of our Digital HUB Team, we want to leverage your expertise in securing customer-facing products. The ideal candidate will focus on threat modeling, security assessments, protocol validation, and ensuring compliance with government certifications and policies for government and private systems and protocols.
What You'll Do:
Perform comprehensive threat modeling and risk assessments for customer products and internal systems.
Assess API security, OAuth/SAML, tenant isolation, or cloud-native security
Validate security protocols to ensure compliance with industry standards and best practices.
Conduct walkthroughs and audits of security policies and procedures.
Collaborate with cross-functional teams to implement mitigation strategies addressing identified risks.
Support and lead efforts for government and industry security certifications.
Monitor emerging cyber threats and vulnerabilities, analyzing their potential impact on organizational assets.
Develop detailed reports documenting findings, risk assessments, and remediation plans.
Assist in designing and maintaining incident response plans and security controls.
What You'll Bring:
Certifications such as CISSP, CISM, CEH, or equivalent.
Minimum 3 years of experience in threat modeling, vulnerability assessments, and protocol validation for large systems.
Strong knowledge of cybersecurity frameworks and government certification requirements.
Experience with API security, OAuth/SAML, tenant isolation, and cloud-native security concepts.
Experience reviewing and improving security policies, procedures, and compliance documentation for geospatial systems.
Familiarity with security protocols, network security, and cryptographic principles.
Excellent analytical and problem-solving skills.
Ability to communicate complex security concepts clearly to technical and non-technical stakeholders.
Familiarity working within government or regulated environments.
Experience supporting audits and managing compliance documentation.
Excellent analytical and problem-solving skills.
Strong communication and interpersonal skills.
Must be proficient in English, both written and verbal, to ensure effective communication and collaboration.
Must be able to obtain and maintain a Secret Security Clearance.
Successful results of preemployment screenings, including federal background check, MVR, and drug screen.
Comply with company drug and alcohol policy.
Be authorized to work in the US or will be authorized by the successful candidate's start date.
Preferred Skills & Certifications:
Strong Project Management Skills: Ability to plan, organize, and manage multiple projects simultaneously, ensuring they are completed on time and within budget.
Digital and Technology Expertise: Understanding of various digital technologies, platforms, and tools relevant to the program's objectives.
Communication and Interpersonal Skills: Ability to communicate effectively with diverse stakeholders, build relationships, and influence decision-making.
Problem-Solving and Analytical Skills: Ability to identify and solve complex problems, analyze data, and make data-driven decisions.
Leadership and Team Management Skills: Ability to lead and motivate teams, build consensus, and drive collaboration.
Customer Knowledge: Familiarity with Federal Market and technical approaches related to next-generation cloud, network, and cybersecurity technologies.
Location Requirements
The position will primarily work onsite at the Newport News, VA office location.
EEO Commitment
Versar Global Solutions is committed to providing equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability, genetic information, sexual orientation, gender identity, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state, and local laws.
Versar Global Solutions complies with applicable state and local laws governing non-discrimination in employment in every location in which the company operates. This policy applies to all terms and conditions of employment, including hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Versar Global Solutions expressly prohibits any form of unlawful employee harassment based on race, color, religion, sex, national origin, age, disability, genetic information, sexual orientation, gender identity, marital status, amnesty, or status as a covered veteran. Improper interference with the ability of Versar Global Solutions employees to perform their job duties is not tolerated.
#LI-WJ1
Auto-ApplySOC Cyber Analyst (Journeyman or Junior, Norfolk, VA)
Cyber security analyst job in Norfolk, VA
Akira Technologies is seeking a Cyber Analyst team member who is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage.
This role supports a government client in the following locations five days a week: Norfolk, VA. Active Secret clearance or higher is also required for this role.
An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines.
Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.
Job Responsibilities
Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.
Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.
Asses Security Technical Implementation Guides (STIGs) compliance and completion.
Utilize asset mapping tools to verify connected inventory.
Handle Information Assurance Vulnerability Management (IVAM) notifications.
Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.
Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.
Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.
Job Qualifications
Active Secret security clearance or higher.
