Post job

Cyber security analyst jobs in Chesterfield, MO

- 146 jobs
All
Cyber Security Analyst
Security Engineer
Cyber Security Engineer
Information Security Analyst
Cyber Security Specialist
Information Systems Security Officer
Information Security Engineer
Senior Security Engineer
Senior Information Security Analyst
Senior Cyber Security Analyst
Data Security Analyst
Securities Analyst
  • Cyber Security Analyst Tier 3

    Freedom Technology Solutions Group

    Cyber security analyst job in Saint Louis, MO

    Freedom Technology Solutions Groups is looking to add a Tier 3 Cyber Security Analyst to the team. The candidate will provide CSOC Tier 3 services, which is 24x7x365 coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. When a CIRT is stood up, all contractors in support of CSOC Tier 3 services will be under the direct control of, and take direction from, the Government CIRT Commander. While not in a period of incident response, the Contractor shall conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber-incident. All Contractor personnel performing CSOC Tier 3 services shall have or obtain, within six months of start, a certification that is compliant with DoDD 8140.01 and DoD 8570.01-M IAT Level III and CSSP Incident Responder. Job Duties: Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cyber security incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government. Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter intelligence personnel as required to perform advanced investigation and triage of incidents; Collaborates with appropriate authorities in the production of security incident reports; Categorizes incidents and events; Coordinates with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated; Coordinates with other contracts, organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events; Coordinates with other contracts, organizations, activities, and services to ensure NGA recovers from an incident/event; Builds timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions. Documents actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken and analysis are capable of being systematically reconstructed. Develops and when approved by the Government generates and updates reports in the Joint Incident Management System (JIMS), Incident Case Management System (ICMS), and/or other authorized reporting systems as directed; Develops, maintains, sustains, and when properly authorized by the Government executes custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events; Performs digital media analysis on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis; Develops and identifies indicators of compromise to send to Cybersecurity stakeholders and other Contract Services; Provides adversary attribution; Performs malware analysis and signature development; Coordinate with CSOC Tier 1 and 2 services to remediate all discrepancies and provide recommendations to prevent reoccurrence. Job Requirements: Bachelors Degree and or 6 years' experience in Cyber Security (CSOS) Active security clearance. DoDD 8140.01 and DoD 8570.01-M IAT Level II and CSSP Incident Responder. Provides input to and coordinates with all applicable stakeholders to develop and deliver the daily CSOC Significant Activity Report, the daily CSOC Operations Update, and the Weekly CSOC Status Report; Serve as C-IRT members as required and serve under the direct control of, and take direction from, the Government C-IRT Commander; Develop and coordinate courses of action with various Government and contract stakeholders, and when properly authorized by the Government, execute Defensive Cyberspace Operations-Internal Defensive Measures on behalf of the NGA on NGA networks and systems; Performs digital media analysis and malware reverse engineering on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis. When properly authorized by the Government, execute custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events; Develops, documents, and provides to the Government incident investigation reports which include sufficient information to document the entire lifecycle of the incident and the response, including but not limited to adversary and friendly forces activity, host and network analysis, timelines, and recommendations for corrective actions, recommendations for new Tactics, Techniques, and Procedures (TTP) and other recommendations as appropriate, within 30 days of C-IRT stand-down; Conduct Quality Control reviews of a percentage closed CSOC Tier 2 tickets each week to ensure proper analysis, categorization, documentation, and notification Preferred Qualifications: Masters degree IAT III Qualifications that are nice to have: Juniper certification What's in It for You? Flexible work environment A team mentality - work with friendly, like-minded professionals Work with innovative, cutting edge technologies Enjoy extremely competitive compensation and benefits A work-life balance you can count on Opportunities to grow and advance your career on our dime The Benefits You Get with Freedom Amazing benefits including matching 401k, fully paid medical, and more Generous paid time off - including paid site closure days Competitive salary offerings Paid training and tuition reimbursement Referral bonuses Fully paid life and disability Annual logo wear allowance Company sponsored events (game nights, holiday party, summer party, happy hours) Interested in learning more about Freedom and our culture? Contact us today! We're constantly hosting hiring events in our office and elsewhere, to help you get a sense of what life is like at Freedom before joining the team. As an Equal Opportunity Employer, we do not discriminate on the basis of race, color, religion, sex, age, marital status, disability or veteran status Applicant Federal & E-Verify Postings VEVRAA Federal Contractor Accessibility: If you need an accommodation as part of the employment process, please contact Human Resources at Phone: ************ Email: ********************* Equal Opportunity Employer, including disabled and veterans. If you want to view the EEO Law poster, please choose your language: English - Spanish - Arabic - Chinese If you want to view the EEO Law Supplement poster, please choose your language: English - Spanish - Chinese If you want to view the Pay Transparency Policy Statement, please click the link: English
    $66k-89k yearly est. Auto-Apply 60d+ ago
  • CI Cyber Threat Analyst IV

    Techguard Security 3.6company rating

    Cyber security analyst job in Saint Louis, MO

    Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements: Duties: Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable): Threat data collected and reported by NGA Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTs). Imagery when available. Information that can be used to inform security decisions. Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decision makers. Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decisions. Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include: Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products. Raw and finished Intelligence reported by Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA. Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross referencing local information reporting with Intelligence Community reporting. Clear and concise writing to briefly convey threat. Responsiveness to Intelligence Community priority collections requirements. Timeliness. Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross). Provide Technical CI advise and expertise in support of CI inquiries, operations and issues. Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners. Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers. Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner. Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages. Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats). Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards. Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing. Display an ability to collaborate with internal NGA and external IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. Skills and Experience Required: Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations. Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level. Desired: Be a credentialed graduate of an accredited federal or DoD CI training academy. Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines. Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines. Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov. Experience translating Government vision into understandable and achievable measures. Experience in using supervisory skills to coach teammates to achieve objectives. Monitor and track progress toward achievable measures.
    $69k-91k yearly est. 60d+ ago
  • Principal Cyber Security Analyst

