Cyber security analyst jobs in Clarksville, TN - 181 jobs
All
Cyber Security Analyst
Information Security Engineer
Senior Security Analyst
Cyber Security Engineer
Information Security Analyst
Security Engineer
Senior Information Security Engineer
Security System Engineer
Information Systems Security Officer
Securities Analyst
Defense Analyst
Data Security Analyst
Cyber Security Engineer
Patriot Talent Solutions
Cyber security analyst job in Knoxville, TN
Knoxville, TN | Cybersecurity Engineer | Full-time
We are actively recruiting a Cybersecurity Engineer for our client in Knoxville, TN. This is a hybrid direct placement opportunity that will require some onsite work in Knoxville. The successful candidate will be responsible for the design, implementation, and ongoing management of advanced cybersecurity measures to protect sensitive data, systems, and networks. This role involves hands-on work with a wide range of security technologies, development and enforcement of security protocols, and proactive risk mitigation. The engineer collaborates with cross-functional IT teams to integrate security solutions into enterprise projects and ensure compliance with applicable regulatory requirements, including HIPAA. Must have a minimum of five years' experience in cybersecurity engineering, with a proven track record in designing and implementing security solutions within an enterprise environment.
Due to client request, candidates must be eligible to work in the United States without sponsorship.
Equal Opportunity Employer/Veterans/Disabled
$69k-94k yearly est. 3d ago
Looking for a job?
Let Zippia find it for you.
Cyber Security Vulnerability Analyst
ITR 4.2
Cyber security analyst job in Oak Ridge, TN
Job DescriptionEast Tennessee company is seeking a CyberSecurity Vulnerability Analyst to perform defensive cyber operational tasks, respond to reported incidents, and track remediation of client system vulnerabilities to include industrial control systems. The ideal candidate will be an experienced analyst with a strong background in addressing network vulnerabilities and conducting incident response activities.
This is a full-time, hybrid position that will work onsite in Oak Ridge, TN 2-3 days each week.
Job Responsibilities:
• Join the Defensive Cyber Operations Group's multi-disciplinary team in responding to advanced Cyber threats from targeted phishing to network-based threats, ransomware, and APT-level activity in a Tier 2 role.
• Mentor the DCO's junior staff, developing their technical and incident resolution skills.
• Participate in incident response activities involving multiple teams and functions.
• Serve as primary coordinator for ORNL response to federal Binding Operational Directives and data calls.
• Leverage internal and external vulnerability scanning scan data to maintain a comprehensive view of ORNL's threat profile and risk status.
• Automate key DCO functions using Tines technology
• Partner with Emerging Threat team to remediate extant vulnerabilities identified by their intelligence activities.
• Maintain strong collaborative and data sharing relationships with DOE headquarters Cyber units, other DOE laboratories, and external entities.
• Leverage EDR, SIEM, IDS, and PCAP tools to identify and investigate cyber threats.
• Assist users with the creation, monitoring, and evaluation of policy and device exceptions.
• Assist in training and awareness activities to ensure ORNL staff are aware of CyberSecurity responsibilities and requirements.
• Partner with Cyber Industrial Control System Engineers to monitor the lab's ICS enclaves for operational and security issues
Candidates must be able to obtain a federal security clearance so US citizenship is required.
$69k-95k yearly est. 24d ago
Cyber Security Analyst
OSC Global
Cyber security analyst job in Radcliff, KY
OSC EdgeTech, LLC is seeking a talented CyberSecurityAnalyst to join the team.
OSC EdgeTech is a wholly owned subsidiary of Cook Inlet Region, Inc. (CIRI), an Alaska Native Corporation proudly owned by over 9,400 Shareholders. OSC EdgeTech was created to deliver agile, responsive IT solutions to meet the evolving needs of federal and defense customers. As an SBA-certified 8(a) entity with a Facility Clearance (FCL), OSC EdgeTech streamlines the acquisition process while maintaining the trusted quality, security, and innovation that define OSC Edge.
Cook Inlet Region, Inc., also known as CIRI, is one of 12 land-based Alaska Native regional corporations created pursuant to the Alaska Native Claims Settlement Act (ANCSA). CIRI's regional boundaries roughly follow the traditional Dena'ina territory of Southcentral Alaska. CIRI was incorporated on June 8, 1972, and is owned today by a diverse group of more than 9,500 Shareholders who live in Alaska and throughout the world.
OSC EdgeTech offers excellent benefits for eligible employees. Benefits include paid holidays, paid time off, 401K with employer match, dental, vision, health insurance plans, as well as life and disability benefits.
Position Overview
The CyberSecurityAnalyst will contribute to the Cyber mission by conducting vulnerability scans, reviewing security alerts and incidents, and assessing technical compliance in accordance with DoD and Federal requirements. This position will utilize Cybersecurity tools, including ACAS, eMASS, HBSS, and Microsoft 365 Defender, to support vulnerability management, POA&M management, threat detection, and other Cyber tasks as required. Additionally, this position will collaborate with other Cyberanalysts to develop programmatic actions and minimize security risks.
Major Activities
Conduct vulnerability scans of IT assets as requested from tickets or as directed by Cybersecurity Manager.
Apply knowledge of monitoring, analyzing, detecting, and responding to Cyber events and incidents within information systems and networks.
Advise on an integrated, dynamic Cyber defense and leverage Cybersecurity solutions to deliver Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, and data spillage, and incident response actions.
Assess IT assets for cybersecurity compliance in accordance with DISA STIGs requirements.
Develop POA&Ms to track any Overdue vulnerabilities or STIG deviations
Review and investigate security alerts and incidents from Microsoft 365 Defender
Utilize eMASS to maintain and update POA&M status
Review device compliance status from HBSS
Work with other NEC Operations team members to remediate and mitigate security vulnerabilities.
Review the latest Cybersecurity intelligence information and provide recommendations to improve the Cybersecurity posture.
Perform other duties as appropriate and as assigned.
Knowledge/Skills/Abilities
Experience analyzing log files, firewall logs, and IDS Logs to identify possible threats to network security, and to perform command and control functions in response to incidents. If not 8570 certified at contract start must be within six months.
Experience in Host Based Security Systems (HBSS), ACAS vulnerability scanning software, knowledge of and experience with Security Information and Events Manager (SIEM) analysis and administration, as well as Information Assurance Vulnerability Alert (IAVA) management.
Excellent verbal, written and interpersonal communication skills, excellent organizational and multi-tasking skills.
Great analytical, critical thinking and problem-solving abilities.
Superior presentation and negotiation skills.
Strong management and organizational skills.
Adaptable and capable of working in fast-paced environments.
Proficient in Microsoft Word, Excel, PowerPoint, and SharePoint
Required Qualifications
Bachelor's degree in IT, CyberSecurity or related field or seven years of IT work experience
Demonstrated work experience as CyberSecurityAnalyst in DoD or Federal government environments
Two or more years' experience performing vulnerability scans using Tenable SecurityCenter (Tenable.sc) or ACAS
Must possess appropriate DISA ESS certifications and experience.
Must be DoD 8570 certified at IAT Level 3 or higher (e.g., CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP)
Must be US citizen
Must possess active secret security clearance or higher
Must be able to pass pre-employment background check
Preferred Qualifications
Bachelor's degree in IT, IM, or CyberSecurity
ACAS certification obtained within the last three (3) years, preferred
HBSS Administrator certification obtained within the last three (3) years, preferred
E-Verify:
OSC EdgeTech participates in E-Verify. We will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization.