At least 3 years, (Journeyman), or applicable 1 to 2 years (Junior) of experience in security operations, demonstrating analytical duties and preforming host or network security analysis.
Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures.
Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.
Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.
Preferred Skill Sets
Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS)
Strong analytical and troubleshooting skills
Able to provide expert content development in Splunk Enterprise Security using tstats and data models
Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring on various security appliances
Experience in other tools and protocols as applicable such as Nessus, Endgame, CrowdStrike, Gray Noise, Shodan, Bacnet, MODBus, SCADA systems, and PCAP
Review logs to determine if relevant data is present to accelerate against data models to work with existing use cases
Familiar with the operations and functions of Nessus or security center management
Can assist and provide technical input to research, discover, implement hardware and software
Understands importance and fundamentals of logistics and evidence handling
Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification
Salary Range: $75,000 to $100,000
Akira's pay range for this position considers various factors including skills, years of experience, training, licenses, certifications, alignment with market data, and internal equity in the organization. This pay range estimate is a general guideline only and not a guarantee of compensation or salary, which Akira believes to be done in good faith in compliance with local laws. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. It is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case.
General Description of Benefits
Akira offers its employees multiple options for medical plans (some with Health Savings Account), dental plans, and vision coverage, and a 401(k) plan with employer match. To promote work/life balance, Akira offers paid time off, including vacation and sick time, holidays, paid parental leave, military leave, bereavement leave, and jury duty leave. We also offer short and long-term disability benefits to protect employee income in the event of sickness or injury, life insurance, accidental death and dismemberment insurance, and critical illness insurance. Akira also offers tuition, training, and certification reimbursement for professional development and career advancement.
Akira regularly reviews our total rewards package to ensure our offerings remain competitive and reflect the values and needs expressed by our employees.
About Akira Technologies
Akira strives to meet and exceed the mission and objectives of US federal agencies. As a leading small business cloud modernization and data analytics services provider, we deliver trusted and highly differentiated solutions and technologies that serve the needs of our customers and citizens. Akira serves as a valued partner to essential government agencies across the intelligence, cyber, defense, civilian, and health markets. Every day, our employees deliver transformational outcomes, solving the most daunting challenges facing our customers.
Akira is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
Auto-ApplyNetwork Security Analyst
Cyber security analyst job in Durham, NC
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network Security Analyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta
Network Sniffer Analysis
Cyber security analyst job in McLean, VA
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ******************
We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value.
Job Description
Position Title : Network Sniffer Analysis
Location : Mclean, VA
Length : Full time / Permanent Position
Work Status : US Citizen/ Green Card Holder/ EAD (GC)
Required Skills
• Strong data analysis ability with sniffer, packet, net flow data.
• Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications.
• Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components.
Technologies
Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application
If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at
[email protected]
and the best time/day to follow up with you for discussion.
Sincerely Yours,
Ranjit
Technical Recruiter | E*Pro Inc.,
Work: ************ x (234)
Email:
[email protected]
E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095
Additional Information
All your information will be kept confidential according to EEO guidelines.
Network Analyst - Active Security Clearance
Cyber security analyst job in Reston, VA
Job Description
CADRE is relied upon for delivering superior insight and leadership to solve the nation's most critical national security challenges in the most demanding environments.
is located in Northern Virginia with flexible core hours.
The Network Analyst (NA) will be responsible for daily substantive work to the Senior Management Team. The NA will also be a member of multidisciplinary teams.
The Network Analysis team is composed of Network Analysts covering three distinct areas of industry and a candidate is likely to be a subject matter expert in only one or two areas:
Telecom and data transport and switching engineering in support of traditional telcos
Data center network engineering in support of intra- and inter-data center transport.
