Cyber Security Analyst II
Cyber security analyst job in Dover, DE
Cyber Security Analyst II Location: Hybrid - residing within commutable distance to Newark or Dover, DE
What makes us great
At the heart of our Company is a dedication to delivering energy that drives progress. We put people first, work to keep them safe and build trusting relationships.
Your role in our success:
This position will be responsible for protecting the corporation's critical information and assets by integrating cybersecurity risk management best practices throughout the enterprise. This position will be responsible for detection and analysis of opportunistic and persistent threats, deploying counter measures and conducting risk and vulnerability assessments across the enterprise (including cloud). As a specialist on the Cyber security team, you will participate in detection and response of cyber incidents, assist in recovery of operations and assist in formulating, updating, and communicating short- and long-term organizational cybersecurity strategies and policies. In addition, you will provide technical support to others on adjacent technical teams and the greater organization. The ideal candidate will have a thorough understanding of incident response protocol and have an understanding of nation state threat actors and their TTPs.
What you'll be working on:
Monitor and analyze security intel generated by company security controls. Lead triage, containment and eradication.
Participate in threat hunting activities and “deep dive” analysis to maintain a high degree of awareness on the current threat landscape.
Participate in simulated “adversary emulation” exercises and have working knowledge of Red Team tools such as Atomic Red Team and Caldera.
Provide effective incident response, by correlating intelligence from IPS systems, endpoints and third parties.
Administer security awareness training and enterprise vulnerability management solutions, as required.
Administer and maintain leading enterprise commercial endpoint and network based security solutions
Develop and produce reports on all activities and incidents to help maintain day to day status,
Develop and report on trends, and provide focus and situational awareness on all issues.
Maintain documentation for all systems and create user guides and standard operating procedures.
Adhere to enterprise change management procedures and corporate security policies, including SLAs for responding to cyber related incidents.
Responsible for tuning and filtering of events and information, creating custom views and content using all available tools following an approved methodology and with approval and concurrence from management.
Maintain system baselines and configuration management items, including security event monitoring “policies” in a manner determined and agreed to by management.
Ensure changes are made using an approval process agreed to in advance.
Produce reports identifying significant or suspicious security events to appropriate parties. Include latest security threat information and tie back to specific intrusion sets of nation state actors when possible.
Additional Responsibilities
Maintain knowledge of the current threat landscape via OSINT.
Maintain proficiency and skills through relevant training, conventions, conferences, and on-the-job training.
Interface to third party vendors as necessary for external audits.
Manage investigations involving Cyber Security, including the use of specialized software.
Create system performance metrics and trending for capacity planning
Meet availability and update requirements
Ability to travel 10%
Who you are:
Bachelor's Degree in computer engineering, computer science, or other closely related IT discipline OR 5 years of relevant work experience.
Must hold one of the following certifications: Security+, CEH, GCIH, GREM or CISSP
3 years specialized experience providing technical and end-user assistance on computer hardware and application software support.
2 years of progressively responsible experience in cyber security analysis, incident response, or related experience.
Working knowledge of MITRE ATT&CK and Lockheed Martin's Cyber Killchain
Working knowledge of memory analysis tools and DFIR best practices
Experience administering enterprise vulnerability management and security awareness solutions
Experience designing and implementing controls to protect OT environments.
Experience administering multi-factor authentication systems
Experience managing enterprise security appliances and/or security monitoring software (IPSs, firewalls etc.)
Experience with enterprise change management and test procedures.
Demonstrated experience dealing with customers and organizational skills are required.
Demonstrated strength in providing strong customer service support.
Strong analytical and problem solving skills.
Good interpersonal, organizational, written and verbal communication skills.
Experience working in a highly regulated environment.
Maintain composure and professional approach when dealing with employees and vendors.
Ability to interpret a variety of instructions furnished in written, oral, diagram or schedule form.
Ability to make decisions logically.
Capable of focusing on details with regards to procedures and workflow.
Ability to lift up to 40 pounds.
Benefits/what's in it for you?
Flexible work arrangement
Competitive base salary
Fantastic opportunities for career growth
Cooperative, supportive and empowered team atmosphere
Annual bonus and salary increase opportunities
Monthly recognition events
Endless wellness initiatives and community events
Robust and customizable benefit packages-choose what works best with your life. Options include generous 401k, medical, dental and life insurance, tuition reimbursement, compensated volunteer hours and MORE!
Paid time off, holidays and a separate bank of sick time!
Chesapeake Utilities Corporation is an equal opportunity employer committed to creating a diverse workforce. We consider all qualified applicants without regard to race, religion, color, sex, national origin, age, sexual orientation, gender identity, disability or veteran status, among other factors. Applicants with a disability that need assistance applying for a position may email ****************.
