Post job

Cyber security analyst jobs in Chandler, AZ

- 105 jobs
All
Cyber Security Analyst
Information Security Analyst
Information Security Engineer
Cyber Security Engineer
Senior Security Analyst
Senior Security Engineer
Security System Engineer
Cyber Security Specialist
  • Information Security Analyst

    Strategic Staffing Solutions 4.8company rating

    Cyber security analyst job in Chandler, AZ

    STRATEGIC STAFFING SOLUTIONS HAS AN OPENING! This is a Contract Opportunity with our company that MUST be worked on a W2 Only. No C2C eligibility for this position. Visa Sponsorship is Available! The details are below. “Beware of scams. S3 never asks for money during its onboarding process.” Job Title: Information Security Analyst Location: Chandler, AZ 85286 Onsite Work Contract Length: 6+ Months Pay: 45-48 an hr on W2 Overview We are seeking an Information Security Analysts to support a Central Access Provisioning team during a transition from a manual to an automated Identity and Access Management (IAM) environment. These roles will also provide flexible support across IAM Operations teams to address capacity needs resulting from workforce attrition and evolving operational demands. The ideal candidates will have hands-on experience with IAM tools, strong foundational knowledge of authentication standards, and the ability to operate effectively in a regulated, security-focused environment. Key Responsibilities Support Identity and Access Management (IAM) operations, including access provisioning and related security processes. Participate in low- to moderately complex information security initiatives and identify opportunities for process improvement. Review, analyze, and resolve basic to intermediate information security assignments requiring research, evaluation, and selection of appropriate solutions. Assist with low- to medium-risk deliverables in alignment with established policies, procedures, and compliance requirements. Develop and present recommendations to address security-related issues, exercising independent judgment within defined guidelines. Provide timely and accurate information to internal stakeholders and client personnel related to information security analysis. Collaborate with cross-functional teams and interact effectively with multiple levels of leadership. Manage priorities, meet deadlines, and deliver high-quality results in a fast-paced environment. Required Qualifications Minimum of 2 years of experience in Information Security Analysis or a related field, or equivalent experience demonstrated through a combination of work experience, consulting, training, military service, or education. Hands-on experience with IAM tools, such as: SailPoint Okta CyberArk Ping Microsoft Entra ID (Azure AD) Working knowledge of authentication and identity standards, including: LDAP SAML OAuth OpenID SCIM Familiarity with security and compliance frameworks, such as ISO, NIST, SOX, and PCI. Strong organizational skills with the ability to multitask and prioritize competing requests. Customer-service mindset with a demonstrated ability to respond to requests in a timely and professional manner. Proficiency in Microsoft Office applications, including Word, Excel, Outlook, PowerPoint, Access, and Project.
    $100k-137k yearly est. 5d ago
  • Information Security Analyst

    The Judge Group 4.7company rating

    Cyber security analyst job in Chandler, AZ

    Our client is currently seeking a Information Security Engineer 3 ***W2 only, No corp to corp - No 1099 - No 3rd party*** Information Security Engineer 3 Schedule: Friday-Monday, 10:30am-8:30pm AZT Contract with potential to convert to full-time Pay: $53-$57 HR Role Overview This role supports the Cyber Threat Fusion Center, specifically covering weekend operations. The consultant will work closely with threat analysts, incident responders, and engineering teams to monitor, investigate, and respond to security events across the enterprise. There is potential for: Full‑time conversion, and Transition to the weekday team if a position opens due to promotion or movement. Core Technical Skills (Required) Splunk - SIEM monitoring, alert triage, dashboarding, log analysis CrowdStrike Falcon - EDR investigation, threat hunting, incident response Nice-to-Have Skills FireEye - Malware and threat analysis Palo Alto XSOAR - Case management and automation workflows NetWitness - Network traffic analysis and packet investigation Experience Requirements 2-3 years working in a Security Operations Center (SOC) or Cyber Threat Fusion Center Hands-on experience with incident response, threat detection, and security monitoring Additional Notes Candidates must be willing to work the Friday-Monday schedule
    $53-57 hourly 5d ago
  • Information Security Engineer 3 - Contingent

    PTR Global

    Cyber security analyst job in Chandler, AZ

    This candidate will provide tuning support for Security AI for structured and unstructured scanning to executes data classification efficacy validation strategy. This position will require that the candidate apply accurate feedback and prevent cascading misclassifications across thousands of columns. Monitor tuning impact and ensure compliance alignment. Maintain governance integrity and audit readiness. Without this role, misclassifications could propagate unchecked, leading to compliance risks and poor data quality. Key skills include data classification and semantic similarity of enterprise data, analytics and governance and platform technical awareness. In this contingent resource assignment, candidate may: Consult on or participate in moderately complex initiatives and deliverables within Information Security Engineering and contribute to large-scale planning related to Information Security Engineering deliverables. Review and analyze moderately complex Information Security Engineering challenges that require an in-depth evaluation of variable factors. Contribute to the resolution of moderately complex issues and consult with others to meet Information Security Engineering deliverables while leveraging solid understanding of the function, policies, procedures, and compliance requirements. Collaborate with client personnel in Information Security Engineering. Required Qualifications: 4 plus years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work or consulting experience, training, military experience, education. Pay Range: $55-60$ The specific compensation for this position will be determined by a number of factors, including the scope, complexity and location of the role as well as the cost of labor in the market; the skills, education, training, credentials and experience of the candidate; and other conditions of employment. Our full-time consultants have access to benefits including medical, dental, vision and 401K contributions as well as any other PTO, sick leave, and other benefits mandated by appliable state or localities where you reside or work.
    $55-60 hourly 1d ago
  • Information Security Engineer

    ML Outsourcing Services Private Limited

    Cyber security analyst job in Chandler, AZ

    Role: Information Security Engineer Contract: 12 months Key Responsibilities) Provide tuning and optimization support for Securiti AI data discovery and classification (structured & unstructured data). Execute data classification efficacy validation strategies to ensure high accuracy and consistency. Apply precise feedback mechanisms to prevent cascading misclassifications across thousands of columns and datasets. Monitor and analyze tuning impact on classification results and ensure ongoing compliance alignment. Maintain data governance integrity and support audit readiness. Perform internal data scanning across servers and virtual machines. Scan and analyze large-scale datasets (up to 100+ TB) across enterprise platforms. Work with cloud-based data sources, primarily on AWS. Collaborate with analytics, governance, security, and platform teams to align classification outcomes. Support regulatory compliance efforts related to GDPR, SOX, and other data protection frameworks. Utilize SQL or other database technologies to analyze, validate, and troubleshoot classification results. Develop scripts and automation to support scanning, tuning, and reporting activities. Required Skills & Qualifications 4-6 years of experience in data classification, data governance, or data analytics roles. Hands-on experience with Securiti AI or similar data discovery and classification platforms. Strong understanding of data classification techniques and semantic similarity across enterprise data. Experience scanning structured and unstructured data at scale. Proficiency in SQL and experience with relational or enterprise databases. Experience working with cloud platforms, preferably AWS. Knowledge of GDPR, SOX, or other data privacy and compliance regulations. Strong problem-solving and analytical skills. Experience with scripting (Python, Shell, or similar) for automation and analysis. Ability to scan data from servers and virtual machines. Nice-to-Have Skills Experience with data governance frameworks and tools. Familiarity with metadata management, data catalogs, and audit reporting. Exposure to AI/ML-driven classification or NLP-based data discovery. Prior experience in large-scale enterprise data environments. “Mindlance is an Equal Opportunity Employer and does not discriminate in employment on the basis of - Minority/Gender/Disability/Religion/LGBTQI/Age/Veterans.”
    $86k-119k yearly est. 2d ago
  • Information Security Engineer

