Cyber security analyst jobs in Ballwin, MO - 74 jobs
All
Cyber Security Analyst
Security Engineer
Securities Analyst
Information Security Analyst
Cyber Security Specialist
Information Assurance Analyst
Data Security Analyst
Senior Security Engineer
Senior Information Security Analyst
CI Cyber Threat Analyst IV
Techguard Security 3.6
Cyber security analyst job in Saint Louis, MO
Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements:
Duties:
Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable):
Threat data collected and reported by NGA Technical CI team and network security personnel.
Intelligence reported by the Intelligence Community.
Fusion of all source threat analysis derived from multiple intelligence sources (INTs).
Imagery when available.
Information that can be used to inform security decisions.
Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include:
Compilation of data collected and reported in weekly products.
Intelligence reported by the Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Imagery when available.
Depiction of Technical CI threat(s) to NGA to inform security decision makers.
Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include:
Compilation of data collected and reported in weekly and monthly products.
Intelligence reported by the Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Include imagery when available.
Depiction of Technical CI threat(s) to NGA to inform security decisions.
Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include:
Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
Raw and finished Intelligence reported by Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Include imagery when available.
Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA.
Produce IIRs from data collected and reported by either the Technical CI team, NGA cybersecurity personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires:
Coordination with teammates and stakeholders to ensure accuracy of reported information.
Cross referencing local information reporting with Intelligence Community reporting.
Clear and concise writing to briefly convey threat.
Responsiveness to Intelligence Community priority collections requirements.
Timeliness.
Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross).
Provide Technical CI advise and expertise in support of CI inquiries, operations and issues.
Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers.
Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats).
Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
Display an ability to collaborate with internal NGA and external IC/Cyber community members.
Coordinate CI Cyber activities originating from Enterprise Incident Response Events.
Conduct liaison between CI Office, Insider Threat, CyberSecurity Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission.
Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures.
Skills and Experience Required:
Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations.
Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level.
Desired:
Be a credentialed graduate of an accredited federal or DoD CI training academy.
Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines.
Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines.
Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov.
Experience translating Government vision into understandable and achievable measures.
Experience in using supervisory skills to coach teammates to achieve objectives.
Monitor and track progress toward achievable measures.
$69k-91k yearly est. 4d ago
Looking for a job?
Let Zippia find it for you.
Information Assurance Principal Analyst (Program Lead) - JOEPS
Technology, Automation, and Management 3.6
Cyber security analyst job in Scott Air Force Base, IL
The Information Assurance Principal Analyst/Program Lead will provide leadership, oversight, and operational management for the Joint Operation Planning and Execution System (JOPES) and the Transportation Visualizer (TransViz) Functional Management Support contract. This individual will act as the primary liaison between TeAM, government officials, and all contract stakeholders, ensuring the coordination, integration, and execution of all program activities in accordance with DoD and USTRANSCOM expectations. The Information Assurance Principal Analyst/Program Lead will be responsible for meeting all performance, schedule, and quality objectives as outlined in the contract's scope.
Mission Objectives - The primary objective of this project is to support the operational effectiveness and mission readiness of the JOPES and TransViz platforms at Scott Air Force Base. As a critical contract team member, the Information Assurance Principal Analyst/Program Lead ensures seamless functional management, stakeholder coordination, and compliance with all contractual and security requirements while facilitating process improvements and the timely delivery of program services. This position supports USTRANSCOM and associated DoD agencies by optimizing system capabilities and user experience in support of national defense objectives.
Position Responsibility Summary
Serve as the principal point of contact (POC) for all programmatic, technical, and contractual matters, representing TeAM in communications with government officials and stakeholders.
Serve as a Liaison for all meetings & events, coordinating & scheduling all course training for teams, and attending reviews of the program.
Lead, supervise, and coordinate activities of the project team-overseeing System Administrators and the Database Administrator-to fulfill contract objectives.
Ensure timely and accurate reporting of program performance, deliverables, metrics, and compliance with DoD security, safety, and operational requirements.
Manage risks, mitigate issues, and implement corrective actions to maintain project schedule and instill quality control.
Oversee and ensure workforce compliance with all mandatory security, safety, and DoD-mandated annual training, including but not limited to OPSEC, Antiterrorism Level I, CUI, and Emergency Operations.
Develop and implement process improvements, leveraging industry best practices (e.g., ITIL) to enhance JOPES/TransViz functionality and user satisfaction.
Foster a culture of open communication and collaboration across stakeholders, promoting continuous improvement in program delivery.
Ensure all support activities are conducted on-site in compliance with established guidelines and within the designated geographic radius.
$63k-92k yearly est. 60d+ ago
Information Security Specialist
Collabera 4.5
Cyber security analyst job in Saint Louis, MO
Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers.
Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations.
For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US.
Job Description
Responsibilities:
Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios.
Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization
Qualifications
Required Skills/Experience
• 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role
• Knowledge of quantitative and qualitative risk evaluation methods
• An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance
• Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
• An ability to effectively influence others to modify their opinions, plans, or behaviors
• An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
• Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part
• An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization
• Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement
Additional Information
To set up an inerview for this position, feel free to contact:
Imran Malek
************
*******************************
$71k-97k yearly est. Easy Apply 2d ago
Network Information Security Specialist
Leidos 4.7
Cyber security analyst job in Shiloh, IL
The Defense group at Leidos has a career opening for a Network Information Security Specialist on a DISA contract. This role is primarily on the customer site at Scott AFB, IL. Administrator will provide support for assigned systems supporting Joint Worldwide Intelligence Communications System (JWICS).
PRIMARY RESPONSIBILITIES:
Works independently to perform configuration of Palo Alto enclave firewalls and other Information Assurance Networking assets as needed.
Perform required patching, STIGs, upgrades, and updates on IA related assets.
Must manage and enforce security strategies and policies within established guidelines.
Effectively manage IT Security Strategy, CyberSecurity, and Compliance and Risk Management supporting IT Security and Compliance Teams
Create and maintain system documentation and support accreditation activities.
Complete accreditation checklists and manage devices to mitigate cybersecurity controls and measures.
Assist in the implementation of global projects for Network and Information Assurance upgrades by providing technical insight, projected necessary actions, timelines, and resource availability
Implement recurring security requirements on network devices
Communicate with multi-tier support and global partners to coordinate troubleshooting efforts where required.
Utilize moderate System Administration skills in both Linux and Windows environments to navigate current systems while managing network assets.
Lead focused multi-tier teams while troubleshooting or upgrading global network problems.
Provide architectural and topology recommendations where efficiencies can be made.