Cyber Security Analyst
Cyber security analyst job in Wilmington, DE
Details:
Stefanini Group is hiring!
Exciting opportunity awaits, let us help you get started!
Click Apply now or you may call: **************/ email: Deepak Tyagi (**************************) for faster processing!
Job Description:
The Cyber Monitoring Analyst will be part of the Cyber Operations team that is responsible for monitoring and investigating alerts to identify potential incidents. The individual will be required to work closely with other members of the Cyber Operations team to ensure the successful delivery of the alert monitoring, triage, and escalation. Specifically, the Cyber
Monitoring Associate will have the following key responsibilities:
Perform real-time analysis and correlation of logs/alerts.
Follow detailed operational procedures to appropriately analyze, escalate, and assist in remediation of security events.
Utilize multiple security technologies to investigate and analyses alerts.
Deliver timely and detailed documentation related to any incident including the findings, review, and follow-up activities
Participate in the creation, modification and maintenance of all Cyber Monitoring policies and procedures
Keep abreast of cyber security trends and the emerging threat landscape in general
Details:
What the ideal candidate looks like:
1-4 years of experience in IT, IT Security, Security, Technical helpdesk, Security Operations are preferred
Understanding various Cloud technologies such as Azure, AWS, GCP is highly desirable
Also desirable is if they have performed investigation of high severity threats, in on-Prem technologies or in cloud
Strong oral and written communication skills including the ability to interact directly with individuals that do not have an IT background.
Intermediate knowledge of endpoint and network security concepts and tools preferred.
Knowledge of ServiceNow.
Crowdstrike, highly desired.
Experience with event monitoring and security reporting
Ability to exercise sound technical, interpersonal, and organizational judgment while evaluating and solving complex problems.
*Listed salary ranges may vary based on experience, qualifications, and local market. Also, some positions may include bonuses or other incentives*
About Stefanini Group
The Stefanini Group is a global provider of offshore, onshore and near shore outsourcing, IT digital consulting, systems integration, application and strategic staffing services to Fortune 1000 enterprises around the world. Our presence is in countries like Americas, Europe, Africa and Asia, and more than 400 clients across a broad spectrum of markets, including financial services, manufacturing, telecommunications, chemical services, technology, public sector, and utilities. Stefanini is a CMM level 5, IT consulting, company with global presence. We are CMM Level 5 company.
#LI-DT1
#LI-HYBRID
Easy ApplyInformation Security Analyst
Cyber security analyst job in Newark, DE
A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing.
Position: Information Security Analyst
Location: NEWARK, DE
Duration: 6 Months
Job Description:
• The Tier I Information Security Analyst is responsible for executing day-to-day tasks in the Security Operations Center 24x7. These tasks include: answering the NASS security support hotline, monitoring the NASS security support mailbox, creating tickets for client requests, monitoring and responding to Instant Messaging applications, and executing a variety of scripted actions on timed intervals. This position will also act as Tier I support for several endpoint services.
Responsibilities:
• Eyes on glass monitoring and resolution of security incidents within established customer Service Level Agreements.
• Perform daily operational 'eyes on glass' real-time monitoring and analysis of security events from multiple sources including but not limited to events from Security Information Monitoring tools, network and host based intrusion detection systems, firewall logs, system logs (Unix & Windows), mainframes, midrange, applications and databases.
• Monitors and analyzes attempted efforts to compromise security protocols. Identifies and investigates activities and conducts and provides analyses regarding results. Escalates issues to higher level associates.
• Reviews computer logs and messages to identify and report possible violations of security. Coordinates, documents, and reports on internal investigations of security violations.
• Interacts with customers to understand their security needs; assists in the development and implementation of procedures to accommodate them.
• Writes security status reports to provide system status, report potential and actual security violations and provide procedural recommendations.
Basic Qualifications:
• Bachelor's degree or equivalent combination of education and experience in Information Security is required.
• Zero or more years of experience in information systems security
• Experience working with operating systems
• Experience working with domain structures and digital signatures
• Experience working with computer desktop packages such as Microsoft Word, Excel, etc.
Qualifications
Other Qualifications:
• Communication skills to interact with team members, management, and support personnel
• Analytical and problem solving skills for design, creation and testing of security systems
• Ability to work independently and as part of a team
Additional Information
Kind Regards
Sachin Gaikwad
Technical Recruiter
Direct Line : 732-429-1920
Cyber Security Specialist
Cyber security analyst job in New Castle, DE
(Hiring) Cyber Security Specialist $50000-$120000 + Benefits We are seeking a Cyber Security Specialist to join our team! You will implement security measures for the protection of computer networks and information.
