Securities Research Analyst
Cyber Security Analyst Job 218 miles from Central Point
Do you have experience in equity research and analysis or capital markets? Fisher Investment's Securities Research Group supports the portfolio management team, which manages over $250 billion in AUM and serves high-net-worth private clients and some of the world's preeminent institutions. We are now searching for finance and research-oriented professionals to join our team of Securities Research Analysts.
The Opportunity:
Securities Analysts guide portfolio outperformance through timely and impactful coverage of stock holdings across firm strategies and industry/thematic research for the IPC. Analysts cover specific industries and learn about trends in their space.
You'll cultivate research and market knowledge alongside motivated peers who share a passion for markets and learn the quantitative and qualitative skills used by successful analysts with in-depth training and a diverse, supportive environment. You will develop an expertise in your sector/industry coverage and an understanding of emerging trends and how they relate to FI's key top-down themes. You will report to the Securities Research Manager. You'll deliver timely and relevant research to the IPC and create impactful portfolio recommendations.
The Day-to-Day:
Develop a comprehensive knowledge of our investment philosophy, process, portfolio themes and rationales
Build expertise on an assigned sector to understand how market events impact forward relative returns, and develop and hone new and/or existing portfolio themes and views
Provide the Investment Policy Committee (IPC) with regular and ad hoc performance analysis and commentary, and proactively help to identify industries and stocks likely to outperform selected benchmarks
Participate in Investment Roundtables, Fisher Client Forums, and client/prospect meetings, and provide critical commentary to our Private Client Group, Fisher International and Institutional Group via written and oral communications
Your Qualifications:
2+ years of professional equity research experience
Experience working in a buy and/or sell-side firm conducting applicable qualitative equity research
Experience communicating with multiple audiences over several platforms, including executive-level stakeholders
Communicate in a Relevant, Concise, and Efficient manner to positively impact portfolios
Have the intellectual flexibility and drive to rapidly learn and test new ways of thinking, doing and communicating, while being comfortable with ambiguity
Experience writing equity research reports utilizing data and qualitative findings to support investment decision-making
Experience working with Bloomberg, Factset, Excel, or similar tools to produce applicable insights-centric to equity performance
Compensation:
$85,000 - $125,000 base salary per year in the state of WA - New hires should expect to start at the lower end of the range depending on experience
Eligible for a discretionary bonus based on firm and individual performance
Why Fisher Investments:
We work for a bigger purpose: bettering the investment universe. We take great pride in our inclusive culture, our learning and development framework customized for every employee, and our Great Place to Work Certification. It's the people that make the Fisher purpose possible, and we invest in them by offering exceptional benefits like:
100% paid medical, dental and vision premiums for you and your qualifying dependents
A 50% 401(k) match, up to the IRS maximum
20 days of PTO, plus 10 paid holidays
Family Support programs including 8 week Paid Primary Caregiver Leave, fertility, family forming, and hormonal health assistance and back-up child, adult, and elder care
$10,000 fertility, hormonal health and family-forming benefit
FISHER INVESTMENTS IS AN EQUAL OPPORTUNITY EMPLOYER
Senior Information Security Engineer
Cyber Security Analyst Job 77 miles from Central Point
Senior Information Security EngineerJOB_DESCRIPTION.SHARE.HTML
CAROUSEL_PARAGRAPH
JOB_DESCRIPTION.SHARE.HTML
Birmingham, Alabama
Surgical Care Affiliates
Technology
Regular
Full-time
1
USD $88,000.00/Yr.
USD $104,000.00/Yr.
36236
Job Description Overview
Today, SCA Health has grown to 11,000 teammates who care for 1 million patients each year and support physician specialists holistically in many aspects of patient care. Together, our teammates create value in specialty care by aligning physicians, health plans and health systems around a common goal: delivering on the quadruple aim of high-quality outcomes and a better experience for patients and providers, all at a lower total cost of care.
As part of Optum, we participate in an integrated care delivery system that enables us to support our partners as they navigate a complex healthcare environment, Only SCA Health has a dynamic group of physician-driven, specialty care businesses that allows us to customize solutions, no matter the need or challenge:
We connect patients to physicians in new and differentiated ways as part of Optum and with our new Specialty Management Solutions business.
We have pioneered a physician-led, multi-site model of practice solutions that restores physician agency by aligning incentives to support growth and transition to value-based care.
We lead the industry in value-based payment solutions through our Global 1 bundled payment convener, that provides easy predictable billing to patients.
We help physicians address everything beyond surgical procedures, including anesthesia and ancillary service lines.
The new SCA Health represents who we are today and where we are going-and the growing career opportunities for YOU.
Responsibilities
We are seeking a seasoned Senior Information Security Engineer to strengthen our IT Security team. This role involves overseeing a broad range of security functions, including vulnerability management, intrusion prevention systems (IPS), data classification, web proxy management, SIEM monitoring, anti-virus management, and comprehensive security monitoring. The Senior Information Security Engineer will be responsible for maintaining the security posture of the organization's infrastructure, collaborating with cross-functional teams, and ensuring the implementation of security best practices across all areas.
As a key contributor, the ideal candidate will have a strong technical background across multiple security domains and be capable of leading initiatives to detect, respond to, and remediate threats. They will also play a vital role in mentoring junior engineers and analysts, fostering a culture of continuous learning and collaboration.
Key Responsibilities:
Perform Vulnerability assessments and collaborate with IT Teams to implement remediation strategies.
Participate in incident response efforts by identifying, analyzing, and responding to security threats.
Continuously gather and integrate threat intelligence to improve detection and defense capabilities.
Implement and manage data classification protocols to safeguard sensitive information.
Maintain and enhance the organization's Intrusion prevention systems (IPS) and Anti-Virus management tools.
Oversee security monitoring activities, ensuring timely detection of potential security incidents.
Work closely with IT and business teams to implement security best practices and ensure compliance with established policies.
Lead security-related projects from design through implementation, ensuring timely completion and alignments with security objectives.
Conduct security control assessments and recommend enhancements to improve the organization's security posture
Mentor and train Jr. Engineers and Analysts to promote knowledge sharing and professional growth within the team.
Develop and maintain up-to-date Information Security policies, guidelines, and standards based on evolving security trends and internal needs.
Stay informed with the latest security threats and vulnerabilities, sharing knowledge with the team to adjust security strategies accordingly.
Perform other duties related to security operations as required
Qualifications
Desirable Skills:
Experience with scripting languages (Powershell, Python, Perl, etc) to automate routine security tasks.
Familiarity with penetration testing methodologies and tools to identify vulnerabilities and enhance security system defenses
Knowledge of cloud security practices and controls, particularly in hybrid environments.
Understanding of network protocols, packet analysis, and the ability to use forensic tools for investigation purposes.
Ability to work effectively in a fast-paced dynamic environment with shifting priorities.
Mentoring and Development:
Serve as a mentor to junior security staff, guiding them in technical growth and fostering a collaborative and innovative work culture
Lead by example in fostering an environment of continuous learning and professional development.
Minimum Qualifications:
Bachelors degree in Computer Science, Information Security, Information Technology, or a related field. Equivalent experience and relevant certifications may be considered.
3-5 Years of experience in information security, managing and deploying a range of security tools and technologies such as SIEM, IPS/IDS, Vulnerability Management, and Endpoint Security
Security certifications such as CISSP, CEH, GCIH, or equivalent are preferred.
Other Qualifications
Proven experience in incident response, including threat detection, analysis, and remediation.
Experience with security projects such as system hardening, security tool implementation, or risk assessments.
Extensive knowledge of security tools and technologies, including SIEM, IDS/IPS, web proxies, anti-virus, and vulnerability management systems.
Strong communication skills, with the ability to translate complex security concepts into actionable recommendations for both technical and non-technical stakeholders.
Strong analytical and troubleshooting skills to diagnose security incidents and implement effective countermeasures.
Ability to balance security requirements with business operational needs.
USD $88,000.00/Yr. USD $104,000.00/Yr.
PIbdab10275a47-26***********5
Cyber Security Analyst
Cyber Security Analyst Job In Oregon
The Cyber Security Analyst will be responsible for protecting all of the companys hardware, software, and networks from cybercriminals. The analyst's primary role will be to understand the company IT infrastructure in detail in order to detect, evaluate and respond to threats that could potentially breach the network. The Cyber Security Analyst provides specific guidance and coaching to key security areas, e.g. key and encryption, secure software development. In this capacity, a cyber security analyst is part of the proactive work to help shape the tech delivery of the organization.The successful incumbent must possess excellent analytical, communication skills and be solution oriented.
RESPONSIBILITIES AND DUTIES
Responsible for understanding the global threat landscape and acting on threat intelligence.