BASIC QUALIFICATIONS:
Bachelor's degree in a relevant technical discipline with 4+ years of overall related experience, 8+ years of experience will suffice in lieu of degree
Active DoD Top Secret Security Clearance and ability to obtain a DoD Top Secret with SCI.
Must have experience or training in IA and IA supporting technologies to include Cisco and Juniper firewalls, authentication technologies (e.g., Active Directory), directory services, and vulnerability assessment tools (e.g., Nessus, nmap).
At least 3 years Linux or Windows experience.
Currently possess DoD 8750 certification at IAT level II, e.g. Security+ce or higher.
Currently possess an active Top Secret security clearance with the ability to acquire a Top Secret/SCI clearance.
Must satisfy both preparatory and sustaining DoD standard training and certification requirements as a condition of privileged access to any DoD information system.
PREFERRED QUALIFICATIONS:
Advanced Juniper experience
Gigamon Load Balancer experience
Experience with VMware vSphere/ESXi 5.
ITIL certification.
At Leidos, we don't want someone who "fits the mold"-we want someone who melts it down and builds something better. This is a role for the restless, the over-caffeinated, the ones who ask, “what's next?” before the dust settles on “what's now.”
If you're already scheming step 20 while everyone else is still debating step 2… good. You'll fit right in.
Original Posting:January 13, 2026
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:Pay Range $87,100.00 - $157,450.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
$87.1k-157.5k yearly Auto-Apply 2d ago
Cyber Security Operations Specialist II
Wcbinc
Cyber security analyst job in Saint Louis, MO
WCBinc is looking for a CyberSecurity Operations Specialist II to operate and manage all aspects of Information Systems, data availability, integrity, authentication, confidentiality, and non-repudiation. This role will develop and execute security policies, plans, and procedures and ensure security measures of the network.
What You'll Get to Do:
Provide cyber threat intelligence services for the collection, fusion, analysis, creation, and distribution of threat intelligence from government entities, commercial feeds, open sources, and other partners to obtain situational awareness of the threat environment.
Provide cyber threat intelligence services on an expanded 12x5 service support level during core hours and on-call support with two-hour response time during non-core hours.
Cyber threat intelligence services shall develop and disseminate reports and tippers to internal and external stakeholders based on events, alerts, and incidents on customer systems and networks.
Implements and monitors security measures for communication systems, networks, and provide advice that systems and personnel adhere to established security standards and Governmental requirements for security on these systems.
Designs and implements data network security measures; operates Network Intrusion Detection and Forensics; conducts performance analysis of Information Systems security incidents; develops Continuity of Operation (COOP)/Disaster Recovery (DR) plans and supports certification of Information Systems and Networks.
Supervises operation of Electronic Key Management System, other information security duties, and Public Key Infrastructure.
Receive tickets from other Cybersecurity Operations Services sub-services and conduct detailed analysis to validate any event/alert/incident
Categorize, prioritize, investigate, and assess cybersecurity events/alerts/incidents to identify the extent and scope of the event/alert/incident and what impact there is on the operation or systems
Update and forward tickets to other Cybersecurity Operations Services to customer as needed
Collect, aggregate, and analyze artifacts and evidence from all available tools, knowledge sources, and data artifacts to determine and document the who, what, when, where, why and how of an intrusion, its extent, how to limit damage, and how to recover
Submit custom signatures and tuning requests as needed to Network Security Services, Endpoint Security Services, and Cybersecurity Data Analysis Services
Assists the C-IRT by assessing ongoing incident activity to predict adversary responses and locations of compromise
Documents tickets and analysis to a level of detail sufficient to reconstruct the analyst's analysis, to include but not limited to the steps taken, timelines, and data required to justify the analyst's assessment
Provide custom metrics reports including incident category types, tools used, number of indicators, time opened at each step, trending statistics, service availability, system utilization, etc.
Provide input to the daily CSOC Significant Activity, Operations, and the weekly CSOC Status Report
Advanced Cybersecurity Analytics, coordinate with Network Security Services, Endpoint Security Services, and Cybersecurity Data Analysis Services to develop or tune rules/signatures/scripts
$68k-96k yearly est. 60d+ ago
Data Security Analyst
The Timberline Group
Cyber security analyst job in Saint Louis, MO
Join our dynamic and thriving company as a Data SecurityAnalyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning.
What You'll Be Doing
Monitor security service performance and availability: Provide recommendations on security equipment, software, and services
On-going investigation: Inspect information security alarms and events to determine vulnerability and impact
Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk
Participate in architecture reviews: Ensure adherence to information security architecture
Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to information security incidents
Design and deliver programs: Create education and training programs on information security and privacy matters
The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* *************************
"Delivering quality solutions through quality people"
$64k-89k yearly est. Easy Apply 60d+ ago
Senior Information Security Analyst (Job ID: 3705)
Valkyrie Enterprises 4.9
Cyber security analyst job in Scott Air Force Base, IL
Senior Information SecurityAnalyst (Job ID: 3705) Location: Scott AFB, IL Senior Information SecurityAnalyst is contingent upon contract funding Purpose: * Valkyrie Enterprises has need for a Senior Information SecurityAnalyst who will provide network and I.T. design support at Scott Air-Force Base, IL
Job Description:
* Oversees overall network security. Ensures protection from viruses or other security threats, corrupt data and maintain system backups.
* Communicates hardware/software problems with outside support personnel, i.e.: vendors and technical support representatives.
* Develop and implement security protocols to protect network infrastructure and data integrity.
* Monitor network traffic for unusual activity and respond to potential threats in real-time.
* Conduct vulnerability assessments and penetration testing to identify weaknesses in systems.
* Collaborate with IT teams to design secure cloud infrastructure solutions.
* Maintain and manage security tools such as PRTG, Juniper, and other monitoring systems.
* Document security incidents and create reports for management review.
* Stays up to date with the latest cybersecurity trends, threats, and technology advancements.
* Assists in the development of disaster recovery plans and business continuity strategies.
Qualifications
* Must have a minimum of 10 years' experience in CyberSecurity.
* Must have demonstrated experience as a Cybersecurity Engineer or in a similar role.
* Must have extensive knowledge of security protocols, cryptography, and security frameworks.
* Must have significant experience in managing network IDS/IPS systems, including FireEye NX and Cisco FIREPOWER appliances.
* Must possess advanced understanding of Microsoft OS & applications.
* Must have extensive experience with hardware/software troubleshooting and analysis.
* Must demonstrate initiative, the ability to manage multiple projects, meet deadlines, and determine priorities in a fast-paced environment.
* Must have excellent people skills; communication and familiarity with a customer support environment are crucial.
* Must have IAT Level II Certification
Desired Qualifications
* C&A, RMF Certifications are preferred.