    Intraedge 3.9company rating

    Cyber security analyst job in Phoenix, AZ

    We're looking for an Information Security Engineer to join our team and help strengthen our endpoint, access, and compliance security posture across the organization. If you thrive in a fast-paced environment and enjoy solving complex security challenges, we'd love to connect. 🔐 Key Responsibilities Support endpoint and access security across Windows and mac OS environments. Review and validate privileged access requests using least-privilege principles. Assist in developing and implementing security policies, elevation rules, and device configurations. Troubleshoot security-related issues, including elevation failures and policy conflicts, using tools like BeyondTrust EPM. Participate in compliance and governance initiatives, including secure analytics and data protection efforts. Prepare clear documentation, meeting updates, and stakeholder communications. Contribute to continuous improvements in cyber engineering and endpoint security. 💡 Ideal Candidate Experience with endpoint security tools (e.g., BeyondTrust, EDR, MDM). Strong understanding of access control, least-privilege frameworks, and security best practices. Ability to collaborate with cross-functional teams and communicate effectively. Curious, proactive, and ready to solve complex security problems.
    $80k-104k yearly est. 3d ago
  • Sr. Security Engineer

    Oscar 4.6company rating

    Cyber security analyst job in Scottsdale, AZ

    My client seeking a Security Engineer with deep experience in Azure cloud environments and Fortinet security technologies. This role is responsible for strengthening the organization's cloud security posture, supporting defensive and offensive security initiatives, and ensuring ongoing compliance with SOC2 and GDPR requirements. The ideal candidate has a strong foundation in Azure security architecture, hands-on experience deploying and managing FortiGate solutions in cloud environments, and a practical understanding of both blue-team and red-team methodologies. This is a highly collaborative position in a fast-moving, multi-tenant environment, requiring strong technical judgment, attention to detail, and the ability to design secure solutions at scale. Details: $120k - $130k Full-Time, Permanent Position Scottsdale, AZ | 5 Days On-Site Key Responsibilities: Design, implement, and maintain security controls across Azure workloads, identities, networks, and data services. Manage Azure security posture using Microsoft Defender for Cloud, Azure Policy, and associated tooling. Ensure proper network segmentation, firewall enforcement, and secure connectivity across cloud environments. Deploy, configure, and manage Fortinet technologies within Azure, including FortiGate firewalls and related services. Optimize firewall rules, routing, logging, and monitoring to enhance threat visibility and reduce attack surface. Support offensive-focused initiatives by identifying misconfigurations, modeling potential attack paths, and validating risks. Support SOC2 control implementation, evidence collection, access reviews, and continuous compliance efforts. Contribute to the development, documentation, and enforcement of security policies and procedures. Support secure deployment pipelines, identity governance practices, and operational security improvements. Participate in security architecture reviews for new systems and integrations. Required Qualifications 5-7 years of experience in cloud security or cloud engineering roles. 5+ years of Azure experience, including networking, identity, governance, and security services 5+ years of experience with Fortinet, ideally FortiGate firewalls deployed in Azure. Practical understanding of both defensive (blue team) and offensive (red team) security concepts. Experience working within or supporting SOC2 programs. Proficiency with scripting/automation (PowerShell or C#) Good-to-Haves: Exposure to DevSecOps practices, CI/CD pipeline hardening, or IaC security scanning. Certifications such as AZ-500, SC-200, SC-300, Fortinet NSE certifications, or similar. Exposure to GDBR Oscar Associates Limited (US) is acting as an Employment Agency in relation to this vacancy.
    $120k-130k yearly 4d ago
  • Cyber Security Analyst - AZ

    Vensure Employer Solutions 4.1company rating

    Cyber security analyst job in Chandler, AZ

    We are seeking an experienced Cyber Security Analyst to join our cybersecurity team. In this critical role, the successful candidate will be tasked with the comprehensive monitoring, detection, analysis, and response to cybersecurity incidents, ensuring the integrity, confidentiality, and availability of information assets. Leveraging deep technical expertise and a strategic approach to cybersecurity, this position calls for a proactive and vigilant professional dedicated to identifying vulnerabilities, mitigating risks, and leading incident response efforts. The ideal candidate will possess deep technical knowledge, excellent communication skills, and the ability to coordinate incident response activities across the organization. This position requires a blend of analytical prowess, technical expertise, and a strategic mindset to protect the company's assets from internal and external threats Essential Duties and Responsibilities Continuously monitor and evaluate the organization's cybersecurity posture, using securitytools and techniques to detect potential threats and vulnerabilities across a wide range ofsystems and environments. Respond to, investigate, and manage security incidents with precision and expertise, frominitial detection through to resolution, ensuring minimal impact to the organization. Serve as a key contributor to the Security Operations team, enhancing its operationalcapabilities through the development and implementation of security measures and protocols. Mentor and guide junior security analysts within the security operations team, fostering aculture of continuous learning and professional development. Share knowledge and insights onthe latest cybersecurity trends, tools, and practices to enhance team capabilities. Develop, refine, and maintain incident response playbooks, procedures, and guidelines inalignment with industry best practices. Engage in proactive threat hunting initiatives, leveraging threat intelligence and cybersecurityframeworks to identify and neutralize potential threats before they manifest into incidents.• Document and communicate detailed incident reports and analyses, ensuring transparency andclarity in the post-incident review process to improve future security measures and responses Stay current with new threats, technologies, and trends in cybersecurity, contributing to thecompany's IT security strategy and roadmap.• Participate in continuous improvement activities that enhance operational efficiency throughthe implementation of automation. Share knowledge and insights with team members and across the organization to foster aculture of security awareness and resilience Knowledge, Skills, and Abilities Bachelor's degree in Cyber Security, Information Assurance, Computer Science, Engineering, ora related technical field is preferred or equivalent combination of experience, education(including other relevant degree or educational programs), and certifications. Professional security certifications such as GCIH, GCFA, CISSP, or similar are highly desirable Education & Experience 3-5 years of experience in cybersecurity, with a focus on security operations, incidentresponse, or related fields. Proven experience in security systems administration, SIEM, threat intelligence platforms,vulnerability management, and forensic tools. Strong understanding of cybersecurity principles, IT systems, and network security. Demonstrated proficiency in Windows and Linux operating systems, with a solid understandingof cloud services Excellent communication skills, with the ability to convey complex security concepts to bothtechnical and non-technical stakeholders. Demonstrated ability to act with integrity, professionalism, and confidentiality. Organized, adaptable, and capable of managing multiple high-priority tasks in a fast-pacedenvironment
    $80k-111k yearly est. 60d+ ago
  • Cyber Security Analyst