Network architect or cellular network engineering for 3G, 4G, and/or 5G to include core network (EPC and 5G) and radio network engineering
Duties: This Network Analyst performs the following core functions:
Coordinate with the customer's other multidisciplinary teams to provide timely and accurate network analysis regarding the logical and physical routes of key telecommunications networks within a designated area
Work with appropriate members and organizations to evaluate the role and value of potential network operations
Display a mastery of relevant network operations, principles and best practices across various projects
Employ their mastery creatively to support the multidisciplinary teams in providing direct mapping and graphics inputs into the customer's modeling tool as well as in modeling briefings
Display subject matter expertise on complex projects
Perform other duties as assigned at the direction of Project Management
Required Qualifications:
Ability to obtain and maintain a TS/SCI with poly
Bachelor's degree preferred, in a STEM discipline (e.g. Computer Science, Cyber Security, Engineering, Mathematics, or Statistics). Other degrees are acceptable with a strong analytic and technical acumen.
No degree + fourteen (14) years relevant experience
Associate's degree and twelve (12) years relevant experience.
Bachelor's degree and ten (10) years relevant experience.
Minimum of 10 years (current) of commercial/industry experience in one of the following roles:
Facility engineer or network planner (TDM and/or Data)
Large scale networking engineering across multiple packet fabrics, such as google B4
Core network engineer, or radio network engineer with experience in 3G, 4G and/or 5G engineering
OR equivalent NSA experience.
Strong understanding of network technologies, protocols, systems and equipment to include one or more of the following: SONET/SDH, OTN, MSAN, MSPP, MPLS/IP-MPLS, VoIP, IP Multimedia Services (IMS), DWDM, ROADM, Software Defined Networks (SDN) WAN and LAN, multi fabric networks, mesh networks, Session Border Controllers, fabric management, radio access network, front haul, back haul, BGP, OSPF, ISIS, SIP, 5G/LT/LAN interworking, VoLTE, SRVCC, DRVCC, ETSI MANO, OSS/BSS
Experience in commercial/industrial telecommunications networks, providing physical and logical network routes to answer strategic requirements.
Working knowledge of Network Management Systems (NMS) in the network and or Network Function Virtualization and SDN
Working knowledge of one or more of the following:
Public Switched Telephone Network (PSTN)
Data networks (IP, MPLS, traffic engineering, OpenFlow)
Dedicated/Private communications networks both traditional voice and VOIP
VOIP networks, softswitches, SBCs
Fiber optic cable, characteristics, engineering, installation and maintenance
RF related technologies such as cellular technologies, microwave, millimeter wave and VSAT
Gigabit-capable Passive Optical Network (GPON) technology
Strong analytical skills
Ability to work with large volumes of data
Computer and database skills
Desired Qualifications:
Active TS/SCI with poly with most recent BI/Polygraph dates within the last five years
Foreign language capability is not required but is considered a plus
Job Posted by ApplicantPro
Network Security Analyst
Cyber security analyst job in Augusta, GA
Network Security AnalystLOCATIONFort Eisenhower, GA 30905CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyNetworking Security Analyst
Cyber security analyst job in Fort Belvoir, VA
The company is looking for an amazingly talented Networking Security Analyst to join our team! In this role you will get to support the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices.
What You'll Be Doing:
Risk Mitigation of sensitive networks and systems
Configure, scan, monitor, report
PCAP collection
What Required Skills You'll Bring:
1+ years' experience supporting the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices
Experience with configuring, scanning, monitoring, alerting and reporting security tools.
Active TS/SCI Clearance
Must be willing to travel 15%- OCONUS and CONUS locations
What Desired Skills You'll Bring:
Experience with PCAP collection.
Experience as a SOC analyst.
Certification such as CISSP, CSA, Sec+, CySA+, GCWN, GCED or CEH
Minimum Clearance Required to Start:
Top Secret SCI
This position is part of our Federal Solutions team.
Our Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
The company is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the quest-APPLY TODAY!
Network/Security Operations Center Analyst (17591)
Cyber security analyst job in Oak Ridge, TN
Job Title: Network/Security Operations Center Analyst Career Level From: Associate Career Level To: Senior Associate Job Specialty: Network Administration What You'll Do NOC/SOC serves as the first line of defense against network disruptions and cybersecurity threats. We serve a critical function in the organization to identify, investigate and resolve issues while minimizing the business impact. We are looking for a positive attitude, esprit de corps, and skills to join our team.
Due to the sensitive nature of this position, NOC/SOC Analysts must work in an office environment 100% of the time.