    Bayer 4.7company rating

    Cyber security analyst job in Creve Coeur, MO

    **At Bayer we're visionaries, driven to solve the world's toughest challenges and striving for a world where 'Health for all Hunger for none' is no longer a dream, but a real possibility. We're doing it with energy, curiosity and sheer dedication, always learning from unique perspectives of those around us, expanding our thinking, growing our capabilities and redefining 'impossible'. There are so many reasons to join us. If you're hungry to build a varied and meaningful career in a community of brilliant and diverse minds to make a real difference, there's only one choice.** **Principal Cyber Security Analyst** As a Principal Cyber Security Analyst, you are responsible for assessing, managing, and enhancing the security measures of Bayer's systems, networks, and data in the area of Security technology. You will drive strategic and transformative change, ensuring cross-squad, cross-regional alignment, and utilize data analytics for monitoring Bayer's security systems and applications. **YOUR TASKS AND RESPONSIBILITIES:** + Oversee security alerts and incidents, executing timely responses to mitigate potential risks and minimize operational impact; + Collaborate with IT and security personnel to implement and verify the effectiveness of comprehensive security protocols; + Develop and refine cybersecurity processes and protocols, ensuring adherence to relevant industry standards and regulatory requirements; + Remain updated on current cybersecurity developments, threats, and industry best practices to enhance the organization's security framework; + Lead or support high-impact projects on behalf of the Platform Leader; + Serve as a sounding board, trusted advisor, and force multiplier for the Platform Leader; + Monitor and evaluate operational logs, event console activities, intelligence feeds, and pertinent data to detect security-related occurrences and trends, ensuring compliance with established industry standards and regulations such as ISO 27001, NIST, and GDPR; + Perform analysis and testing to identify vulnerabilities, misconfigurations, or other security exposures; + Conduct root cause analyses and investigations to recommend prevention strategies and configuration modifications; + Execute penetration testing to identify vulnerabilities within infrastructure, web applications, and other systems, differentiating between vulnerability assessments and penetration testing methodologies; + Investigate incidents and respond to events in real time. + The primary location for this role is Creve Coeur, MO. **WHO YOU ARE:** Bayer seeks an incumbent who possesses the following: **Required Qualifications:** + Minimum of a Bachelor's Degree in computer science, information security, cybersecurity, or a related field, though many years of relevant working experience may be considered an equivalent; + Demonstrated leadership and extensive experience in IT audit, network operations, enterprise risk management, penetration testing, red team/incident response, or as a junior security operations analyst; + Demonstrated leadership and extensive experience with regulatory compliance and information security management frameworks, such as ISO 27000, COBIT, and NIST 800; + Professional certifications such as CCP-SIRA (Senior), CISSP, and ISACA certifications, along with familiarity with standards like BSI ISO 27001 and PCI DSS. **Preferred Qualifications:** + Further certifications, such as Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), CompTIA, EC-Council (CSA) SOC; + Demonstrated leadership and extensive experience in monitoring SIEM systems and tools; + Demonstrated leadership and extensive experience with network and security technologies, such as firewalls, IDS/IPS; + Demonstrated leadership and extensive experience configuring and utilizing vulnerability management tools. This posting will be available for application until at least 12/22/2025. Employees can expect to be paid a salary between 161981.60 - 242972.40. Additional compensation may include a bonus or commission (if relevant). Other benefits include health care, vision, dental, retirement, PTO, sick leave, etc. If selected for this role, the offer may vary based on market data/ranges, an applicant's skills and prior relevant experience, certain degrees and certifications, and other relevant factors. **YOUR APPLICATION** Bayer offers a wide variety of competitive compensation and benefits programs. If you meet the requirements of this unique opportunity, and want to impact our mission Science for a better life, we encourage you to apply now. Be part of something bigger. Be you. Be Bayer. To all recruitment agencies: Bayer does not accept unsolicited third party resumes. Bayer is an Equal Opportunity Employer/Disabled/Veterans Bayer is committed to providing access and reasonable accommodations in its application process for individuals with disabilities and encourages applicants with disabilities to request any needed accommodation(s) using the contact information below. Bayer is an E-Verify Employer. **Location:** United States : Missouri : Creve Coeur **Division:** Enabling Functions **Reference Code:** 859313 **Contact Us** **Email:** hrop_*************
    $82k-106k yearly est. Easy Apply 4d ago
  • Cyber Security Engineer NSS Tools

    Caci International Inc. 4.4company rating

    Cyber security analyst job in Saint Louis, MO

    Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 25% Type of Travel: Continental US * * * The Opportunity: TCS offers a long-term contract opportunity supporting the National Geospatial-Intelligence Agency's (NGA). Our team of talented Network and Cybersecurity professionals help design, develop, procure, implement, operate/sustain, and enhance NGA networks and cybersecurity posture in support of national security. Joining the TCS Team means working with truly cutting-edge technologies, on high performing cyber engineering teams, and benefiting from accelerated professional growth! Responsibilities: * Work with both corporate and customer leadership to research, analyze, and implement enterprise-wide network security solutions/capabilities/enhancements to support customer business/mission goals and objectives * Assist with design, analysis, testing and implementation of state-of-the-art secure network architectures. * Conduct risk assessment and provide recommendations for design. * Manage remote network security as well as incident and problem management. * Oversee security infrastructure sustainment, maintenance, and advanced configuration. (firewalls, F5 load balancers, web gateways, mail gateways, IDS, and management tools). * Oversee the reporting, documentation, and investigation of all security related incidents; lead the development and implementation of corrective measures. * Develop and execute standard operating procedures (SOPs) for security tools * Evaluate and report on new network Security technologies to enhance capabilities of the network. * Act as liaison to the contract and customer management, and government Designated Approving Authority (DAA) regarding network security status, policies, and procedures. * Travel up to 15% of the time CONUS, maybe occasional OCONUS Qualifications: Required: * TS/SCI (current) and ability to successfully pass and maintain a Government Polygraph (post-hire requirement) * Bachelor's Degree and five (5) years of technical experience in Network Security with large-scale enterprise/global networks in high-paced, diverse environment. (Additional experience may be considered in lieu of a degree) * Be proficient with one or more of the following: * Firewalls (e.g. Palo Alto, Juniper, Cisco, etc.) * Routers/Switches (e.g. Juniper, Cisco, etc.) * Intrusion Detection Systems / IDS Products (e.g. FireEye, F5 Load Balancer, Cisco FTD, etc.) * Unix, RHEL OS, Windows Enterprise AD, VMware * Python scripting * Certifications required: * DoD Information Assurance Technical (IAT) Level II certification (current) * DoD CSSP Infrastructure Support certification (within six months of hire) * ________________________________________________________________________________________ What You Can Expect: A culture of integrity. At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation. An environment of trust. CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality. A focus on continuous growth. Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy. Your potential is limitless. So is ours. Learn more about CACI here. ________________________________________________________________________________________ Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here. The proposed salary range for this position is: $82,100-$172,400 CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.
    $82.1k-172.4k yearly 38d ago
  • Cyber Resilience Specialist

