Post job

Cyber security analyst jobs in Collierville, TN

- 340 jobs
All
Cyber Security Analyst
Information Security Analyst
Cyber Security Engineer
Security Engineer
Security System Engineer
Information Security Engineer
Senior Security Engineer
Network Security Consultant
Information Systems Security Officer
Senior Cyber Security Analyst
Senior Information Security Analyst
Securities Analyst
Defense Analyst
Senior Security Analyst
Data Security Analyst
  • Cyber Security Engineer

    Patriot Talent Solutions

    Cyber security analyst job in Knoxville, TN

    Knoxville, TN | Cybersecurity Engineer | Full-time We are actively recruiting a Cybersecurity Engineer for our client in Knoxville, TN. This is a hybrid direct placement opportunity that will require some onsite work in Knoxville. The successful candidate will be responsible for the design, implementation, and ongoing management of advanced cybersecurity measures to protect sensitive data, systems, and networks. This role involves hands-on work with a wide range of security technologies, development and enforcement of security protocols, and proactive risk mitigation. The engineer collaborates with cross-functional IT teams to integrate security solutions into enterprise projects and ensure compliance with applicable regulatory requirements, including HIPAA. Must have a minimum of five years' experience in cybersecurity engineering, with a proven track record in designing and implementing security solutions within an enterprise environment. Due to client request, candidates must be eligible to work in the United States without sponsorship. Equal Opportunity Employer/Veterans/Disabled
    $69k-94k yearly est. 1d ago
  • Senior Cloud Security Engineer

    Pyramid Consulting, Inc. 4.1company rating

    Cyber security analyst job in Missouri

    Immediate need for a talented Senior Cloud Security Engineer . This is a 04 months contract opportunity with long-term potential and is located in Elkhorn,NE(Remote). Please review the job description below and contact me ASAP if you are interested. Job ID:25-94911 Pay Range: $90 - $91.19/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location). Key Responsibilities: Deploy and configure container scanning tools to ensure secure containerized environments. Analyze vulnerabilities identified through SAST, DAST, SCA, and container scans, prioritizing remediation based on risk. Develop and maintain custom scripts to automate security processes and enhance scanning capabilities. Consult with development teams to provide secure coding guidance and assist with remediation strategies. Onboard applications into DAST scanning workflows, ensuring proper configuration and coverage. Configure and troubleshoot DAST scans, resolving issues related to application accessibility and scan accuracy. Review and validate SAST and SCA findings, confirming or rejecting false positives and “mitigated by design” claims from development teams. Document findings, create actionable reports, and communicate technical details effectively to stakeholders. Key Requirements and Technology Experience: Key Skills; Strong experience with application security tools: DAST (e.g., Burp Suite, OWASP ZAP), SAST (e.g., Checkmarx, Veracode), and SCA (e.g., Black Duck, Snyk). Hands-on experience with container security and deployment of scanning tools (e.g., Wiz, Prisma, Aqua Security). Proficiency in scripting languages (Python, Bash, or PowerShell) for automation and tool integration. Deep understanding of secure software development lifecycle (SDLC) and common vulnerabilities (OWASP Top 10). Strong experience with application security tools: DAST (e.g., Burp Suite, OWASP ZAP), SAST (e.g., Checkmarx, Veracode), and SCA (e.g., Black Duck, Snyk). Hands-on experience with container security and deployment of scanning tools (e.g., Wiz, Prisma, Aqua Security). Proficiency in scripting languages (Python, Bash, or PowerShell) for automation and tool integration. Deep understanding of secure software development lifecycle (SDLC) and common vulnerabilities (OWASP Top 10). Ability to troubleshoot complex scanning issues and optimize configurations for accuracy and performance. Strong analytical skills for vulnerability triage and risk prioritization. Excellent communication skills for consulting with development teams and explaining technical findings. Experience integrating security tools into CI/CD pipelines. Familiarity with cloud-native security (AWS, Azure, GCP) and container orchestration (Kubernetes). Knowledge of API security testing and microservices architecture. Exposure to DevSecOps practices and security automation frameworks. Relevant certifications such as OSWE, GWAPT, or CSSLP. Our client is a leading Financial Industry, and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration. Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, colour, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. By applying to our jobs you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here.
    $90-91.2 hourly 3d ago
  • Security Analyst