    Washington Elementary School District 4.6company rating

    Cyber security analyst job in Phoenix, AZ

    Pay Grade: PP (Non-Exempt Support Staff Salary System) Department: Management Information Systems (MIS) Accountable To: Administrator of MIS FLSA Status: Non-Exempt Calendar: 261 Days Under general direction, incumbent is responsible for protecting the school district's technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites. Essential Functions: * Threat detection and analysis: Actively monitor security alerts from various sources, including Security Information and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc. * Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts. * Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls. * Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. * Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. * Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies. * User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures. * Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment. * Performs other job related duties as assigned. Required Qualifications: To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary. * High School diploma or equivalent (G.E.D.) prior to being hired; * Valid Arizona Department of Transportation Driver's License; * Minimum of one year of experience in information security, network security, or a related technology field. * Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services. * Experience with security tools, including SIEM, antivirus software, and intrusion detection systems. * Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card. Preferred Qualifications: It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position. * Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise. * Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP. * Experience working in an educational or public sector environment. * Knowledge of emerging security technologies and trends. * Experience administering a Cisco Local and Wide area networking environment; * Experience with border network security devices such as Email filters and Firewalls; * Experience administering Windows Server and Active Directory. * Experience with VMWare and Veeam (or other backup and recovery platform) Knowledge and Skills Required: To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Skills required, but not limited to, for this position include: * Ability to work independently and collaboratively in a team environment. * Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. * Familiarity with scripting languages like Python or PowerShell for automating security tasks. * Knowledge of common security frameworks, such as NIST. * Understanding of networking concepts, firewalls, and data encryption techniques. * Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences. * Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities. * Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack. Physical Requirements: The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus. Working Conditions: The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels. The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
    $48k-60k yearly est. 15d ago
  • Cyber Security Engineer

    Runbuggy OMI, Inc.

    Cyber security analyst job in Tempe, AZ

    About Us: RunBuggy is the most technically advanced automotive logistics platform on the market. Period. Backed by Porsche Ventures and Hearst Ventures, RunBuggy is transforming the way cars move. Our cutting-edge technology is trusted by some of the largest OEMs, captive finance companies, and automotive lenders in the world to streamline vehicle transportation at scale. RunBuggy's end-to-end platform connects car shippers and haulers in real time - eliminating the friction of traditional load boards and costly custom software. For shippers, RunBuggy integrates directly into existing management systems, reducing transportation costs and accelerating delivery timelines. For transporters, we offer a smarter, more profitable way to find, accept, and manage loads - all from a single app. Since launching in 2019, RunBuggy has grown to over 150 team members, facilitated the movement of hundreds of thousands of vehicles, and attracted tens of thousands of transporters across the U.S. We're not just building a better logistics platform - we're redefining the future of automotive transportation. About the Role: Are you passionate about defending digital frontiers and tackling the latest cyber threats? At RunBuggy, we're searching for a Cyber Security Engineer who thrives on challenge and innovation. In this pivotal role, you'll be part of our Engineering team, safeguarding both our products and infrastructure. You'll lead the charge in identifying and neutralizing emerging threats, investigating incidents, and driving rapid resolutions that keep our business secure and resilient. Bring your hands-on expertise in cloud and on-premises security automation, infrastructure-as-code, and DevSecOps practices to a team that values proactive problem-solving and continuous improvement. If you're ready to make a real impact and grow your career in a fast-paced, collaborative environment, we want to hear from you! What You Will Be Doing: Kubernetes & Microservices Security * Architect and enforce security policies for Kubernetes clusters and containerized applications, including Azure Kubernetes Service (AKS) and integration with service meshes (e.g., Istio). * Integrate security checks into CI/CD pipelines (e.g., GitHub Actions, Azure DevOps), automate vulnerability scanning (e.g., SonarQube, Coverity, Kube-Bench, Kube-Hunter, Falco), and manage secure base container images. * Apply security hardening using distroless images and CIS benchmarks for Kubernetes. * Automate infrastructure provisioning and security controls using tools like Terraform and Ansible. Network & Web Security * Configure and maintain network and web firewalls, ACLs, secure routing, and SSL/TLS termination at ingress points. * Implement encryption, MFA, and secure access controls across services, including integration with CDNs (e.g., Akamai) and OAuth providers (e.g., Apigee). * Model after AWS and Azure security best practices, staying current on the latest trends and features. Threat Detection & Incident Response * Deploy and manage tools such as Falco, GuardDuty, IDS/IPS, and X-ray for container image scanning. * Monitor logs and metrics using platforms such as Grafana, Prometheus, and the Elastic Stack (Kibana, Fluentd). * Lead incident response efforts, including investigation, documentation, and remediation of security events. * Develop and automate expiration reporting for secrets, keys, and certificates, and implement proactive alerting for expiring credentials. Compliance & Documentation * Ensure adherence to frameworks such as NIST CSF and ISO 27001. * Maintain and update security documentation, playbooks, and standard operating procedures. * Assist with maintaining and updating the incident response policy, plan, and playbooks. Automation & DevSecOps * Drive automation of security and infrastructure tasks using Infrastructure-as-Code (Terraform, Azure Bicep), configuration management (Ansible, Ansible Tower), and GitOps tools (ArgoCD, Flux). * Lead migration initiatives from on-premises to cloud and from licensed to open-source tools, optimizing for cost and security. * Mentor and train team members on security automation and best practices. Requirements What You Bring to the Team by Way of Skills and Experience * 5+ years of experience as a security engineer or DevSecOps engineer supporting development, infrastructure, and incident response teams in cloud environments (Azure, AWS). * Bachelor's or Master's degree in Computer Science, IT, Cyber Security, or related field. * Demonstrated understanding of Cyber Security Engineer principles, secure SDLC, and incident detection and response. * Deep knowledge of secure coding practices, security gateways, and threat modeling as part of the secure software development lifecycle. * Hands-on experience with CI/CD pipelines (GitHub Actions, Azure DevOps, Jenkins), container security, and automation scripting (Shell, Python, Perl). * Proficiency with infrastructure automation (Terraform, Ansible), service mesh (Istio), and monitoring/logging tools (Grafana, Prometheus, Elastic Stack). * Experience with advanced persistent threats, phishing, social engineering, and enhanced authentication methods. * Familiarity with cyber security frameworks (NIST CSF, ISO 27001) and compliance requirements. * Strong attention to detail, QA skills, and a proactive approach to problem-solving. Certificates, Licenses, and/or Registrations: * Professional certifications such as Certified Ethical Hacker (CEH), Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified Cloud Security Professional (CCSP) are preferred. What is in it for You and Why you Should Apply: * Market competitive pay based on education, experience, and location. * Highly competitive medical, dental, vision, Life w/ AD&D, Short-Term Disability insurance, Long-Term Disability insurance, pet insurance, identity theft protection, and a 401(k) retirement savings plan. * Employee wellness program. * Employee rewards, discounts, and recognition programs. * Generous company-paid holidays (12 per year), vacation, and sick time. * Paid paternity/maternity leave. * Monthly connectivity/home office stipend if working from home 5 days a week. * A supportive and positive space for you to grow and expand your career. Pay Range Disclosure: The advertised range represents the expected pay range for this position at the time of posting based on education, experience, skills, location, and other factors. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. RunBuggy is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination, harassment, and retaliation on the basis of race, color, religion, sex (including gender identity and sexual orientation), pregnancy, parental status, national origin, age, disability, genetic information, or any other status protected under federal, state, or local law. Applicants must be currently authorized to work in the United States. Please, no agencies.
    $84k-117k yearly est. 1d ago
  • Cyber Security Engineer