    Slalom 4.6company rating

    Cyber security analyst job in Saint Louis, MO

    Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery. What You'll Do * Lead and facilitate Business Impact Assessments (BIAs) across business units * Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems * Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience * Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles * Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews * Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations * Support program governance, metrics, training, and awareness efforts What You'll Bring * 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting * Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning * Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms) * Experience supporting risk assessments and regulatory audits * Excellent facilitation and stakeholder management skills * Strong writing skills to produce clear, client-ready plans and reports About Us Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all. Compensation and Benefits Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance. Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time. We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************. EEO and Accommodations Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process. #LI-MS12
    $153k-186k yearly Easy Apply 60d+ ago
  • Information Security Specialist

    Collabera 4.5company rating

    Cyber security analyst job in Saint Louis, MO

    Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers. Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations. For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US. Job Description Responsibilities: Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios. Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization Qualifications Required Skills/Experience • 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role • Knowledge of quantitative and qualitative risk evaluation methods • An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one • An ability to effectively influence others to modify their opinions, plans, or behaviors • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business • Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part • An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization • Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement Additional Information To set up an inerview for this position, feel free to contact: Imran Malek ************ *******************************
    $71k-97k yearly est. Easy Apply 17h ago
  • Cyber Security Incident Response Engineer

    Technogen 4.3company rating

    Cyber security analyst job in Saint Louis, MO

    TechnoGen, Inc. (formerly known as SYSCOM Technologies) is a Proven Leader in providing full IT Services, Software Development and Solutions for 12+ years.TechnoGen is a Small & Woman Owned Minority Business with GSA Advantage Certification. We have offices in VA,MD & Offshore development centers in India.We have successfully excuted 100+ projects for clients ranging from small business and non-profits to Fortune 50 companies and federal, state and local agencies. TechnoGen leadership has experience guiding highly skilled and certified professionals delivering end to end IT and Business consulting services projects in public and commercial sectors across the globe. Job Description Job Title: Cyber Security Incident Response Engineer Location: Washington, DC Duration: FULL TIME Requirements: 5+ years of experience in Cybersecurity incident handling and experience in Security Operation Center in Federal government environments Familiarity with OMB and FISMA mandates surrounding Information Security Deep understanding of NIST Special Publications, specifically 800-61, 800-37, 800-53 and 800-137 Knowledge of security policy and technical standard development, secure infrastructure design reviews, multi-tiered trust zone structures, and complex networking through multiple level network security structures Familiarity with common SOC tools - SIEM, Tenable, ForeScout, App Detective, DB Protect, Fortify, Hailstorm, Cisco Ironport, etc. Excellent oral and written communication skill Familiarity with hardening techniques for a wide range of Microsoft operating systems, databases, and software suites, including: Windows Server 2008, 2012, Windows Desktop 7, 8, Microsoft SQL Server 2008, 2012, 2014, Microsoft SharePoint 2010, 2013 Candidates must be able to work on-site at a Federal Agency located in Washington, DC and must be able to pass a U.S Federal government background Bachelor's degree in Information Systems, related discipline or equivalent experience CISM, CISSP-ISSMP, GCIH or similar industry certification preferred Responsibilities Triage incident handling support for incident detection, analysis, coordination, and response This team member will work with firewalls, intrusion protection, web proxy, antivirus, SIEM, vulnerability scanning and other key threat countermeasures. Research and analyze data sources to provide insight into new trends to customer environment collaborating with other members of the SOC Troubleshoot problems with customer policies and controls Performing on-demand vulnerability scanning and compliance monitoring to ensure agency security standards are met Identification of network and operating systems vulnerabilities and recommending countermeasures Supports the deployment and integration of security tools Analyze and recommend solution of information security problems based on knowledge of the major information security products and services Strong interpersonal and communication skills with the ability to lead and work as part of a team Additional Information All your information will be kept confidential according to EEO guidelines.
    $74k-100k yearly est. 17h ago
  • Information System Security Officer (ISSO)

    Leidos 4.7company rating

    Cyber security analyst job in Shiloh, IL

    Are you ready for your next challenge? Unleash your potential at Leidos, where we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customer's success. We empower our teams, contribute to our communities, and operate sustainably. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business. If this sounds like an environment where you can thrive, keep reading! The Mission The National Security Sector within Leidos combines technology-enabled services and mission software capabilities for defense and intel customers in the areas of cyber, logistics, security operations, and decision analytics. To explore and learn more, Click here Leidos has a career opportunity for an Information System Security Officer (ISSO) at Scott AFB, IL. Candidates must already possess a current TS/SCI security clearance in order to be considered. The ISSO will provide cybersecurity support services to assist ACC Cybersecurity Chief Information Security Officer and unit Information System Security Officers (ISSO) in maintaining an effective cybersecurity program that supports missions and adequately protects the confidentiality, integrity and availability of AF IC information resources. Duties include: Develop local unit Cybersecurity programs and security plan IAW ACC, AF, IC, and DOD guidance. Gather data, analyze compliance and report results on the condition and progress of local unit Cybersecurity programs, security plans, plan of action and milestones (POA&M) and Assessment and Authorization (A&A) workflow tools data, patch management, information assurance vulnerability alerts (IAVA), DoD 8570.01M certifications, and Federal Information System Modernization Act (FISMA) compliance requirements, and Authorizations to Operate (ATOs) to unit leadership and HHQs as directed. Interact with local units and HHQ IISMs to provide Cybersecurity assessments, courses of action, and solutions to commanders on how to improve their Cybersecurity programs. Develop and provide on-the-job work center training to Government civilian, contractor, and military personnel on various IT security tools, policies and procedures required to protect resources and meet standards. Qualifications: TS/SCI security clearance on day 1. Bachelor's degree and 5 years (OR Associate's and 7 years) of relevant experience. (Additional experience may be considered in lieu of degree). IAT Level II required JWICS SYSAD admin skills and experience Experience working Assessment and Authorization documents, assessments and Cybersecurity program tasks. Two (2) years of experience with AF and IC plans and policies. Ability to learn and apply ICD 705 physical security and personnel security duties. EIO2024 At Leidos, we don't want someone who "fits the mold"-we want someone who melts it down and builds something better. This is a role for the restless, the over-caffeinated, the ones who ask, “what's next?” before the dust settles on “what's now.” If you're already scheming step 20 while everyone else is still debating step 2… good. You'll fit right in. Original Posting:October 15, 2025 For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range:Pay Range $85,150.00 - $153,925.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
    $85.2k-153.9k yearly Auto-Apply 60d+ ago
  • Cybersecurity - Information System Security Officer (ISSO)