Reasonable Accommodation:
OSC EdgeTech, LLC will provide reasonable accommodations, according to applicable state and federal laws, to all qualified individuals with physical or mental disabilities. In compliance with the ADA Amendments Act (ADAAA), if you have a disability and would like to request an accommodation in order to apply for a position with OSC EdgeTech, LLC or any of its subsidiaries, please email *******************.
$64k-88k yearly est. 37d ago
Temporary- Cyber Security Analyst
Tennessee Board of Regents 4.0
Cyber security analyst job in Nashville, TN
Title: Temporary - CyberSecurityAnalyst
Under the directive of the Information Security Officer, the cybersecurityanalyst will implement security strategies and best practices in accordance with regulatory standards.
ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES
Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned.
REQUIRED QUALIFICATIONS
High School Diploma or GED
One year of experience in information security and compliance regulations.
Proficiency with Microsoft applications.
PREFERRED QUALIFICATIONS
Certificate in information security, i.e., Security+, Pen+, Ethical Hacker.
Experience with SIEM (Microsoft Defender).
Experience in phishing campaign/training.
KNOWLEDGE, SKILLS AND ABILITIES
Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of Information Security Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels.
Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures.
Open Until Filled: Yes
Rate of Pay: $20.00 per hour
Work Hours: Up to 28 hours per week
Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check.
Nashville State offers flexible work arrangements for positions that qualify.
$20 hourly 60d+ ago
Temporary- Cyber Security Analyst
The College System of Tennessee 3.9
Cyber security analyst job in Nashville, TN
Title: Temporary - CyberSecurityAnalyst Under the directive of the Information Security Officer, the cybersecurityanalyst will implement security strategies and best practices in accordance with regulatory standards. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES
Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned.
REQUIRED QUALIFICATIONS
High School Diploma or GED
One year of experience in information security and compliance regulations.
Proficiency with Microsoft applications.
PREFERRED QUALIFICATIONS
Certificate in information security, i.e., Security+, Pen+, Ethical Hacker.
Experience with SIEM (Microsoft Defender).
Experience in phishing campaign/training.
KNOWLEDGE, SKILLS AND ABILITIES
Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of Information Security Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels.
Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures.
Open Until Filled: Yes
Rate of Pay: $20.00 per hour
Work Hours: Up to 28 hours per week
Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check.
Nashville State offers flexible work arrangements for positions that qualify.
$20 hourly 18d ago
Information Security Engineer
Heaven Hill Brands 4.6
Cyber security analyst job in Louisville, KY
Job Description: with a base location in Louisville, KY. What the Role Is The Information Security Engineer is responsible for strengthening and supporting Heaven Hill's cybersecurity program. This hands-on technical role focuses on implementation, monitoring, and continuous improvement of security controls across cloud and on-premise environments.
The Engineer supports governance and risk management efforts and plays a key role in incident response and in deploying and maintaining secure technology solutions.
This position will collaborate with IT and business units to ensure Heaven Hill's data and systems remain resilient against evolving threats, while helping enable secure and efficient access through identity and access management solutions.
This role is instrumental in advancing Heaven Hill's overall security maturity and ensuring that cybersecurity enables, rather than limits, innovation and operational excellence.
How You Will Spend Your Time? Security Engineering & OperationsDesign, implement, monitor, and maintain security controls across cloud, identity, endpoint, and network environments.
Implement and manage Privileged Access Management (PAM) and Role-Based Access Control (RBAC) programs that align with business needs and support POLP (Principle of Least Privilege).
Support and enhance Identity Management solutions, including user provisioning, Single Sign-On (SSO) integrations, and secure application configurations.
Support secure configuration and hardening of Windows and Linux servers, as well as Windows and mac OS workstations.
Manage and maintain DNS and domain registrar configurations to ensure secure and reliable name resolution and domain integrity.
Implement, integrate, and manage authentication, including Kerberos, FIDO2, Smart Cards, passkeys, certificate-based authentication, and TLS or key management solutions.
Administer and support Public Key Infrastructure (PKI), including certificate issuance, renewal, and lifecycle management.
Perform vulnerability scanning and coordinate remediation activities.
Administer and optimize core security platforms such as endpoint detection and response (EDR) and security information and event management (SIEM) systems, including alert tuning, integration, and incident response support.
Develop and maintain automation or scripting (e.
g.
, PowerShell, Python) to improve efficiency in security monitoring, configuration management, and response processes.
Monitor security events, investigate incidents, perform root cause analysis, and drive post-incident improvements.
Collaborate with IT and business teams to ensure security considerations are integrated into infrastructure and project planning from the outset.
Risk & GovernanceConduct and document formal risk assessments, identify, evaluate, and communicate risk mitigation strategies.
Develop, update, and maintain cybersecurity policies, standards, and procedures aligned with the NIST framework.
Partner across the business to build awareness, ensure accountability, and foster a risk-informed culture.
Support security aspects of vendor assessments and technology evaluations.
Collaboration & Continuous ImprovementProvide security guidance for new initiatives, integrations, and system changes.
Contribute to incident response planning, tabletop exercises, and lessons-learned reviews.
Develop, maintain, and refine security operations and incident response playbooks to support consistent and effective response activities.
Stay informed on emerging threats, technologies, and best practices relevant to manufacturing and spirits production environments.
Who You Are… Required Skills and Experience:Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or equivalent experience along with Information Technology related associate's degree.
Minimum 5 years of experience in cybersecurity engineering and/or IT engineering.
Strong cloud security experience, including the design input, configuration, and operation of controls in cloud and hybrid environments.
Hands-on experience with Microsoft Entra ID (Azure AD), including Conditional Access, identity lifecycle management, and integration within hybrid Active Directory environments.
Experience with enterprise email security, endpoint protection, network security, data protection.
Experience implementing and managing Microsoft Purview for data protection, governance, and compliance.
Experience supporting third-party risk management or vendor assessments.
Strong understanding of identity, endpoint, and network security architectures and their integration across enterprise environments.
Experience performing root cause analysis during and after security incidents.
Experience developing or contributing to security documentation such as policies, standards, or procedures.
Strong communication skills across technical and non-technical audiences.
Experience in manufacturing or industrial environments.
Familiarity with OT/ICS security principles, including network segmentation, asset visibility, and industrial protocol security.
Valued but not Required Skills and Experience:Professional certifications such as CISSP, CISM, CRISC, or equivalent.
Understanding secure application deployment or DevSecOps principles.
Physical Requirements While performing duties of job, employee is occasionally required to:Stand; walk; use hands and fingers to handle or feel objects; use a computer; and reach with hands and arms.
Occasionally lift and/or move up to 20 pounds.
BenefitsPaid Vacation11 Paid HolidaysHealth, Dental & Vision eligibility from day one FSA/HSA401K match EAPMaternity/Paternity Leave Heaven Hill and its affiliates are committed to fostering a diverse workforce as an Equal Employment Opportunity company.
We invite applications from candidates of all backgrounds, without regard to race, religion, color, sex, sexual orientation, natural origin, gender identity or expression, age, disability, veteran status, or any other legally protected characteristic.
$69k-90k yearly est. 30d ago
Sr. Information Security Engineer
North Star Staffing Solutions
Cyber security analyst job in Goodlettsville, TN
Job Requirements & Qualifications: •Designs, put into practice, administers, and supports multiple information security platforms, systems, and applications. Supports a variety of technologies in a hands-on manner. •Performs internal security risk assessments, security risk assessments of third party business partners, and detailed security risk assessments of various technologies. (Examples include directory services, database platforms, client and server operating systems, programming languages, web services, firewalls, remote access technologies, messaging platforms, encryption solutions, wireless technologies, internally-hosted applications, externally-hosted applications, and cloud services).