    Ports America Career Opportunity

    Cyber security analyst job in Tempe, AZ

    In the maritime industry, where colossal ships dock, and millions of tons of cargo are moved with precision, it takes teams of dedicated individuals to keep global trade in motion. Working in this dynamic sector means that you play a part in ensuring the pulse of commerce never skips a beat, all while driving the future of supply chain logistics and marine terminal operations. Dive into a career where your talents make an impact and help us steer the future of this vital sector. Every job function in our organization, whether it's on the docks or behind the scenes in administrative roles, finance, payroll, or IT, has a significant impact on the national economy and critical supply chain operations. Where the pulse of global trade meets the precision of maritime excellence, at Ports America, we don't just move cargo; we drive the nation's economic engine! We are looking for a driven, self-starting Cyber Security Engineer to help our Information Security Team strengthen our cyber security program. This role provides a unique opportunity for a cyber-security professional to learn a complex and interesting business model while supporting all facets of a national organization. Using multiple tools and processes, this role will assist in reducing risk in a business that is part of our nation's critical infrastructure. As the Cyber Security Engineer, you will provide cyber security support, guidance, and technical expertise to help ensure that risks to the business of Ports America are minimized, while maintaining the ability of our ports and terminals to move the maximum amount of cargo in the minimum amount of time. At Ports America, your job matters! Essential Duties: Assist in the measurement and analysis of the organization's cyber security posture and recommend improvements to address risks. Support the implementation of network security best practices across multiple solutions. Assist with implementation of cyber security solutions (new/modifications) to reduce risk while enabling business efficiency and productivity. Support the development, implementation, and maintenance of policies, processes, and procedures associated with cyber security and Identity and Access Management (IAM). Contribute to endpoint security initiatives, including hardening, tools, and procedures. Stay current on threats, vulnerabilities, attacks, and countermeasures. Monitor and manage web filtering solutions. Assist in the development and refinement of patch and vulnerability management processes. Support disaster recovery plan development and testing. Participate in cyber security incident response across the enterprise. Assist with capturing and refining information protection requirements and integrating them into system designs. Support security evaluations, system analyses, penetration testing, and security architecture reviews. Prepare and/or conduct written and oral reports and presentations. Facilitate periodic access reviews to support SOX/Internal Controls compliance. Assist with malware analytics and forensic investigations. Working Conditions: Must be willing to travel (up to 10%) Office environment Minimum Qualifications: BA/BS degree in Computer Science, Engineering, Information Systems, or equivalent experience 4+ years in Information Technology, including at least 2 years in an Information Security Engineering or similar capacity. Preferred Qualifications: Strong understanding of NIST and CIS Controls. Solid working knowledge in incident response, network security (firewalls, NAT, VPN, NGFWs, IPS/IDS), web filtering, patch management, vulnerability assessments, and malware monitoring. Direct experience with anti-virus software, intrusion detection, firewalls, SIEM, patch management tools, and content filtering. Experience in a system administration role supporting multiple platforms and applications. Experience with virtualization technologies. Security+ or similar certification CISSP, CEH, OSCP, or similar certifications Experience with secure network, system, and application design Experience with Linux/Unix, Experience managing and securing public cloud platforms (IaaS, PaaS, SaaS) Strong, hands-on knowledge of Microsoft Windows OS, Active Directory, Group Policy Management, and Microsoft Office 365 environments. Knowledge of Windows network configurations, Microsoft ADFS, and enterprise environments. Familiarity with packet capture and analysis techniques and technologies. Working knowledge of endpoint protection tactics and tools. Experience with risk assessment tools and methods. Familiarity with disaster recovery, forensic tools, and mobile device management (MDM/EMM). Skills in structured analysis and requirements gathering. Ability to analyze logs using tools such as Splunk, ELK, or similar platforms. Ability to present technical and security concepts to non-technical audiences. Strong relationship-building and collaboration skills with stakeholders and IT operations peers. Scripting/programming knowledge (Perl, Python, PowerShell, etc.) preferred. Knowledge of change management and project management principles, preferred. NOTE: This job description is not intended to be all-inclusive. Employees may perform other related duties as needed to meet the ongoing needs of the organization. Ports America is an Equal Opportunity Employer encouraging diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race; color; religion; national origin; sex (including pregnancy); sexual orientation; gender identity and/or expression; age; disability; genetic information, citizenship status; military service obligations or any other category protected by applicable federal, state, or local law. This role does not offer sponsorship for work authorization. External applicants must be eligible to work in the US.  If you require additional information about our comprehensive data privacy policy https://artifacts.portsamerica.com/pdf/Applicant%20Privacy%20Notice.pdf, we invite you to contact us via email at human.resources@portsamerica.com. Our dedicated team at Ports America will be pleased to address any specific inquiries or concerns you may have regarding the handling, protection, and security of your data. We are committed to ensuring the utmost privacy and confidentiality of your personal information and will gladly provide you with the necessary details to help you better understand our practices and protocols.
    $84k-117k yearly est. 60d+ ago
  • Cyber Security Engineer