    Boeing 4.6company rating

    Cyber security analyst job in Hazelwood, MO

    At Boeing, we innovate and collaborate to make the world a better place. We're committed to fostering an environment for every teammate that's welcoming, respectful and inclusive, with great opportunity for professional growth. Find your future with us. The Boeing Company is looking for a highly motivated Cybersecurity - Information System Security Officer (ISSO) to join our Classified Operations Cybersecurity team based in Hazelwood, MO. This position supports Boeing's Enterprise Wide Area Network (eWAN). The selected candidate will rely on cyber security and Information Assurance (IA) background to support Enterprise activities and Boeing customers throughout multiple classified computing domains. The ISSO is responsible for maintaining and enforcing all Information System Security policies, standards, and directives to ensure assessment and authorization of information systems processing classified information. Position Responsibilities: * Perform security analysis of operational and development environments, threats, vulnerabilities, and internal interfaces to define and assess compliance with accepted industry and government standards * Support and implement the Assessment and Authorization (A&A) processes under the Risk Management Framework (RMF) for new and existing information systems * Facilitate development of Memorandums of Understanding (MOU), Interconnection Security Agreements (ISA), Risk Acceptance Letters (RAL) and support Continuous Monitoring (CONMON) * Perform configuration management of assigned systems; auditing systems to ensure security posture integrity * Conduct risk assessments and investigations, execute appropriate risk mitigations, and participate in incident response activities * Conduct periodic hardware/software inventory assessments * Interface with the appropriate government customers, suppliers, and company personnel to implement protective mechanisms and to ensure understanding of and compliance with cybersecurity requirements Basic Qualifications (Required Skills/Experience): * IAM Level 1 DoD 8140.01 (previously 8570.01) compliant certification (i.e. CAP, Security+ CE, CISSP, CASP, CISM, GSLC) * 1+ years of experience in cybersecurity * 1+ years of experience as an information system security officer (ISSO) or information system security manager (ISSM) supporting classified programs Preferred Qualifications (Desired Skills/Experience): * 3+ years of experience utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include NESSUS, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS * 3+ years of experience assessing and documenting test or analysis data to show cyber security compliance Drug Free Workplace: Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies. Pay & Benefits: At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities. The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work. The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements. Pay is based upon candidate experience and qualifications, as well as market and business considerations. Summary pay range: $92,650 - $125,350 Applications for this position will be accepted until Dec. 25, 2025 Export Control Requirements: This position must meet export control compliance requirements. To meet export control compliance requirements, a "U.S. Person" as defined by 22 C.F.R. §120.15 is required. "U.S. Person" includes U.S. Citizen, lawful permanent resident, refugee, or asylee. Export Control Details: US based job, US Person required Education Bachelor's Degree or Equivalent Required Relocation Relocation assistance is not a negotiable benefit for this position. Security Clearance This position requires an active U.S. Secret Security Clearance (U.S. Citizenship Required). (A U.S. Security Clearance that has been active in the past 24 months is considered active) Visa Sponsorship Employer will not sponsor applicants for employment visa status. Shift This position is for 1st shift Equal Opportunity Employer: Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law. Read more Shows the full job description for sighted users Apply Now Save JobRemove Job
    $92.7k-125.4k yearly 4d ago
  • Senior Information Security Analyst

    Stifel 4.8company rating

    Cyber security analyst job in Saint Louis, MO

    Why Stifel Stifel strives for a culture that puts its clients and associates first: a culture where everyone belongs, everyone is welcome, and everyone contributes to the success of our clients, their careers, and the firm as a whole. Let's talk about how you can find your place here at Stifel, where success meets success. What You'll Be Doing The Sr Information Security Analyst plays a critical role in supporting the information security strategy. Reporting directly to the Chief Information Security Officer (CISO), this role is responsible for proactively assessing and mitigating security risks, monitoring for threats, developing security policies and procedures, regulatory reporting, metrics/KPIs, security risk management, security process integration, and collaborating with multiple departments to ensure the protection of sensitive data. The ideal candidate will possess a strategic mindset, advanced technical skills, and a deep understanding of cybersecurity trends and regulatory requirements. What We're Looking For • Develop, maintain, and enforce information security policies, standards, and guidelines. Ensure security practices align with regulatory requirements and industry best practices. • Work with IT, legal, compliance, and business units to integrate security measures into all aspects of the organization's operations. • Provide guidance on security practices and assist in awareness training. • Identify, assess, and mitigate security risks. Develop remediation plans to address identified risks. • Maintain in-depth knowledge of regulatory compliance requirements, such as FINRA, SEC, PCI-DSS, and applicable laws. • Assist in audits and ensure compliance with relevant regulations. • Evaluate, recommend, and implement security technologies and solutions to enhance the security posture. Provide strategic input on the selection and deployment of security tools and technologies. • Stay current on the latest cybersecurity threats, trends, and technologies. Continuously evaluate the threat landscape and recommend improvements. • Gather and analyze information security KPIs. What You'll Bring • Proven ability in information security principles, processes, tools, and the latest industry awareness and current knowledge. • Strong knowledge of NIST (800-53, CSF) and other information security frameworks. • Understanding of financial services regulatory environment • Experience with formal risk management. • Excellent analytical skills, logical thinking, and diagramming capability. • Strong and confident interpersonal and customer service skills; ability to interface with personnel from various departments and levels, both technical and non-technical. • Excellent organizational skills. Ability to prioritize multiple tasks and meet deadlines. Attention to detail and commitment to excellence. • Experience working in an ITIL-focused support organization with incident/request tickets. • Ability to work flexible schedules, including availability outside of normal working hours. • Knowledge of data privacy regulations is preferred. Education & Experience • Required: Bachelor's degree in information technology, Computer Science, or equivalent combination of cybersecurity certifications and experience. • Required: 6+ years of experience in information security. Licenses & Credentials • Certifications: CISSP, CISM, CISA, or similar are strongly preferred. Systems & Technology • Experience using industry-standard event logging platforms. • Solid understanding of information security tools and best practices. • Proficient with Windows 365. #LI-LL1 About Stifel Stifel is more than 130 years old and still thinking like a start-up. We are a global wealth management and investment banking firm serious about innovation and fresh ideas. Built on a simple premise of safeguarding our clients' money as if it were our own, coined by our namesake, Herman Stifel, our success is intimately tied to our commitment to helping families, companies, and municipalities find their own success. While our headquarters is in St. Louis, we have offices in New York, San Francisco, Baltimore, London, Frankfurt, Toronto, and more than 400 other locations. Stifel is home to approximately 9,000 individuals who are currently building their careers as financial advisors, research analysts, project managers, marketing specialists, developers, bankers, operations associates, among hundreds more. Let's talk about how you can find your place here at Stifel, where success meets success. At Stifel we offer an entrepreneurial environment, comprehensive benefits package to include health, dental and vision care, 401k, wellness initiatives, life insurance, and paid time off. Stifel is an Equal Opportunity Employer.
    $84k-108k yearly est. Auto-Apply 60d+ ago
  • Data Security Analyst