Security Requirements
* TS/SCI security clearance
Travel Requirements:
* Occasional travel- less than 10%
* If position requires travel by domestic flight or access to secure federal facilities/military bases, candidate must be able to obtain (by start of position) and maintain appropriate identification credentials, such as REAL ID. (More information regarding REAL ID can be found: *************************** )
Physical Requirements:
* Remaining in a stationary position, often standing, or sitting for prolonged periods.
* Required to use hands to finger, handle, or feel; reach with hands and arms.
Valkyrie strictly adheres to a policy of equal employment opportunity. This policy is based on Valkyrie's commitment to hire and retain qualified employees consistent with position requirements; and to seek, employ, promote and treat all employees and applicants for employment without regard to race, color, religious creed, national origin, ancestry, citizenship status, pregnancy, childbirth, physical disability, mental disability, age, military status or protected veteran status, marital status, registered domestic partner or civil union status, gender (including sex stereotyping and gender identity or expression), medical condition, genetic information or sexual orientation or other protected characteristics.
Additionally, Valkyrie Enterprises provides a variety of benefits to eligible employees to support your best health, wellness, and future, to include medical/dental/vision options, company paid life and disability insurances, 401k with match, education reimbursement, as well as company paid holidays and paid time off (PTO).
Pay Range: $34 - $44 per hour
$34-44 hourly 60d+ ago
Managed Services Security Analyst
GFI Digital
Cyber security analyst job in Maryland Heights, MO
The Managed Service SecurityAnalyst is responsible for monitoring, detecting, and responding to security incidents to protect client environments. This role involves the identification of vulnerabilities, analyzing security risks, responding to security operations service tickets, and implementing protective measures. The SecurityAnalyst will also assist with security audits, incident response, compliance-related activities and projects, and ensuring that all security services meet established performance and security standards.
PRINCIPAL DUTIES AND RESPONSIBILITIES:
Client Support: Provide security-related support to clients, addressing concerns, incidents, and queries in a timely manner.
Security Monitoring: Perform continuous security monitoring of client systems, networks, and applications for malicious activities or security breaches.
Incident Response: Respond to security incidents, conduct investigations, containment, and remediation efforts to mitigate risks and protect client environments.
Vulnerability Management: Identify, assess, and prioritize vulnerabilities in client systems, recommending and implementing mitigation strategies.
Threat Intelligence: Utilize threat intelligence tools to identify potential risks and provide proactive defense recommendations.
Compliance Support: Ensure client systems adhere to regulatory and compliance standards (e.g., PII, HIPAA, PCI-DSS) as required.
Security Audits: Assist with internal and external security audits, including the preparation and maintenance of audit documentation.
Documentation: Maintain detailed records of security incidents, operational tasks, and system configurations in accordance with best practices.
KNOWLEDGE, SKILLS AND ABILITIES:
Education: Bachelor's degree in information technology, Computer Science, a related field, or additional years of relevant job experience.
Experience: Minimum of 1 year of experience in an IT security or service role, preferably in a managed services environment.
Certifications: Relevant certifications such as CASP+, CISSP, CEH, CompTIA Security+, or equivalent are preferred.
Skills:
Strong understanding of security frameworks (e.g., NIST, ISO 27001).
Experience with security information and event management (SIEM) tools.
Excellent analytical and problem-solving abilities.
Strong communication and interpersonal skills for client-facing interactions.
Ability to manage multiple security incidents and tasks simultaneously.
$64k-88k yearly est. Auto-Apply 60d+ ago
Senior AI Security Engineer
Mastercard 4.7
Cyber security analyst job in OFallon, MO
Our Purpose
Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential.
Title and Summary
Senior AI Security EngineerAs an Information Security Engineer specializing in AI Security and Data Science, you will be at the forefront of protecting our AI systems and the underlying data that powers them. Your role will combine deep technical expertise in security engineering with strong data science capabilities to analyze, interpret, and secure complex datasets used in AI models. You will design and implement advanced security measures to safeguard AI infrastructure and ensure the integrity, confidentiality, and availability of AI-driven solutions.
Key Responsibilities:
- Security Architecture Design: Architect and implement robust security frameworks for AI systems, including secure coding practices and design principles.
-Data Analysis & Risk Modeling: Apply data science techniques to analyze AI system data, identify patterns, and assess potential security risks. Develop predictive models to anticipate vulnerabilities and threats.
- Vulnerability Assessment: Implement and manage tooling for penetration testing on AI models and systems, leveraging statistical and data-driven approaches to prioritize remediation.
- Secure AI Development: Collaborate with data scientists and software engineers to integrate security best practices into the AI development lifecycle, including secure model training, validation, and deployment.
- Data Governance & Privacy: Ensure compliance with data protection standards (GDPR, NIST, ISO) and implement privacy-preserving techniques such as differential privacy and federated learning.
- Research and Innovation: Stay abreast of advancements in AI security and data science, conduct research, and contribute to innovative security solutions.
- Documentation and Reporting: Prepare detailed reports and dashboards using data visualization tools to communicate security posture and risk insights.
- Advisory and Support: Provide guidance on secure data handling and AI security best practices to cross-functional teams.
- Technical Training and Mentorship: Mentor team members on AI security principles and data science methodologies.
- Experimentation and POCs: Design and execute experiments and proof-of-concepts to validate emerging threats and security solutions using data-driven approaches.
Qualifications:
Bachelor's or Master's degree in Computer Science, Information Security, Data Science, or related field.
Relevant experience in information security with a strong focus on AI systems and data protection.
Proficiency in data science tools and languages (Python, R, SQL) and experience with machine learning frameworks (TensorFlow, PyTorch).
Strong understanding of statistical modeling, data visualization, and anomaly detection techniques.
Expertise in designing and implementing security measures for AI systems, including encryption, access controls, and secure coding desired.
Excellent analytical and problem-solving skills with ability to interpret complex datasets for security insights.
Relevant certifications such as CISSP, CEH, OSCP, or data science certifications are highly desirable.Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly.
Corporate Security Responsibility
All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must:
Abide by Mastercard's security policies and practices;
Ensure the confidentiality and integrity of the information being accessed;
Report any suspected information security violation or breach, and
Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Mastercard benefits for interns generally include: 56 hours of Paid Sick and Safe Time; jury duty leave; and on-site fitness facilities in some locations.