    Runbuggy OMI

    Cyber security analyst job in Tempe, AZ

    About Us: RunBuggy is the most technically advanced automotive logistics platform on the market. Period. Backed by Porsche Ventures and Hearst Ventures, RunBuggy is transforming the way cars move. Our cutting-edge technology is trusted by some of the largest OEMs, captive finance companies, and automotive lenders in the world to streamline vehicle transportation at scale. RunBuggy's end-to-end platform connects car shippers and haulers in real time - eliminating the friction of traditional load boards and costly custom software. For shippers, RunBuggy integrates directly into existing management systems, reducing transportation costs and accelerating delivery timelines. For transporters, we offer a smarter, more profitable way to find, accept, and manage loads - all from a single app. Since launching in 2019, RunBuggy has grown to over 150 team members, facilitated the movement of hundreds of thousands of vehicles, and attracted tens of thousands of transporters across the U.S. We're not just building a better logistics platform - we're redefining the future of automotive transportation. About the Role: Are you passionate about defending digital frontiers and tackling the latest cyber threats? At RunBuggy, we're searching for a Cyber Security Engineer who thrives on challenge and innovation. In this pivotal role, you'll be part of our Engineering team, safeguarding both our products and infrastructure. You'll lead the charge in identifying and neutralizing emerging threats, investigating incidents, and driving rapid resolutions that keep our business secure and resilient. Bring your hands-on expertise in cloud and on-premises security automation, infrastructure-as-code, and DevSecOps practices to a team that values proactive problem-solving and continuous improvement. If you're ready to make a real impact and grow your career in a fast-paced, collaborative environment, we want to hear from you! What You Will Be Doing: Kubernetes & Microservices Security Architect and enforce security policies for Kubernetes clusters and containerized applications, including Azure Kubernetes Service (AKS) and integration with service meshes (e.g., Istio). Integrate security checks into CI/CD pipelines (e.g., GitHub Actions, Azure DevOps), automate vulnerability scanning (e.g., SonarQube, Coverity, Kube-Bench, Kube-Hunter, Falco), and manage secure base container images. Apply security hardening using distroless images and CIS benchmarks for Kubernetes. Automate infrastructure provisioning and security controls using tools like Terraform and Ansible. Network & Web Security Configure and maintain network and web firewalls, ACLs, secure routing, and SSL/TLS termination at ingress points. Implement encryption, MFA, and secure access controls across services, including integration with CDNs (e.g., Akamai) and OAuth providers (e.g., Apigee). Model after AWS and Azure security best practices, staying current on the latest trends and features. Threat Detection & Incident Response Deploy and manage tools such as Falco, GuardDuty, IDS/IPS, and X-ray for container image scanning. Monitor logs and metrics using platforms such as Grafana, Prometheus, and the Elastic Stack (Kibana, Fluentd). Lead incident response efforts, including investigation, documentation, and remediation of security events. Develop and automate expiration reporting for secrets, keys, and certificates, and implement proactive alerting for expiring credentials. Compliance & Documentation Ensure adherence to frameworks such as NIST CSF and ISO 27001. Maintain and update security documentation, playbooks, and standard operating procedures. Assist with maintaining and updating the incident response policy, plan, and playbooks. Automation & DevSecOps Drive automation of security and infrastructure tasks using Infrastructure-as-Code (Terraform, Azure Bicep), configuration management (Ansible, Ansible Tower), and GitOps tools (ArgoCD, Flux). Lead migration initiatives from on-premises to cloud and from licensed to open-source tools, optimizing for cost and security. Mentor and train team members on security automation and best practices. Requirements What You Bring to the Team by Way of Skills and Experience 5+ years of experience as a security engineer or DevSecOps engineer supporting development, infrastructure, and incident response teams in cloud environments (Azure, AWS). Bachelor's or Master's degree in Computer Science, IT, Cyber Security, or related field. Demonstrated understanding of Cyber Security Engineer principles, secure SDLC, and incident detection and response. Deep knowledge of secure coding practices, security gateways, and threat modeling as part of the secure software development lifecycle. Hands-on experience with CI/CD pipelines (GitHub Actions, Azure DevOps, Jenkins), container security, and automation scripting (Shell, Python, Perl). Proficiency with infrastructure automation (Terraform, Ansible), service mesh (Istio), and monitoring/logging tools (Grafana, Prometheus, Elastic Stack). Experience with advanced persistent threats, phishing, social engineering, and enhanced authentication methods. Familiarity with cyber security frameworks (NIST CSF, ISO 27001) and compliance requirements. Strong attention to detail, QA skills, and a proactive approach to problem-solving. Certificates, Licenses, and/or Registrations: Professional certifications such as Certified Ethical Hacker (CEH), Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified Cloud Security Professional (CCSP) are preferred. What is in it for You and Why you Should Apply: Market competitive pay based on education, experience, and location. Highly competitive medical, dental, vision, Life w/ AD&D, Short-Term Disability insurance, Long-Term Disability insurance, pet insurance, identity theft protection, and a 401(k) retirement savings plan. Employee wellness program. Employee rewards, discounts, and recognition programs. Generous company-paid holidays (12 per year), vacation, and sick time. Paid paternity/maternity leave. Monthly connectivity/home office stipend if working from home 5 days a week. A supportive and positive space for you to grow and expand your career. Pay Range Disclosure: The advertised range represents the expected pay range for this position at the time of posting based on education, experience, skills, location, and other factors. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. RunBuggy is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination, harassment, and retaliation on the basis of race, color, religion, sex (including gender identity and sexual orientation), pregnancy, parental status, national origin, age, disability, genetic information, or any other status protected under federal, state, or local law. Applicants must be currently authorized to work in the United States. Please, no agencies.
    $84k-117k yearly est. 1d ago
  • Cyber Resilience Specialist

    Slalom 4.6company rating

    Cyber security analyst job in Phoenix, AZ

    Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery. What You'll Do * Lead and facilitate Business Impact Assessments (BIAs) across business units * Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems * Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience * Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles * Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews * Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations * Support program governance, metrics, training, and awareness efforts What You'll Bring * 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting * Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning * Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms) * Experience supporting risk assessments and regulatory audits * Excellent facilitation and stakeholder management skills * Strong writing skills to produce clear, client-ready plans and reports About Us Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all. Compensation and Benefits Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance. Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time. We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************. EEO and Accommodations Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process. #LI-MS12
    $153k-186k yearly Easy Apply 2d ago
  • Lead Cyber Security Architect/Engineer