Job Specific Responsibilities:
Network Operations Center / Security Operations Center (NOC / SOC) Analysts are hard charging, analytical thinkers who enjoy solving problems. We thrive in a high-pressure environment with shifting priorities. NOC / SOC Analysts are able to assess a situation, determine tactical steps forward, and can implement a strategic plan. We support multiple technical teams in a 24 x 7 x 365 operational environment with high uptime requirements. In addition to these general skills and personality traits, CNS is seeking candidates with the following skills.
Core Skills & Job Requirements:
* Interact positively with peers, other departments, internal / external customers, and vendors to identify operational issues
* Prolonged or irregular hours required - 12 hour rotating shifts (compensated by shift differential pay)
* On-site requirement to support the network and cyber infrastructure
* Collecting and reviewing performance reports for various systems, and reporting trends in performance to senior technical personnel to help them predict future issues or outages
* Strong ability to diagnose server or network alerts, events or issues
* General understanding of TCP/IP Networking and Server infrastructure
* Understanding of common information architecture frameworks
* General understanding and/or experience with Information Security and Incident Response
* Understanding of Disaster Recovery plans and related technologies
* General understanding of common firewalls
* Excellent time management and organizational skills, and ability to handle multiple concurrent tasks and projects with minimal supervision
* Good oral and written communication skills, and ability to address conflict with others constructively
* Cross-team coordination and collaboration
What You Can Expect
* Meaningful work and unique opportunities to support missions vital to national and global security
* Top-notch, dedicated colleagues
* Generous pay and benefits with a stable organization
* Career advancement and professional development programs
* Work-life balance fostered through flexible work options and wellness initiatives
Minimum Job Requirements
* Bachelor's degree in engineering/science/information technology discipline
* OR Eight or more years of relevant education, training, and/or progressive experience may be considered to satisfy educational and years-of-experience requirements for this posting
Preferred Job Requirements
* Prior helpdesk and/or field support experience
* Prior NOC / SOC experience
* Security Incident and Event Management (SIEM)
* Common Intrusion Detection/Prevention Systems (IDS/IPS) (Snort, Cisco, FortiGate, Firepower)
* Experience with Disaster Recovery plans and related technologies
* Server hardware experience (e.g., Cisco UCS, and HP blade systems)
* Server Administration experience with Linux and/or Windows
* Prior Server / Network Administration experience
* Experience working in a large, geographically distributed environments
* Experience with SolarWinds, System Center Operations Manager, or other monitoring tools
* Operational analysis and development skills, such as scripting, to deploy DevOps solutions
* Knowledge of packet analysis and packet capture tools
* Working knowledge of large network and server infrastructures
* Experience with Penetration Testing or similar training environments
* Preferred certifications: Network+ and/or Security+, SPLUNK
Why Y-12?
You get #morethanajob. We encourage employees to achieve a healthy personal balance among home, work and the community. One of the ways we embrace work-life balance is by offering flexible work arrangements that provide alternatives to the traditional workweek, while still meeting business needs. Top talent and personal commitment mean more to our success than any other factors, so we reward our people with the kinds of benefits that make a positive difference in the quality of their lives. Benefits such as: medical plan, prescription drug plan, vision plan, dental plan, employer matched 401(k) savings plan, disability coverage, education reimbursement and many more. Want to stay healthy and fit but hate the cost of a gym membership? Take advantage of one of our onsite workout facilities and eat healthy in our onsite cafeterias. Much more than a workplace, at Y-12, you can build a career that lasts a lifetime.
Notes
The minimum education and experience for the lowest career level in the job posting range are listed under Minimum Job Requirements. Successful candidates hired into a higher career level than the minimum in the range must meet the requirements listed in the job leveling charts for the career level into which they are being hired.
If a range of Career Levels is posted, i.e., Senior Associate to Senior Specialist, internal applicants already in one of the Career Levels would come across at their current Career Level. Internal applicants currently in a lower level Career Level would move to the lowest posted Career Level.
Requires a Q clearance; however all qualified candidates will be considered regardless of their current clearance status. The ability to obtain and maintain a Department of Energy Q clearance is required.