Conduct cyber security incident response, following industry standards of containment, eradication, recovery and lessons learned.
Manage containment and eradication of threats and remediation of environment during or after an incident, including identifying potential business impact and communication with stakeholders
Manage information security-related breaches
Document event analysis and write reports of incident investigations.
Perform forensic analysis on threat indicators and intelligence insight and identify impact of vulnerabilities
Support the tech delivery in product and services teams with expert security knowledge relevant to a specific technology area or domain (e.g. Key & encryption, secure software development)
Develop the required processes and tools to support the tech delivery teams
Define and develop security guardrails relevant to the tech area/domain
The above responsibilities are indicative of the work required and should not be seen as an exhaustive list.
KNOWLEDGE AND SKILLS
Security solutions (proxy, email gateway, IDS/IPS, FW, SIEM, SOAR, EDR etc.)
Cloud, key and encryption management, SDLC concepts
IT and security architecture
Excellent English skills, both written and spoken.
QUALIFICATIONS AND EXPERIENCE
BSc. in Computer Science, Computer Engineering, Mathematics, Information Security or any related field (or equivalent work experience).
Minimum of 3 years experience in the field
Penetration testing (OWASP, MITRE etc.) experience
Cyber Security certifications (e.g. Security+, GCIA, GCIH, GREM, CISSP, CEH, GCFA)
DESIRED ATTRIBUTES AND BEHAVIOURAL COMPETENCIES
Apply fundamental security concepts to cyber defense and understand business and risk to guide the cyber defense day to day operations.
Manage cases with enterprise SIEM or Incident Management systems
Support network investigations and network monitoring in a SOC environment.
Perform vulnerability assessment and penetration testing
SPECIAL CONDITIONS
N/A
FUNCTIONAL RELATIONSHIPS
External: N/A
Internal: Development team, Tech Lead, CTO
PERFORMANCE CRITERIA
Timely delivery of agreed daily, weekly and monthly KPIs
Senior Cyber Security Analyst
Cyber Security Analyst Job 206 miles from Central Point
**In your career, let's prove what's possible.** At Lam Research, we create equipment that drives technological advancements in the semiconductor industry. Our innovative solutions enable chipmakers to power progress in nearly all aspects of modern life, and it takes each member of our team to make it possible.
Across our organization, our employees come to work and change the world. We take on the toughest challenges with precision and accuracy. We push for the next big semiconductor breakthrough. We lead the way in one of the most critical and fast-moving industries on the planet. And we do it together, with deep connections and limitless collaboration.
The impact we have on the world is made possible by focusing on our people. So we recognize and celebrate our teams' achievements. We strive to create an inclusive and diverse culture where everyone's contribution and voice has value. We evaluate and evolve our offerings, so our people receive the support and empowerment to do meaningful things for their lives, careers, and communities.
Because at Lam, we believe that when people are the priority and they're inspired to unleash the power of innovation for a better world together, anything is possible.
** Senior Cyber Security Analyst**
Date: Nov 18, 2024 Location: Tualatin, OR, US, 97062
Req ID: 186035 Worker Category: Virtual Flex ****The Group You'll Be A Part Of****
The Information Security department is dedicated to securing Lam through best-in-class security practices. Together, we support users globally with data, information, and systems to achieve their business objectives.
****The Impact You'll Make****
Reporting to the Sr. Manager, Cyber Security Operations, the Sr. Cyber Security Analyst will be responsible for security monitoring, incident detection and escalation, threat assessment, cyber intelligence, software security, and vulnerability assessment services to protect the information and IT/OT infrastructure. This person should be able to work under limited supervision, with considerable latitude for initiative and independent judgment. Sr. Cyber Security Analyst supports the SOC and existing MSSP team by providing ticket quality assurance review and technology coaching.Reporting to the Sr. Manager, Cyber Security Operations, the Sr. Cyber Security Analyst will be responsible for security monitoring, incident detection and escalation, threat assessment, cyber intelligence, software security, and vulnerability assessment services to protect the information and IT/OT infrastructure. This person should be able to work under limited supervision, with considerable latitude for initiative and independent judgment. Sr. Cyber Security Analyst supports the SOC and existing MSSP team by providing ticket quality assurance review and technology coaching.
****What You'll Do****
* Provide security monitoring and incident response services supporting the mission to protect Lam and its customers' information.
* Responsible for conducting information security investigations as a result of security incidents identified by the tier 1 security analysts who are monitoring the security consoles from various Cybersecurity Operations Center entry channels (SIEM, Tickets, and Email)
* Act as a point of escalation for tier 1 CSOC security analysts in support of information security investigations to provide guidance and oversight on incident resolution and containment techniques.
* Actively participate in researching trends and current countermeasures for cyber security vulnerabilities, exploits, and other malicious activity
* Assist in creating and maintaining documentation for the CSOC process and procedure.
* Contribute to the development and improvement of security monitoring and incident response processes and solutions as required to support Lam's cyber security program.
* SIEM (Security Information Event Management) monitoring and implementing use cases for monitoring.
* Responsible for working in a 24x7 Cyber Security Operation Center environment.
****Who We're Looking For****
* Bachelor's degree in cyber security, Information Technology, or related experience
* 3+ years of experience in an Information Security or Security Operations role
* CISSP, CISA, or CISM professional certifications preferred
* Understanding of a variety of technical concepts such as Networking, systems administration, application development, cloud computing, and information security best practices
* Security monitoring experience with one or more SIEM technologies, Azure Sentinel or Splunk, and intrusion detection and prevention technologies
* Strong understanding of security incident management, malware management, and vulnerability management processes
* Familiar with Windows and Linux operating systems
* Good understanding of Risk management and Risk assessment processes
* Strong verbal and written communication skills
* Hands-on experience with Microsoft security technologies is a plus
****Our Commitment****
We believe it is important for every person to feel valued, included, and empowered to achieve their full potential. By bringing unique individuals and viewpoints together, we achieve extraordinary results.
Lam Research ("Lam" or the "Company") is an equal opportunity employer. Lam is committed to and reaffirms support of equal opportunity in employment and non-discrimination in employment policies, practices and procedures on the basis of race, religious creed, color, national origin, ancestry, physical disability, mental disability, medical condition, genetic information, marital status, sex (including pregnancy, childbirth and related medical conditions), gender, gender identity, gender expression, age, sexual orientation, or military and veteran status or any other category protected by applicable federal, state, or local laws. It is the Company's intention to comply with all applicable laws and regulations. Company policy prohibits unlawful discrimination against applicants or employees.
*Lam offers a variety of work location models based on the needs of each role. Our hybrid roles combine the benefits of on-site collaboration with colleagues and the flexibility to work remotely and fall into two categories - On-site Flex and Virtual Flex. ‘On-site Flex' you'll work 3+ days per week on-site at a Lam or customer/supplier location, with the opportunity to work remotely for the balance of the week. ‘Virtual Flex' you'll work 1-2 days per week on-site at a Lam or customer/supplier location, and remotely the rest of the time.*
**Our Perks and Benefits**
At Lam, our people make amazing things possible. That's why we invest in you throughout the phases of your life with a comprehensive set of outstanding benefits.
Discover more at
**Nearest Major Market:** Portland Oregon
**Job Segment:** Cloud, Quality Assurance, Information Security, Linux, Application Developer, Technology
**Your Privacy**
Cyber Security Analyst
Cyber Security Analyst Job 213 miles from Central Point
FLEX IT has an immediate need for a Cyber Security Analyst with a proven track record of delivering world-class results with our Enterprise level client. The ideal candidate will bring a broad range of lean and agile experiences working within large-scale organizations.
ALL LEVELS OF Cyber Security Analysts ARE ENCOURAGED TO APPLY
Top Skillsets: (Based on Requirement)
?-Knowledge of information security standards, principles, and practices
-Computer programming and/or scripting languagues (Python, Powershell, Java Script, Go)
-Experience with massive log aggregation and analysis
-Comfortable interfacing with other organizations regarding security policy
Job Responsibilities:
Elevate security analytics by distilling complex analytical concepts
Enable a culture of data driven decision making
Minimize complexity and focus on results
Thrive in an entrepreneurial environment
Use data to prove your point, think outside the box and solve problem creatively
Information Security Operation Center Analyst
Cyber Security Analyst Job 216 miles from Central Point
Job Details:Job Description:
The Government Information Technology and Security Team (GITS) is made up of highly experienced security professionals with skills ranging from solutions architecture and information security to application development and service operations and includes regulatory compliance oversight. This cross functional team is focused on supporting the unique information security and compliance requirements for Intel Federal LLC, a subsidiary of Intel that delivers products and/or services to the U.S. Government (USG). We are growing our secure solution suite to meet U.S. Government requirements for data safeguarding.