•Supports defined Company operating principles via effective, pragmatic information security controls. Analyzes, defines, implements, and administers efficient business processes related to information security programs. Represents the information security function through pragmatic consultation and participation in a defined SDLC.
•Maintains knowledge of current and up-and-coming security, compliance, and technical developments. Identifies present and prospective future vulnerabilities and collaborates with suitable leaders to identify, recommend, and develop risk remediation plans, ad to track remediation outcomes and timelines.
•Works with the information security management team to administer, maintain, and continuously improve HIPAA, PCI DSS, SOX, and internal controls compliance programs, investigate known or suspected security incidents, support internal and external audits, and assist in the development of appropriate audit response Management Action Plans.
•Promotes security best practices via awareness, example, and compliance with policies and regulatory requirements.
•Uses project management best practices to initiate, manage, and close projects, often simultaneously across a variety of projects. Creates and maintains a variety of documents related to projects and information security.
•Guide and cross-train junior department team members lead meetings construct and uphold strong partnerships with multiple departments coordinate vendor support engagements etc.
Knowledge, Skills, and Abilities
•Knowledgeable with and ability to apply time-proven, generally-accepted security management concepts, techniques, and methodologies.
•Strong understanding of pragmatic implementation of information security controls, holistic defense-in-depth strategies, protocols used to interconnect networks, and publish application resources.
•Strong, efficient written and verbal communication skills that enables effective communications to multiple audiences.
•Ability to occasionally work unscheduled shifts and in an on-call capacity and be available for occasional travel (up to 25%).
•Strong internal (security recommendations) and external (vendor support) negotiation skills.
•Ability to influence and encourage others.
•Strong understanding of PCI, HIPAA, and SOC regulatory requirements.
•Development/analysis proficiency in one or more scripting languages.
•Development/analysis proficiency in TSQL.
•Capability to learn and preserve new skills required to adapt to growing business and technical environments.
•Strong perceptive of present and emergent information security technologies and trends.
Qualifications
Work Experience and/or Education
•Bachelor's and/or Master's degree in information security or computer information systems.
•6+ years of information security generalist experience (broad and deep in data, application, system, and network security domains) with complex technical initiatives.
•Active CISA, CISSP, or CISM certification.
•Experience identifying and addressing security risks associated with host and network operating systems (e.g. Windows, Linux, AS400, PAN OS, AIX, Cisco IOS, etc.) enterprise services (e.g. directory services, email, web publishing, database, virtualization, etc.) content management, client-server, and collaboration, thin-client, and web-based applications enterprise applications (e.g. Lawson) cloud services (e.g. SaaS, IaaS, etc.) data storage, etc.
•Hands-on SME/lead experience with the design, implementation, and administration of at least 5 of the following technologies: Palo Alto Networks, IBM Tivoli Endpoint Manager (BigFix), IBM QRadar (SIEM), Qualys Vulnerability Scanning Solutions, Tenable Nessus, Juniper SSL VPN GlobalScape EFT Server Symantec Data Loss Prevention (Vontu), RSA SecurID, and CyberArk Password Management.
Additional Information
$88k-117k yearly est. 3d ago
Clinical Cyber Security Engineer
Renovo Solutions 3.1
Cyber security analyst job in Lexington, KY
As a hybrid biomedical equipment/IT technician, a Clinical CyberSecurity Engineer usually has a four-year degree or the associated experience to maintain a diverse population of patient care equipment and networked medical devices. A Clinical CyberSecurity Engineer has a good knowledge of electronics, schematics, computer operating systems, networking, and security. This individual must have strong project management skills and organizational skills. Often, they must collaborate with the Manager of Clinical CyberSecurity Engineering and the facility's IT department and must demonstrate excellent customer service skills.
Essential Duties & Responsibilities:
Responsible for support and oversight of the clinical information systems under his/her care. This includes the tracking of hardware (configuration items), software and network documentation.
Provides user support, systems technical service and support, and participates in system projects as requested.
Coordinates and/or implements software patches / updates in collaboration with Clinical Staff, Original Equipment Manufactures and the Hospitals SIT Department.
Demonstrates cost containment and financial acumen
Maintains a good personal relationship with fellow co-workers, hospital staff, and vendors
Maintains an accurate inventory of Networked Medical Devices or devices containing ePHl
Works with IT and security staff to identify and mitigate risks; helps to enforce policies and procedures on medical devices and IoT systems
Utilizes system management tools and industry best practices to asses security vulnerabilities and risk to medical devices and IoT management
Uses project management tools to manage system implementations and change management procedures
Acts as a consultant to the facility regarding system hardware/software evaluation and selection
Coordinates installation and maintenance of networked medical devices containing PC hardware with facility IT department
Performs other duties as assigned**
Required Skills
Possesses a comprehensive knowledge of electromechanical devices and principles, as well as a thorough understanding of general patient care equipment and can demonstrate the usage of supported devices
Basic understanding of life-support and diagnostic support devices and their usage within the healthcare setting
Configuration of computer hardware and software, cybersecurity systems
Use and management of operating systems including Microsoft, Linux/Unix and RTOS
Configuration and deployment of computer software support tools (i.e. Configuration,
Remote Management, Antivirus, Backup and Recovery, Monitoring tools, etc.)
Proficient in the use of Microsoft Office products, and the creation of network diagrams using Microsoft Visio or similar software
Configuration of basic network components and understanding of routing and subnetting processes
Application of CIS, NIST, HITRUST best practices and guidelines to technology devices & systems
Knowledge and understanding of human anatomy and physiology
Required Competencies
Accountability - takes ownership of assigned work and responsibilities, follows through and closes the loop
Communication - clearly expresses thoughts and ideas both in written and verbal communications, provides timely information
Financial Acumen - Considers financial impact of all decisions
Integrity - Can admit mistakes, is direct and truthful
Customer Service - demonstrates a "customer-first" mentality, focused on meeting the needs of customers and captures feedback to make improvements Priority Setting - Prioritizes assigned schedules and workload
Knowledge - Stay current with technological developments, security trends and best practices in the information technology field.
Information Technology - Possesses knowledge and understanding of basic cybersecurity and IT terminology as it pertains to medical devices and facility IT systems
Team Building - Mentors newer technicians, facilitates clear communication amongst the team, demonstrates care and respect for co-workers and colleagues
Regulatory - understands the various regulations and best practices that apply to the HTM space (HIPAA, HITECH, Omnibus, SOC, COBIT, ITIL)
Attributes
Culture - promotes the Vision, Mission and Values that make up the RENOVO culture as well as the culture of the healthcare facility
Mechanically inclined - technical skills and abilities to figure out how things work Self-motivated - can work on their own or under limited direction while prioritizing equipment schedules and repair activities. Advanced projects or activities require supervision
Open-minded - Willing to listen to opinions and criticism, can switch directions quickly
Agility - Can break complex projects into smaller iterative tasks
Improvement - willing to learn and grow, wants to update job skills for career growth
Confidence - Self-reliant decision maker that doesn't second guess decisions Multi-tasker - Is organized and efficient, handles multiple projects or tasks simultaneously
Education/Special Training
H.S. Diploma or equivalent required
Technical Certificate or DOD training required
4-year College Degree, Certification, or other higher level of education pertaining to this job description preferred
CompTIA A+ & Network+ or equivalent certification,
CISSP, CCNA, MSCE desired
Required Work Hours
Forty hours per week during daytime and evening hours. Scheduled work hours may change. Overtime may be required or permitted with prior approval. This position may be included in the on-call rotation for the facility.