    Medasource 4.2company rating

    Cyber security analyst job in Nashville, TN

    Jr. Security Analyst Our client is currently looking for a Jr. Security Analyst to join their team in a long term contract capacity focusing on an increase in compliance and audit work heading into the new year. This person will be brought on to support an established information security and compliance team. This role is ideal for someone looking to grow in TPA (Third Party Assessment), audit support, compliance operations, NIST frameworks, and GRC practices. Below is a breakdown of what our enterprise client is looking for in their potential candidate! Key Responsibilities Support Third Party Assessments (TPAs) by gathering evidence, tracking documentation, and helping review vendor security controls. Participate in internal and external audit readiness tasks including evidence collection, control testing preparation, remediation tracking, and audit log review coordination. Assist with vulnerability scan reporting, ticket creation, and follow-up with technical teams on remediation tasks. Support intake, documentation, and status tracking of new compliance and security projects. Help maintain dashboards, risk registers, and compliance reporting metrics within the GRC tool. Participate in annual assessment activities including contingency plan exercises, incident response tests, access reviews, and other required security program tasks. Assist with audit log reviews and routine monitoring processes as assigned. Maintain structured, accurate documentation to support continuous compliance efforts. Minimum Qualifications 1-3 years of experience in security, IT, audit, or compliance support roles (internships or rotational experience accepted). Foundational knowledge of NIST frameworks, FISMA requirements, or other security compliance standards (HIPAA, SOC 2, ISO 27001 a plus). Experience with GRC platforms (ServiceNow, Archer, OneTrust, ZenGRC, etc.) OR strong interest in learning. Strong attention to detail with the ability to create, edit, and maintain structured documentation. Proficiency with Microsoft Office and basic workflow tracking tools (Excel, SharePoint, Confluence, Smartsheet, etc.). Familiarity with basic cybersecurity terminology and frameworks (e.g., CIS Controls). Experience supporting compliance evidence collection or policy documentation. Interest in security governance, risk, and compliance as a long-term career path.
    $66k-89k yearly est. 4d ago
  • Endpoint Security Engineer #10904

    ECCO Select 4.8company rating

    Cyber security analyst job in Kansas City, MO

    ECCO Select is a talent acquisition and consulting company specializing in people, process and technology solutions. We provide the talent behind the technology enabling our clients to achieve their goals. For more information about ECCO Select, visit us at ******************* Position Title: Endpoint Security Engineer Location Information Kansas City Metro (Onsite) Position Responsibilities: The Endpoint Security Engineer will play a critical role within the IT security and operations team, responsible for the administration, implementation, and continual improvement of endpoint security solutions-primarily utilizing Microsoft Intune. The ideal candidate must possess advanced expertise in Intune for Mobile Device Management (MDM) and Mobile Application Management (MAM), and be prepared to respond to security incidents beyond regular business hours. Experience with Jamf in Apple environments is an advantage. Design, deploy, and manage the organization's Microsoft Intune environment for both corporate-owned and BYOD (Bring Your Own Device) devices, ensuring a secure yet seamless user experience. Develop and maintain solutions for device enrollment, authentication, and complete lifecycle management utilizing Intune, while leveraging Jamf for Apple device environments when required. Configure, optimize, and monitor Microsoft Intune settings for MDM and MAM across Windows, Android, and iOS devices to ensure security and compliance. Establish and enforce device compliance policies, security baselines, encryption protocols, and remote wipe capabilities for rapid incident response. Manage application deployment, app protection policies, and conditional access requirements via Intune and related tools. Continuously monitor the performance of security solutions via analytics, logs, and user feedback; proactively identify areas for improvement to enhance protection and efficiency. Lead or contribute to large-scale device migrations, OS upgrades, and mobility transformation projects, ensuring minimal business impact and service continuity. Regularly monitor, investigate, and respond to endpoint threats, vulnerabilities, and anomalies; promptly remediate endpoint security incidents and collaborate with SOC and IT support teams for escalated security issues and rapid resolution. Ensure that endpoint security implementations meet regulatory standards and internal governance requirements; stay up to date with relevant compliance frameworks (HIPAA, GDPR, SOC 2, etc.). Generate detailed reports on device compliance, application usage, and security incidents, supplying metrics and documentation for audits and stakeholders as required. Develop, refine, and deliver training sessions and materials for end-users and IT helpdesk staff on device enrollment, usage, and security best practices. Provide Tier 2/3 support for complex endpoint security, mobility, and compliance issues; serve as a subject matter expert for cross-functional teams implementing security initiatives. Promote a culture of continuous improvement by researching and recommending new endpoint security technologies, trends, and best practices; implement process and tool enhancements as appropriate. Essential Skills, Experience 3-5 years of hands-on experience in administering and supporting Microsoft Intune, Office 365, and enterprise device security solutions. Strong proficiency in configuring, managing, and troubleshooting Intune, Microsoft Endpoint Manager, and Azure Active Directory settings. Proven expertise in designing, deploying, and supporting MDM/MAM solutions for large enterprise environments. Comprehensive understanding of endpoint security principles, including antivirus, EDR, encryption, secure authentication, and access controls. Practical experience with endpoint compliance and governance requirements; strong working knowledge of frameworks such as HIPAA, GDPR, or SOC 2 and involvement in audit processes. Familiarity with automation and scripting tools (e.g., PowerShell, Bash) for task automation, device management, and mobile application deployment. Demonstrated ability to manage multiple complex projects simultaneously, with excellent organizational, analytical, and documentation skills. Knowledge of Active Directory, Group Policy Objects (GPO), and remote support tools for user and device management. Exceptional interpersonal and communication skills, with a proven track record of successful cross-functional collaboration and the ability to operate independently or as part of a team. Preferred: Hands-on experience with Jamf administration for mac OS and iOS device management, including policy configuration and endpoint protection. Preparedness to provide support and incident response outside normal business hours as needed. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field (advanced degrees or relevant certifications are a plus). Preferred certifications: Microsoft Certified (Intune, Azure, or Endpoint Manager), Jamf Certification. ECCO Select is committed to hiring and retaining a diverse workforce. Our policy is to provide equal opportunity to all people without regard to race, color, religion, national origin, ancestry, marital status, veteran status, age, disability, pregnancy, genetic information, citizenship status, sex, sexual orientation, gender identity or any other legally protected category. Veterans of our United States Uniformed Services are specifically encouraged to apply for ECCO Select opportunities. Equal Employment Opportunity is The Law This Organization Participates in E-Verify
    $71k-91k yearly est. 1d ago
  • Security Engineer - Threat & Vulnerability