In the GITS Team, each person wears many hats and has multiple areas of expertise. We are looking for a talented and motivated individual with strong analytical, communication, and security risk assessment skills and enthusiasm for rapidly learning new technologies. As part of this role, you will be part of an Agile Kanban team and be expected to support, improve, and grow our secure solutions to enhance Intel Federal's capabilities with a constant focus on regulatory compliance of U.S. Government contracts.
Responsibilities
The Government IT and Security (GITS) organization is seeking a dedicated Information Security Operations Center Analyst.
Your responsibilities will include:
Identify, develop, plan, implement, and support enterprise security systems using Agile methodologies and DevOps principles to build and maintain Intel's global security posture.
Create solutions in partnership with enterprise architecture to design security measures (from infrastructure to software) that safeguard sensitive data, protect confidentiality and availability, and enable compliance with security policies and regulatory requirements for the enterprise.
Partners with system engineers, network engineers, database administrators, and information security personnel in support, integration, development, and lifecycle management.
Review health measures for various functional performance components of platform, applications, controls, and appliances and supports key security systems, responds to security events, and troubleshoots and proactively discovers security issues across the enterprise.
Validate security controls are working as designed (validation and/or efficacy) to ensure effective security measures.
Develop new and/or updates existing controls that limit the risk exposure for the company and optimizes security system performance.
Research new security and information technology trends in enterprise applications, networks, and systems to understand and drive strategic plans, forward engineering, upgrades, and changes while influencing vendors to drive bug resolution, product feature enhancement, and key security improvements.
Identify security risks and communicates to relevant stakeholders ranging from business leaders to engineers.
Installs security measures and software to protect systems and information infrastructure, including firewalls and data encryption programs.
Monitor computer networks to identify security threats and investigates security breaches and other cybersecurity incidents.
Remain current with information technology (IT) trends and industry security standards. Works with information security engineering and architecture staff to perform tests and uncover network vulnerabilities.
Qualifications:
Minimum Qualifications:
You must meet the minimum requirements and qualifications to be considered for this position. Preferred qualifications are a plus factor in identifying top candidates.
This position requires verification of U.S. citizenship due to citizenship-based legal restrictions. Specifically, this position supports United States government customers and is subject to certain citizenship-based restrictions.
Active US Government Top Secret (TS-SCI) with Polygraph.
Bachelor's degree in Computer Science, Information Technology with 4+ years of relevant experience or 8+ years of related experience in lieu of a degree.
At least one of the following certifications: Security+ CE, CySA+, GICSP, GSEC, CND, or SSCP.
4+ years of experience with the following skills:
Experience with the NIST Risk Management Framework (RMF), NISPOM, JSIG, NIST 800-53, ICD-503.
Experience with STIGs or SCAP or SRGs.
Experience maintaining IS package documentation (SSP, POAMs, RAR, SAR, SRTM, hardware and software inventories).
Minimal travel required.
Preferred Qualifications:
Leader who thrives in a team environment and can mentor others while driving operational success.
Experience in Industry Standard tools for purposes of audit reduction, vulnerability scanning, and malware detection is preferred. Relevant tools include but are not limited to: Splunk, Tenable Nessus, Security Content Automation Protocol (SCAP) Checker and STIG viewer.
Experience Administering and Operating IT Technologies including Microsoft Windows, Linux, Networks, Firewalls, and Virtual Cloud environments.
Experience with using multiple encryption methodologies for data in transport and at rest.
Additional Security Certifications (or desire to continue security learning) CISSP, CISM, GSLC, CCISO.
#CJ
Job Type:Experienced HireShift:Shift 1 (United States of America) Primary Location: US, Oregon, HillsboroAdditional Locations:US, Arizona, PhoenixBusiness group:Enable amazing computing experiences with Intel Software continues to shape the way people think about computing - across CPU, GPU, and FPGA architectures. Get your hands on new technology and collaborate with some of the smartest people in the business. Our developers and software engineers work in all software layers, across multiple operating systems and platforms to enable cutting-edge solutions. Ready to solve some of the most complex software challenges? Explore an impactful and innovative career in Software.Posting Statement:All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance.Position of TrustN/A
Benefits:
We offer a total compensation package that ranks among the best in the industry. It consists of competitive pay, stock, bonuses, as well as, benefit programs which include health, retirement, and vacation. Find more information about all of our Amazing Benefits here: **********************************************************
Annual Salary Range for jobs which could be performed in the US:
$123,139.00-$203,801.00
Salary range dependent on a number of factors including location and experience.
Work Model for this Role
This role will be eligible for our hybrid work model which allows employees to split their time between working on-site at their assigned Intel site and off-site. In certain circumstances the work model may change to accommodate business needs.
IRM Cyber Security Analyst
Cyber Security Analyst Job 218 miles from Central Point
At PGE, our work involves dreaming about, planning for, and realizing a smarter, cleaner, more enduring Oregon neighborhood. Its core to our DNA and we haven't stopped since we started in 1888. We energize lives, strengthen communities and drive advancements in energy that promote social, economic and environmental progress. We're always on the lookout for people passionate about leading and being a part of teams that are advancing innovative clean energy solutions that are also affordable and accessible to all.
Job Function Information:
Risk Management Design information systems security infrastructure. Develop policies and procedures to prevent unauthorized access. Educate and communicate security requirements and procedures to users and new employees. Ensure compliance with regulations and privacy laws. May oversee internal or external systems security (i.e., cloud services). Needs may include performance in the capacity of analyst, auditor or consultant.
Key Responsibilities:
Develop and communicate policy and standards advises internal business and IT stakeholders on information security requirements, policies and standards.
Assists in promoting awareness of security issues among management and employees.
Explains the purpose of and provides advice and guidance on the application and operation of physical, procedural and technical security controls.
Contributes to the development and update of information security policies and processes.
Risk Assessment Performs security risk, vulnerability assessments and business impact analysis for medium complexity information systems.
Identifies observed or emerging security exposures that create potential threats to infrastructure, systems or data.
Prepares reports of findings. Tracking and Reporting Monitors and follows up to ensure that appropriate mitigation and remediation actions have been taken on risk- assessment findings.
Gathers and creates information security metrics reports for management using appropriate visualization techniques.
Vendor Risk Management Conducts technical and policy-based information security risk reviews of third-party vendors.
Reviews RFPs to ensure information security requirements are fully and correctly stated.
Education/Experience/Certifications:
Education Requires a bachelor's degree in computer science, information systems or other related field or equivalent experience preferred.
Experience Typically five or more years in related field.
Competencies (Knowledge, Skills, Abilities):
Intermediate knowledge of information system risk management principles and best practices
Intermediate knowledge of Windows, UNIX and network administration
Intermediate knowledge of hardening systems Intermediate knowledge of network and communication systems and equipment Intermediate knowledge of PC and productivity software
Working knowledge of the utility industry Intermediate knowledge of relevant technology standards (e.g., ISO, ITIL, OBIT, NIST)
Intermediate knowledge of security issues, techniques and implications across all existing computer platforms
Intermediate knowledge of hardware and software products that enhance the security of systems, such as intrusion prevention systems (host and network based), firewalls, security event management systems, port scanning and vulnerability identification, monitoring and logging mechanisms
Intermediate knowledge of security architecture models and principles
Working skill in using a variety of visualization techniques to effectively present information Intermediate ability to communicate security and risk-related concepts to technical and nontechnical audiences, including all levels of management both orally and in writing
Advanced customer focus skills Advanced accuracy skills
Advanced oral and written communication skills
Advanced interpersonal skills Advanced decision-making skills
Advanced organization and prioritization skills
Physical and Cognitive Demands Cognitive Level Substantial:
Consistent use of logic or scientific thinking to define problems, collect information, establish facts and draw valid conclusions (for example, engineer, HR director, plant manager, etc.)
Cognitive Ability to adhere to set response times, deadlines and time-sensitive tasks Ability to follow accuracy standards
Ability to follow through on decision-making tasks
Ability to interact effectively and collaboratively within a team environment
Ability to communicate and problem solve when under stress
Ability to respond and adapt to frequent change
Ability to accept and demonstrate self-awareness when provided constructive feedback
Ability to discern feedback and acknowledge ownership of areas of improvement
Ability to avoid future mistakes by applying reasonable skills to new but similar work situations or tasks
Ability to successfully collaborate with peers, managers and others within the organization
Demonstrates sound memory
Ability to process new information to be applied consistently to work tasks
Physical Capabilities:
Driving/travel/commute: Daily within service territory - Frequently (at least once a week or more)
Driving/travel/commute: Daily within service territory - Occasionally (one to two times a month or less)
Driving/travel/commute: Overnight inside/outside the service territory - Frequently (at least once a week or more)
Driving/travel/commute: Overnight inside/outside the service territory - Occasionally (one to two times a month or less)
Computer use (use computer regularly for entire work shift)
Lifting/pushing/pulling: Up to 10 lbs.