Pay Ranges
O'Fallon, Missouri: $115,000 - $184,000 USD
$115k-184k yearly Auto-Apply 7d ago
Associate Product Security Engineer
Jeppesen 4.8
Cyber security analyst job in Hazelwood, MO
Company:
The Boeing Company
Boeing is seeking an innovative Associate Product Security Engineer - Avionics Development to join our growing team as part of an integrated Product Security Organization, located in Berkeley, MO, Hazelwood, MO, Saint Louis, MO, Saint Charles, MO. The successful candidate will be responsible for the development, implementation, and sustainment of product cybersecurity and resiliency engineering for avionics through requirements, design, analysis, build, test, production, operations, support and sustainment.
You will be a part of Boeing's Product Security Engineering Organization, which is a growing multi-disciplinary cybersecurity engineering organization that is responsible for the cybersecurity and resiliency of our products, platforms, and services. You will have the opportunity to shape and influence Product Security Engineering within Boeing and engage with Boeing's Product Security community. Furthermore, your effort will directly inform our Enterprise Product Security Engineering team with lessons learned and technologies, that directly enhances our commercial and defense offerings.
Primary responsibilities:
Support development, implementation, and sustainment of product security for Boeing avionics systems, throughout the requirements, design, analysis, build, test, production, operations, support and sustainment lifecycle
Support coordination with platforms and system-of-systems product security counterparts for requirements, activities, artifacts, and solutions
Support coordination with other engineering stakeholders - systems, software, and hardware - advising on the results of security analysis - to develop secure architectures and designs
Support the integration of standards and processes for product security engineering for avionics development, and to meet applicable program and certification requirements
Utilize the Risk Engineering digital thread to inform product requirements surrounding cyber survivability against specified cyber threats - by performing criticality, adversity, threat analysis for avionics systems
Support assessment of internal customer requirements to derive strategies and detailed security requirements system and technical requirements
Support the execution of PSE activities - security requirements, architectures, risk assessments
Documenting PSE activities and delivering PSE artifacts
Support risk reduction and technology maturation activities - where appropriate - resulting in innovative solutions in product and services offering
Support the identification and elevation of product security risks to the integrated product team(s) and management
Basic Qualifications (Required Skills and Experience):
Bachelor of Science degree in Engineering, Engineering Technology (including Manufacturing Technology), Computer Science, Data Science, Mathematics, Physics, Chemistry or non-US equivalent qualifications directly related to the work statement
2+ years of related work experience or an equivalent combination of education and experience
Working knowledge of cybersecurity controls, frameworks, and the vulnerability management lifecycle
Experience in architecture, design, management, administration and troubleshooting of networks with a focus on security controls and firewall administration
Experience in cybersecurity and/or product security engineering
Experience in analysis of customer security requirements and deriving detailed security requirements, architecture & design
Ability to identify new opportunities and engage with stakeholders to define, plan, resource and deliver solutions
Experience coordinating and presenting technical content to a diverse audience, as well as preparing technical documentation
Experience performing adversity (threat) analysis, security risk assessments, and maturing the analysis throughout the development lifecycle - to inform requirements, and design
Experience generating product cybersecurity artifacts for customer/certifiers
Preferred Qualifications (Desired Skills and Experience):
Security certification is desired: DoD 8570.01M / DoDD 8140.01 certification at IASAE Level II or higher (such as Security+ CE, GSEC, SSCP, CISSP, CISA, CCNA-Security)
Experience with defense security standards (DoDI 8510.01, ICD-503, CNSSI-1253, NIST 800-53) to perform risk analysis and provide strategic direction for system architectures, operations and delivered products
Experience with military avionics and military platform operations
U.S. Top Secret or Secret Security Clearance
Drug Free Workplace:
Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies.
Pay & Benefits:
At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities.
The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work.
The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements.
Pay is based upon candidate experience and qualifications, as well as market and business considerations.
Summary Pay Range: $102,000 - $138,000
Language Requirements:
Not Applicable
Education:
Bachelor's Degree or Equivalent
Relocation:
This position offers relocation based on candidate eligibility.
Export Control Requirement:
This position must meet U.S. export control compliance requirements. To meet U.S. export control compliance requirements, a “U.S. Person” as defined by 22 C.F.R. §120.62 is required. “U.S. Person” includes U.S. Citizen, U.S. National, lawful permanent resident, refugee, or asylee.
Safety Sensitive:
This is not a Safety Sensitive Position.
Security Clearance:
This position requires the ability to obtain a U.S. Security Clearance for which the U.S. Government requires U.S. Citizenship. An interim and/or final U.S. Secret Clearance Post-Start is required.
Visa Sponsorship:
Employer will not sponsor applicants for employment visa status.
Contingent Upon Award Program
This position is not contingent upon program award
Shift:
Shift 1 (United States of America)
Stay safe from recruitment fraud! The only way to apply for a position at Boeing is via our Careers website. Learn how to protect yourself from recruitment fraud - Recruitment Fraud Warning
Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law.
EEO is the law
Boeing EEO Policy
Request an Accommodation
Applicant Privacy
Boeing Participates in E - Verify
E-Verify (English)
E-Verify (Spanish)
Right to Work Statement
Right to Work (English)
Right to Work (Spanish)
$102k-138k yearly Auto-Apply 9d ago
Cloud Security Engineer
Us Corp2Corp
Cyber security analyst job in Saint Louis, MO
Compunnel Software Group is a New Jersey based premier information technology consulting & services company into this market for nearly two decades now; with close to two decades of experience in IT Industry which includes consulting, development, e-learning etc.
Our company is going through a tremendous growth spurt and we are now interested in personnel like you to augment the work force in the company. We have several projects starting that we are staffing for. If you think you would like to become a consultant for
Compunnel Software Group Inc
., please send me an updated copy of your resume along with a detailed summary of your work experience. I need a phone number to contact you. I look forward to possibly working with you on these positions.
We offer specialized services to our clients to meet their business objectives. Successful solutions that are valued by our clients are in industry areas such as pharmaceuticals, telecommunications, banking, finance, manufacturing, publishing and consumer products.
Job Description
Position: Cloud Security Engineer
Duration: 6+ months
Location: St. Louis, MO, 63167
Must Have:
Cloud SecuritySecurity Patches
Cloud Security Automation Engineer
Client is seeking a Cloud Security Automation Engineer with deep technical experience in securing cloud technologies.
The successful candidate possesses out of the box thinking, the ability to collaboration with development team members, and experience with automation and solving end to end application/infrastructure security problems.
Our mission is to design and build a highly secure cloud environment without sacrificing our developers' ability to quickly innovate and deliver world class software solutions.
Responsibilities:
•
Define security best practices for our cloud platform and provide guidance to development teams.
• Build tools to monitor for compliance of security policy and automate the resolution process.
• Evangelize security throughout the enterprise and collaborate to help architect secure applications.
• Research emerging technologies and build proof of concepts to investigate better ways of meeting our control objectives.