    Ztek Consulting 4.3company rating

    Cyber security analyst job in Saint Louis, MO

    We are seeking a Security Engineer II to support threat and vulnerability management across on-premises and cloud environments. This role focuses on identifying security risks, assessing vulnerabilities, ensuring secure configurations, and driving remediation efforts to improve overall security posture. Key Responsibilities: Identify, assess, and remediate vulnerabilities across on-prem and cloud environments (AWS/Azure/GCP) Monitor and analyze threat intelligence using frameworks such as MITRE ATT&CK, OWASP, and CVSS Utilize vulnerability and cloud security tools (Tenable, Qualys, Rapid7, Prisma Cloud, Defender for Cloud, Wiz) Perform secure configuration audits using CIS Benchmarks, NIST, and STIGs Collaborate with IT, Cloud, and DevOps teams to implement remediation Automate security processes using scripting (Python, PowerShell, Bash) Track remediation progress and communicate risks to technical and non-technical stakeholders Required Skills & Experience: 4+ years of experience in Cybersecurity or IT with exposure to vulnerability or cloud security Hands-on experience with vulnerability management tools Strong understanding of security controls, risk management, and compliance Experience with scripting/automation and API integrations Familiarity with SIEM, logging, monitoring, and ticketing systems
    $75k-102k yearly est. 3d ago
  • CI Cyber Threat Analyst IV

    Techguard Security 3.6company rating

    Cyber security analyst job in Saint Louis, MO

    Job Description Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements: Duties: Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable): Threat data collected and reported by NGA Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTs). Imagery when available. Information that can be used to inform security decisions. Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decision makers. Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decisions. Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include: Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products. Raw and finished Intelligence reported by Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA. Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross referencing local information reporting with Intelligence Community reporting. Clear and concise writing to briefly convey threat. Responsiveness to Intelligence Community priority collections requirements. Timeliness. Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross). Provide Technical CI advise and expertise in support of CI inquiries, operations and issues. Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners. Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers. Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner. Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages. Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats). Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards. Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing. Display an ability to collaborate with internal NGA and external IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. Skills and Experience Required: Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations. Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level. Desired: Be a credentialed graduate of an accredited federal or DoD CI training academy. Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines. Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines. Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov. Experience translating Government vision into understandable and achievable measures. Experience in using supervisory skills to coach teammates to achieve objectives. Monitor and track progress toward achievable measures.
    $69k-91k yearly est. 25d ago
  • Cyber Security Training

    Learnkwik.com

    Cyber security analyst job in Kansas City, MO

    Kanshe Infotech is Consulting Firm Which Provides World online training. Online Training (Remote Training + Real-time exp) available. Our training is more than just hours of lecture, we believe in student engagement, motivation and knowledge sharing as tools for success and we do it with great dedication and precision. We offer online training that clearly stands out of the group, sign up for a demo session. Job Description Our Training Features: · You will receive top quality instruction that Kanshe Infotech is famous for Online IT training. · Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue. · Training sessions are conducted by real-time instructor with real-time examples. · Every training session is recorded and posted to the batch after each weekend class. · We are offering online training on Cyber Security. . Provide OPT Stem Ext.: Guidance and support for applying for the 24-month OPT STEM extension Help with OPT Employment letter: Help with drafting and obtaining OPT employment letters that meet USCIS requirements. · We provide training in technology of your choice. · Good online training virtual class room environment. · Highly qualified and experienced trainers. · Professional environment. · Special interview training · Training for skill enhancement. · Study material and Lab material provided. · E-Verified company. If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates. Thanks Additional Information All your information will be kept confidential according to EEO guidelines.
    $65k-87k yearly est. 18h ago
  • Cyber Security Vulnerability Analyst