Lifting/pushing/pulling: Up to 50 lbs.
Lifting/pushing/pulling: More than 50 lbs.
Carrying: Up to 10 lbs.
Carrying: Up to 50 lbs.
Carrying: More than 50 lbs.
Unstable surfaces requiring balance (i.e., moving equipment, boats) (check all that apply):
Elevated areas (i.e., catwalks, roofs and high buildings)
Confined spaces
Walking distances and surfaces (long distances and over rough, uneven or rocky surfaces)
Stairs (over 10 steps)
Ladders (over 10 rungs)
Environment - Indoor/Outdoor (check all that apply):
Office
Plant
Field
Compensation Range:
$33.10 - $160,500.00
Actual total compensation, including a performance based incentive bonus, is commensurate with experience, skills, qualifications, education, training, and internal equity. While we anticipate the selected candidate for this position will fall towards the middle or entry point of the compensation range, the decision will be made on a case-by-case basis.
PGE believes in rewarding dedicated performance. We provide a total rewards package that is designed to reward your contributions to the company, and, at the same time, support your well-being and professional development, both now and into the future. To find out more, click here.
Join us today and power your potential!
Assisting with storms or other Company emergencies is a part of all positions at Portland General Electric.
PGE is committed to diversity and inclusion in the workplace and is an equal opportunity employer. PGE will not discriminate against any employee or applicant for employment based on race, color, national origin, gender, gender identity, sexual orientation, age, religion, disability, protected veteran status, or other characteristics protected by law.
PGE does not discriminate on the basis of disability. We recognize individuals have a variety of abilities to offer and we believe there is much to value and celebrate by incorporating different abilities into the work we do. One very important way we live this out is in our application and interview process. We work hard to support individuals who may need an accommodation to fully participate in these processes. If you feel you may need an accommodation, or would like to request one, please notify the Talent Acquisition Specialist (Recruiter) associated with the job posting. You may also make this request by contacting ************************* or by calling ************. The Recruiter will provide information and next steps for the accommodation process. Our Diversity, Equity & Inclusion (DEI) team is also available for support. You can contact them at ***********.
To be considered for this position, please complete the following employment application by the posting close date. Posting closes at midnight (Pacific Time) on the closing date below. If no date is listed, job is open until filled.
Computer Network Defense Analyst (CDNA)
Cyber Security Analyst Job In Oregon
As a CDNA, you will: * Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur
* Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems
* Gain work experience spanning the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all
* Have the opportunity to advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security
* Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
* Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
* Distill, document, contextualize and share your findings (including any new tradecraft that you develop) with teammates, stakeholders, and intelligence consumers
** Required Qualifications**
Relevant experience must be in some or all of the following:
* Computer or information systems design/development, programming
* Information/cyber/network security
* Vulnerability analysis, penetration testing
* Computer forensics
* Information assurance
* Systems engineering
Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training in a relevant area will be considered towards relevant experience requirement (i.e., 20- to 24-week courses will count as six months of experience; 10-14 weeks will count as three months of experience). Such training includes:
* JCAC (Joint Cyber Analysis Course)
* Undergraduate Cyber Training (UCT)
* Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT)
* Cyber Defense Operations
In some cases, foreign language proficiency may also be used to satisfy experience requirements; recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level. The total of all experience equivalencies is capped at half of the required years of experience.
*Specific labor categories determined by years of experience and educational degrees*
**Level One**
* Two years' applicable experience with a bachelor's degree, OR
* Four years' applicable experience with an associate degree
**Level Two**
* Two years' applicable experience with a PhD, OR
* Three years' applicable experience with a master's degree, OR
* Five years' applicable experience with a bachelor's degree, OR
* Seven years' applicable experience with an associate degree
**Level Three**
* Four years' applicable experience with a PhD, OR
* Six years' applicable experience with a master's degree, OR
* Eight years' applicable experience with a bachelor's degree, OR
* Ten years' applicable experience with an associate degree
**Level Four**
* Seven years' applicable experience with a PhD, OR
* Nine years' applicable experience with a master's degree, OR
* Eleven years' applicable experience with a bachelor's degree, OR
* Thirteen years' applicable experience with an associate degree
Sr. Staff Cyber Security Incident Response
Cyber Security Analyst Job 216 miles from Central Point
General Information Job Title Sr. Staff Cyber Security Incident Response Job ID 6634 City Hillsboro State/Province Oregon Date Posted 24-Sep-2024 Job Category Engineering Job Subcategory Cyber Security Engineering Hire Type Employee Remote Eligible No Base Salary Range: $156000 - $234000
Descriptions & Requirements
Job Description and Requirements
This position requires access to or use of information which is subject to export restrictions, including the International Traffic in Arms Regulations (ITAR). All applicants for this position must be "U.S. Persons" within the meaning of the ITAR. "U.S. Persons" include U.S. Citizens, U.S. Lawful Permanent Residents (i.e. 'Green Card Holders'), Political Asylees, Refugees or other protected individuals as defined by 8 U.S.C. 1324b(a)(3)'.
We Are:
At Synopsys, we're at the heart of the innovations that change the way we work and play. Self-driving cars. Artificial Intelligence. The cloud. 5G. The Internet of Things. These breakthroughs are ushering in the Era of Smart Everything. And we're powering it all with the world's most advanced technologies for chip design and software security. If you share our passion for innovation, we want to meet you.
You Are:
You are a dedicated and experienced Info Security Operations Engineer with a deep understanding of incident response and cyber security. You have a proven track record of managing complex security incidents and possess a robust technical knowledge of various network protocols, security tools, and cloud environments. Your expertise extends to understanding and applying security frameworks such as MITRE ATT&CK and NIST Cyber Security Frameworks in an enterprise setting. With a strong foundation in Windows, Unix, Linux, and Mac operating systems, you are adept at using development or scripting languages like PowerShell or Python to enhance security operations. You are not only technically skilled but also an excellent communicator, capable of mentoring junior team members and collaborating with various stakeholders to improve security processes and responses. Your passion for staying updated on evolving cyber threats ensures that you are always prepared to protect the organization from potential risks.
What You'll Be Doing:
* Leading investigations and serving as a subject matter expert while pivoting and correlating across multiple log sources and systems.
* Continually improving cyber security procedures and documentation.
* Communicating with users, vendors, and other IT personnel on security-related issues.
* Keeping up to date on evolving cyber threats, identifying their impact, and detecting them in our environment.
* Providing mentoring to junior members to advance their skillsets and the team's capabilities.
* Assisting in the management of infrastructure security systems such as HIDS/NIDS, SIEM, NGAV, EDR, UBA, WAF, DLP, and vulnerability management tools to meet internal and external regulatory requirements.
The Impact You Will Have:
* Enhance the security posture of the organization by leading effective incident response efforts.
* Improve detection and response capabilities through continuous refinement of procedures and tools.
* Mitigate risks and minimize the impact of security incidents on business operations.
* Foster a culture of security awareness and best practices across the organization.
* Contribute to the development and implementation of robust security strategies and frameworks.
* Ensure compliance with internal and external regulatory requirements through effective management of security tools and processes.
What You'll Need:
* Bachelor's Degree in Information Security, Computer Science, or an equivalent combination of education, training, and experience.
* 5+ years in an Incident Response or SOC role.
* 3+ years of experience deploying and managing endpoint, network, and cloud security tooling.
* Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups.
* Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS.
* Familiarity with various cloud environments (AWS, Azure, O365).
* Functional and practical experience with at least one development or scripting language/framework (e.g. PowerShell, Python, .Net) and regular expressions.
* Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements.
* In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems.
* Hold or willingness to obtain certifications such as GCIH, GCFE, GCFA, GCSA, GMON, CISSP, or other relevant security certifications.
Who You Are:
* Excellent communicator with strong interpersonal skills.
* Team player who thrives in a collaborative environment.
* Self-motivated and able to work independently when needed.
* Adaptable and open to learning new technologies.
* Passionate about technology and innovation.
The Team You'll Be A Part Of:
You will be an integral part of the Synopsys Information Security team, specifically within the Security Operations group. This dynamic team is dedicated to protecting the organization from cyber threats and ensuring the safety of our digital assets. The team values collaboration, continuous learning, and innovation, working together to enhance our security posture and response capabilities.
Inclusion and Diversity are important to us. Synopsys considers all applicants for employment without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, military veteran status, or disability.
In addition to the base salary, this role may be eligible for an annual bonus, equity, and other discretionary bonuses. Synopsys offers comprehensive health, wellness, and financial benefits as part of a of a competitive total rewards package. The actual compensation offered will be based on a number of job-related factors, including location, skills, experience, and education. Your recruiter can share more specific details on the total rewards package upon request. The base salary range for this role is across the U.S.