Reporting and Supervisor Responsibilities
The Clinical Systems Engineer reports to - Manager, Biomedical Engineering
This position has no supervisory responsibilities
Physical Requirements
The Clinical Systems Engineer must be able to speak, hear, see, read, write, type, dial, reach, bend, climb, crawl, crouch, kneel, squat, and twist. Must have near vision, far vision, depth perception, and be able to distinguish colors. Must have sensory ability to distinguish hot, cold, range of temperatures, surfaces, fine motor skills, manual dexterity, and detect/distinguish odors. Must be able to carry or lift up to 50 pounds routinely.
Travel
Travel will be required for this position, unless otherwise specified. Total travel based on project needs and locations
Classification
FLSA: Non-exempt
Administration:
Understand and observe company policies and procedures.
Relationships:
Utilize teamwork in your daily activity and ensure customer satisfaction.
Other:
Housekeeping - Maintain a clean, orderly appearance of all work areas.
Personal appearance - Must observe company dress code always and must have good personal hygiene.
Maintain all RENOVO owned equipment including tools, test equipment, computers, and others as specified in proper working condition and ensure annual calibration where appropriate.
**Note: This position description does not list every activity, duty, and responsibility of the position and may be altered by RENOVO at any time.
$77k-105k yearly est. 8d ago
IT Security Engineer SR
Dollar General Corporation 4.4
Cyber security analyst job in Goodlettsville, TN
The Senior Security Engineer is responsible for designing and leading advanced security solutions to safeguard Dollar General's digital infrastructure, with a focus on cloud, network, and system security in a dynamic retail environment. This role drives layered security integration, mentors junior team members, and utilizes tools such as Palo Alto Networks, Splunk, and F5 ASM to address complex security risk. The ideal candidate brings a balance of technical depth, critical thinking, and pragmatism to strengthen Dollar General's overall security posture.
Job Details
Duties & Responsibilities: What major responsibilities does this position have and what percentage of time is spent on completing them? (Typically 5 - 7)
* Design and implement security architectures across on-premises and cloud environments (Google GCP, Azure) utilizing tools such as Palo Alto firewalls, F5 ASM, and Akamai App & API Protector.
* Promote modern security fundamentals by embedding security into CI/CD pipelines using Terraform and championing secure design practices for applications and APIs.
* Perform advanced risk analysis and vulnerability management, leveraging tools such as ExtraHop RevealX, Palo Alto Cortex XDR, and Sysdig Secure to identify and mitigate threats.
* Manage and respond to security incidents and perform forensic analysis using Splunk and Proofpoint Email Security while leveraging CyberArk for privileged access control.
* Develop and enforce security policies related to network security (Palo Alto, Fortinet), DNS (Akamai), and identity management (Clearpass), with emphasis on PKI and conditional access frameworks.
* Mentor junior security engineers, fostering critical thinking and hands-on problem-solving skills while collaborating with IT and business units to embed security into organizational processes.
* Research emerging threats and evaluate technologies to inform and enhance Dollar General's security strategy and posture.
Knowledge, Skills and Abilities (KSAs): What KSAs are required to perform this job?
* Deep expertise in network security (Palo Alto, Fortinet, Meraki MX), application firewalls (F5 ASM, Akamai App & API Protector, Cloud Armor), and data protection (Digital Guardian DLP, Microsoft DLP).
* Advanced proficiency in cloud security (GCP, Azure) and container security (Sysdig Secure), including tools such as VPC Service Controls and Cloud Armor.
* Strong scripting skills in Python, Bash, or PowerShell, and hands-on experience in Terraform for automating security infrastructure.
* In-depth understanding of PKI, VPN/remote access technologies (CyberArk Alero, GlobalProtect), and DNS security (Akamai DNS, Akamai GLB).
* Exceptional analytical and critical thinking skills with the ability to solve complex security challenges in a pragmatic and business-aligned manner.
* Proven leadership and communication skills, with the ability to mentor team members and influence cross-functional stakeholders.
* Excellent written, oral, and inter-personal communications skills with the ability to clearly communicate complex topics across technical and non-technical audiences.
* Capability to adapt to rapidly changing technologies and threat landscapes, with occasional availability for non-standard hours or travel (up to 5%).
Qualifications
Work Experience &/or Education: What are the minimum education and/or experience requirements necessary to perform this job?
* Bachelor's degree in Computer Science, Information Security, or a related field; or equivalent combination of education and relevant experience.
* Minimum 7 years of experience in information security, including at least 2 years in a senior or leadership capacity.
* Advanced hands-on experience with at least five of the following:
* Palo Alto Networks firewalls and Panorama
* Akamai App/API Protector
* F5 Application Security Manager (ASM)
* Sysdig Secure (or equivalent)
* Google Cloud Platform (GCP) native security tools
* Microsoft Azure native security tools
* Microsoft Defender
* CyberArk Privileged Access
* HCL BigFix
* Splunk Enterprise and Enterprise Security
* Data security methodologies
* DLP technologies
* Proven track record in risk analysis, mitigation planning, and implementing secure configurations across cloud, network, and application layers.
* Preferred certifications: CISSP, CISM, CISSP-ISSAP, Palo Alto PCNSE, Splunk Certified Architect, or GCP Cloud Security Engineer.
$91k-114k yearly est. 18d ago
Data Security Analyst
Exeter Government Servi 4.1
Cyber security analyst job in Fort Knox, KY
Provide support to the lead securityAnalyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of anomalies.
Required Qualifications:
Experience in administrative support & MS Office proficiency
Bachelor's degree or 5 years of experience
U.S. citizen and MUST possess a current active DoD Secret clearance
Possess an understanding of cybersecurity principles and be able to obtain a security+ certification within 6 months
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
#clearancejobs
$64k-88k yearly est. Auto-Apply 60d+ ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Frankfort, KY
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 55d ago
Sr. Security Analyst
Maximus 4.3
Cyber security analyst job in Louisville, KY
Description & Requirements Maximus is seeking a qualified Sr. Technical/SecurityAnalyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client.*
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$78k-106k yearly est. Easy Apply 2d ago
Analyst, Information Security
Standard Aero 4.1
Cyber security analyst job in Maryville, TN
Build an Aviation Career You're Proud Of
At StandardAero, we use our ingenuity and know-how to find solutions for the simple to the most complex challenges in aviation. Together, we get the job done and done well. Our stability, resources, and respectful culture supports you in building a solid career with a great team you can count on day in and day out for the long term.
Summary:
As an IT SecurityAnalyst position is a critical role in protecting StandardAero's business and technology operations. In this role you will be accountable in securing the enterprise technology and operations against an ever evolving and growing threat landscape. The role is an integral position in supporting StandardAero's global cyber-security defenses, providing tactical cybersecurity objectives and implementing the security strategy across the organization.
What you'll do:
Conduct risk and security assessments through vulnerability analysis and reporting
Perform mitigation support for both internal and external security audits
Investigate, analyze and document security incidents to identify and document the root cause
Provides incident response support including mitigating actions to contain activity and facilitating forensics analysis when necessary
Partner with IT Operation teams to remediate system vulnerabilities
Participates in the production of documentation and management reporting
Research security enhancements and make recommendations for improved policy and process
Analyze IT requirements and provide objective advice on the use of new IT security offerings
Stay up-to-date on information technology and cybersecurity trends and standards
Other IT Security-related duties as required
Capable of identifying, evaluating and mitigating significant risks within an enterprise.
Strong working experience with Microsoft Office Suite.