Responsibilities:
Implement and monitor daily security alerts
Report and respond to any security breaches or viruses
Triage and categorize network intrusions and incidents
Perform periodic risk reviews and audits
Provide strategies for improving system security
Qualifications:
Previous experience in network security or other related fields
Knowledge of network security technologies and devices
Excellent root cause analysis skills
Strong attention to detail
Apply or Email Resumes to: Admin@viperstaffing.com
Detection & Response Security Engineer, Threat Intelligence
Cyber security analyst job in Dover, DE
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements.
**Required Skills:**
Detection & Response Security Engineer, Threat Intelligence Responsibilities:
1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects
2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work
3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services
4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions
5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network
6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences
7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations
8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems
**Minimum Qualifications:**
Minimum Qualifications:
9. 8+ years threat intelligence experience
10. B.S. or M.S. in Computer Science or related field, or equivalent experience
11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services
12. Experience developing and delivering information on threats, incidents and program status for leadership
13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures
14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework
15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks
16. Proven track record of managing and executing on short term and long term projects
17. Ability to work with a team spanning multiple locations/time zones
18. Ability to prioritize and execute tasks with minimal direction or oversight
19. Ability to think critically and qualify assessments with solid communications skills
20. Coding or scripting experience in one or more scripting languages such as Python or PHP
**Preferred Qualifications:**
Preferred Qualifications:
21. Experience recruiting, building, and leading technical teams, including performance management
22. Experience close collaborating with incident responders on incident investigations
23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
24. Familiarity with malware analysis or network traffic analysis
25. Familiarity with nation-state, sophisticated criminal, or supply chain threats
26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort
27. Experience in one or more query languages such as SQL
28. Experience authoring production code for threat intelligence tooling
29. Experience conducting large scale data analysis
30. Experience working across the broader security community
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Epic Security & Providers - Analyst
Cyber security analyst job in Wilmington, DE
Job Details
Applicants must be currently authorized to work in the United States. ChristianaCare will not sponsor applicants for this position for an employment visa now or in the future.
Why ChristianaCare
Do you want to work at one of the Top 100 Hospitals in the nation? We are guided by our values of Love and Excellence and are passionate about delivering health, not just health care. Come join us at ChristianaCare!
ChristianaCare, with Hospitals in Wilmington and Newark, DE, as well as Elkton, MD, is one of the largest health care providers in the Mid-Atlantic Region. Named one of “America's Best Hospitals” by U.S. News & World Report, we have an excess of 1,100 beds between our hospitals and are committed to providing the best patient care in the region. We are proud to that Christiana Hospital, Wilmington Hospital, our Ambulatory Services, and HomeHealth have all received ANCC Magnet Recognition .
ChristianaCare Offers
Medical, Dental, Vision, Life Insurance, etc.
Two retirement planning offerings, including 403(b) with company contributions.
Generous paid time off with annual roll-over and opportunities to cash out.
12-week paid parental leave
Tuition assistance
Incredible Work/Life benefits including annual membership to care.com, access to backup care services for dependents through Care@Work, retirement planning services, financial coaching, fitness and wellness reimbursement, and great discounts through several vendors for hotels, rental cars, theme parks, shows, sporting events, movie tickets and much more!
Why Epic
The electronic health record (EHR) is foundational to the care we provide because it centralizes patient information, enabling informed decision-making and seamless care coordination. The EHR supports our ability to deliver high-quality, equitable, accessible care.
ChristianaCare is excited to transition from Cerner to Epic as the EHR across our sites of care!
This role is a HYBRID position requiring frequent on-site work. Must be within a commutable distance.
Epic certification preferred; if not certified, must become Epic certified within 3 weeks of completing the mandatory Epic training sessions.
Education and Experience Requirements:
Bachelor's degree in Information Technology, Computer Science, Healthcare Administration, or a related field is preferred.
2 - 3 years of experience working with Epic systems or similar EHR platforms preferably in security analysis or a related field.
High School diploma with 5 years of related experience may be considered in lieu of bachelor's degree.
Epic Security Coordinator Certification preferred.
Relevant certifications in healthcare security management are highly desirabl
Principal Duties and Responsibilities:
Provisions application security levels and roles.
Establishes ownership of each particular security class.
Coordinates security template and role updates and establishes a security change control process.
Coordinates security‐related activity across physical ﴾buildings, grounds﴿, infrastructure ﴾network, servers, operating system﴿ and application ﴾Epic or non‐Epic﴿ teams.