• Collaborate with incident response, risk and compliance, product security and development teams to solve critical security problems.
• Develop an AppSec pipeline and integrate it into the agile software development process.
Required Qualifications:
•
BA/BS degree in Computer Science, Information Systems, CyberSecurity or a related technical field or equivalent experience.
• At least 3 years of experience in Information Security and/or infrastructure
engineering.
• An accomplished security practitioner with a strong understanding of industry trends in all areas of security.
• Experience with building IaaS cloud based solutions including AWS, Azure, etc.. and knowledge of their network security and IAM models.
• Experience working with security vendors including evaluating and implementing new products.
Desired Qualifications:
•
Expertise in common AWS services (CloudFormation, Route53, VPC, EC2, Lambda, etc...) and their security best practices.
• Programming experience in JavaScript, Java, Scala, Python, Perl, Ruby, etc.. and their use in automating security and compliance.
• Strong understanding of security technologies including host and network based protection and detection technologies.
• Experience with vulnerability management (including: running vulnerability scans, creating reports, communicating with asset owners and giving remediation guidance).
• Experience with continuous integration and automation tools (e.g. Jenkins, Chef, Puppet, Ansible).
• Experience writing security white papers and/or presenting security products and technologies to diverse audiences.
• CISSP or CSSLP (Certified Secure Software Lifecycle Professional) certification.
Qualifications
Must Have:
Cloud SecuritySecurity Patches
Additional Information
All your information will be kept confidential according to EEO guidelines.
$71k-97k yearly est. 2d ago
Application Security Engineer - Java / Node.js
The Giant Bullseye
Cyber security analyst job in Saint Louis, MO
Seeking a Java / Node.js Engineer focused on application security remediation, technical debt reduction, and automated vulnerability fixes across multiple platforms. This role partners closely with InfoSec, QA, DevOps, and engineering teams to improve security posture using automation and GenAI-driven solutions.
Key Responsibilities
• Triage and remediate vulnerabilities from SAST, DAST, and SCA tools
• Secure Java, Node.js, Ruby on Rails, and WordPress applications against common OWASP risks
• Patch and upgrade third-party dependencies and harden application configurations
• Validate fixes through regression testing and user flow checks
• Integrate automated security and remediation into CI/CD pipelines
• Build GenAI-assisted remediation workflows using AWS Bedrock or similar tools
• Reduce technical debt, modernize legacy components, and harden cloud, container, and OS environments
• Collaborate with InfoSec and QA teams to close security findings and rescans
Required Skills & Experience
• Strong hands-on experience with Java, Spring Boot, REST APIs, and secure coding
• Proficiency in Node.js, Express.js, JavaScript/TypeScript
• Working knowledge of Ruby on Rails and WordPress security
• Experience with Veracode, Checkmarx, SonarQube, Snyk, or similar tools
• Strong understanding of OWASP vulnerabilities and mitigation techniques
• Experience with OAuth2/JWT, API security, Docker, Kubernetes, Linux, and AWS
• Hands-on experience integrating security into CI/CD pipelines
• Exposure to GenAI tools such as AWS Bedrock or CodeWhisperer
Preferred Qualifications
• Experience with microservices, cloud-native security, and DevSecOps
• Familiarity with OWASP ASVS and threat modeling
• Security certifications (CEH, CSSLP, OSCP) a plus
Exegy is a global leader in intelligent market data, advanced trading systems, and future-proof technology. Exegy serves as a trusted partner to the complete ecosystem of the buy-side, sell-side, exchanges, and financial services technology firms around the globe. Headquartered in St. Louis with regional offices in North America, the UK/Europe and Asia Pacific, Exegy has the global footprint to deliver world-class support and managed services to its customer base of elite financial market participants.
Job Summary
The Security Engineer - IAM & PAM is responsible for designing, implementing, and operating identity, authentication, authorization, and privileged access controls across the enterprise. This role focuses on reducing over-provisioned access, enforcing least privilege, and ensuring access is appropriately granted, reviewed, and revoked in alignment with business risk, regulatory requirements, and security best practices.
This engineer partners with IT Operations, Security Architecture, GRC, HR, and Application Owners to ensure identity and access management supports both secure operations and business agility.
Responsibilities
Identity & Access Engineering
Design, implement, and maintain IAM and PAM platforms supporting workforce, privileged, and service identities
Enforce least-privilege access models, role-based access control (RBAC), and attribute-based access control (ABAC) where appropriate
Implement strong authentication controls, including MFA, conditional access, and phishing-resistant authentication
Privileged Access Management (PAM)
Manage privileged identities for administrative, infrastructure, cloud, and application accounts
Eliminate shared, standing, and unmanaged privileged accounts through vaulting, just-in-time (JIT) access, and session recording
Ensure privileged access is time-bound, approved, logged, and auditable
Access Governance & De-Provisioning
Lead initiatives to identify and remediate over-provisioned access, orphaned accounts, and excessive entitlements
Design and operate access review and certification processes in collaboration with GRC and business owners
Integrate IAM with HR systems and ITSM to automate joiner, mover, and leaver workflows
Risk Reduction & Continuous Improvement
Partner with Risk and GRC teams to align IAM/PAM controls to ISO 27001, NIST, CIS Controls, and regulatory requirements
Perform periodic access risk assessments and provide remediation recommendations
Develop metrics that demonstrate risk reduction, such as decreased standing privileged access, faster de-provisioning, and reduced audit findings
Incident Support & Monitoring
Support security incident investigations related to identity misuse, credential compromise, or privilege escalation
Ensure IAM and PAM logs integrate with SIEM and monitoring platforms for visibility and alerting
Our Ideal Candidate Has
Technical Experience
5+ years of experience in information security or identity engineering, with deep focus on IAM and/or PAM programs
Hands-on experience designing, implementing, and operating enterprise IAM and PAM platforms (e.g., Azure AD / Entra ID, Okta, Ping, CyberArk, BeyondTrust, Delinea, HashiCorp Vault, or comparable solutions)
Proven experience building and maintaining RBAC models, automating joiner-mover-leaver workflows, and leading entitlement cleanup initiatives
Strong working knowledge of modern authentication and authorization protocols (SAML, OAuth, OIDC, LDAP, Kerberos)
Experience integrating identity systems across cloud platforms, SaaS applications, on-prem infrastructure, and CI/CD pipelines
Governance & Risk Enablement
Demonstrated experience reducing access-related audit findings and closing identity control gaps
Working knowledge of common security and compliance frameworks (e.g., ISO 27001 Annex A, NIST SP 800-53, CIS Controls), with emphasis on access control and identity safeguards
Ability to translate security and compliance requirements into practical, scalable identity controls that support business operations
Operating & Collaboration Approach
Effective partner to IT, Security, HR, and business teams to align identity controls with real-world workflows
Comfortable communicating access risk, least-privilege principles, and control decisions to both technical and non-technical stakeholders
Organized and process-oriented, with the judgment to balance security rigor, operational efficiency, and user experience
Experience That Enhances Impact
Exposure to regulated environments such as SOX, PCI-DSS, HIPAA, or similar compliance frameworks
Experience working with identity governance (IGA) platforms, access reviews, or access analytics
Relevant security or identity certifications (e.g., CISSP, CISM, GIAC, or IAM/PAM vendor certifications) are beneficial but not required
$75k-98k yearly est. Auto-Apply 9d ago
Security Analyst II
Touchette 3.9
Cyber security analyst job in Collinsville, IL
Monitors the health of Touchette Regional Hospital and SIHF Healthcare's security threat posture and cybersecurity & network infrastructure.