Strong oral and written communication skills and the ability to work well with people from many different disciplines with varying degrees of technical experience.
Possess strong analytical skills attention to detail.
Ability to prioritize assignments while working on multiple projects
Ability to work independently and proactively to meet assigned objectives
Flexible with the ability to multi-task, effectively prioritize and work under pressure
Basic project management
Design, implement, administer, support and maintain cybersecurity technology systems (Endpoint Protection, IDS/IPS, Web and Email Security, SIEM, Multi-Factor Authentication, Network Access Controls, DLP, etc.)
Analyze, report and respond to security alerts within the various IT technologies and global locations
Proactively remediate information technology security threats as a member of the security team
Assist in the designing, documenting, architecting and implementing IT security measures and controls
Provide support through ‘Threat Hunting' against anomalous behavior within the enterprise. Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity
Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources
Threat mitigation; malicious code detection, response and prevention; operating system security oversight
Minimum Qualifications:
Bachelor's degree in Information Security, Computer Science, or a related field; equivalent experience may be considered.
5+ years of progressive experience in cybersecurity and IT, including hands-on security operations, threat detection, or engineering.
5+ years of experience in SIEM Administration, endpoint protection, vulnerability management tools, and security automation.
5+ years of experience of network and application security, threat actor tactics (MITRE ATT&CK), and incident response frameworks.
5+ years of experience working in regulated environments or with industry frameworks (e.g., NIST, ISO 27001, CIS, or CMMC).
Preferred Qualifications:
IT Security Certification, specifically GSEC, CEH, CISSO, CISA or CISSP, GCIA, OSCP and ITIL
SDLC, and understand application security.
Containerization and Development Security Operations
Benefits that make life better:
Comprehensive Healthcare
401(k) with 100% company match; up to 5% vested
Paid Time Off starting on day one
Bonus opportunities
Health- & Dependent Care Flexible Spending Accounts
Short- & Long-Term Disability
Life & AD&D Insurance
Learning & Training opportunities
Raising the Standard of Excellence since 1911
With over a century of proven excellence, StandardAero has become an industry leader in MRO services and customized solutions in the aerospace field. Our shared values and learning-based culture inspire our team to exceed their potential and power our customers' missions worldwide. With on-the-job training, advancement opportunities, and excellent benefits, StandardAero invites you to experience a fulfilling and meaningful career with us.
Inclusivity Is Our Standard
It is StandardAero's policy to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information. Our supportive environment celebrates diversity with no room for harassment or discrimination of any kind. We invite you to bring your authentic self to our team and experience our welcoming culture.
$73k-103k yearly est. Auto-Apply 60d+ ago
Information Security and Fraud Analyst
First Farmers & Merchants Bank 4.2
Cyber security analyst job in Columbia, TN
Education Level: (1) A bachelor's degree, or (2) achievement of formal certifications recognized in the industry as equivalent to a bachelor's degree (e.g. information technology certifications in lieu of a degree).
Preferred Certifications include Security+ (CompTIA), CySA+ (CompTIA), or SSCP (ISC
2
).
Job Type: Full Time
VEVRAA Federal Contractor
Request Priority Referral of Protected Veterans
EOE Protected Veterans/Disabled
Robert C. Matthews, email: *******************************
Role:
The Information Security and Fraud Analyst is responsible for developing and managing appropriate security measures for the bank's information systems, managing third-party vendor security risk, and investigating incidents of fraud and attempted fraud.
Essential Functions & Responsibilities:
E 35% Risk Management. Coordinates organizational risk assessments. Performs third party vendor risk assessments. Conducts information security Vendor Risk Assessments (VRA) on all in-scope third-party requests. Communicates at all levels and with all business units in providing support in the onboarding of third-party vendors with respect to the assessment of Information Security posture of the vendor. Creates and manages relationships with business units and stakeholders of the Third-Party Vendor Risk Management process. Performs assessment of third-party security and related due diligence documentation (such as SOC).
E 30% Information Security. Monitors computer networks for security issues. Documents and investigates security breaches and other cybersecurity incidents. Stays current on IT security trends and news. Develops company-wide best practices for IT security. Research security enhancements and makes recommendations to management. Implements both internal and external security audits. Analyzes security issues thoroughly to identify the root cause.
E 30% Fraud Investigations. Assists in the investigation of fraud incidents and recovery of funds; Maintains records of incidents, losses, recoveries, and prevention. Provides customer education to increase awareness of the fraud risk and effective techniques customers can use to mitigate the risk. Coaches staff on determination of fraud incidents and communication with customers. Interacts with external partners such as law enforcement agencies, vendors, and banks to validate information to check fraudulent activities.
N 5% Performs other related duties as assigned or requested.
Performance Measurements:
1.
To comply with the letter and with the spirit of the bank's Code of Business Conduct and Ethics
2.
To ensure that the bank suffers no losses due to failure to comply with operational procedures.
3.
To provide friendly, professional, and accurate service and support to all customers both internal and external.
4.
To maintain and build knowledge of auditing procedures through continued learning and research.
5.
To acquire and maintain a working knowledge of regulations and bank procedures; to comply with the provisions of the Bank Secrecy Act and other laws and regulations.
6. To maintain the confidentiality of customer and any other sensitive information.
7.
To complete required training and undertake additional training as needed to increase job knowledge and maximize productivity.
Knowledge and Skills:
Experience
Three yeas to five years of similar or related experience.
Education
(1) A bachelor's degree, or (2) achievement of formal certifications recognized in the industry as equivalent to a bachelor's degree (e.g. information technology certifications in lieu of a degree). Preferred Certifications include Security+ (CompTIA), CySA+ (CompTIA), or SSCP (ISC
2
).
Interpersonal Skills
Work involves much personal contact with others inside and/or outside the organization for the purpose of first-level conflict resolution, building relationships, and soliciting cooperation. Discussions involve a higher degree of confidentiality and discretion, requiring diplomacy and tact in communication.
Other Skills
1. Knowledge in all areas of accounting and audit procedures and the ability to work independently.
2. Working knowledge of spreadsheets and word processing software; must be able to use PC and other types of general office equipment.
Physical Requirements
The person in this position needs to frequently move about inside the office to interact with associates or clients and access office machinery and file cabinets. The person in the position constantly operates a computer and other office productivity machinery, such as a calculator, photocopier, and printer.
Work Environment
This job operates in a professional office environment and may require travel to branches and other locations. This role routinely uses standard office equipment such as calculators, computers, phones, photocopier, filing cabinets and fax machines.
$69k-96k yearly est. Auto-Apply 5d ago
Night Shift Security Analyst
Arctiq
Cyber security analyst job in Brentwood, TN
Arctiq is a leader in professional IT services and managed services across three core Centers of Excellence: Enterprise Security, Modern Infrastructure and Platform Engineering. Renowned for our ability to architect intelligence, we connect, protect, and transform organizations, empowering them to thrive in today's digital landscape. Arctiq builds on decades of industry expertise and a customer-centric ethos to deliver exceptional value to clients across diverse industries.
Job Summary:
Do you have an analytical and flexible mindset, a demonstrated strong work ethic and are motivated to seek out and solve complex security problems? If so, Arctiq invites you to join their Security Operations Center team. As a Night Shift Security Operations Centre (SOC) Analyst, you will be responsible for handling cybersecurity events. Analyze and respond to alerts, compromise, breaches and proactively develop defensive measures and capabilities. Handle information security incidents and other adverse security events.
Responsibilities:
Monitor and triage security events, incidents, and alerts in a 24/7/365 environment.