Cyber Security Engineer | Qualcomm India Private Limited
Cyber Security Analyst Job In Oregon
****Company:**** Qualcomm India Private Limited ****Job Area:**** Information Technology Group, Information Technology Group > Cyber Security Engineering · Working under close supervision. · Taking responsibility for own work and making decisions with limited D29; Impact of decisions is readily apparent; Errors made typically only impact timeline (i.e., require additional time to correct).
· Using verbal and written communication skills to convey basic, routine factual information about day-to-day activities to others who are fully knowledgeable in the subject area.
· Completing some tasks with multiple steps that must be performed in a specific order; directions or manuals can accurately document the steps necessary to perform the tasks.
· Using deductive problem solving to solve moderately complex problems; most problems have defined processes of diagnosis/detection; some limited data analysis may be required.
· Exercising some creativity to troubleshoot technical problems or deal with novel circumstances.
Actively seeks answers for new challenges, and explores multiple strategies for completing project tasks.
· Seeks out learning opportunities and feedback to increase own knowledge and skill using internal and external training resources.
· Performs security-related tasks.
· Understands the importance of contributions from individuals of varying backgrounds, locations, and cultures.
· Adapts to moderate changes and setbacks in order to manage pressure and meet deadlines.
· Participates in training programs within domain of expertise, and identifies personal opportunities for development.
· Regularly discusses issues within and outside of project team to maintain open communication.
· Networks with colleagues within domain of expertise to gain insight, ideas, and connections.
· Completes moderate technical tasks assigned by more senior personnel.B44
· Documents solutions for issues resolved in order to maintain accurate records.
Analytical Skills - The ability to collect information and identify fundamental patterns/trends in data. This includes the ability to gather, integrate, and interpret information from several sources.
· IT Security - Knowledge of IT security policies and how to apply them when working with end-users. This includes the ability to adhere to policies even when faced with end-user challenges.
· Operations Support - The ability to follow standard policies and procedures to carry out operations support for security-related systems and devices.
· Root Cause Analysis - The ability to understand the cause of an issue and contribute to identifying the appropriate solution.
· Security Monitoring - The ability to understand how to interpret basic data from logs in networks/systems/applications in order to monitor and maintain performance, and identify security issues.
· Taking Initiative - The ability to attack work activities with drive and energy, understand the impact of work on key metrics, and make decisions that are in the company's best interest. This includes not being afraid to initiate action before all the facts are known, and driving value-added work tasks to completion.
· Time Management - The ability to quickly prioritize mission-critical from less important or trivial work activities. This includes sensing what the next most useful thing is to work on, and focusing on the critical few tasks that add value while putting aside or delaying the rest.B17
· Troubleshooting - The ability to resolve end-user hardware, software and networking issues by implementing a progressive troubleshooting methodology
**Minimum Qualifications:**•
Bachelor's degree in Engineering, Information Systems, Computer Science, or related field.
OR
High school diploma or equivalent and 2+ years of cybersecurity-relevant work experience.
**Physical Requirements:**
• Frequently transports and installs equipment up to 40 lbs.
**Applicants**: If you need an accommodation, during the application/hiring process, you may request an accommodation by sending email to accommodationsupport
Although this role has some expected minor physical activity, this should not deter otherwise qualified applicants from applying. If you are an individual with a physical or mental disability and need an accommodation during the application/hiring process, please call Qualcomm's toll-free number found here for assistance. Qualcomm will provide reasonable accommodations, upon request, to support individuals with disabilities as part of our ongoing efforts to create an accessible workplace.
Qualcomm is an equal opportunity employer and supports workforce diversity.
Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law.
**To all Staffing and Recruiting Agencies**: Our Careers Site is only for individuals seeking a job at Qualcomm. Staffing and recruiting agencies and individuals being represented by an agency are not authorized to use this site or to submit profiles, applications or resumes, and any such submissions will be considered unsolicited. Qualcomm does not accept unsolicited resumes or applications from agencies. Please do not forward resumes to our jobs alias, Qualcomm employees or any other company location. Qualcomm is not responsible for any fees related to unsolicited resumes/applications.
If you would like more information about this role, please contact Qualcomm Careers.
Overview Experience: 3-12 years Qualification: BE /…
Job Location :- Hyderabad, Telangana,…
Principal Security Analyst
Cyber Security Analyst Job 175 miles from Central Point
**100% REMOTE!** At WelbeHealth, it's our mission to serve our communities' most vulnerable seniors through shared intention, pioneering spirit, and courage to love. These core values and our participant focus lead the way no matter what. The Principal Security Analyst will be responsible for the operational and project related tasks required to maintain the Information Security Program at WelbeHealth. The Principal Security Analyst's primary focus will be driving the implementation of WelbeHealth's security agendas with emphasis on the Azure Cloud Infrastructure and Development Operations.
The Principal Security Analyst will actively monitor the WelbeHealth Azure environment for detected risks and lead remediation efforts in collaboration with the Infrastructure and Engineering teams. The Principal Security Analyst will also be responsible for performing technical and non-technical security assessments for WelbeHealth and provide corrective action plans. Ensures security procedures are followed through process development, management, and training. Collaborates effectively with colleagues and stakeholders to promote WelbeHealth values, team culture and mission.
**Benefits of Working at WelbeHealth** Apply your clinical expertise in new ways as we rapidly expand. You will have the opportunity to design the way we work in the context of an encouraging and loving environment where every person feels uniquely cared for.
+ **BENEFITS** : Health Coverage on Day 1, Paid Parental Leave, 401K Match.
+ **PERKS** : 17 days of paid time off in year one, 12 company holidays & 6 sick days
+ **GROWTH:** Career path advancement and leadership opportunities
**Essential Job Duties**
+ Act as the subject matter expert on security matters related to the Microsoft Azure Infrastructure, and DevOps workflows.
+ Lead security assessments for WelbeHealth DevOps environment in collaboration with Infrastructure and Engineering teams.
+ Implement and manage technical, physical, and administrative security controls.
+ Document and operationalize new security implementations.
+ Adhere to standard best practices in performing security assessments.
+ Collaborate on security policy and controls development.
+ Provide hands on security administration of cloud systems and security solutions including but not limited to operation, maintenance, scheduling, development, architecture, documentation, and delivery.
+ Ensure recommendations and processes are consistent with applicable regulations, rules, policies, and procedures relevant to WelbeHealth operations as defined by the Regulatory and Compliance and Quality Improvement teams.
**Job Requirements:**
+ Bachelor's Degree in relevant field or professional industry experience in the areas of
+ Cybersecurity, Azure Cloud Infrastructure, Azure DevOps or Information Technology may be substituted.
+ Microsoft "AZ" or "SC" series certification is required (AZ-500, SC-100, etc.).
+ Other security certifications are highly desirable. (e.g., CISSP, ISACA, GIAC, Microsoft Cloud Security, AWS Cloud Security, etc.
+ Minimum of four years of experience with a BA in a relevant field or eight years of experience without a degree.
+ Experience in implementing security controls in an Azure Infrastructure environment is required.
+ Experience working with security solutions and tools to identify and respond to threats and vulnerabilities (e.g., EDR, IDS/IPS, SEIM, DLP, Vulnerability Scanners, etc.).
+ Understanding of healthcare security and privacy requirements including HIPAA, HITECH, Technical Administrative Safeguards and Security Rule, requirements for annual security assessments, etc.)
+ Demonstrated ability to use data to formulate trends and adjust security procedures as needed.
\#LI-REMOTE
Salary/Wage base range for this role is $132,181- $158,617 / year + Bonus + Equity. WelbeHealth offers competitive total rewards package that includes, 401k match, healthcare coverage and a broad range of other benefits. Actual pay will be adjusted based on experience and other qualifications.
Compensation
$132,181-$158,617 USD
**COVID-19 Vaccination Policy**
At WelbeHealth, our mission is to unlock the full potential of our vulnerable seniors. In this spirit, please note that we have a vaccination policy for all our employees and proof of vaccination, or a vaccine declination form will be required prior to employment. WelbeHealth maintains required infection control and PPE standards and has requirements relevant to all team members regarding vaccinations.
**Our Commitment to Diversity, Equity and Inclusion**
At WelbeHealth, we embrace and cherish the diversity of our team members, and we're committed to building a culture of inclusion and belonging. We're proud to be an equal opportunity employer. People seeking employment at WelbeHealth are considered without regard to race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, marital or veteran status, age, national origin, ancestry, citizenship, physical or mental disability, medical condition, genetic information or characteristics (or those of a family member), pregnancy or other status protected by applicable law.