This position may require entry into the Material Access Areas (MAA) and participation in the Human Reliability Program (10 C.F.R. Part 712), which requires successful competition of a DOE counterintelligence evaluation and may include a counterintelligence-scope polygraph examination.
This position may be categorized as a "designated position" identified by 10 C.F.R. Part 709, requiring successful completion of a DOE counterintelligence evaluation that may include a counterintelligence-scope polygraph examination.
CNS is a drug-free workplace. Candidates accepting a job offer will be required to pass a pre-placement physical, drug screening and background investigation. As an employee, you may be required to receive and maintain a security clearance from the United States Department of Energy in order to meet eligibility requirements for access to sensitive information or matter. U.S. citizenship is a requirement for security clearance applicants. All employees are subject to being randomly selected for drug testing without advance notification.
CNS is an equal opportunity employer. All qualified applicants will receive consideration for employment based on merit and without regard to race, color, religion, sex, sexual orientation, national origin, protected veteran status or disability.
Information Security Engineer
Cyber security analyst job in Greer, SC
Proterra offers a dynamic and supportive workplace where our employees can thrive personally and professionally. With cutting-edge facilities and groundbreaking projects, Proterra offers unique opportunities to grow, collaborate, and lead transformative change in the electrification of heavy-duty transportation and equipment.
Our commitment to innovation extends beyond our battery solutions to our people, where we create an environment where everyone feels valued, supported, and empowered to drive change for the earth. Here at Proterra we strive to foster a culture of inclusivity, valuing diverse perspectives and encouraging bold ideas, allowing our employees to bring their full selves to work. Our employees benefit from competitive total rewards packages, and opportunities to develop professionally.
Position Overview:â¯
The Information Security Engineer will be responsible for developing, enhancing, and executing Information Security Operations at Proterra.⯠In this position you will assist with the maintenance and implementation of IT security systems to protect Proterra's corporate, manufacturing, cloud and IoT environments from cyber-attacks. You will maintain and lead incident response and escalations with our security operations center, be responsible for vulnerability management and participate in the creation or improvement of company security policies/ procedures.⯠You will be responsible for conducting/leading risk assessments and participating in and supporting security assessments and audits. Additionally, you will be assisting with evaluation, setup and utilization of new security products and technologies.â¯
About the Role - You will:â¯
Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
Work with cross functional teams to support security requirements to protect organization's corporate, manufacturing, cloud and IoT environments from cyber-attacks.
Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.â¯
Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
Work with cross functional teams to support security requirements to protect organization's corporate, manufacturing, cloud and IoT environments from cyber-attacksâ¯â¯
Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.â¯
Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
Assist Crowdstrike Falcon Complete team in remediation of critical information security incidents in coordination with 3rd party SOC team.â¯
Implement and maintain security controls and have a suitable knowledge of existing cyber threats to infrastructure and clouded environments.â¯
Participate in scheduled security assessment activities and projects to ensure industry compliance.â¯
Initiate and maintain Security Incident Response Plan (SIRT) and After-Action Reports (AARs) to maintain operational continuityâ¯
Identify, analyze and interpret threat actors and malicious activity in client environments act upon and take the appropriate actions towards remediation and documentation.â¯
Differentiate between potential intrusion attempts and pinpoint false alarmsâ¯by working with EDR, Identity Protection and NextGen SIEM to develop resolution plans.
Perform 3rd party vendor assessments and fulfill Proterra security assessments requirements
Triage and respond to security events - serve as a primary responder for incidents, taking ownership of incidents and tracking through resolution.â¯
Performs other related duties as assigned.â¯
Your Experience Includes:
3-5 years of related information technology infrastructure experience⯠with identity and access management [IAM], SSO solutions including (SAML 2, OAuth 2, OIDC).
Some experience in securing enterprise networks, including firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and secure network protocols (e.g., IPsec, SSL/TLS) heavy emphasis in SaaS apps such as Crowdstrike Falcon Complete, Netskope DLP, Nessus Tenable and asset management platforms such as Axionus.