    The Team and Product

    Cyber security analyst job in Phoenix, AZ

    Join a cutting-edge aerospace product security team shaping the future of secure flight systems and defense technologies. The Product Security Governance Leader will be responsible for establishing, leading, and continuously improving Honeywell Aerospace's product security governance framework. This role ensures that all aerospace products meet stringent cybersecurity, safety, and compliance requirements across their lifecycle. The leader will act as a bridge between engineering, compliance, and executive leadership, driving secure-by-design principles and regulatory adherence in a highly complex, global environment. YOU MUST HAVE Bachelor's degree in Computer Science, Cybersecurity, Engineering, or related field. Knowledge of product cybersecurity standards. Strong leadership, communication, and stakeholder management skills. Ability to influence across global, cross-functional teams. Experience with risk management, audit processes, and executive reporting. WE VALUE Knowledge of Secure Software Development Lifecycle (SSDLC), Knowledge of Secure System Development Lifecycle Experience with product security lifecycle Black Belt/Six Sigma Experience Good communication and leadership skills Good interpersonal skills with the ability to facilitate diverse groups, help negotiate priorities, and resolve conflicts among project stakeholders Certifications in security and privacy demonstrating deep practical knowledge such as CISSP/CISM/ CGRC As a key leader in our growing product security team, you'll leverage your proven experience and... Governance & Strategy Define and implement Honeywell Aerospace's product security governance framework aligned with industry standards (DO-326A, DO-356A, CRA, Part IS, NIST, ISO 21434, etc.). Develop policies, procedures, and metrics to measure product security maturity across programs. Lead risk management processes for product cybersecurity, ensuring proactive mitigation strategies. Compliance & Regulatory Oversight Ensure compliance with FAA, EASA, DoD, and other global aerospace cybersecurity regulations. Partner with legal and compliance teams to monitor evolving regulatory landscapes and integrate requirements into product development. Cross-Functional Leadership Collaborate with engineering, IT, supply chain, and program management to embed security governance into product lifecycle processes. Drive secure development practices, including threat modeling, vulnerability management, and secure coding standards. Audit & Assurance Lead internal and external audits related to product security governance. Establish reporting mechanisms for executive leadership and regulatory bodies. Training & Culture Champion a culture of security awareness across engineering and product teams. Develop training programs to ensure compliance with governance policies.
    $84k-117k yearly est. Auto-Apply 1d ago
  • Principal Security Information Analyst

    Gen Mobile 3.9company rating

    Cyber security analyst job in Tempe, AZ

    Principal Information Security Analyst (Tier 2) As a Principal Information Security Analyst within Gen Digital's global Security Operations Center (SOC), you will play a key role in strengthening threat detection and response across the organization. The role focuses on improving SOC monitoring and detection processes through technical expertise, continuous development, and close collaboration with other security teams. In this position, you will serve as a senior specialist, leading automation and detection engineering efforts, mentoring junior analysts and contributing to projects that enhance security visibility and overall SOC performance. Operating in a follow-the-sun model, the SOC ensures 24/7 global coverage, with regional teams working during their respective business hours and sharing on-call responsibilities for weekend. Key Responsibilities: Monitor, analyze, and correlate security alerts and events across multiple platforms (SIEM, WAF, EDR, email, cloud, network, and threat intelligence tools) to identify and validate suspicious or malicious activity Continuously develop and fine-tune detection rules, correlation searches, security policies, and dashboards to improve visibility, reduce false positives, and increase alert accuracy across security platforms Support and mentor Tier 1 analysts in alert triage, escalation quality, and use of tools Collaborate with security engineers on automation and enrichment initiatives to streamline operational workflows and improve detection efficiency Maintain complete and up-to-date documentation for all detection use cases, workflows and process improvements Participate in security projects and collaborate with internal stakeholders (e.g., Incident Response, Security Engineering, Application Security, and IT) to enhance detection coverage, visibility, and response capabilities Support the execution of incident response playbooks Qualification and Work Experience: 3-5 years of hands-on experience in SOC operations, cybersecurity monitoring, or related areas such as detection engineering or threat analysis Solid understanding of networking concepts (TCP/IP, DNS, HTTP/S) and how they apply to security monitoring and threat analysis Strong knowledge of cybersecurity principles, common attack techniques, and threat types (e.g., phishing, malware, brute force, web application attacks) Proven experience working with security logs, alerts, and structured data across multiple platforms (SIEM, EDR, WAF, cloud, and network telemetry) Hands-on experience with SIEM platforms - Splunk preferred - including detection content development, rule tuning, and dashboard creation Familiarity with Web Application Firewall (WAF) technologies and the ability to analyze or tune related alerts and policies Understanding of cloud security concepts and experience with monitoring tools for major providers (AWS, Azure, GCP) Working knowledge of scripting or automation (e.g., Python, PowerShell, or API-based integrations) to support analysis and enrichment workflows Experience using AI-based tools to support daily SOC operations, including data analysis, investigation, documentation, and collaboration Strong analytical and problem-solving skills with attention to detail and curiosity for continuous learning Effective communication and documentation skills in English, both written and verbal Experience collaborating across teams (e.g., Security Engineering, Incident Response, Application Security) on detection improvements or automation projects Prior experience in a Security Operations Center (SOC) or similar environment is highly preferred Familiarity with the fintech environment or experience supporting financial services infrastructure is considered a strong advantage #LI-AS1 Gen is proud to be an equal-opportunity employer, committed to diversity and inclusivity. We base employment decisions on merit, experience, and business needs, without considering race, color, national origin, age, religion, sex, pregnancy, genetic information, disability, medical condition, marital status, sexual orientation, gender identity or expression, military or veteran status, or other unlawful factors. Gen prohibits discrimination based on these protected characteristics and recruits talented candidates from diverse backgrounds. We consider individuals with arrest and conviction records and do not discriminate against employees for discussing their own pay or that of other employees or applicants. Learn more about pay transparency. To conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.
    $81k-118k yearly est. Auto-Apply 36d ago
  • Principal Security Information Analyst

    Gen Digital

    Cyber security analyst job in Tempe, AZ

    Principal Information Security Analyst (Tier 2) As a Principal Information Security Analyst within Gen Digital's global Security Operations Center (SOC), you will play a key role in strengthening threat detection and response across the organization. The role focuses on improving SOC monitoring and detection processes through technical expertise, continuous development, and close collaboration with other security teams. In this position, you will serve as a senior specialist, leading automation and detection engineering efforts, mentoring junior analysts and contributing to projects that enhance security visibility and overall SOC performance. Operating in a follow-the-sun model, the SOC ensures 24/7 global coverage, with regional teams working during their respective business hours and sharing on-call responsibilities for weekend. Key Responsibilities: * Monitor, analyze, and correlate security alerts and events across multiple platforms (SIEM, WAF, EDR, email, cloud, network, and threat intelligence tools) to identify and validate suspicious or malicious activity * Continuously develop and fine-tune detection rules, correlation searches, security policies, and dashboards to improve visibility, reduce false positives, and increase alert accuracy across security platforms * Support and mentor Tier 1 analysts in alert triage, escalation quality, and use of tools * Collaborate with security engineers on automation and enrichment initiatives to streamline operational workflows and improve detection efficiency * Maintain complete and up-to-date documentation for all detection use cases, workflows and process improvements * Participate in security projects and collaborate with internal stakeholders (e.g., Incident Response, Security Engineering, Application Security, and IT) to enhance detection coverage, visibility, and response capabilities * Support the execution of incident response playbooks Qualification and Work Experience: * 3-5 years of hands-on experience in SOC operations, cybersecurity monitoring, or related areas such as detection engineering or threat analysis * Solid understanding of networking concepts (TCP/IP, DNS, HTTP/S) and how they apply to security monitoring and threat analysis * Strong knowledge of cybersecurity principles, common attack techniques, and threat types (e.g., phishing, malware, brute force, web application attacks) * Proven experience working with security logs, alerts, and structured data across multiple platforms (SIEM, EDR, WAF, cloud, and network telemetry) * Hands-on experience with SIEM platforms - Splunk preferred - including detection content development, rule tuning, and dashboard creation * Familiarity with Web Application Firewall (WAF) technologies and the ability to analyze or tune related alerts and policies * Understanding of cloud security concepts and experience with monitoring tools for major providers (AWS, Azure, GCP) * Working knowledge of scripting or automation (e.g., Python, PowerShell, or API-based integrations) to support analysis and enrichment workflows * Experience using AI-based tools to support daily SOC operations, including data analysis, investigation, documentation, and collaboration * Strong analytical and problem-solving skills with attention to detail and curiosity for continuous learning * Effective communication and documentation skills in English, both written and verbal * Experience collaborating across teams (e.g., Security Engineering, Incident Response, Application Security) on detection improvements or automation projects * Prior experience in a Security Operations Center (SOC) or similar environment is highly preferred * Familiarity with the fintech environment or experience supporting financial services infrastructure is considered a strong advantage #LI-AS1 Gen is proud to be an equal-opportunity employer, committed to diversity and inclusivity. We base employment decisions on merit, experience, and business needs, without considering race, color, national origin, age, religion, sex, pregnancy, genetic information, disability, medical condition, marital status, sexual orientation, gender identity or expression, military or veteran status, or other unlawful factors. Gen prohibits discrimination based on these protected characteristics and recruits talented candidates from diverse backgrounds. We consider individuals with arrest and conviction records and do not discriminate against employees for discussing their own pay or that of other employees or applicants. Learn more about pay transparency. To conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.
    $78k-114k yearly est. Auto-Apply 39d ago
  • CORP-Information Security Specialist