    The Timberline Group

    Cyber security analyst job in Saint Louis, MO

    Join our dynamic and thriving company as a Data Security Analyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning. What You'll Be Doing Monitor security service performance and availability: Provide recommendations on security equipment, software, and services On-going investigation: Inspect information security alarms and events to determine vulnerability and impact Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk Participate in architecture reviews: Ensure adherence to information security architecture Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to information security incidents Design and deliver programs: Create education and training programs on information security and privacy matters The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* ************************* "Delivering quality solutions through quality people"
    $64k-89k yearly est. Easy Apply 60d+ ago
  • Cybersecurity - Information System Security Officer (ISSO)

    Jeppesen 4.8company rating

    Cyber security analyst job in Hazelwood, MO

    Company: The Boeing Company The Boeing Company is looking for a highly motivated Cybersecurity - Information System Security Officer (ISSO) to join our Classified Operations Cybersecurity team based in Hazelwood, MO. This position supports Boeing's Enterprise Wide Area Network (eWAN). The selected candidate will rely on cyber security and Information Assurance (IA) background to support Enterprise activities and Boeing customers throughout multiple classified computing domains. The ISSO is responsible for maintaining and enforcing all Information System Security policies, standards, and directives to ensure assessment and authorization of information systems processing classified information. Position Responsibilities: Perform security analysis of operational and development environments, threats, vulnerabilities, and internal interfaces to define and assess compliance with accepted industry and government standards Support and implement the Assessment and Authorization (A&A) processes under the Risk Management Framework (RMF) for new and existing information systems Facilitate development of Memorandums of Understanding (MOU), Interconnection Security Agreements (ISA), Risk Acceptance Letters (RAL) and support Continuous Monitoring (CONMON) Perform configuration management of assigned systems; auditing systems to ensure security posture integrity Conduct risk assessments and investigations, execute appropriate risk mitigations, and participate in incident response activities Conduct periodic hardware/software inventory assessments Interface with the appropriate government customers, suppliers, and company personnel to implement protective mechanisms and to ensure understanding of and compliance with cybersecurity requirements Basic Qualifications (Required Skills/Experience): IAM Level 1 DoD 8140.01 (previously 8570.01) compliant certification (i.e. CAP, Security+ CE, CISSP, CASP, CISM, GSLC) 1+ years of experience in cybersecurity 1+ years of experience as an information system security officer (ISSO) or information system security manager (ISSM) supporting classified programs Preferred Qualifications (Desired Skills/Experience): 3+ years of experience utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include NESSUS, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS 3+ years of experience assessing and documenting test or analysis data to show cyber security compliance Drug Free Workplace: Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies . Pay & Benefits: At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities. The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work. The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements. Pay is based upon candidate experience and qualifications, as well as market and business considerations. Summary pay range: $92,650 - $125,350 Language Requirements: Not Applicable Education: Bachelor's Degree or Equivalent Relocation: Relocation assistance is not a negotiable benefit for this position. Export Control Requirement: This position must meet export control compliance requirements. To meet export control compliance requirements, a “U.S. Person” as defined by 22 C.F.R. §120.15 is required. “U.S. Person” includes U.S. Citizen, lawful permanent resident, refugee, or asylee. Safety Sensitive: This is not a Safety Sensitive Position. Security Clearance: This position requires an active U.S. Secret Security Clearance (U.S. Citizenship Required). (A U.S. Security Clearance that has been active in the past 24 months is considered active) Visa Sponsorship: Employer will not sponsor applicants for employment visa status. Contingent Upon Award Program This position is not contingent upon program award Shift: Shift 1 (United States of America) Stay safe from recruitment fraud! The only way to apply for a position at Boeing is via our Careers website. Learn how to protect yourself from recruitment fraud - Recruitment Fraud Warning Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law. EEO is the law Boeing EEO Policy Request an Accommodation Applicant Privacy Boeing Participates in E - Verify E-Verify (English) E-Verify (Spanish) Right to Work Statement Right to Work (English) Right to Work (Spanish)
    $92.7k-125.4k yearly Auto-Apply 5d ago
  • Security Engineer