Conduct initial triage and analysis of security events and incidents.
Escalate complex incidents to Tier 2/3 analysts as needed.
Respond to security incidents in accordance with established incident response procedures.
Participate in incident response activities and provide status updates to stakeholders.
Document and maintain an accurate record of all security incidents, events, and alerts.
Maintain a high level of awareness of current and emerging security threats and trends.
Collaborate with other teams and departments within the organization to resolve security incidents.
Continuously improve processes and procedures for incident response and security event management.
Provide excellent quality of Customer Service.
Meet or exceed customer expectation.
Understand the overall processes and procedures of the Arctiq SOC and the relevance of the procedures to the managed client.
Work non-traditional hours in a 24 x 7 service environment.
Experience
2+ years in an IT security role or IT support role with significant security responsibilities.
Demonstrated expertise in one or more of the following domains Data Security, Digital Forensics, Incident Response and Analysis, IT Systems and Operations, Network Security, Systems and Applications Security or Vulnerability Management.
Excellent oral and written communication skills.
Individuals will be required to submit to a background examination.
Demonstrated ability in effective communication and collaborating in a high-performance team environment.
Demonstrated commitment to customer service.
Experience functioning in diverse workgroups
Experience working with a SIEM
Arctiq is an equal opportunity employer. If you need any accommodations or adjustments throughout the interview process and beyond, please let us know. We celebrate our inclusive work environment and welcome members of all backgrounds and perspectives to apply.
We thank you for your interest in joining the Arctiq team! While we welcome all applicants, only those who are selected for an interview will be contacted.
$61k-84k yearly est. 26d ago
IT Security Engineer
Brookdale Senior Living 4.2
Cyber security analyst job in Brentwood, TN
Recognized by Newsweek in 2024 and 2025 as one of America's Greatest Workplaces for Diversity
Make Lives Better Including Your Own. If you want to work in an environment where you can become your best possible self, join us! You'll earn more than a paycheck; you can find opportunities to grow your career through professional development, as well as ongoing programs catered to your overall health and wellness. Full suite of health insurance, life insurance and retirement plans are available and vary by employment status.
Part and Full Time Benefits Eligibility
Medical, Dental, Vision insurance
401(k)
Associate assistance program
Employee discounts
Referral program
Early access to earned wages for hourly associates (outside of CA)
Optional voluntary benefits including ID theft protection and pet insurance
Full Time Only Benefits Eligibility
Paid Time Off
Paid holidays
Company provided life insurance
Adoption benefit
Disability (short and long term)
Flexible Spending Accounts
Health Savings Account
Optional life and dependent life insurance
Optional voluntary benefits including accident, critical illness and hospital indemnity Insurance, and legal plan
Tuition reimbursement
Base pay in range will be determined by applicant's skills and experience. Role is also eligible for team based bonus opportunities. Temporary associates are not benefits eligible but may participate in the company's 401(k) program.
Veterans, transitioning active duty military personnel, and military spouses are encouraged to apply. To support our associates in their journey to become a U.S. citizen, Brookdale offers to advance fees for naturalization (Form N-400) application costs, up to $725, less applicable taxes and withholding, for qualified associates who have been with us for at least a year.
The application window is anticipated to close within 30 days of the date of the posting.
Responsibilities
Responsible for working with network administrators, system administrators, developers, business managers, and end users to manage the security of the IT environment. The IT Security Engineer must stay abreast of evolving security issues and ensure the appropriate preventive and detective measures are in place. This role requires the ability to maintain the confidentiality of sensitive information. The role will oscillate, as needed, between supporting daily operational tasks (i.e. logs review, account management, AV threat management, etc.) and enterprise wide projects while keeping an eye toward reaching management goals for the organization-wide policies based on industry best practices. The role will require ongoing team building as well as information security administration.
Administers security infrastructure, such as firewalls, anti-virus, intrusion prevention systems, VPNs, SMTP gateway, SEIM, etc
Ensures that security configurations of key systems are properly implemented, monitored and reported.
Investigates and resolves incident tickets.
Provides technical support and consultation for enhancement of and change to network security configuration
Performs active tests; discovers vulnerabilities in information systems
Performs all security administration functions within Mission Critical maintenance of user profiles and roles
Assists the business in achieving security certifications (e.g. external - SOX and HIPAA, internal - network, database, end user computing) and evaluates compliance of IT Policies
Conducts risk assessments, compliance and control reviews for the organization
Reviews security settings with business process owners to ensure they are in compliance with company standards for segregation of duties.
This job description represents an overview of the responsibilities for the above referenced position. It is not intended to represent a comprehensive list of responsibilities. An associate should perform all duties as assigned by his/her supervisor.
Qualifications
Education and Experience
Associate Degree in the field of Computer Science preferred. Minimum of 5 or more years of progressive experience in IT engineering.
Certifications, Licenses, and Other Special Requirements
None
Management/Decision Making
Uses limited independent judgment to make decisions based on precedents and established guidelines. Solves problems using standard procedures and precedents. Knows when to refer issues to supervisor and when to handle them personally.
Knowledge and Skills
Has a working knowledge of a skill or discipline that requires basic analytic ability. Has an overall understanding of the work environment and process. Has working knowledge of the organization. Well-rounded understanding of technology, operations and key business processes. Strong knowledge of hardware, software, database, operating system and networking technologies. Track record demonstrating maturity and responsibility with an ability to work with confidential situations. Strong problem solving and analytical capabilities. Excellent written and verbal communication skills. Ability to write reports, business correspondence, and procedure manuals. Ability to effectively present information and respond to questions from groups of managers, clients, customers, and the general public. Ability to define problems, collect data, establish facts, and draw valid conclusions. Ability to interpret an extensive variety of technical instructions in mathematical or diagram form and deal with several abstract and concrete variables. Ability to compute rate, ratio, and percent and to draw and interpret bar graphs.
Physical Demands and Working Conditions
Standing
Requires interaction with co-workers, residents or vendors
Walking
Sitting
Use hands and fingers to handle or feel
On-Call on an as needed basis
Reach with hands and arms
Stoop, kneel, crouch, or crawl
Talk or hear
Ability to lift: Up to 25 pounds
Vision
Brookdale is an equal opportunity employer and a drug-free workplace.
$60k-81k yearly est. Auto-Apply 6d ago
Product Security Engineer
Ncontracts
Cyber security analyst job in Brentwood, TN
Remote | Product and Development | Full-Time
WHO WE ARE
Headquartered in Nashville, Tenn., Ncontracts leads the industry in integrated risk management and compliance solutions, serving over 5,000 financial institutions nationwide. As a seven-time Inc. 5000 Fastest Growing Companies honoree and consistent year-over-year recipient of "Best Places to Work" awards, we offer a thriving, work environment where career growth and life-work balance go hand in hand.
At Ncontracts, you'll join a team of industry experts dedicated to strengthening the financial services sector through innovation and thought leadership. We're seeking creative, collaborative, and self-driven professionals across all areas of our business - from developing cutting-edge solutions to sales, marketing, customer support, and beyond. Join us in our mission to make the financial industry stronger and more resilient, while advancing your career in a supportive, dynamic environment that values your unique skills and perspectives.
THE ROLE
We're looking for a Product Security Engineer to embed security throughout our software development lifecycle. You'll work closely with engineering teams to secure our financial services platform, with particular focus on emerging AI technologies including Agentic AI systems. This role offers the opportunity to shape security practices in a cutting-edge fintech environment.