    ITR 4.2company rating

    Cyber security analyst job in Oak Ridge, TN

    Job DescriptionEast Tennessee company is seeking a Cyber Security Vulnerability Analyst to perform defensive cyber operational tasks, respond to reported incidents, and track remediation of client system vulnerabilities to include industrial control systems. The ideal candidate will be an experienced analyst with a strong background in addressing network vulnerabilities and conducting incident response activities. This is a full-time, hybrid position that will work onsite in Oak Ridge, TN 2-3 days each week. Job Responsibilities: • Join the Defensive Cyber Operations Group's multi-disciplinary team in responding to advanced Cyber threats from targeted phishing to network-based threats, ransomware, and APT-level activity in a Tier 2 role. • Mentor the DCO's junior staff, developing their technical and incident resolution skills. • Participate in incident response activities involving multiple teams and functions. • Serve as primary coordinator for ORNL response to federal Binding Operational Directives and data calls. • Leverage internal and external vulnerability scanning scan data to maintain a comprehensive view of ORNL's threat profile and risk status. • Automate key DCO functions using Tines technology • Partner with Emerging Threat team to remediate extant vulnerabilities identified by their intelligence activities. • Maintain strong collaborative and data sharing relationships with DOE headquarters Cyber units, other DOE laboratories, and external entities. • Leverage EDR, SIEM, IDS, and PCAP tools to identify and investigate cyber threats. • Assist users with the creation, monitoring, and evaluation of policy and device exceptions. • Assist in training and awareness activities to ensure ORNL staff are aware of Cyber Security responsibilities and requirements. • Partner with Cyber Industrial Control System Engineers to monitor the lab's ICS enclaves for operational and security issues Candidates must be able to obtain a federal security clearance so US citizenship is required.
    $69k-95k yearly est. 2d ago
  • Temporary- Cyber Security Analyst

    Tennessee Board of Regents 4.0company rating

    Cyber security analyst job in Nashville, TN

    Title: Temporary - Cyber Security Analyst Under the directive of the Information Security Officer, the cyber security analyst will implement security strategies and best practices in accordance with regulatory standards. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned. REQUIRED QUALIFICATIONS High School Diploma or GED One year of experience in information security and compliance regulations. Proficiency with Microsoft applications. PREFERRED QUALIFICATIONS Certificate in information security, i.e., Security+, Pen+, Ethical Hacker. Experience with SIEM (Microsoft Defender). Experience in phishing campaign/training. KNOWLEDGE, SKILLS AND ABILITIES Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of Information Security Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels. Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures. Open Until Filled: Yes Rate of Pay: $20.00 per hour Work Hours: Up to 28 hours per week Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check. Nashville State offers flexible work arrangements for positions that qualify.
    $20 hourly 60d+ ago
  • Temporary- Cyber Security Analyst

    The College System of Tennessee 3.9company rating

    Cyber security analyst job in Nashville, TN

    Title: Temporary - Cyber Security Analyst Under the directive of the Information Security Officer, the cyber security analyst will implement security strategies and best practices in accordance with regulatory standards. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned. REQUIRED QUALIFICATIONS High School Diploma or GED One year of experience in information security and compliance regulations. Proficiency with Microsoft applications. PREFERRED QUALIFICATIONS Certificate in information security, i.e., Security+, Pen+, Ethical Hacker. Experience with SIEM (Microsoft Defender). Experience in phishing campaign/training. KNOWLEDGE, SKILLS AND ABILITIES Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of Information Security Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels. Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures. Open Until Filled: Yes Rate of Pay: $20.00 per hour Work Hours: Up to 28 hours per week Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check. Nashville State offers flexible work arrangements for positions that qualify.
    $20 hourly 60d+ ago
  • Cyber Security Engineer

    Manpowergroup 4.7company rating

    Cyber security analyst job in Memphis, TN

    Our client, a leading financial services organization, is seeking a Cyber Security Engineer - Threat Management to join their team. As a Cyber Security Engineer, you will be part of the Cyber Security Department supporting the Threat Management and Incident Response teams. The ideal candidate will have strong analytical skills, attention to detail, and excellent communication abilities which will align successfully in the organization. **Job Title: Cyber Security Engineer - Threat Management** **Location: Onsite - Memphis TN, Raleigh or Charlotte NC, Dallas TX, Birmingham AL, New Orleans or Lafayette LA** **Employment Type: FTE Direct Hire** **What's the Job?** + Respond to SOC alerts, perform analysis, and contain security events. + Provide Tier II support for escalated security incidents. + Support the Cyber Incident Response Team (CIRT) in detection, analysis, and containment of attacks. + Operate configuration and file integrity management programs to track changes and deviations. + Collect and analyze threat intelligence, create actionable intelligence products using MITRE ATT&CK Framework. **What's Needed?** + Minimum 3 years of experience in cyber threat or information security. + Familiarity with compliance regulations (SOX, PCI-DSS, GLBA, Federal Banking). + Proficiency in cloud security and incident response in Azure. + Knowledge of configuration management and file integrity tools (e.g., Tripwire). + Security certifications (CISSP, GSEC, GCIH, CEH) preferred but not required **What's in it for me?** + Opportunity to work with cutting-edge security tools and frameworks. + Collaborative team environment with strong professional integrity. + Exposure to enterprise-level cloud and on-prem security operations. + Professional development and certification support. + Competitive compensation and benefits package. If this is a role that interests you and you'd like to learn more, click apply now and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you! **About ManpowerGroup, Parent Company of:** **Manpower, Experis, Talent Solutions, and Jefferson Wells** _ManpowerGroup (NYSE: MAN), the leading global workforce solutions company, helps organizations transform in a fast-changing world of work by sourcing, assessing, developing, and managing the talent that enables them to win. We develop innovative solutions for hundreds of thousands of organizations every year, providing them with skilled talent while finding meaningful, sustainable employment for millions of people across a wide range of industries and skills. Our expert family of brands -_ **_Manpower, Experis, Talent Solutions, and Jefferson Wells_** _-_ creates substantial value for candidates and clients across more than 75 countries and territories and has done so for over 70 years. We are recognized consistently for our diversity - as a best place to work for Women, Inclusion, Equality and Disability and in 2022 ManpowerGroup was named one of the World's Most Ethical Companies for the 13th year - all confirming our position as the brand of choice for in-demand talent. ManpowerGroup is committed to providing equal employment opportunities in a professional, high quality work environment. It is the policy of ManpowerGroup and all of its subsidiaries to recruit, train, promote, transfer, pay and take all employment actions without regard to an employee's race, color, national origin, ancestry, sex, sexual orientation, gender identity, genetic information, religion, age, disability, protected veteran status, or any other basis protected by applicable law.
    $72k-96k yearly est. 9d ago
  • Information Security Analyst