    Talentporte

    Cyber security analyst job in Saint Louis, MO

    Job DescriptionSecurity Engineer Position: Direct HireLocation: Bridgeton, MO. If not, local you must be willing to relocate.Salary: $95K - $140K (Depending on experience).Pay Frequency: Semi Monthly.Hours: M - F (8 to 5) Fully On-Site.Status: Must be a US citizen.Travel: N/A.Benefits: PTO, Holiday Pay, Healthcare coverage, Profit-Sharing, Tuition Reimbursement, Parental Leave and free onsite fitness & rec center. Experience Level: Mid to Senior.Summary: Our client is seeking a Security Engineer to join their team.Duties: Design, implement, manage, maintain, improve, and troubleshoot company's various security systems, including but not limited to Data Loss Prevention (DLP), SIEM and UEBA, endpoint protection, and data security/auditing platforms. Analyze and audit systems, software, processes, implementations, and environments for compliance with policies, regulations, and security best practices; and recommend and implement refinements and enhancements, in collaboration with individuals and teams. Conduct threat, vulnerability, and risk assessments, at times in collaboration with external auditors, to understand and eliminate potential system and network vulnerabilities. Develop and improve monitoring and visibility capabilities of information systems, and act as a technical leader for security incident detection, response, handling, and forensics. Provide reporting on incidents, investigations, vulnerabilities, trends, conditions, and events. Remain current on information security topics, trends, events, and developments. May occasionally provide end-user security training. Provide end-user support as necessary. Provide exceptional customer service while acting ethically and maintaining business confidentiality. Provide after-hours support as required and be able to identify critical issues that require urgent response. Additional duties as assigned. Skills Needed: 7+ years of experience in Information Technology required; inclusive of up to 4 years of relevant education, including 3+ years of experience in security. Must have demonstrable experience with: Microsoft/Office 365 Security landscape. Azure and on-premises Active Directory. PowerShell and Regular Expressions. Software Development and/or Development Security Operations. Performing and managing proactive risk identification and mitigation, including penetration testing, network vulnerability assessments, and system risk profiling. Security incident detection, response, handling, and forensics. Must understand networking concepts, protocols, and services. Must have excellent verbal and written communication skills. Must possess a very strong troubleshooting methodology to tackle issues efficiently. Must be self-starting and self-sufficient to complete tasks in a timely and effective manner.
    $95k-140k yearly 18d ago
  • Information Security Operations Analyst II

    Mastercard 4.7company rating

    Cyber security analyst job in OFallon, MO

    Our Purpose Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential. Title and Summary Information Security Operations Analyst IIOverview The Security Awareness team is looking for an Information Security Operations Analyst II to drive continued improvements to the education and training offerings we have for our Mastercard colleagues. Our award winning SecurIT First program must continue to remain relevant and effective in how we keep security awareness top of mind for all employees and contingent staff. The ideal candidate is passionate about the internal customer experience, is highly motivated, intellectually curious, analytical, and possesses an entrepreneurial mindset. Role In this Security Awareness position, you will: • Liaise between the Security Awareness team and all others at Mastercard. • Build new content and design awareness events to positively impact the security behaviors of Mastercard staff. • Partner with external providers to deliver effectives solutions with quality and integrity. • Manage our collaboration with the M&A Team and manage all Audit and Regulatory requests that come into our team. All About You The ideal candidate for this position should: • Possess advanced knowledge in security awareness concepts and principals. • Be comfortable meeting with business leaders to discuss and educate their teams about the desired security behaviors and how to influence and improve those behaviors. • Be able to identify appropriate security awareness solutions to further reduce the human risk at Mastercard. • Analyze, recognize and escalate trends in security behaviors and identify ways to improve our offerings. • Lead vendor relationships with those providers of contract solutions for the Security Awareness program. • A professional certification in Security Awareness is not required but highly encouraged. Corporate Security Responsibility Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: Abide by Mastercard's security policies and practices; • Ensure the confidentiality and integrity of the information being accessed. • Report any suspected information security violation or breach. • Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected information security violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Mastercard benefits for interns generally include: 56 hours of Paid Sick and Safe Time; jury duty leave; and on-site fitness facilities in some locations. Pay Ranges O'Fallon, Missouri: $76,000 - $127,000 USD
    $76k-127k yearly Auto-Apply 18d ago
  • Digital Risk Management - Security Engineer IV (Analyst)