    Bryan College 3.8company rating

    Cyber security analyst job in Tempe, AZ

    The Information Security Specialist is responsible for providing leadership in securing university data and systems. They will assist in developing policies and training programs to guide user activities; work closely with the ITS Management team to develop recommendations for system controls and monitoring to ensure the integrity and safety of university systems and data; and they will perform regular audits to ensure alignment with departmental standards and university policies. The Information Security Specialist works as a member of the Information Security Services OR Infrastructure Services team and is charged to understand the goals/objectives of the university and ITS division, and to provide collaborative leadership to university users to ensure that all members of the user community understand their roles/responsibilities and are positioned for success in securing institutional and student data. Core Values: Deliver Delight Every Time - We keep learner success at the center of every interaction to provide exceptional service and a delightful student experience. ● Value each student and employee interaction. ● Provide the best service externally to students and internally to one another. ● Make decisions that reflect a commitment to students' welfare and success. Continuously Improve - As lifelong learners, we intentionally find opportunities to grow and improve, both as individuals and as an organization. ● Take time to develop and practice relevant skills and behaviors. ● Dig deeper into systems, data, and processes to understand problems and create impactful solutions. ● Welcome challenges and feedback. Win Together - We act with integrity, empathy, and transparency while assuming positive intent in each other's communications and decisions. ● Seek understanding from one another first, over-responding. ● Recognize how words and actions impact our students, employees, and the organization as a whole. ● Provide constructive feedback and avoid gossip. Trust and Be Trusted - We take ownership of our responsibilities and actions to students and colleagues. ● Keep commitments and deliver results on time to teams. ● Comply with policies and procedures. ● Proactively find solutions to issues. Own it - We navigate challenges and celebrate successes together as a diverse community. ● Collaborate to solve issues and build solutions in the best interest of the organization and our stakeholders. ● Recognize roadblocks and celebrate achievements. ● Utilize a diversity of perspectives through sharing knowledge and resources. Responsibilities: Leadership Provide cross-functional team leadership across all ITS teams in information security policies, standards, and procedures. Establish and conduct information security/data integrity training for all stakeholders of the university community. Demonstrate a positive attitude and set an example for direct reports and colleagues. Information Security Research and provide recommendations for the design, development, testing, implementation, and management of security protocols, procedures, system measures, and audits to ensure physical and logical security of network, data center, cloud and enterprise system architectures. Document, distribute, and maintain security policies and procedures. Monitor and analyze system security information to provide actionable data to ITS Leadership team. Document and maintain incident response plans. Document and maintain Disaster Recovery and Business Continuity plans. Document and maintain Change Management policies, standards, and procedures and monitor system/infrastructure management to ensure compliance. Coordinate with the Infrastructure Services Team to monitor, analyze, and provide recommendations for shaping network traffic. Develop and maintain information security documentation in accordance with defined ITS standards within 3 business days of any approved changes. Monitor emerging information security threats and collaborate with ITS Leadership team to deploy appropriate security measures in accordance with ITS Change Management process. Monitor system access procedures to ensure alignment with defined system governance standards that protect the integrity and security of all university data. Perform regular (at least quarterly) system access audits for all enterprise systems. Consultancy Work with ITS teams, project teams, and institutional leadership teams in problem analysis, solution identification, implementation, and delivery activities. Work closely with ITS teams and campus customers to understand project requirements and recommend sustainable solutions that meet defined business and academic needs while accounting for information security. Serve as technical contact for information security analysis. Respond to assigned user support requests within 1 business day. Diagnose and resolve at least 90% of assigned Help Desk tickets within 3 business days. Planning and Organizing Coordinate with the Infrastructure Services team to develop network, data center, cloud and systems design specs and diagrams to plan and illustrate sustainable technical solutions that account for appropriate physical and logical security. Work with ITS Leadership and teams to establish appropriate project timelines to deliver sustainable solutions within approved time and budget parameters. Independently manage assigned tasks and project components. Plan and account for physical and logical security/integrity in all projects. Demonstrate attention to detail. Information Processing & Decision Making Prioritize allocation of time and resources in accordance with defined university and departmental priorities. Actively look to maximize existing university investments and leverage existing systems to solve identified business problems. Work with ITS teams and customers to identify and understand functional requirements of network, data center, and enterprise applications. Actively look to automate repetitive manual processes. Identify potential impacts of new systems/processes or changes to existing systems/processes and provide technical expertise to ensure operational reliability and information security. Coordinate with other ITS staff, functional users, and appropriate vendors to account for security (physical and logical), sustainability, disaster recovery, and business continuity measures in all solutions. Work with ITS teams, project teams, and institutional leadership teams in problem analysis, solution identification, implementation, and delivery activities. Work closely with ITS teams and campus customers to understand project requirements and recommend sustainable solutions that meet defined business and academic needs. Communication Interpret meaning and importance of information. Determine appropriate need and method for keeping team members, customers/stakeholders, and management informed. Utilize plain language in all verbal and written communication. Keep policy, project, communication, testing, and training documentation updated using defined standards within 3 business days of approved changes. Document systems and processes in accordance with defined standards within 3 business days of approved changes. Work with ITS Management and teams to develop polices and standards and ensure compliance. Be engaged and participate in individual discussions, project and team meetings. Problem Solving Establish working partnerships with ITS teams and external partners to coordinate problem resolution for operational issues, and analyze root cause issues to address underlying problems. Work with the ITS User Support Services team to identify common issues and develop appropriate documentation, training, and/or tip sheets for campus users. Develop “as is” and “to be” diagrams to visually represent challenges, risks, and opportunities for information security improvements. *Other special projects, duties, and responsibilities as assigned. Requirements: Experience & Skills 3-5 years of progressive experience with network and/or data center security. 3-5 years of progressive experience in systems deployment and associated security measures. 1-3 years of progressive experience in FERPA, HIPAA, PCI and/or similar industry security standards. Education Bachelor's degree in computer science, or equivalent combination of education and experience. Advanced degree highly preferred. IT Security certifications (CISA, CISM, CISSP, etc.) highly preferred. Interpersonal Skills Excellent verbal and written communication skills Excellent critical thinking and problem solving skills. Positive attitude and solutions oriented thinking. Ability to communicate technical concepts to both technical and non-technical audiences. Other Skills MS Word MS Excel Project management tools Workflow diagramming tools Physical Demands/Work Environment: ● Ability to work in a virtual environment using software technology including but not limited to virtual meeting tools, such as Zoom, Instant Messaging, Canvas Learning Management System (LMS). ● The ability to efficiently operate a computer and its peripheral equipment (keyboard, mouse, etc.). ● Ability to sit or stand for six to eight hours. ● Ability to work at least 40 hours a week. EEO and Accessibility Statement: Bryan University is an equal-opportunity employer committed to providing a welcoming and inclusive work environment for all. We do not discriminate based on race, color, religion, sex, national origin, age, disability, or any other legally protected status. We are committed to building and developing a diverse environment where a variety of ideas, cultures and perspectives can thrive. We provide reasonable accommodations to individuals with disabilities and strive to ensure accessibility in our facilities, products, and services.
    $71k-88k yearly est. Auto-Apply 37d ago
  • Information Security Analyst 2