Develops a deep understanding of the threat landscape and ensures cybersecurity technology is monitored to detect threats.
Works with the IS Security Officer and junior members of the team to ensure that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with Touchette Regional Hospital and SIHF Healthcare IT and cybersecurity standards
Develops, documents, maintains, and communicates Touchette Regional Hospital and SIHF Healthcare's governance models and compliance codes and standards.
Develop, provide, and maintain necessary documentation for all network applications and network systems
Assist with network security in a multi-hospital & multi-healthcare clinic environment
Key responsibilities include:
Monitors endpoint anti-virus & malware, content-filtering, data loss prevention solutions, multi factor authentication systems, device profiling systems, firewall rules, network ACLs, server configuration monitoring, network logging consolidation and event correlation systems.
Analyze threat intelligence to anticipate and mitigate potential risks.
Conduct root cause analysis of security incidents and recommend corrective actions.
Conduct research on network products, services, protocols, and standards in support of network & security procurement and development efforts.
Installs and maintains network & security operating systems; ensures that backup copies of all files are routinely made and securely stored at separate location; maintains system documentation.
Develops vulnerability remediation documentation and assists in the remediation of vulnerabilities both on server and network systems both cloud and physical.
Documents systems with vulnerability's that are not able to be remediated, develops an action plan to secure those devices and communicates this information to stakeholder's and the IS Security Officer.
Develops the skills necessary to manage network security solutions.
Develops expertise in scanning and monitoring networks or server systems for attacks, malicious software, intrusions, and threats.
Develops an understanding of the organization's current threat posture and uses a variety of tools to understand emerging threat patterns and gauge potential impacts to day-to-day business processes.
Develops attack and penetration technologies to reduce threat landscape while looking for creative ways to save money and time where possible.
Works with the IS Security Officer to develop policies and training to ensure employees are following and understanding security policies and procedures.
Provides cybersecurity and network support for operational systems and assists in business planning, maintenance, and troubleshooting.
Executes risk management initiatives to assess risk and gather information/data for defining/updating policy/standards.
Researches and interprets risks and impacts of new technology, emerging patterns and trends in the cybersecurity landscape and provides updates/reports to the IS Security Officer on a regular basis.
Develops monitoring use cases, tests, and assesses the effectiveness of Digital controls.
Develops expertise in working with Network Packet Analyzers, Next-Generation Antivirus, Endpoint Detection and Response, Cyber Threat Intelligence and Threat Hunting Tools.
Engages and communicates effectively with internal personnel, external vendors, or contacts in day-to-day activities and fosters positive business relationships.
Educates the various business units on the different IT or cybersecurity strategies, policies, processes, and procedures.
Executes projects and programs for the Network and Security team as required.
Prepares and works with the different stakeholders to develop business continuity, disaster recovery and incident response plans
Develop methods or propose technologies to protect data at rest when required.
Will be required to provide on-call support in rotating intervals and emergency support as needed.
Ability to occasionally support routine or emergency network or security changes during normal business hours, after-hours, on weekends or during holidays is required. At the direction of your supervisor this may involve travel on-site to a pre-determined location to support these changes.
Ability to participate in on-call rotation.
Provides second-level technical support to users concerning network & security system operations.
Performs all other duties as assigned.
Qualifications
Bachelor's degree preferred, preferably in computer science, cybersecurity, network engineering, engineering, mathematics, or equivalent work experience
5-6 years of experience in information security, cybersecurity, or a related IT role.
Professional certifications preferred Cisco Certified CyberOps Professional (CCCP), Cisco Certified Network Professional - Security (CCNP Security), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), GIAC Certified Enterprise Defender (GCED).
In addition to the above qualifications, the successful candidate will demonstrate:
Fundamental knowledge of networking & security concepts
Understand the OSI model, well-known and reserved ports & network protocol specifications
Understand encryption methods used in securing network traffic transiting unsecured networks
Understand encryption methods to secure sensitive information stored digitally
Hands-on technical troubleshooting capabilities (physical, virtual, logical)
Ability to work independently under minimal supervision
Familiarity with network monitoring tools
Exceptional critical thinking and problem-solving ability
Strong interpersonal skills to assist non-technical individuals with complex technical issues
Ability to adapt and learn new skills rapidly in support of the IT organization across a variety of different operating systems, protocols, applications, or technologies.
Enthusiasm
Teamworking skills
Attention to detail
Physical Demands:
Must be able to sit and/or stand for prolonged periods of time
Must be able to wear personal protective equipment (PPE) (mask, gown, gloves) when required
Must occasionally lift and/or move up to 50 pounds; 100 pounds with assistance.
$60k-76k yearly est. Auto-Apply 21d ago
Security Engineer
Duvari Group
Cyber security analyst job in Bridgeton, MO
We are excited to add a new Senior Security Engineer role to our team and are seeking a local candidate who works best in a collaborative, on-site setting in the St. Louis area. Are you someone who is motivated by investigating security issues and strengthening environments end to end, this role could be for you!
Why This Role:
Highly technical, hands-on security role
Opportunity to influence security strategy, tooling, and processes
Close collaboration with infrastructure and architecture teams
Newly created position with real influence
What You'll Do:
Recommend and implement new technologies, processes, and practices to enhance security
Design and manage enterprise security platforms
Support cloud security initiative
Conduct risk and vulnerability assessments and support compliance efforts
What You Bring:
Over 7 years' experience in IT, including 3 years in security
Strong background in systems, infrastructure, networking and securitySecurity Experience (Azure, Microsoft 365, AD,)
DevOps experience Python, Scripting, Powershell, etc.
Critical thinking, problem-solving (find out root cause of issues/breaches, understands incident response), and strong communication skills
If you are looking to work in a collaborative environment where security is a top priority and your expertise makes a direct impact, this offers that opportunity!