Overall Knowledge of endpoint protection technologies (e.g., anti-malware, EDR, DLP), and experience in managing and securing workstations, mobile devices, and servers.
Have participated in penetration testing, vulnerability assessments, and red teaming exercises.
General understating of industry standards, compliance, and legal requirements (ISO 27001, FedRAMP, NIST 800-171, NIST 800-53, SOC2, etc.)â¯
Excellent trouble-shooting abilities in software and hardware and be able to lead outage calls and trouble-shooting conversations until resolved and provide detailed root cause analysis reports.â¯
Above average understanding in vulnerability reporting using Saas platforms such as Nessus Tenable.
Education:
Bachelor's degree in computer science, Information Security, Electrical Engineering or Management Information Systems preferred. Equivalent years of consecutive IT security experience with recognized industry certifications may be considered.
Certifications:
CISSP, CASP+, SSCP+, or other relevant security certificatesâ¯
Certified Ethical Hacking (CEH) CISSP, CISA
Network+, Security+, Linux+ or combination of similar certificates acceptable.
Applicants must be authorized to work for any employer in the U.S. There is no immigration sponsorship available for this role (ex: H1-B, OPT, CPT, TN or any other employment sponsorship).â¯
#LI-BJ1
Senior Information Security Analyst
Cyber security analyst job in Landrum, SC
Founded on a simple belief - do what's right for our clients and our people. TrueBridge leverages proven talent identification / attraction / screening solutions to match highly qualified IT and business professionals with great opportunities.
We made the Staffing Industry Analyst's 'Fastest Growing' list in 2013, 2014 and 2015.
Job Description
Summary:
Information Technology Services team members are responsible for securely managing information systems throughout their life-cycle, including; knowing what information systems are within their scope of responsibility, understanding what sensitive data is stored, transmitted, or processed on those information systems, enforcing the security principles of least privilege and least functionality, knowing what events may constitute an information security incident, and understanding their role in security incident response activities.
Recognizes and identifies potential areas where existing data security policies, standards and procedures need change
Educates and communicates to ITS application managers and owners the definition of high risk/privileged/administrative access and how to report new access for ongoing reviews
Qualifications
Manages user entitlements in Active Directory, UNIX, RACF (Resource Access Control Facility). Must have a general understanding of these environments and how users are managed. Must have a general understanding of these environments and how users are managed.
SQL or PowerShell experience, a plus.
Bachelor's Degree preferred
ServiceNow experience
Additional Information
All your information will be kept confidential.
Renil John "Neil" Cervantes
National Talent Advisor - TrueBridge Resources
***************
Security Engineer
Cyber security analyst job in Asheville, NC
Introduction Do you have the career opportunities as a(an) Security Engineer you want with your current employer? We have an exciting opportunity for you to join HCA Healthcare which is part of the nations leading provider of healthcare services, HCA Healthcare.
Benefits
HCA Healthcare offers a total rewards package that supports the health, life, career and retirement of our colleagues. The available plans and programs include:
* Comprehensive medical coverage that covers many common services at no cost or for a low copay. Plans include prescription drug and behavioral health coverage as well as free telemedicine services and free AirMed medical transportation.
* Additional options for dental and vision benefits, life and disability coverage, flexible spending accounts, supplemental health protection plans (accident, critical illness, hospital indemnity), auto and home insurance, identity theft protection, legal counseling, long-term care coverage, moving assistance, pet insurance and more.
* Free counseling services and resources for emotional, physical and financial wellbeing
* 401(k) Plan with a 100% match on 3% to 9% of pay (based on years of service)
* Employee Stock Purchase Plan with 10% off HCA Healthcare stock
* Family support through fertility and family building benefits with Progyny and adoption assistance.
* Referral services for child, elder and pet care, home and auto repair, event planning and more
* Consumer discounts through Abenity and Consumer Discounts
* Retirement readiness, rollover assistance services and preferred banking partnerships
* Education assistance (tuition, student loan, certification support, dependent scholarships)
* Colleague recognition program
* Time Away From Work Program (paid time off, paid family leave, long- and short-term disability coverage and leaves of absence)
* Employee Health Assistance Fund that offers free employee-only coverage to full-time and part-time colleagues based on income.