    Rogers Corporation 4.8company rating

    Cyber security analyst job in Chandler, AZ

    This role will provide information security direction, configuration, and operational support of key security tools, as well as broader interactions with enterprise staff to help mitigate security risks and advise the organization on security best practices. Essential Functions: * Defend against and/or mitigate system vulnerabilities related to network infrastructure devices and boundary defense through network and endpoint solution configuration. * Support data and asset risk. * Use data collected from a variety of cyber defense tools (e.g., Intrusion Detection System (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within specific environments for the purposes of mitigating threats. * Address various security problems across a disperse set of assets. * Other duties as assigned. Qualifications: * Bachelor's Degree in Computer Science, Computer Information Systems or related field. May consider equivalent work experience in lieu of degree * 2+ years of progressive cybersecurity experience * Sound comprehension of Information Security practices, concepts, and theories for traditional Information Technology (IT) assets
    $81k-124k yearly est. 6d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Phoenix, AZ

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 32d ago
  • Senior Security Analyst (L2)

    Lumifi Cyber

    Cyber security analyst job in Scottsdale, AZ

    L2 Security Analyst Full-Time, Exempt We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ. Primary Duties Triage alerts and determine if further investigation or action is required by the customer Assist customers with the investigation and response of incidents throughout the incident response process Perform investigations of customer requests and be able to provide further contextual information along with recommended actions Proactively threat hunt using network and host data within customer environments Mentor junior analysts Required Qualifications Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.) Strong understanding of incident response methodologies and reporting Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.) Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers Preferred Qualifications Minimum of 3+ years of experience performing triage/incident response in enterprise environments Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP) Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving Ability to manage projects to completion both individually and in a group Benefits Include: Health Insurance 80% paid by employer Dental Insurance 80% paid by employer Vision Insurance 80% paid by employer Self- Managed vacation leave Paid sick leave Paid holiday leave All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer. Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
    $87k-119k yearly est. Auto-Apply 51d ago
  • Security Systems Engineer

    Exyte Group

    Cyber security analyst job in Chandler, AZ

    Discover your exciting role The Security Systems Engineer designs and implements security solutions to protect facilities, identifies vulnerabilities, and develops strategies to prevent unauthorized access, ensuring effective risk mitigation and compliance with security standards. Explore your tasks and responsibilities * Design and implement integrated security systems tailored for advanced technology and cleanroom environments. * Identify and assess vulnerabilities specific to sensitive facility operations and controlled environments. * Conduct comprehensive threat, risk, and vulnerability assessments for high-value assets and critical infrastructure. * Specify and deploy appropriate security devices and controls that do not compromise cleanroom protocols. * Consult with stakeholders on security requirements, best practices, and regulatory compliance. * Develop strategies to prevent unauthorized access while maintaining operational continuity. * Ensure all security solutions meet industry standards, facility-specific guidelines, and cleanroom requirements. * Collaborate with internal teams, external vendors, and facility managers to deliver effective technical solutions. * Support both large-scale and small-scale security projects, from design through commissioning and validation. * Prepare and maintain detailed documentation for security system designs, installations, and compliance audits. * Other duties as assigned Show your expertise Minimum Required * Bachelor's degree in Engineering or a related field. * 2-5 years of experience as a Security Systems Engineer or in a similar role, preferably in advanced technology or cleanroom facilities. Preferred * Relevant certifications (e.g., CISSP, PSP, or similar) are highly desirable. * Prior experience as a consulting engineer preferred * Prior experience with Advanced Technology * Experience working within a team environment * Experience in the quality control review process * Experience contributing to continuous improvement processes Applicants must be authorized to work for ANY employer in the U.S. We are unable to sponsor or take over sponsorship of an employment Visa at this time. Non-Solicitation: We are not currently accepting third-party agency candidates for this position. Any agency candidate submitted to any employee of Exyte may be contacted by Exyte without obligation to the third-party agency. Exyte US, Inc. is proud to be an Affirmative Action and Equal Employment Opportunity employer that is committed to celebrating diversity and supporting an inclusive workplace where associates excel based on personal merit, qualifications, experience, ability, and job performance. We prohibit discrimination and harassment of any kind based on race, color, religion, age, sex (e.g., pregnancy, childbirth and related medical conditions, sexual orientation, gender identity or expression), national origin, disability status, genetic information, protected veteran status, or any other protected characteristic as outlined by federal, state, or local laws. Contact: You want to be part of the Exyte team? We look forward to receiving your application! For further questions and information, please do not hesitate to contact Phillip Turner via E-Mail at ************************ Please note that we only consider applications submitted through our application portal. Applications sent via email will not be considered due to data protection regulations.
    $78k-112k yearly est. Easy Apply 6d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Chandler, AZ?

The average cyber security analyst in Chandler, AZ earns between $65,000 and $121,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Chandler, AZ

$89,000

What are the biggest employers of Cyber Security Analysts in Chandler, AZ?

The biggest employers of Cyber Security Analysts in Chandler, AZ are:
  1. Vensure Employer Services
Job type you want
Full Time
Part Time
Internship
Temporary