    Edward Jones 4.5company rating

    Cyber security analyst job in Saint Louis, MO

    **Innovate here. And see your ideas come to life.** It's an exciting time to work in tech at Edward Jones. We are making massive investments in emerging technologies to improve how we work with our clients and with each other. Relationships are the focus of our business model. And working in Technology here means using your skills to build, deliver and maintain the technologies that enable us to deepen and support those relationships. The best part? We develop and create our own industry-leading solutions internally. And you can be a part of it. Working with emerging new technologies. Creating platforms, programs and experiences that change how we work together - and support our client-first focus. Changing the future of our firm, the industry and the advisor-client relationship. **Job Overview** **Position Schedule:** Full-Time This job posting is anticipated to remain open for 30 days, from 11-Dec-2025. The posting may close early due to the volume of applicants. **Team Overview:** As a part of the Digital Risk Management team, you'll assist management by working with the various domains within the Digital, Data, and Information Security organizations to help perform various activities related to the governance, risk, and compliance efforts of the enterprise. You will be looked at as a relationship leader with these domains, helping them manage the risks and controls associated with their functions. You will consult, analyze, work on remediation, and help ensure that the groups have the technology-related risks and controls properly managed to meet the firm's risk appetite. **What You'll Do** + Conduct detailed risk analysis efforts to measure and report on the residual risk of the various Digital functions. + Act as a consultant to the Digital functions during any audits of their environments, helping them manage any findings and remediation efforts. + Act as a subject matter expert on cross-divisional risk assessments, helping properly represent the risks identified and being mitigated within the Digital organization. + Perform other activities in the effort to help identify, measure, report on, and mitigate technology-related risks. Edward Jones' compensation and benefits package includes medical and prescription drug, dental, vision, voluntary benefits (such as accident, hospital indemnity, and critical illness), short- and long-term disability, basic life, and basic AD&D coverage. Short- and long-term disability, basic life, and basic AD&D coverage are provided at no cost to associates. Edward Jones offers a 401k retirement plan, and tax-advantaged accounts: health savings account, and flexible spending account. Edward Jones observes ten paid holidays and provides 15 days of vacation for new associates beginning on January 1 of each year, as well as sick time, personal days, and a paid day for volunteerism. Associates may be eligible for bonuses and profit sharing. All associates are eligible for the firm's Employee Assistance Program. For more information on the Benefits available to Edward Jones associates, please visit our benefits page (*********************************************************************************************** . **Hiring Minimum:** $99200 **Hiring Maximum:** $168900 Qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act. Edward Jones is prohibited from hiring individuals with certain specified criminal history as set forth in Section 3(a)(39) and 15(b)(4) and Rule 17a-3(a)(12) of the Securities and Exchange Act of 1934, and conducts background reviews consistent with FINRA Rule 3110(e). A copy of a notice regarding the provisions of the Los Angeles County Fair Chance Ordinance is available at: dcba.lacounty.gov/wp-content/uploads/2024/08/FCOE-Official-Notice-Eng-Final-8.30.2024.pdf . Read More About Job Overview **Skills/Requirements** **What Experience You Need** + Bachelor's degree or equivalent related work experience. + 7+years Information Security, Internal Audit, or Financial Industry experience; or 7 years of Information Technology experience with a focus on security controls and processes. + Working knowledge of industry control frameworks (e.g, COBIT, NIST, other applicable frameworks). + Demonstrated success navigating complex, dynamic environments and ability to manage conflicting priorities. + Ability to work in a team-based or matrix environment, mentoring and cross training other team members. + Develops relationships; seen as trusted and trustworthy. **What could set you apart** + Experience working in equivalent roles within the financial services industry + Undergraduate or graduate degrees related to technology and/or risk management + CISA, CRISC, or other applicable and equivalent certifications **Current INTERNAL home-based associates:** While this role is posted as hybrid, **if selected and accepted, you may retain your home-based status** . Edward Jones intends in good faith to continue offering the role as home-based, though future business or regulatory needs may require on-site work. ****Candidates that live within in a commutable distance from our Tempe, AZ and St. Louis, MO home office locations are expected to work in the office three days per week, with preference for Tuesday through Thursday.**** Read More About Skills/Requirements **Awards & Accolades** At Edward Jones, we are building a place where everyone feels like they belong. We're proud of our associates' contributions to the firm and the recognitions we have received. Check out our U.S. awards and accolades: Insights & Information Blog Postings about Edward Jones (*********************************************************************** Check out our Canadian awards and accolades: Insights & Information Blog Postings about Edward Jones (************************************************************************************ Read More About Awards & Accolades **About Us** Join a financial services firm where your contributions are valued. Edward Jones is a Fortune 500¹ company where people come first. With over 9 million clients and 20,000 financial advisors across the U.S. and Canada, we're proud to be privately-owned, placing the focus on our clients rather than shareholder returns. Behind everything we do is our purpose: We partner for positive impact to improve the lives of our clients and colleagues, and together, better our communities and society. We are an innovative, flexible, and inclusive organization that attracts, develops, and inspires performance excellence and a sense of belonging. People are at the center of our partnership. Edward Jones associates are seen, heard, respected, and supported. This is what we believe makes us the best place to start or build your career. View our Purpose, Inclusion and Citizenship Report (******************************************************************************************************************************************** . ¹Fortune 500, published June 2024, data as of December 2023. Compensation provided for using, not obtaining, the rating. Edward Jones does not discriminate on the basis of race, color, gender, religion, national origin, age, disability, sexual orientation, pregnancy, veteran status, genetic information or any other basis prohibited by applicable law. \#LI-HO
    $99.2k-168.9k yearly 4d ago
  • Security Engineer III

    Genoa Employment Solutions 4.8company rating

    Cyber security analyst job in Saint Louis, MO

    Under minimal supervision, the Data Security Engineer III is a front-line member of the Data Security team that has responsibility for protecting corporate information assets. The Data Security Engineer III will be responsible for configuring and improving DLP policies on multiple tools, working towards increasing DLP Program coverage, crafting and maintaining DLP Program process documentation, defining new processes and controls to further mature the DLP Program, and addressing gaps that impact the DLP process. Essential Duties & Responsibilities Deploys and manages technology and process solutions to reduce the potential of data compromise Develops technical requirements, evaluating vendor solutions, and testing of data security solutions Utilizes security tools to enhance data loss prevention capabilities across the Enterprise Tune DLP policies on a continuous basis to maintain a mature set of policies within the scope of the DLP Program. Implement security policies to comply with data privacy, governance and regulatory requirements Performs data protection monitoring and reporting, analyzes security alerts and escalates security alerts to local support teams. Proposes improvements and assists in the implementation of enterprise wide security policies, procedures and standards to meet compliance responsibilities. Prepares status reports to develop security risk analysis scenarios. Assist in documenting standard operating procedures and protocols for the Data Security Pillar Assist in the development of technical solutions and processes to help mitigate security vulnerabilities and automate repeatable tasks. Partner with teams as needed to enhance DLP monitoring / response processes on an ongoing basis.
    $77k-105k yearly est. 60d+ ago
  • Cloud Security Engineer