Learn more about Employee Benefits
Note: Eligibility for benefits may vary by location.
Our teams are a committed, caring group of colleagues. Do you want to work as a(an) Security Engineer where your passion for creating positive patient interactions is valued? If you are dedicated to caring for the well-being of others, this could be your next opportunity. We want your knowledge and expertise!
Job Summary
The IPS Field Security Engineer will support Division and Facility Network/System Engineers and Administrators by analyzing a wide range of applications, network configurations, and security architectures to ensure the security, integrity, and regulatory compliance of critical information transmitted or stored within the enterprise. Their role is to facilitate the discovery of information and IT-related risks, apply critical thinking to assumptions and develop the right security position/priorities that: first, attain compliance; second, address the material risks to the company while allowing the business to attain its objectives. This position blends cybersecurity engineering with system infrastructure expertise to support risk management, threat mitigation, infrastructure reliability, and compliance with IT and security standards.
The IPS Field Security Engineer will work across multiple domains of information security (i.e. Security and Risk Management, Asset Security, Security Architecture and Engineering, Network Security, Identity and Access Management, Security Assessment and Testing, and Security Operations), providing consultation, assessments, and security/technical guidance to business units and IT teams.
Major Responsibilities:
Risk Management and Security Consulting
* Serves as an internal information security consultant to the enterprise while balancing the needs of the business.
* Research and recommend solutions that meet security standards while ensuring functionality for business continuity.
* Drive and manage execution of corrective actions to address deficiencies identified during risk assessments.
* Translate security standards and regulatory requirements into actionable technical and business requirements.
* Lead and support the IPS program by assessing new applications and technologies and ensuring they are implemented in accordance with company standards
* Partner with appropriate stakeholders on vulnerability remediation
* Engage in Architecture Review Committee discussions to identify and address Third Party solution variance from company standards
* Support, coordinate, and manage incident response and investigation activities
* Evaluate and recommend security solutions that balance risk mitigation with business functionality
* Drive ongoing compliance with IPS policies, standards, and operational procedures
* Serve as an internal security consultant across business units
* Manage operational processes that monitor and respond to potential security threats
Security Engineering & Architecture
* Evaluate new and proposed security technologies and assist in their integration
* Assist in the design and implementation of secure network, application, and system architectures.
* Partner with IT colleagues to assure ongoing maturity of IT operational security controls.
* Participate in the development and testing of disaster recovery and contingency plans
Security Operations and Threat Management
* Partner with corporate and local departments as required to facilitate rapid response to cybersecurity events.
* Maintain awareness of emerging threats, vulnerabilities, and mitigation techniques.
* Oversee processes for review and approval of security exception requests.
Vendor Systems Security
* Partner with appropriate business and IT leadership to help ensure systems, services, and devices receive appropriate assessments and remediation as part of local on-boarding processes.
* Partner with business and IT leadership to ensure proper controls are in place for existing vendor-maintained solutions.
Education & Experience:
* Bachelors degree Required
* Masters degree Preferred
* 3+ years of experience in a relevant field Required
* 3+ years of experience in security risk management, information security domains, and/or hospital operations. Preferred
Licenses, Certifications, & Training:
* CISSP, CISA, CISM, CCNA, MCSA or other relevant certifications in network administration or information security Preferred
Additional Information
* The job may require up to 50% travel (Mostly within the Division)
HCA Healthcare has been recognized as one of the Worlds Most Ethical Companies by the Ethisphere Institute more than ten times. In recent years, HCA Healthcare spent an estimated 3.7 billion in cost for the delivery of charitable care, uninsured discounts, and other uncompensated expenses.
"Bricks and mortar do not make a hospital. People do."- Dr. Thomas Frist, Sr.
HCA Healthcare Co-Founder
If you are looking for an opportunity that provides satisfaction and personal growth, we encourage you to apply for our Security Engineer opening. We promptly review all applications. Highly qualified candidates will be contacted for interviews. Unlock the possibilities and apply today!
We are an equal opportunity employer. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.