WHAT YOU DO
Participate in security architecture reviews and threat modeling for new features and systems
Perform code reviews with focus on security vulnerabilities and best practices
Design and implement security controls for cloud infrastructure (AWS, Azure, GCP)
Participate in security assessments of AI/ML systems, including Agentic AI implementations
Contribute to secure coding guidelines and security testing frameworks
Integrate security tools into CI/CD pipelines (SAST, DAST, dependency scanning)
Collaborate with DevOps team on infrastructure-as-code security practices
Investigate and remediate security vulnerabilities across the technology stack
Create security documentation for development teams and architectural decisions
Support penetration testing activities and coordinate remediation efforts
Research emerging threats and security technologies, particularly in AI/ML space
WHAT YOU NEED
2+ years of experience in application security or product security engineering
Bachelor's degree in computer science, Cybersecurity, or related technical field
Strong programming skills in modern languages (Python, Ruby, Java, C#, JavaScript, PowerShell)
Strong database experience with proficiency in SQL and PostgreSQL
Deep understanding of web application security (OWASP Top 10, API security)
Experience with cloud security architectures and containerization (Docker, Kubernetes)
Experience with server administration across Linux and Windows environments
Knowledge of security testing tools and methodologies (SAST, DAST, penetration testing)
Experience applying risk assessment methodologies (DREAD, CVSS) to analyze security findings and establish data-driven remediation priorities
Understanding of secure software development lifecycle (SSDLC) practices
Experience with version control systems (Git) and CI/CD pipelines
Experience with infrastructure automation using Ansible
Demonstrated ability to communicate technical security concepts to diverse stakeholders and influence remediation efforts
Self-motivated with ability to work independently and drive security initiatives to completion
Experience collaborating with development teams to implement security fixes
NICE TO HAVE
Professional certifications (SAA-C03, PJPT, CSSLP, CEH, OSCP, AZ-400, AWS DevOps, or equivalent)
Experience with AI/ML security, including model security and adversarial attacks
Knowledge of financial services security requirements and data protection
Experience with infrastructure-as-code tools (Terraform, CloudFormation)
Background in threat modeling frameworks (STRIDE, PASTA, OCTAVE)
Experience with security orchestration and automation platforms
WE OFFER
A fun, fast-paced work environment
Responsible PTO Plan that meets or exceeds state and local medical and family leave laws
11 paid holidays
Community and social events to keep you connected and engaged
Mental Health Benefits
Medical, Dental and Vision insurance
Company-paid Group Life Insurance, Short- and Long-Term Disability
Flexible Spending Account & Health Savings Account
Aflac Benefits - Critical Illness, Cancer Protection, & Hospital Choice
Pet Insurance
401 (k) with company match with eligibility on Day 1 of employment
2 Paid Volunteer Time Off Days
And much more!
Compensation Information
Pursuant to state and local law disclosure requirements, the pay range for this role, with final offer amount dependent on education, skills, experience and location is $80,000 to $100,000 per year. This position may be eligible for an annual discretionary incentive award. The incentive award amount is dependent upon company performance and your personal performance and is not guaranteed.
AAP/EEO Statement
Ncontracts provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Other Duties
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.
$80k-100k yearly Auto-Apply 60d+ ago
Security Engineer
Lattimore Black Morgan & Cain, PC and Affiliates
Cyber security analyst job in Brentwood, TN
The Security Engineer is responsible for ensuring that technical and procedural security controls are established and maintained within the organization and complies with a variety of security requirements as well as industry best practices. The position works closely with the Information Security Officer, IS leadership, and team members to implement and maintain security and compliance across LBMC.
The Security Engineer will assist in managing Security Systems such as various endpoints, network logging, monitoring, physical access methods, and preventive systems as needed. The Security Engineer must focus on continuous improvement of response capabilities through automation and critical thinking. The professional is responsible for scrutinizing malware, targeted attacks, and intrusion detection. The Security Engineer will identify, investigate, and respond to information security alerts. They play an active role in searching through datasets, alerts, and notifications to detect any threats and anomalies. The security engineer will help resolve any issues related to network perimeter and security infrastructure devices. They must help resolve Windows and other security vulnerabilities.
The Security Engineer must be able to dissect network, host, memory, and other artifacts that are originating from multiple operating systems and applications. The engineer will perform enterprise-wide operations to identify any undetected threats. It is the responsibility of the security engineer to develop alerting and detection strategies to investigate any unusual behavior. They must develop new defensive techniques to recognize any changes in adversary techniques and tactics.
The Security professional must be involved in incident response and investigations. The Information Security Engineer may suggest tools and techniques to achieve security goals. The Security Engineer may perform well-researched security enhancement suggestions to the ISO which meet security standards that protect the organization from possible security breaches.
Essential Responsibilities
* Security Alerts: Review, respond, and remediate where applicable;
* Vulnerability remediation (may also be tasked with vulnerability administration, enhancements, scans, and automation development opportunities);
* Phish campaign monitoring and resolution;
* Analyze security systems and seek improvements on a continuous basis;
* Report possible threats or software issues;
* Research weaknesses and determine ways to counter them;
* Understand software, hardware, and internet needs while adjusting them according to our business environment;
* Assist fellow employees with cybersecurity, software, hardware, or IT needs;
* Carry out and support information security plans and policies;
* Respond to, investigate, and assist in recovery efforts related to a security breach;
* Assist in Security Awareness training development and support;
* Troubleshoot security and network problems;
* Ensure the organization's data and infrastructure are protected by enabling and/or recommending appropriate security controls;
* Participate and follow the change management process;
* Daily administrative tasks, reporting, and communication within Information Security as well as relevant departments within the organization, as needed or directed;
* Administer, configure, and troubleshoot security infrastructure devices such as Varonis;
* Test new software and firmware, as needed or directed.
Operational Management
* Work closely with IS Engineering, Security Engineers/Analysts, and other IS departments on corporate technology development to fully secure information, computer, network, and processing systems;
* Recommend and implement changes, where appropriate, related to security policies and practices in accordance with changes in local and federal law;
* Creatively provide resolution to security issues/problems in a cost-effective manner;
* Collaborate with the Information Security Officer to establish and maintain systems for ensuring security and privacy policies are met.
* Other security responsibilities as directed by the Information Security Officer
Other Qualifications
* Minimum of 1 - 3 years progressive experience in Cybersecurity technology development/engineering, with an emphasis on cybersecurity technology installations projects, administration, development, support, and related security tools/technology implementations;
* Position requires a 4-year degree in Information Systems, Computer Science, Information Security or similar. An equivalent combination of education and experience will be considered;
* For those not meeting the minimum education, additional work-related experience will be deemed equivalent;
* CISSP or related certification is an advantage;
* Strong knowledge of core IT and Security infrastructures including Active Directory, Azure AD, Microsoft Windows security controls, SIEM, AV/EDR [specifically Microsoft o365/E5], IPS, PIM, PAM, IAM, Certificate Management, vulnerability scanners, etc.;
* Working knowledge and experience in the following areas:
* Cloud computing security in Azure/Windows environments, security controls, security capabilities identification;
* Experience in working on Microsoft products and can learn new systems quickly;
* Experience with Nessus, Sentinel, Log Analytics, M365 Security stack, penetration testing, security patching, AppLocker, etc.;
* Strong verbal and written communication skills required;
* Must be able to handle multiple, simultaneous tasks effectively and efficiently while maintaining a professional, courteous manner;
* Must be able to work well with others;
* Must be detail oriented and organized;
* High integrity, including maintenance of confidential information;
* Must be able to exercise good judgement and positively influence others, including handling confrontations/conflict with poise and efficiency;
* Focus on continuously improving skillset to meet security changes and challenges;
* Based on business need, ability to work a flexible schedule, including some evenings and weekends as approved in advance or as required to support a security issue;
* Regular and reliable attendance required.