**Beware of Scams**
Please ensure your application is being submitted through a WelbeHealth sponsored site only. Our emails will come from @welbehealth.com email addresses. You will never be asked to purchase your own employment equipment. You can report suspected scam activity to ****************************
Information Security Analyst (In office; not remote)
Cyber Security Analyst Job 5 miles from Central Point
The Information Security Analyst will primarily be responsible for researching, proposing, implementing, and monitoring systems and data security following industry best practices. Act as the subject matter expert concerning information security. Lead information security team.
MAJOR TASKS:
- Oversee and assure company-wide information security and maintain environment confidentiality, integrity, and availability.
- Actively monitors systems activity, to identify suspicious activity and respond accordingly. Correlate and validate alerts. Provide context within the business, and coordinate response.
- Support and uphold Timber Products' information security program by implementing tactical solutions, investigating, and responding to potential cyber security incidents, and aligning solutions to governance driven from industry requirements and corporate leadership.
- Incident response manager, responsible for maintenance of incident response plan and policies, development of incident playbooks, plan testing and training.
- Develops, implements, and enforces company-wide security policies and procedures to ensure consistent security practices across the organization. Documents security standards and guidelines.
- Prepares reports documenting potential and realized cyber security incidents outlining extent of threats and suggests mitigating actions. Provides Root Cause Analysis reports on all security incidents and presents findings and remediation recommendations to IT leadership.
- Performs regular assessments of the company's systems environment, leveraging external resources where appropriate, to identify, classify and address potential security risks; including but not limited to external penetration testing and both internal and external vulnerability scanning of Timber Products systems. Contextualize Vulnerability Management to coordinate and prioritize the remediation.
- Conducts IT and End User training on Information Security related topics. Preparing training materials, conducting employee security training, and sending frequent instructional/preventative communications regarding security best practices and threat awareness. Manages the security awareness training platform, regularly audits user completion of required training.
- Monitor threat landscape regarding the products we use (Microsoft, Cisco, etc.) through public and subscription-based channels. Research systems' security best practices; recommends and assists in the implementation of architectural, procedural and policy changes to mitigate or remediate the risks to Timber Products' systems and data.
- Works with security toolsets and trusted vendors to ensure the data environment is well protected from unauthorized infiltration and exfiltration of sensitive corporate data assets; Implement and Manage security tools.
- May be called upon to augment the corporate Help Desk staff during those hours when emergency help is needed by any Timber Products site during those hours when the corporate Help Desk is not manned.
SKILL REQUIREMENTS:
- 4 years' experience in Information Security, or comparable position. B.S. Degree in Cyber Security, Computer Science, or related field preferred.
- Experience working in the cyber security field.
- Information Security related certification such as CISSP is a plus.
- Must be able to communicate effectively and confidently with users, team members and management.
- Ability to research and diagnose security risks and system problems.
- Strong conceptual, analytical and problem-solving abilities. Must be flexible and willing to undertake a wide variety of challenging tasks.
Information Security Analyst
Cyber Security Analyst Job 218 miles from Central Point
This position is based in Mérida, Yucatán, México. If you do not live in/around Merida, and are still interested in this position, relocation will be required within 60 days of accepting this position. Verato will provide a relocation bonus of $42,500 MNX pesos to help with your move.
Verato, the identity experts for healthcare, is a high growth healthcare technology company that enables better care everywhere by providing the single source of truth for identity to organizations across the care continuum. Over 80 of the most respected brands in healthcare rely on Verato's next generation cloud identity resolution platform for a complete and trusted 360-degree view of their patients, provider networks, and customers in their communities. With significant market momentum building towards digital health transformation, Verato is experiencing hyper customer and revenue growth, doubling in last 15 months alone and growing over 50% annually over the last 3 years. More importantly, Verato celebrates 99% customer retention, exemplifying the fact that customer obsession is at the center of our growth story.
Core to Verato's strategy for continued growth is our drive to build a strong people-first culture that attracts, develops and retains the best skills and talent in the world. Verato operates on the simple notion that a company must first and foremost take care of its employees. In turn, these employees will take care of the company's customers, and these customers will take care of the company's shareholders. Verato believes in empowering teams with the best tools and development available. Staff receive opportunities to expand their knowledge in areas of technology (e.g. big data, distributed/cloud computing, complex algorithms), healthcare and organizational development. As Verato continues a trajectory of high-growth and high impact, each member of the team gets an influential front-row seat as we execute our business strategy. Together, we can make a profound and positive change in healthcare as we know it today.
Verato Values
We are focused on continually raising the bar on excellence across the organization, from marketing to engineering to customer service. Our guiding principles are to Make a Difference, to be Trustworthy and to be Customer Obsessed.
Verato employees have a precise focus on proactively protecting the privacy and security of all systems while always ensuring they are following documented policies and procedure
About the position
As a Security Analyst, you will monitor and support security operations for malicious activity. You will perform CERT/SOC operations to include incident monitoring, response and reporting. To be successful in this role youshould be familiar with common Intrusion Detection Systems, virus and malware behavior, and intrusion response methodologies. You will also be responsible for determining appropriate response action(s) to an incident, following standard analysis of techniques, tactics and procedures. In this role you will also be responsible for the analysis and reporting of cyber threats as well as assist in deterring, identifying, monitoring, investigating and analyzing computer network intrusions within a public cloud environment.
Daily Responsibilities:
• Supports cyber and network incidents and warning activity
• Performs security event and incident correlation using information gathered from a variety of sourceswithin the enterprise
• Performs cyber incident triage to include determining scope, urgency, and potential impact; identify the specific vulnerability and make recommendations which enable expeditious remediation
• Tracks cyber actions from initial detection through final resolution
• Analyzes and assesses damage to the data / infrastructure
• Performs cyber engineering trend analysis and reporting
• The person in this position frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in thesesituations
Requirements
To fulfill the responsibilities of this position, expertise or knowledge in the following areas is required:
• English advanced level.
• A bachelor's degree in a related discipline is preferred
• Excellent analytical and problem-solving skills
• Experience working within a Cybersecurity Operations Center environment supporting public cloudinfrastructure workloads (AWS, Azure and Google Cloud)
• Experience with industry standard technologies used in a Cybersecurity Engineering environment
• Experience in incident response including tools, technologies and frameworks
• Strong verbal and written communication skills
• Knowledge of security best practices and frameworks
• Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures
• Experience in computer evidence seizure, computer forensic analysis, and data recovery, and/or Computer network forensics
• Experience using a SIEM or other event correlation tools
• Experience in computer intrusion analysis and incident response, Intrusion detection
• Solid understanding of cyber security threats, risks, vulnerabilities, and attacks, giving insight intothreat actor motives, capabilities, and techniques
• Demonstrated ability to meet deliverables, timetables, and deadlines
• Personal integrity and high ethical behavior at all times to inspire confidence in clients, peers,partners, and employees
• Knowledge of current and emerging security and information technology standards and practices.
Security Engineer, Incident Response
Cyber Security Analyst Job 175 miles from Central Point
Meta Security is looking for an Incident Response Engineer with experience coordinating, investigating and responding to internal and external threats. You will help the team establish, lead and execute multi-year roadmaps to mature investigative and response services, drawing upon automation and cross functional partnerships to create scalable and resilient operational capabilities.
**Required Skills:**
Security Engineer, Incident Response Responsibilities:
1. Conduct security investigations and lead security incident response in a cross-functional environment and drive incident resolution.
2. Develop Incident Response initiatives that improve our capabilities to effectively respond and remediate security incidents.
3. Refine operational metrics, key performance indicators, and service level objectives to measure Security Operations and Incident Response services.
4. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects.
5. Build, cultivate, and maintain positive relationships with internal customers to identify and facilitate solutions to increase the impact of the team's work.
6. Partner with cross-functional teams to solve challenges related to a broad spectrum of detection and response initiatives.
7. Collaborate with software and production engineering teams to develop scalable and flexible Incident Response and Investigative solutions.
8. Focus on ruthlessly prioritizing, automating and scaling every aspect of our detection and response capabilities.
9. Coach, mentor, support and care for the team in a way that enables long-term career development, happiness and success at scale.
**Minimum Qualifications:**
Minimum Qualifications:
10. 10+ years of work experience in Security Incident Response and Detection & Response Engineering in a large, regulated organization.
11. Be a technical and process subject matter expert regarding Security Operations and Incident Response services.
12. Experience developing and delivering information on incident and program status for senior leadership.
13. Experience leading and managing complex cross-functional programs.
14. Experience responding to both external and insider threats.
15. Experience analyzing network and host-based security events.
16. Knowledge of networking technologies, specifically TCP/IP and the related protocols.
17. Knowledge of operating systems, file systems, and memory structures on Windows, MacOS and Linux.
18. Coding/scripting experience in one or more general purpose languages.
19. Experience with attacker tactics, techniques, and procedures.
**Preferred Qualifications:**
Preferred Qualifications:
20. Background in malware analysis, digital forensics, intrusion detection, and/or threat intelligence.
21. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigate suspicious behavior across networks and systems.