$71k-97k yearly est. 14d ago
CI Cyber Threat Analyst IV
Techguard Security 3.6
Cyber security analyst job in Saint Louis, MO
Job Description
Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements:
Duties:
Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable):
Threat data collected and reported by NGA Technical CI team and network security personnel.
Intelligence reported by the Intelligence Community.
Fusion of all source threat analysis derived from multiple intelligence sources (INTs).
Imagery when available.
Information that can be used to inform security decisions.
Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include:
Compilation of data collected and reported in weekly products.
Intelligence reported by the Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Imagery when available.
Depiction of Technical CI threat(s) to NGA to inform security decision makers.
Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include:
Compilation of data collected and reported in weekly and monthly products.
Intelligence reported by the Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Include imagery when available.
Depiction of Technical CI threat(s) to NGA to inform security decisions.
Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include:
Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
Raw and finished Intelligence reported by Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Include imagery when available.
Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA.
Produce IIRs from data collected and reported by either the Technical CI team, NGA cybersecurity personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires:
Coordination with teammates and stakeholders to ensure accuracy of reported information.
Cross referencing local information reporting with Intelligence Community reporting.
Clear and concise writing to briefly convey threat.
Responsiveness to Intelligence Community priority collections requirements.
Timeliness.
Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross).
Provide Technical CI advise and expertise in support of CI inquiries, operations and issues.
Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers.
Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats).
Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
Display an ability to collaborate with internal NGA and external IC/Cyber community members.
Coordinate CI Cyber activities originating from Enterprise Incident Response Events.
Conduct liaison between CI Office, Insider Threat, CyberSecurity Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission.
Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures.
Skills and Experience Required:
Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations.
Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level.
Desired:
Be a credentialed graduate of an accredited federal or DoD CI training academy.
Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines.
Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines.
Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov.
Experience translating Government vision into understandable and achievable measures.
Experience in using supervisory skills to coach teammates to achieve objectives.
Monitor and track progress toward achievable measures.
$69k-91k yearly est. 5d ago
Information Security Specialist
Collabera 4.5
Cyber security analyst job in Saint Louis, MO
Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers.
Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations.
For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US.
Job Description
Responsibilities:
Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios.
Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization
Qualifications
Required Skills/Experience
• 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role
• Knowledge of quantitative and qualitative risk evaluation methods
• An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance
• Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
• An ability to effectively influence others to modify their opinions, plans, or behaviors
• An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
• Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part
• An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization
• Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement
Additional Information
To set up an inerview for this position, feel free to contact:
Imran Malek
************
*******************************
$71k-97k yearly est. Easy Apply 60d+ ago
Cyber Security Operations Specialist III
Wcbinc
Cyber security analyst job in Saint Louis, MO
WCBinc is pursuing an opportunity with the National Geospatial-Intelligence Agency (NGA) for Transport & Cybersecurity Services (TCS) contract. The functional capabilities are to provide the information technology (IT) infrastructure services required to deliver timely, relevant, and accurate GEOINT in support of national security. TCS will provide innovative design, engineering, procurement, implementation, operations, sustainment and disposal of transport and cybersecurity IT services on multiple networks and security domains, at multiple locations worldwide to support the NGA GEOINT mission.
What You'll Get to Do:
Provide cyber threat intelligence services for the collection, fusion, analysis, creation, and distribution of threat intelligence from government entities, commercial feeds, open sources, and other partners to obtain situational awareness of the threat environment.
Cyber threat intelligence services shall develop and disseminate reports and tippers to internal and external stakeholders based on events, alerts, and incidents on the customer systems and networks.
Provide advanced cybersecurity analytics (ACA) services which aggregates and analyzes products, data, and information to identify trends and patterns, anomalous activity, provide situational awareness of the customers networks, missions and threats, and provide operational recommendations, visualizations, tuning requests, and custom signature creation to the CSOC and other internal and external stakeholders.
Implements and monitors security measures for communication systems, networks, and provide advice that systems and personnel adhere to established security standards and Governmental requirements for security on these systems.
Designs and implements data network security measures; operates Network Intrusion Detection and Forensics; conducts performance analysis of Information Systems security incidents; develops Continuity of Operation (COOP)/Disaster Recovery (DR) plans and supports certification of Information Systems and Networks.
Advanced Cybersecurity Analytics will provide advanced cybersecurity services on an expanded 12x5service support level during core hours and on-call support with two-hour response time during non-core hours.
Cyber Threat Intel Services will provide advanced cybersecurity services on an expanded 12x5 service support level during core hours and on-call support with two-hour response time during non-core hours.
Supervises operation of Electronic Key Management System, other information security duties, and Public Key Infrastructure.
Develops new concepts and processes.
Analyzes root causes and resolves issues.
Supports more junior level technicians and specialists in their activities.
Can perform all tasks of lower level technicians or specialists.
Works individually, actively participates on integrated teams, and may also lead a task, project or team
Requires guidance and direction from more expert level technicians, specialists, and managers only when dealing with new, uncertain situations.
Provides guidance to lower level technicians and specialists.
$68k-96k yearly est. 60d+ ago
Security Analysts
The Timberline Group
Cyber security analyst job in Saint Louis, MO
Securityanalysts are responsible for analyzing system and application security and making recommendations that optimize the protection of our computer systems and information resources. Securityanalysts develop, test, implement and maintain security policies and programs. They are responsible for staying current on security best practices and identifying security procedures to support business objectives and regulatory compliance.
Responsibilities:
The Information Security Office (ISO) Regulatory Compliance team is seeking a SecurityAnalyst 2 to actively contribute to our organization's compliance efforts. This role calls for someone who can work closely with various business units, conduct thorough assessments, and assist in crafting effective remediation plans.
Key Responsibilities:
As a SecurityAnalyst 2 on the Regulatory Compliance Team, you will:
Coordinate audits with external assessors (QSA) and internal stakeholders to streamline assessment process related to collecting evidences
Lead the validation of PCI requirements testing results and drive compliance gap remediation efforts
Create and maintain documentation to support PCI program
Conduct comprehensive internal compliance assessments, identify compliance gaps, and actively participate in developing remediation plans.
Collaborate closely with different business units to ensure alignment with relevant regulations and standards.
Support automation efforts across the compliance function.
Regularly review policies and procedures to ensure ongoing compliance with regulatory requirements.
Effectively manage and prioritize multiple projects related to regulatory compliance.
Stay vigilant in monitoring and tracking regulatory changes, providing teams with guidance on updating policies and procedures as needed.
Be a source of guidance and support for fellow members of the compliance team.