    Us Corp2Corp

    Cyber security analyst job in Saint Louis, MO

    Compunnel Software Group is a New Jersey based premier information technology consulting & services company into this market for nearly two decades now; with close to two decades of experience in IT Industry which includes consulting, development, e-learning etc. Our company is going through a tremendous growth spurt and we are now interested in personnel like you to augment the work force in the company. We have several projects starting that we are staffing for. If you think you would like to become a consultant for Compunnel Software Group Inc ., please send me an updated copy of your resume along with a detailed summary of your work experience. I need a phone number to contact you. I look forward to possibly working with you on these positions. We offer specialized services to our clients to meet their business objectives. Successful solutions that are valued by our clients are in industry areas such as pharmaceuticals, telecommunications, banking, finance, manufacturing, publishing and consumer products. Job Description Position: Cloud Security Engineer Duration: 6+ months Location: St. Louis, MO, 63167 Must Have: Cloud Security Security Patches Cloud Security Automation Engineer Client is seeking a Cloud Security Automation Engineer with deep technical experience in securing cloud technologies. The successful candidate possesses out of the box thinking, the ability to collaboration with development team members, and experience with automation and solving end to end application/infrastructure security problems. Our mission is to design and build a highly secure cloud environment without sacrificing our developers' ability to quickly innovate and deliver world class software solutions. Responsibilities: • Define security best practices for our cloud platform and provide guidance to development teams. • Build tools to monitor for compliance of security policy and automate the resolution process. • Evangelize security throughout the enterprise and collaborate to help architect secure applications. • Research emerging technologies and build proof of concepts to investigate better ways of meeting our control objectives. • Collaborate with incident response, risk and compliance, product security and development teams to solve critical security problems. • Develop an AppSec pipeline and integrate it into the agile software development process. Required Qualifications: • BA/BS degree in Computer Science, Information Systems, Cyber Security or a related technical field or equivalent experience. • At least 3 years of experience in Information Security and/or infrastructure engineering. • An accomplished security practitioner with a strong understanding of industry trends in all areas of security. • Experience with building IaaS cloud based solutions including AWS, Azure, etc.. and knowledge of their network security and IAM models. • Experience working with security vendors including evaluating and implementing new products. Desired Qualifications: • Expertise in common AWS services (CloudFormation, Route53, VPC, EC2, Lambda, etc...) and their security best practices. • Programming experience in JavaScript, Java, Scala, Python, Perl, Ruby, etc.. and their use in automating security and compliance. • Strong understanding of security technologies including host and network based protection and detection technologies. • Experience with vulnerability management (including: running vulnerability scans, creating reports, communicating with asset owners and giving remediation guidance). • Experience with continuous integration and automation tools (e.g. Jenkins, Chef, Puppet, Ansible). • Experience writing security white papers and/or presenting security products and technologies to diverse audiences. • CISSP or CSSLP (Certified Secure Software Lifecycle Professional) certification. Qualifications Must Have: Cloud Security Security Patches Additional Information All your information will be kept confidential according to EEO guidelines.
    $71k-97k yearly est. 17h ago
  • Vulnerability & Security Engineer

    The Giant Bullseye

    Cyber security analyst job in Saint Louis, MO

    We are looking for experienced Vulnerability Development / Security Engineers with a background in healthcare IT to join our security team. You will focus on identifying, assessing, and remediating vulnerabilities across applications and cloud environments. Responsibilities: Conduct SAST and DAST scans and manage vulnerability remediation. Perform secure code reviews and implement best practices in Java and Python. Conduct threat modeling for applications, APIs, and cloud environments. Collaborate with development teams to ensure secure application delivery. Stay updated on security trends and healthcare-specific compliance requirements. Qualifications: 6-10 years of experience in application security or vulnerability management. Hands-on with SAST/DAST tools, patching, and secure coding. Strong knowledge of API and cloud security. Healthcare IT experience preferred (HIPAA, HITRUST, or related frameworks). Excellent analytical and communication skills.
    $71k-97k yearly est. 19d ago
  • Security Engineer (On-Site/St. Louis, MO)

    Oakwood Systems Group 3.5company rating

    Cyber security analyst job in Saint Louis, MO

    Description What you will do: Design, implement, manage, maintain, improve, and troubleshoot various security systems, including but not limited to Data Loss Prevention (DLP), SIEM and UEBA, endpoint protection, and data security/auditing platforms. Analyze and audit systems, software, processes, implementations, and environments for compliance with policies, regulations, and security best practices; and recommend and implement refinements and enhancements, in collaboration with individuals and teams. Conduct threat, vulnerability, and risk assessments, at times in collaboration with external auditors, to understand and eliminate potential system and network vulnerabilities. Develop and improve monitoring and visibility capabilities of information systems, and act as a technical leader for security incident detection, response, handling, and forensics. Provide reporting on incidents, investigations, vulnerabilities, trends, conditions, and events. Remain current on information security topics, trends, events, and developments. May occasionally provide end-user security training. Provide end-user support as necessary. Provide exceptional customer service while acting ethically and maintaining business confidentiality. Provide afterhours support as required and be able to identify critical issues that require urgent response. Qualifications Include: 7+ years of experience in Information Technology required; inclusive of up to 4 years of relevant education, including 3+ years of experience in security Must have demonstrable experience with: Microsoft/Office 365 Security landscape. Azure and on-premise Active Directory. PowerShell and Regular Expressions. Software Development and/or Development Security Operations. Performing and managing proactive risk identification and mitigation, including penetration testing, network vulnerability assessments, and system risk profiling. Security incident detection, response, handling, and forensics Must understand networking concepts, protocols, and services. Must have experience with SIEM/UEBA and EDR tools/platforms. Must have excellent verbal and written communication skills. Must possess a very strong troubleshooting methodology to tackle issues efficiently. Must be self-starting and self-sufficient to complete tasks in a timely and effective manner. Additional Qualifications Include: Experience with RESTful web API, JSON, XML, and HTTP. Experience with Linux. Experience with SQL and relational databases. Experience with the Azure Cloud landscape. Additional programming and/or scripting experience is a plus. Relevant certifications are a plus. Culture of: Innovation & Continuous Improvement Appreciation & Recognition Advancement Opportunities Pay for Performance Some Benefits and Perks Include: Industry Leading Healthcare Industry Leading Profit-Sharing Plan w/ Safe Harbor Contribution Generous Paid Time Away Tuition Reimbursement Program Parental Leave Free Onsite Fitness & Recreation Center
    $72k-99k yearly est. Auto-Apply 60d+ ago
  • INTL GCP Cloud Security Engineer

    Insight Global

    Cyber security analyst job in Edmundson, MO

    Implement fine-grained access controls for PHI/PII Automate data classification, configure security monitoring Ensure compliance, test/validate security controls We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: **************************************************** Skills and Requirements Start by December 1 Onsite in Hyderabad 4 days/week 5+ years cloud security (2+ years data security) Strong GCP security, BigQuery, DLP, KMS, SIEM, healthcare/HIPAA experience Security certifications (CISSP, CHC, GCP Security Engineer) Zero Trust, DevSecOps, container security
    $71k-97k yearly est. 53d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Chesterfield, MO?

The average cyber security analyst in Chesterfield, MO earns between $57,000 and $102,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Chesterfield, MO

$76,000

What are the biggest employers of Cyber Security Analysts in Chesterfield, MO?

The biggest employers of Cyber Security Analysts in Chesterfield, MO are:
  1. Bayer
Job type you want
Full Time
Part Time
Internship
Temporary