22. Broad knowledge across the Security domain, as well as deep focus in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Detection and/or response tool development.
23. Experience recruiting, building, and leading technical teams, including performance management.
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Systems Administrator V - Information Security Analyst
Cyber Security Analyst Job In Oregon
**Job Title: Systems Administrator V- Information Security Analyst** **Wage/Hour Status: Exempt** **Pay Group: A55** **Primary Purpose:** Performs highly complex information security analysis work. Work involves coordinating and planning, implementing and monitoring security measures for information systems and infrastructure to regulate access to computer configuration and data files and to prevent unauthorized modification, destruction and disclosure of information; as well as security measures for the protection of information systems and infrastructure. Works under limited supervision with considerable latitude for the use of initiative and independent judgement.
**Qualifications**
**Education/Certification/Experience:**
Master's degree from a college or university accredited by an organization recognized by the Council for Higher Education Accreditation (CHEA). Major coursework in Computer Information Systems, Management Information Systems or Computer Science or a related field preferred.
Three years full-time wage-earning experience in program administration to include information technology experience or administration of technical programs.
OR
Bachelor's degree from a college or university accredited by an organization recognized by the Council for Higher Education Accreditation (CHEA). Major coursework in Computer Information Systems, Management Information Systems or Computer Science or a related field preferred
Five years full-time wage-earning experience in program administration to include information technology experience or administration of technical programs.
OR
Each year of experience in excess of the required five years may be substituted for thirty semester hours from an accredited college or university on a year for year basis.
Three years full-time wage-earning analysis experience to include development of policies and procedures preferred.
Governmental program experience preferred.
This position requires personal technology that will enable the completion of job duties and responsibilities when working remotely.
**Special Knowledge/Skills:**
Knowledge of principles, practices and procedures of information technology services and security
Knowledge of applicable state and federal laws, rules, regulations and statutes.
Knowledge of limitations and capabilities of computer systems.
Knowledge of technical aspects of all network layers and computer platforms.
Knowledge of operational support of networking, operating systems, internet technologies, databases, and security application support.
Knowledge of agency and departmental organizational structure, policies, procedures, rules and regulations preferred.
Strong written and verbal communications.
**Major Responsibilities and Duties:**
1. Assists in developing and recommends plans to safeguard computer configurations and data files against accidental and unauthorized modification, destruction and disclosure to meet emergency data processing needs.
2. Provides advice and technical assistance regarding violations, deficiencies, and potential information risks; and researches, evaluates and recommends systems and procedures for the prevention, detection, containment, and correction of data security breaches; and ensures no unauthorized modification, destruction, or disclosure of information occurs.
3. Monitors, evaluates, and maintains systems and procedures to protect data systems and databases from unauthorized access.
4. Participates in the development of information technology disaster recovery and business continuity planning; and confers with users regarding computer data access needs, security violations and programming changes.
5. Trains users and promotes security awareness to ensure system security and to improve server and network efficiency.
6. Perform backup, recovery and archival files stored on the network to assist in recovery efforts, review system logs, and perform general system and network troubleshooting resolutions.
7. Assists in planning, implementing, and monitoring the district information systems security program, and ensures compliance with laws, industry standards, and state information security and risk management policies, standards and guidelines.
8. Perform other duties as assigned.
**Policy, Reports, and Law:**
9. Maintain confidentiality in handling sensitive information received in the performance of the job duties.
10. Perform duties in a professional manner through daily, punctual attendance at location of work assignment.
11. Follow Windham School District policies and procedures in completing assigned job duties.
12. Execute duties in a professional, ethical and responsible manner as defined in 19 TAC Chapter 247, Code of Ethics and Standard Practices for Texas Educators.
**Supervisor Responsibilities:** None
**Working Conditions:**
Additional Requirements With or Without Reasonable Accommodation:
**Mental Demands:**
Ability to communicate (verbal and written), ability to instruct, ability to speak, ability to reason, ability to compile data, ability to interpret policy, ability to interpret procedures and data, ability to concentrate, ability to memorize, ability to alphabetize, ability to understand verbal and written instructions, ability to organize, ability to analyze, ability to maintain emotional control, ability to maintain confidentiality, ability to work with frequent interruptions.
**Physical Demands:**
Ability to perform full duties of position, lift and carry less than 15 pounds, walking, sitting, standing, climbing stairs and ramps, kneeling, stooping, reaching, hearing (with aid), visual acuity, speaking, travel by car, van, or airplane, driving of car/van, distinguishing colors, occasional prolonged and irregular work hours.
**Environmental Demands:**
Work inside and outside, noise, radiant/electrical energy, work alone, work with others, around machines with moving parts and objects, possible exposure to microwaves in use, exposure to hot and cold temperatures, exposure to dust and cleaning chemicals.
**The foregoing statements describe the general purpose and responsibilities assigned to this job and are not an exhaustive list of all responsibilities and duties that may be assigned or skills that may be required.
Mainframe Security Analyst - CDS
Cyber Security Analyst Job In Oregon
**To learn more about our website privacy policy, click on this .** * Responsible for analyzing compliance and technical control validation data to determine and report baseline variance for all applicable technology environments. * Interfaces with internal and external audit staff to ensure appropriate and accurate responses to audit queries are satisfied in a timely fashion.
* Assists in researching and evaluating systems and procedures for the prevention, detection, containment and correction of information security breaches. Assists in advising management and users regarding security procedures and compliance policies.
* Utilizing technologically advanced software, performs system monitoring evaluations and audits to ensure compliance with the corporate security policies and standards.
* Prepares and analyzes compliance information to develop mitigation priorities, milestones and audit responses.
* Participates in the evaluation of products and/or procedures to enhance productivity and effectiveness of information security across the organization.
* Assists architects and security specialists to ensure adequate security solutions are in place throughout IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements.
* 4 years job related work experience **OR**
* Associate's degree and 2 years job-related work experience
* Strong data analysis and correlation abilities.
* Strong organizational, interpersonal and communication skills.
* Strong knowledge of administrative, procedural and technical controls used to reduce security risks.
* Ability to effectively prioritize and execute tasks in a high-pressure environment.
* Strong knowledge of enterprise data architecture, systems engineering and data communications as applied to the automated storage and retrieval of information, using multiple platforms and protocols with the inherent security risks of each.
* Strong understanding of the organization's goals and objectives.
* Strong familiarity with threat analysis risk management, configuration management, business continuity and contingency planning as it applies to IT.
* Ability to troubleshoot multi-vendor Security issues.
* Able to work in a team-oriented, collaborative environment.
* Excellent attention to detail.
* Strong proficiency with applicable IT Security tools (software and hardware).
* Microsoft Office.
* **Experience in supporting the infrastructure / application environment within a CMS Claims Processing Environment for Part A, Part B and DME Claims**
* **Mainframe Infrastructure and Application skills such as but not limited to z/OS, CICS, RACF, JCL, Vanguard and/or z/Secure Security Tools**
* **Strong background in Mainframe Security across several areas, IE: RACF, USS, CICS, z/OS.**
* **Strong knowledge of all the RACF commands, dataset class, and the RACF general resource classes.**
* **Strong knowledge of the mainframe DISA STIG.**
* **Ability to run SMF reports (utilizing zSecure) to analyze access to resources.**
* **Ability to work with Auditors and to produce required reports for artifacts and to address findings.**
* **Ability to follow change control and to carefully plan and implement any high-risk security changes.**
* **Ability to work numerous RACF incidents and requests in a given day and ability to update the tickets clearly.**
* **Knowledge of utilizing the SYSLOG, SMF reports, and the RACF database to diagnose security errors.**
* **Knowledge of the RACDCERT command the ability to implement and renew certificates and manipulate rings on the mainframe.**
* **Knowledge of the use of the Vanguard Compliance Manager software.**
* **Knowledge of the use of the z/Secure Admin & Audit software.**
* **A plus to write REXX code to post-process SMF and Database reports.**
* **Ability to work closely in a team environment to help one another and share ideas.**
Mainframe Security Analyst - CDS
Cyber Security Analyst Job In Oregon
**To learn more about our website privacy policy, click on this.** * Responsible for analyzing compliance and technical control validation data to determine and report baseline variance for all applicable technology environments. * Interfaces with internal and external audit staff to ensure appropriate and accurate responses to audit queries are satisfied in a timely fashion.