    Hunter Fan Co 4.3company rating

    Cyber security analyst job in Memphis, TN

    WHAT YOU WILL DO Support a complex security architecture that includes but not limited to: Next generation firewalls, web filtering, e-mail security, DLP, Identity Access Management, Vulnerability management, Endpoint Protection, SIEM and forensic analysis Design and implement network security controls for multiple locations Lead large and complex projects while managing resources effectively. Develop and maintain appropriate Information Security technical documentation as well as providing reviews and updates of existing policies and procedures. Identify opportunities and recommend solutions for improving service, efficiency and effectiveness. Provide inputs for formulating security architecture recommendations and design of security services. Enforce the organization's security policies and mitigate security risks to preserve the confidentiality, integrity and availability of business services Provide IT support for end users as needed Requirements: BS degree in Information technology, computer science or relevant field preferred A minimum of 2 years' experience in a role as an IT Security professional Information Security Certifications like CISSP, GCIH, CCNA, Security+, CEH a plus Experience with supporting end users in a technical support role Experience with implementing security solutions in an enterprise environment Experience with network security management (Firewalls, Switches, IDS/IPS; VLAN, ACLs, NAC, SDWAN) Experience with security frameworks like NIST 800-171, ISO 27002 & CIS Experience with SOX audit and compliance requirement functions Strong written, oral, interpersonal and organizational skills; attention to detail; highly collaborative; ability to and interested in interacting with individuals at all levels of the organization Working knowledge of various privacy, risk and security standards and practices Experience in Cloud security (Azure & AWS) as plus
    $71k-97k yearly est. Auto-Apply 60d+ ago
  • Information Security Specialist

    Collabera 4.5company rating

    Cyber security analyst job in Saint Louis, MO

    Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers. Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations. For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US. Job Description Responsibilities: Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios. Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization Qualifications Required Skills/Experience • 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role • Knowledge of quantitative and qualitative risk evaluation methods • An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one • An ability to effectively influence others to modify their opinions, plans, or behaviors • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business • Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part • An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization • Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement Additional Information To set up an inerview for this position, feel free to contact: Imran Malek ************ *******************************
    $71k-97k yearly est. Easy Apply 18h ago
  • Analyst, Information Security