$73k-99k yearly est. 34d ago
Information Security and Fraud Analyst
First Farmers 3.5
Cyber security analyst job in Columbia, TN
Education Level: (1) A bachelor's degree, or (2) achievement of formal certifications recognized in the industry as equivalent to a bachelor's degree (e.g. information technology certifications in lieu of a degree). Preferred Certifications include Security+ (CompTIA), CySA+ (CompTIA), or SSCP (ISC 2).
Job Type: Full Time
VEVRAA Federal Contractor
Request Priority Referral of Protected Veterans
EOE Protected Veterans/Disabled
Robert C. Matthews, email: *******************************
Role:
The Information Security and Fraud Analyst is responsible for developing and managing appropriate security measures for the bank's information systems, managing third-party vendor security risk, and investigating incidents of fraud and attempted fraud.
Essential Functions & Responsibilities:
E 35% Risk Management. Coordinates organizational risk assessments. Performs third party vendor risk assessments. Conducts information security Vendor Risk Assessments (VRA) on all in-scope third-party requests. Communicates at all levels and with all business units in providing support in the onboarding of third-party vendors with respect to the assessment of Information Security posture of the vendor. Creates and manages relationships with business units and stakeholders of the Third-Party Vendor Risk Management process. Performs assessment of third-party security and related due diligence documentation (such as SOC).
E 30% Information Security. Monitors computer networks for security issues. Documents and investigates security breaches and other cybersecurity incidents. Stays current on IT security trends and news. Develops company-wide best practices for IT security. Research security enhancements and makes recommendations to management. Implements both internal and external security audits. Analyzes security issues thoroughly to identify the root cause.
E 30% Fraud Investigations. Assists in the investigation of fraud incidents and recovery of funds; Maintains records of incidents, losses, recoveries, and prevention. Provides customer education to increase awareness of the fraud risk and effective techniques customers can use to mitigate the risk. Coaches staff on determination of fraud incidents and communication with customers. Interacts with external partners such as law enforcement agencies, vendors, and banks to validate information to check fraudulent activities.
N 5% Performs other related duties as assigned or requested.
Performance Measurements:
1.
To comply with the letter and with the spirit of the bank's Code of Business Conduct and Ethics
2.
To ensure that the bank suffers no losses due to failure to comply with operational procedures.
3.
To provide friendly, professional, and accurate service and support to all customers both internal and external.
4.
To maintain and build knowledge of auditing procedures through continued learning and research.
5.
To acquire and maintain a working knowledge of regulations and bank procedures; to comply with the provisions of the Bank Secrecy Act and other laws and regulations.
6. To maintain the confidentiality of customer and any other sensitive information.
7.
To complete required training and undertake additional training as needed to increase job knowledge and maximize productivity.
Knowledge and Skills:
Experience
Three yeas to five years of similar or related experience.
Education
(1) A bachelor's degree, or (2) achievement of formal certifications recognized in the industry as equivalent to a bachelor's degree (e.g. information technology certifications in lieu of a degree). Preferred Certifications include Security+ (CompTIA), CySA+ (CompTIA), or SSCP (ISC 2).
Interpersonal Skills
Work involves much personal contact with others inside and/or outside the organization for the purpose of first-level conflict resolution, building relationships, and soliciting cooperation. Discussions involve a higher degree of confidentiality and discretion, requiring diplomacy and tact in communication.
Other Skills
1. Knowledge in all areas of accounting and audit procedures and the ability to work independently.
2. Working knowledge of spreadsheets and word processing software; must be able to use PC and other types of general office equipment.
Physical Requirements
The person in this position needs to frequently move about inside the office to interact with associates or clients and access office machinery and file cabinets. The person in the position constantly operates a computer and other office productivity machinery, such as a calculator, photocopier, and printer.
Work Environment
This job operates in a professional office environment and may require travel to branches and other locations. This role routinely uses standard office equipment such as calculators, computers, phones, photocopier, filing cabinets and fax machines.
$57k-81k yearly est. Auto-Apply 6d ago
Physical Security Systems Engineer
xAI
Cyber security analyst job in Memphis, TN
xAI's mission is to create AI systems that can accurately understand the universe and aid humanity in its pursuit of knowledge. Our team is small, highly motivated, and focused on engineering excellence. This organization is for individuals who appreciate challenging themselves and thrive on curiosity. We operate with a flat organizational structure. All employees are expected to be hands-on and to contribute directly to the company's mission. Leadership is given to those who show initiative and consistently deliver excellence. Work ethic and strong prioritization skills are important. All engineers are expected to have strong communication skills. They should be able to concisely and accurately share knowledge with their teammates.
About the Role
As a Physical Security Systems Engineer at xAI, you'll design, implement, and maintain advanced security systems to safeguard our facilities, assets, and personnel. Working onsite in Memphis, Tennessee, you'll tackle complex challenges, leveraging your deep expertise in security technologies to strengthen our infrastructure at a fast-scaling company. Expect to dive into system optimization, ensure robust protection, and travel regularly to xAI sites to support our mission of accelerating human scientific discovery through AI.
This is an in-person role based in Memphis, Tennessee, with regular travel required to all xAI sites.
Responsibilities
Develop detailed design plans for the installation of physical security systems including access control, surveillance cameras, intrusion detection, and alarm systems.
Collaborate with InfoSec, IT and facility management teams to integrate security hardware with existing systems across locations.
Manage health and configuration of security network infrastructure
Regularly assess the performance of installed security systems and make necessary adjustments or upgrades.
Conduct preventive maintenance to ensure all security equipment is in optimal working condition.
Diagnose and resolve hardware issues promptly to minimize downtime and security risks.
Keep detailed records of all service and maintenance activities.
Participate in or lead security audits to identify vulnerabilities in physical security measures.
Recommend and implement solutions to address identified security gaps.
Liaise with vendors for procurement of security hardware, ensuring compliance with organizational standards and budget constraints.
Manage relationships with external contractors for installation and maintenance services.
Train security and facility staff on the use of new security systems.
Ensure all security hardware installations meet local, state, and federal regulations.
Maintain up-to-date documentation on system configurations, maintenance schedules, and security incident responses.
Required Qualifications
Minimum of 5 years in a role focused on physical security systems design.
Proven experience with CCTV, access control, and intrusion detection systems.
Experience using CAD software and reading architectural drawings
Experience using Bluebeam software
Preferred Qualifications
Bachelor's degree in Electrical Engineering, Computer Science, or related field; or equivalent experience in security systems.
Ability to interpret security objectives, develop project schedules and manage adherence to established timetables.
Familiarity with Genetec software is a plus.
Proficiency in hardware troubleshooting and system diagnostics.
Experience configuring security and network architecture in integrated security systems.
Familiarity with current security technology trends and innovations.
Certifications such as CPP (Certified Protection Professional) or PSP (Physical Security Professional) are highly desirable.
Excellent problem-solving abilities and attention to detail.
Strong communication skills for effective collaboration with team members and stakeholders.
Ability to work under pressure in a dynamic environment on highly condensed timelines.
Regular sitting at a desk or computer for extended periods, typing and writing. Occasionally walking, around the facility and standing.
xAI is an equal opportunity employer. For details on data processing, view our
Recruitment Privacy Notice.
How much does a cyber security analyst earn in Clarksville, TN?
The average cyber security analyst in Clarksville, TN earns between $60,000 and $107,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Clarksville, TN