Qualifications:
Required:
Must be presently authorized to work in the U.S. without a requirement for work authorization sponsorship by our company for this position now or in the future
Must be committed to incorporating security into all decisions and daily job responsibilities
3+ years with leading, planning and execution of PCI assessments which includes review of control design with a focus on payment card compliance and security.
Demonstrate the ability to work both independently with a strong sense of ownership and collaboratively within a team to achieve departmental and project objectives.
Ability to maintain a high degree of confidentiality.
Detail-oriented with strong project management skills, including project planning, directing project activities, and leading project teams.
Proficient in documentation, communication skills, and a proven ability to deliver formal and informal presentations to a diverse audience.
Ability to organize and prioritize multiple complex assignments and tasks for self and team members, ensuring deadlines are met.
Excellent problem-solving and analytical skills, with the ability to define problems, collect data, establish facts, and draw valid conclusions.
Demonstrated leadership, collaboration, and relationship management skills, representing goals within the team and outside the department.
Ability to be flexible and adaptable to changing requirements and responsibilities while delivering high-quality results.
Commitment to incorporating security into all decisions and daily job responsibilities.
Proficiency with Microsoft Office applications, including Outlook, Word, PowerPoint, and Excel.
Preferred:
Bachelor's degree in CyberSecurity, Computer Science, Computer Information Systems, Management Information Systems, or extensive security-related experience, or an equivalent combination of education and experience.
Functional knowledge of productivity, documentation, and collaboration tools such as SharePoint, Jira, Confluence, and Jive.
The Timberline Group Phone: ************ PO Box 385, Lebanon, MO 65536 ********************* *************************
"Delivering quality solutions through quality people"
$64k-88k yearly est. Easy Apply 60d+ ago
Security Analyst II
Touchette 3.9
Cyber security analyst job in Collinsville, IL
Job Description
Monitors the health of Touchette Regional Hospital and SIHF Healthcare's security threat posture and cybersecurity & network infrastructure.
Develops a deep understanding of the threat landscape and ensures cybersecurity technology is monitored to detect threats.
Works with the IS Security Officer and junior members of the team to ensure that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with Touchette Regional Hospital and SIHF Healthcare IT and cybersecurity standards
Develops, documents, maintains, and communicates Touchette Regional Hospital and SIHF Healthcare's governance models and compliance codes and standards.
Develop, provide, and maintain necessary documentation for all network applications and network systems
Assist with network security in a multi-hospital & multi-healthcare clinic environment
Key responsibilities include:
Monitors endpoint anti-virus & malware, content-filtering, data loss prevention solutions, multi factor authentication systems, device profiling systems, firewall rules, network ACLs, server configuration monitoring, network logging consolidation and event correlation systems.
Analyze threat intelligence to anticipate and mitigate potential risks.
Conduct root cause analysis of security incidents and recommend corrective actions.
Conduct research on network products, services, protocols, and standards in support of network & security procurement and development efforts.
Installs and maintains network & security operating systems; ensures that backup copies of all files are routinely made and securely stored at separate location; maintains system documentation.
Develops vulnerability remediation documentation and assists in the remediation of vulnerabilities both on server and network systems both cloud and physical.
Documents systems with vulnerability's that are not able to be remediated, develops an action plan to secure those devices and communicates this information to stakeholder's and the IS Security Officer.
Develops the skills necessary to manage network security solutions.
Develops expertise in scanning and monitoring networks or server systems for attacks, malicious software, intrusions, and threats.
Develops an understanding of the organization's current threat posture and uses a variety of tools to understand emerging threat patterns and gauge potential impacts to day-to-day business processes.
Develops attack and penetration technologies to reduce threat landscape while looking for creative ways to save money and time where possible.
Works with the IS Security Officer to develop policies and training to ensure employees are following and understanding security policies and procedures.
Provides cybersecurity and network support for operational systems and assists in business planning, maintenance, and troubleshooting.
Executes risk management initiatives to assess risk and gather information/data for defining/updating policy/standards.
Researches and interprets risks and impacts of new technology, emerging patterns and trends in the cybersecurity landscape and provides updates/reports to the IS Security Officer on a regular basis.
Develops monitoring use cases, tests, and assesses the effectiveness of Digital controls.
Develops expertise in working with Network Packet Analyzers, Next-Generation Antivirus, Endpoint Detection and Response, Cyber Threat Intelligence and Threat Hunting Tools.
Engages and communicates effectively with internal personnel, external vendors, or contacts in day-to-day activities and fosters positive business relationships.
Educates the various business units on the different IT or cybersecurity strategies, policies, processes, and procedures.
Executes projects and programs for the Network and Security team as required.
Prepares and works with the different stakeholders to develop business continuity, disaster recovery and incident response plans
Develop methods or propose technologies to protect data at rest when required.
Will be required to provide on-call support in rotating intervals and emergency support as needed.
Ability to occasionally support routine or emergency network or security changes during normal business hours, after-hours, on weekends or during holidays is required. At the direction of your supervisor this may involve travel on-site to a pre-determined location to support these changes.
Ability to participate in on-call rotation.
Provides second-level technical support to users concerning network & security system operations.
Performs all other duties as assigned.
Qualifications
Bachelor's degree preferred, preferably in computer science, cybersecurity, network engineering, engineering, mathematics, or equivalent work experience
5-6 years of experience in information security, cybersecurity, or a related IT role.
Professional certifications preferred Cisco Certified CyberOps Professional (CCCP), Cisco Certified Network Professional - Security (CCNP Security), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), GIAC Certified Enterprise Defender (GCED).
In addition to the above qualifications, the successful candidate will demonstrate:
Fundamental knowledge of networking & security concepts
Understand the OSI model, well-known and reserved ports & network protocol specifications
Understand encryption methods used in securing network traffic transiting unsecured networks
Understand encryption methods to secure sensitive information stored digitally
Hands-on technical troubleshooting capabilities (physical, virtual, logical)
Ability to work independently under minimal supervision
Familiarity with network monitoring tools
Exceptional critical thinking and problem-solving ability
Strong interpersonal skills to assist non-technical individuals with complex technical issues
Ability to adapt and learn new skills rapidly in support of the IT organization across a variety of different operating systems, protocols, applications, or technologies.
Enthusiasm
Teamworking skills
Attention to detail
Physical Demands:
Must be able to sit and/or stand for prolonged periods of time
Must be able to wear personal protective equipment (PPE) (mask, gown, gloves) when required
Must occasionally lift and/or move up to 50 pounds; 100 pounds with assistance.
How much does a cyber security analyst earn in Ballwin, MO?
The average cyber security analyst in Ballwin, MO earns between $57,000 and $102,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Ballwin, MO