    Standard Aero 4.1company rating

    Cyber security analyst job in Maryville, TN

    Build an Aviation Career You're Proud Of At StandardAero, we use our ingenuity and know-how to find solutions for the simple to the most complex challenges in aviation. Together, we get the job done and done well. Our stability, resources, and respectful culture supports you in building a solid career with a great team you can count on day in and day out for the long term. Summary: As an IT Security Analyst position is a critical role in protecting StandardAero's business and technology operations. In this role you will be accountable in securing the enterprise technology and operations against an ever evolving and growing threat landscape. The role is an integral position in supporting StandardAero's global cyber-security defenses, providing tactical cyber security objectives and implementing the security strategy across the organization. What you'll do: Conduct risk and security assessments through vulnerability analysis and reporting Perform mitigation support for both internal and external security audits Investigate, analyze and document security incidents to identify and document the root cause Provides incident response support including mitigating actions to contain activity and facilitating forensics analysis when necessary Partner with IT Operation teams to remediate system vulnerabilities Participates in the production of documentation and management reporting Research security enhancements and make recommendations for improved policy and process Analyze IT requirements and provide objective advice on the use of new IT security offerings Stay up-to-date on information technology and cybersecurity trends and standards Other IT Security-related duties as required Capable of identifying, evaluating and mitigating significant risks within an enterprise. Strong working experience with Microsoft Office Suite. Strong oral and written communication skills and the ability to work well with people from many different disciplines with varying degrees of technical experience. Possess strong analytical skills attention to detail. Ability to prioritize assignments while working on multiple projects Ability to work independently and proactively to meet assigned objectives Flexible with the ability to multi-task, effectively prioritize and work under pressure Basic project management Design, implement, administer, support and maintain cybersecurity technology systems (Endpoint Protection, IDS/IPS, Web and Email Security, SIEM, Multi-Factor Authentication, Network Access Controls, DLP, etc.) Analyze, report and respond to security alerts within the various IT technologies and global locations Proactively remediate information technology security threats as a member of the security team Assist in the designing, documenting, architecting and implementing IT security measures and controls Provide support through ‘Threat Hunting' against anomalous behavior within the enterprise. Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources Threat mitigation; malicious code detection, response and prevention; operating system security oversight Minimum Qualifications: Bachelor's degree in Information Security, Computer Science, or a related field; equivalent experience may be considered. 5+ years of progressive experience in cybersecurity and IT, including hands-on security operations, threat detection, or engineering. 5+ years of experience in SIEM Administration, endpoint protection, vulnerability management tools, and security automation. 5+ years of experience of network and application security, threat actor tactics (MITRE ATT&CK), and incident response frameworks. 5+ years of experience working in regulated environments or with industry frameworks (e.g., NIST, ISO 27001, CIS, or CMMC). Preferred Qualifications: IT Security Certification, specifically GSEC, CEH, CISSO, CISA or CISSP, GCIA, OSCP and ITIL SDLC, and understand application security. Containerization and Development Security Operations Benefits that make life better: Comprehensive Healthcare 401(k) with 100% company match; up to 5% vested Paid Time Off starting on day one Bonus opportunities Health- & Dependent Care Flexible Spending Accounts Short- & Long-Term Disability Life & AD&D Insurance Learning & Training opportunities Raising the Standard of Excellence since 1911 With over a century of proven excellence, StandardAero has become an industry leader in MRO services and customized solutions in the aerospace field. Our shared values and learning-based culture inspire our team to exceed their potential and power our customers' missions worldwide. With on-the-job training, advancement opportunities, and excellent benefits, StandardAero invites you to experience a fulfilling and meaningful career with us. Inclusivity Is Our Standard It is StandardAero's policy to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information. Our supportive environment celebrates diversity with no room for harassment or discrimination of any kind. We invite you to bring your authentic self to our team and experience our welcoming culture.
    $73k-103k yearly est. Auto-Apply 54d ago
  • IAM Information Security Specialist V6W6W656

    AP Recruiters & Associates

    Cyber security analyst job in Kansas City, MO

    IAM Information Security Specialist Duration: 12 Months Overview of the Role: Our Client is currently seeking an Identity Access Management (IAM) Information Security Specialist that will have a strong emphasis on Cloud based IAM services. As a member of the team, your work will focus on IDaaS (Identity as a service) work using SaaS (Software as a Service) tools. As an IAM Information Security Specialist you will work with critical and sensitive information daily, and you will be relied upon to maintain critical security safeguards. Key Responsibilities: Develop and maintain comprehensive information security posture including rules, controls, and security safeguards. General activities such as Develop and maintain the information security posture (rules, controls, security safeguards, etc.) to protect information assets, and conducts reviews. Engineering activities such as facilitating and configuring application integrations, creation of IAM objects (users, groups, servicer accounts, API tokens, etc.), working incidents, following change management processes, and creating documentation. Required Skills & Qualifications: At least three years of related access control experience with a general understanding of provisioning within IDaaS and IAM systems preferred. Associate or Bachelors degree from an accredited college or university with specialization in an information technology field or equivalent combination of experience, education, and/or certification preferred. Intermediate understanding of computer applications such as Microsoft Office, internet navigation and email programs. Strong interpersonal, analytical and customer service skills and communication skills. Good business and organizational skills including the ability to prioritize, work within a team setting and manage work. Perks of Working with AP Recruiters & Associates: Competitive compensation (depending on experience) Comprehensive career development and professional growth opportunities Dedicated recruiter support throughout your contract journey Access to exclusive opportunities with Fortune 500 clients Flexible work arrangements and professional development resources About the Client: Our client is a leading energy company recognized as one of the largest electric utilities in the United States. They are committed to delivering clean, affordable, and reliable energy while driving innovation in sustainable power generation. The organization operates across multiple states, serving millions of customers and maintaining a strong focus on environmental stewardship, technological advancement, and community development. Their commitment to digital transformation and cybersecurity excellence makes this an exciting opportunity for security professionals.
    $68k-96k yearly est. 60d+ ago
  • Data Security Analyst

    The Timberline Group

    Cyber security analyst job in Saint Louis, MO

    Join our dynamic and thriving company as a Data Security Analyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning. What You'll Be Doing Monitor security service performance and availability: Provide recommendations on security equipment, software, and services On-going investigation: Inspect information security alarms and events to determine vulnerability and impact Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk Participate in architecture reviews: Ensure adherence to information security architecture Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to information security incidents Design and deliver programs: Create education and training programs on information security and privacy matters The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* ************************* "Delivering quality solutions through quality people"
    $64k-89k yearly est. Easy Apply 60d+ ago
  • Sr. Security Engineer