* Assists in researching and evaluating systems and procedures for the prevention, detection, containment and correction of information security breaches. Assists in advising management and users regarding security procedures and compliance policies.
* Utilizing technologically advanced software, performs system monitoring evaluations and audits to ensure compliance with the corporate security policies and standards.
* Prepares and analyzes compliance information to develop mitigation priorities, milestones and audit responses.
* Participates in the evaluation of products and/or procedures to enhance productivity and effectiveness of information security across the organization.
* Assists architects and security specialists to ensure adequate security solutions are in place throughout IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements.
* 4 years job related work experience **OR**
* Associate's degree and 2 years job-related work experience
* Strong data analysis and correlation abilities.
* Strong organizational, interpersonal and communication skills.
* Strong knowledge of administrative, procedural and technical controls used to reduce security risks.
* Ability to effectively prioritize and execute tasks in a high-pressure environment.
* Strong knowledge of enterprise data architecture, systems engineering and data communications as applied to the automated storage and retrieval of information, using multiple platforms and protocols with the inherent security risks of each.
* Strong understanding of the organization's goals and objectives.
* Strong familiarity with threat analysis risk management, configuration management, business continuity and contingency planning as it applies to IT.
* Ability to troubleshoot multi-vendor Security issues.
* Able to work in a team-oriented, collaborative environment.
* Excellent attention to detail.
* Strong proficiency with applicable IT Security tools (software and hardware).
* Microsoft Office.
* **Experience in supporting the infrastructure / application environment within a CMS Claims Processing Environment for Part A, Part B and DME Claims**
* **Mainframe Infrastructure and Application skills such as but not limited to z/OS, CICS, RACF, JCL, Vanguard and/or z/Secure Security Tools**
* **Strong background in Mainframe Security across several areas, IE: RACF, USS, CICS, z/OS.**
* **Strong knowledge of all the RACF commands, dataset class, and the RACF general resource classes.**
* **Strong knowledge of the mainframe DISA STIG.**
* **Ability to run SMF reports (utilizing zSecure) to analyze access to resources.**
* **Ability to work with Auditors and to produce required reports for artifacts and to address findings.**
* **Ability to follow change control and to carefully plan and implement any high-risk security changes.**
* **Ability to work numerous RACF incidents and requests in a given day and ability to update the tickets clearly.**
* **Knowledge of utilizing the SYSLOG, SMF reports, and the RACF database to diagnose security errors.**
* **Knowledge of the RACDCERT command the ability to implement and renew certificates and manipulate rings on the mainframe.**
* **Knowledge of the use of the Vanguard Compliance Manager software.**
* **Knowledge of the use of the z/Secure Admin & Audit software.**
* **A plus to write REXX code to post-process SMF and Database reports.**
* **Ability to work closely in a team environment to help one another and share ideas.**
Security Engineer
Cyber Security Analyst Job In Oregon
Your Opportunity
We believe that if you want to fix healthcare you have to fix it for patients and providers. Our responsibility is to ensure both patient and provider safety and accessibility.
In this role you will be a technical contributor on the security team building security tools, implementing security controls, building security alerting infrastructure, and liaising between technical teams. You will be an active voice in a small but growing security team.
About You:
You have 2+ years of security-related experience
You have experience using infrastructure as code tools such as CloudFormation or Terraform
You are comfortable developing code in a high-level language such as Python, NodeJS, Ruby, etc.
You have experience working with cloud platforms such as AWS, Azure, or GCP
You are familiar with OWASP Top Ten vulnerabilities and how they impact an environment
You are familiar with building security alerts from multiple data sources
You have some familiarity with control frameworks such as NIST CSF and ISO 27001
You enjoy collaborating with external teams and stakeholders, their success is your success
You're passionate about building automated tasks to help efficiency
You don't dwell on mistakes, you own them and use them as opportunities to learn and grow from
You are an active voice and listener in a small but focused security team
No matter how large, small, complex, or mundane the task, you follow through to the best of your ability and persevere through challenges.
What You'll Do:
Implement technical security controls into our environment
Develop tools that assist with identifying and remediating security threats
Help build our security monitoring infrastructure across our platform
Ideate, develop, and execute technical compliance frameworks into controls
Review
third party applications and tools for security & compliance
Be a champion of security to stakeholders, team members, and outside vendors Best Parts of the Job:
You'll work with a small team that encourages you to learn new things
You'll have a wide scope of responsibilities and make impactful change
You'll use creativity to solve novel problems and be encouraged to learn new technologies to meet our business goals
You'll have an experienced technical manager who deeply cares about your performance
Web security engineer
Cyber Security Analyst Job In Oregon
SCT resources have a broad range of skills in different technologies. The large skill-set has been made possible by a conscious focus on strengthening our skills base. Every person selected for our team brings something new, something that adds to our offerings. We learn continuously, both on the job and through formal training programs.
Job Description
Requirements:
5+ years' experience with strong programming skills with proficient in of C#/.NET, Managed C++, MSTest using Visual Studio, Java programming using Eclipse tools and Familiarity with Ant
Experience of developing a browser plugin for Windows, including knowledge of ensuring compatibility across Chrome, Firefox and Internet Explorer
General understanding of system level Windows API/features (registry/privileges/security)
Experience with security models including authentication, encryption using AES
Working experience securing Internet services with (one or more) SSL/TLS protocols, PKI/X.509, digital signatures
Experience of working with scripting languages like Python/JavaScript
Familiar with version control systems (i.e Perforce)
Work in agile environments, particularly SCRUM
Strong written and verbal communication skills
Education: B.S. in Computer Science, or equivalent work experience
Network and Information Security Analyst
Cyber Security Analyst Job In Oregon
Job | Posted a month ago Benefits **Description** Network and Information Security Analyst DISTINGUISHING FEATURES OF THE CLASS: Network and Information Security Analyst plays a crucial role in the design, installation, configuration, monitoring, and maintenance of the network infrastructure. The primary responsibility is to uphold network access and security by preventing data loss, network interruptions, and related events through proactive measures. Working under the general direction of the Chief Technology Officer, this position will supervise Network and Systems Technicians and perform duties during normal business hours, nights, and weekends as required.
TYPICAL WORK ACTIVITIES:
* Install and maintain virtual and physical machines, switches, local and wide area networks, firewalls, and filters.
* Manage the installation and maintenance of cabling to maintain necessary connections.
* Monitor cybersecurity alerts from federal, state, and local agencies, promptly assessing and patching vulnerabilities.
* Conduct daily health checks of the network, troubleshooting, identifying, and correcting access and cybersecurity-related issues.
* Collaborate with vendors to configure and troubleshoot routers, circuit problems, and third-party software applications.
* Oversee the Security Operations Center (SOC) and Security Information and Event Management (SIEM), ensuring the safety and security of the network and information.
* Ensure proper connectivity, configuration, and security of all systems on the network.
* Manage the security and policies within the Google Admin console and Active Directory and other related software.
* Ensure network and systems compliance with NIST standards (or other applicable standards).
* Involvement in the development and implementation of cybersecurity awareness training programs for staff to promote a security-conscious culture.
* All other duties as assigned by supervisor
FULL PERFORMANCE KNOWLEDGE, SKILLS, ABILITIES AND PERSONAL CHARACTERISTICS:
* Solid understanding of NIST standards and cybersecurity principles.
* Experience in incident response and the ability to conduct thorough investigations in the event of a security incident.
* Capability to perform risk assessments and recommend proactive measures to mitigate potential cybersecurity risks.
* Proficiency in managing modern virtual and physical machines, switches, local and wide area networks, firewalls, filters, EDR, SIEMs, SOC.
* Demonstrated knowledge of installation procedures for network components and software.
* Familiarity with LDAP, AD, VPN, RDP, RCE, EDR, MDR, DNS, etc.
* Ability to diagnose and resolve computer systems and network problems.
* Capable of providing guidance to users on system and network use.
* Strong communication skills to effectively collaborate with cross-functional teams, external vendors, and end-users to convey complex technical information in a clear and understandable manner.
* Strong organizational skills and attention to detail for maintaining accurate records.
* Physical condition commensurate with the demands of the position.
MINIMUM QUALIFICATIONS:
- Graduation from a New York State or regionally accredited college or university with an Bachelor's Degree in cyber security, management information systems, computer science, information resources management, information technology, or a closely related field and three (3) years of full-time, paid experience in the installation, configuration, troubleshooting and maintenance of computer systems and networks of which one (1) year was in a supervisory capacity; OR,
- Graduation from a New York State or regionally accredited college or university with an Associate's Degree and five (5) years of full-time, paid experience in the installation, configuration, troubleshooting and maintenance of computer systems and networks of which one (1) year was in a supervisory capacity.
and you accept our . **Privacy Preference Center**
** Manage Consent Preferences**
Always Active