    Select Cyber

    Cyber security analyst job in Memphis, TN

    Our client, a large international Information Security Consulting organization, has asked to find a Senior\-Level security expert to lead a major SIEM migration. This is a highly visible role with mission critical responsibilities because you will play an integral part of a major multi\-year SOC transformation. STRONG SPLUNK UNDERSTANDING IS CRITICAL FOR THIS ROLE. Responsibilities of the SIEM Security Engineer: · Architect and manage SIEM technologies, specifically with ArcSight · Lead a s major SIEM migration into a Splunk environment (complete data migration). · Develop, tune, and maintain tools to automate analysis capabilities with host and log\-based security event analysis · optimize event ingestion, reporting and alerting · Create signatures, rule sets, and content analysis definitions for a variety of security detection capabilities · Manage project tasks, reporting, and customer meetings Requirements Requirements of the SIEM Security Engineer: · Splunk Web Framework (reports\/dashboards\/etc.) · Command line and console\-based troubleshooting · Custom parser creation for events in Syslog, ODBC, ad flat file formats · Splunk App creation and scripting experience (Python) · Relevant certifications such as CCNP, CCNA, SANS, CISSP, etc. · Experience supporting large scale SIEM migrations and project task management · Expert level knowledge of installing, deploying, documenting, and troubleshooting network perimeter security technologies such as firewalls, proxy servers, intrusion prevention\/detection (IDS\/IPS), antivirus, antimalware, anti\-spam and unified threat management (UTM). · A solid understanding of networking\/distributed computing environment concepts; understands principles of routing, client\/server programming, the design of consistent network\-wide file system layouts. Benefits A full and competitive benefits package is available with this role. "}}],"is Mobile":false,"iframe":"true","job Type":"Full time","apply Name":"Apply Now","zsoid":"613378118","FontFamily":"Verdana, Geneva, sans\-serif","job OtherDetails":[{"field Label":"Job Opening ID","uitype":111,"value":"ZR_37_JOB"},{"field Label":"Industry","uitype":2,"value":"Technology"},{"field Label":"City","uitype":1,"value":"Memphis"},{"field Label":"State\/Province","uitype":1,"value":"Tennessee"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"38103"}],"header Name":"Sr. Security Engineer","widget Id":"320100000000072311","is JobBoard":"false","user Id":"320100000000115003","attach Arr":[],"custom Template":"3","is CandidateLoginEnabled":false,"job Id":"320100000002195862","FontSize":"12","location":"Memphis","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do"}
    $83k-112k yearly est. 60d+ ago
  • Information Security Operations Analyst II

    Mastercard 4.7company rating

    Cyber security analyst job in OFallon, MO

    Our Purpose Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential. Title and Summary Information Security Operations Analyst IIOverview The Security Awareness team is looking for an Information Security Operations Analyst II to drive continued improvements to the education and training offerings we have for our Mastercard colleagues. Our award winning SecurIT First program must continue to remain relevant and effective in how we keep security awareness top of mind for all employees and contingent staff. The ideal candidate is passionate about the internal customer experience, is highly motivated, intellectually curious, analytical, and possesses an entrepreneurial mindset. Role In this Security Awareness position, you will: • Liaise between the Security Awareness team and all others at Mastercard. • Build new content and design awareness events to positively impact the security behaviors of Mastercard staff. • Partner with external providers to deliver effectives solutions with quality and integrity. • Manage our collaboration with the M&A Team and manage all Audit and Regulatory requests that come into our team. All About You The ideal candidate for this position should: • Possess advanced knowledge in security awareness concepts and principals. • Be comfortable meeting with business leaders to discuss and educate their teams about the desired security behaviors and how to influence and improve those behaviors. • Be able to identify appropriate security awareness solutions to further reduce the human risk at Mastercard. • Analyze, recognize and escalate trends in security behaviors and identify ways to improve our offerings. • Lead vendor relationships with those providers of contract solutions for the Security Awareness program. • A professional certification in Security Awareness is not required but highly encouraged. Corporate Security Responsibility Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: Abide by Mastercard's security policies and practices; • Ensure the confidentiality and integrity of the information being accessed. • Report any suspected information security violation or breach. • Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected information security violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Mastercard benefits for interns generally include: 56 hours of Paid Sick and Safe Time; jury duty leave; and on-site fitness facilities in some locations. Pay Ranges O'Fallon, Missouri: $76,000 - $127,000 USD
    $76k-127k yearly Auto-Apply 21d ago
  • Physical Security Systems Engineer

    xAI

    Cyber security analyst job in Memphis, TN

    xAI's mission is to create AI systems that can accurately understand the universe and aid humanity in its pursuit of knowledge. Our team is small, highly motivated, and focused on engineering excellence. This organization is for individuals who appreciate challenging themselves and thrive on curiosity. We operate with a flat organizational structure. All employees are expected to be hands-on and to contribute directly to the company's mission. Leadership is given to those who show initiative and consistently deliver excellence. Work ethic and strong prioritization skills are important. All engineers are expected to have strong communication skills. They should be able to concisely and accurately share knowledge with their teammates. About the Role As a Physical Security Systems Engineer at xAI, you'll design, implement, and maintain advanced security systems to safeguard our facilities, assets, and personnel. Working onsite in Memphis, Tennessee, you'll tackle complex challenges, leveraging your deep expertise in security technologies to strengthen our infrastructure at a fast-scaling company. Expect to dive into system optimization, ensure robust protection, and travel regularly to xAI sites to support our mission of accelerating human scientific discovery through AI. This is an in-person role based in Memphis, Tennessee, with regular travel required to all xAI sites. Responsibilities Develop detailed design plans for the installation of physical security systems including access control, surveillance cameras, intrusion detection, and alarm systems. Collaborate with InfoSec, IT and facility management teams to integrate security hardware with existing systems across locations. Manage health and configuration of security network infrastructure Regularly assess the performance of installed security systems and make necessary adjustments or upgrades. Conduct preventive maintenance to ensure all security equipment is in optimal working condition. Diagnose and resolve hardware issues promptly to minimize downtime and security risks. Keep detailed records of all service and maintenance activities. Participate in or lead security audits to identify vulnerabilities in physical security measures. Recommend and implement solutions to address identified security gaps. Liaise with vendors for procurement of security hardware, ensuring compliance with organizational standards and budget constraints. Manage relationships with external contractors for installation and maintenance services. Train security and facility staff on the use of new security systems. Ensure all security hardware installations meet local, state, and federal regulations. Maintain up-to-date documentation on system configurations, maintenance schedules, and security incident responses. Required Qualifications Minimum of 5 years in a role focused on physical security systems design. Proven experience with CCTV, access control, and intrusion detection systems. Experience using CAD software and reading architectural drawings Experience using Bluebeam software Preferred Qualifications Bachelor's degree in Electrical Engineering, Computer Science, or related field; or equivalent experience in security systems. Ability to interpret security objectives, develop project schedules and manage adherence to established timetables. Familiarity with Genetec software is a plus. Proficiency in hardware troubleshooting and system diagnostics. Experience configuring security and network architecture in integrated security systems. Familiarity with current security technology trends and innovations. Certifications such as CPP (Certified Protection Professional) or PSP (Physical Security Professional) are highly desirable. Excellent problem-solving abilities and attention to detail. Strong communication skills for effective collaboration with team members and stakeholders. Ability to work under pressure in a dynamic environment on highly condensed timelines. Regular sitting at a desk or computer for extended periods, typing and writing. Occasionally walking, around the facility and standing. xAI is an equal opportunity employer. California Consumer Privacy Act (CCPA) Notice
    $65k-90k yearly est. Auto-Apply 7d ago
  • Senior Security Analyst

    Firstbank 4.6company rating

    Cyber security analyst job in Nashville, TN

    Description Summary: This role supports the advancement of the organization's Information Security Program, ensuring robust protection of customer, consumer, and proprietary data against evolving threats. The position is a key player with strategic initiatives, enforces corporate and regulatory compliance, and continuously enhances security posture through proactive risk management and visibility improvements. Essential Duties and Responsibilities: Support the security strategies aligned with organizational goals. Lead or serve as a key participant in audits, regulatory examinations, and vendor assessments. Ensure compliance with industry standards and regulatory requirements. Maintain InfoSec dashboards using Power BI to track key metrics and identify trends. Provide actionable insights to leadership for continuous improvement of security controls. Implement and optimize security measures to reduce network risk and enhance visibility. Continuously improve security controls, policies, and procedures to address emerging threats. Manage and audit intrusion prevention systems, SIEM, antivirus, vulnerability management, and content filtering solutions. Oversee patch management for operating systems, applications, and hardware. Partner with technology and compliance teams to resolve security issues and implement strategic initiatives. Manage Data Security Posture Management (DSPM) and Data Loss Prevention (DLP) tools and associated governance controls. Education and/or Experience Bachelor's degree or equivalent experience 5+ years in Information Security or IT Audit, with demonstrated leadership in security strategy and risk management. CISSP required Skills and Abilities Ability to assess, prioritize, and mitigate risks across complex environments. Strong experience with audit processes, regulatory examinations, and vendor risk assessments. Skilled in translating technical data into actionable insights for leadership Ability to demonstrate the highest level of ethical behavior and confidentiality and maintain confidentiality with sensitive information. Respectful demeanor toward other associates and managers that promotes a positive and professional work environment. FirstBank does not accept unsolicited resumes from agencies and staffing firms. Recruitment agencies and consultants may not submit resumes directly to managers. FirstBank will not pay fees to any third-party agency or company that does not have a signed agreement as an approved vendor. FirstBank in an Equal Opportunity Employer, including disability.
    $82k-105k yearly est. Auto-Apply 38d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Collierville, TN?

The average cyber security analyst in Collierville, TN earns between $59,000 and $105,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Collierville, TN

$79,000
Job type you want
Full Time
Part Time
Internship
Temporary