Works with application and compliance teams to design system‐level access.
Creates user records and maps them to templates built by application coordinators/analysts.
Creates appropriate shared security classifications which do not have specific application ownership.
Creates and maintains procedures to activate, deactivate, and update user records.
Understands the Epic software security structures, including user profiles, roles, and security classes
Serving as the main point of contact for technical issues and general questions related to assigned applications
Working in collaboration with Epic to implement new projects ﴾such as a new module﴿
Managing upgrades of assigned applications with Epic by setting timelines, maintaining continuous communication, and addressing issues
Analyzing and communicating the impact of issues
Triaging requests and determining the priority of issues
Resolving end‐user application issues using Epic documentation and ensuring business needs are met
Escalating end‐user problems to the appropriate level ﴾such as team lead﴿ when necessary
Validating solutions are complete and appropriately implemented
Building relationships with end users and providing consistent support through day‐to‐day communication
Communicating problem status and solutions to end users
#LI-CD1
Annual Compensation Range $79,497.60 - $127,212.80This pay rate/range represents ChristianaCare's good faith and reasonable estimate of compensation at the time of posting. The actual salary within this range offered to a successful candidate will depend on individual factors including without limitation skills, relevant experience, and qualifications as they relate to specific job requirements.
Christiana Care Health System is an equal opportunity employer, firmly committed to prohibiting discrimination, whose staff is reflective of its community, and considers qualified applicants for open positions without regard to race, color, sex, religion, national origin, sexual orientation, genetic information, gender identity or expression, age, veteran status, disability, pregnancy, citizenship status, or any other characteristic protected under applicable federal, state, or local law.
Post End Date
Jan 10, 2026
EEO Posting Statement
ChristianaCare offers a competitive suite of employee benefits to maximize the wellness of you and your family, including health insurance, paid time off, retirement, an employee assistance program. To learn more about our benefits for eligible positions visit *********************************************************
Auto-ApplySOC Cloud Security Analyst
Cyber security analyst job in Wilmington, DE
Job DescriptionAt ALLERE, we take pride in creating the perfect match for our candidates. We work diligently to build strong relationships with top companies nationwide, ensuring we always have exciting opportunities available for the right individuals. If you're passionate about emerging technologies and eager to contribute to a forward-thinking organization, we'd love to connect with you!Job Title: SOC Cloud Security AnalystLocation: Hybrid - Wilmington, DEOverviewIn this role, you will assist in the execution, monitoring, and documentation of SOC 1 controls across our cloud environments, ensuring compliance with regulatory requirements, client expectations, and industry security standards. The ideal candidate will have hands-on experience with cloud platforms, security frameworks, audit methodologies, and continuous control monitoring. Key Responsibilities
SOC 1 Compliance & Controls
Support the readiness, testing, and ongoing maintenance of SOC 1 Type I and Type II control activities.
Ensure cloud-based systems adhere to internal control requirements, including change management, logical access, incident response, and system operations.
Assist with preparing evidence, documentation, and reporting for internal and external auditors.
Cloud Security Monitoring & Analysis
Monitor cloud infrastructure security across platforms such as AWS, Azure, or Google Cloud.
Analyze security alerts, investigate potential threats, and escalate incidents as needed.
Validate that cloud controls are operating effectively and consistently.
Documentation & Reporting
Maintain accurate and up-to-date control documentation, policies, and procedures.
Assist in preparing SOC 1 audit deliverables and ensuring timely submission.
Develop dashboards and metrics to communicate control health and compliance performance.
Qualifications
2-6 years of experience in cloud security
Intermediate knowledge of at least one major Cloud technology such as Azure, AWS, GCP
Understanding of IaaS security concepts and technologies with intermediate knowledge in at least one major CSP is preferred
Also desirable is if they have performed investigation of high severity threats in cloud
ALLERE is a proud woman-owned business (WBENC certified) and an active supporter of numerous philanthropic, volunteer, and fundraising initiatives. We provide direct hire, contract-to-hire, and statement-of-work placements, along with access to employer-sponsored healthcare benefits and a 401(k)-retirement plan.ALLERE is committed to equal employment opportunity for all employees and applicants. We prohibit discrimination or harassment of any kind based on race, color, religion, age, sex, national origin, disability status, genetic information, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected under federal, state, or local laws.
Engineer, Information Security and Risk
Cyber security analyst job in Dover, DE
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Software Engineer
Cyber security analyst job in Delaware
Company Details
Company URL: ******************************************
Berkley Technology Services (BTS) is a dynamic company committed to providing world class IT services. We offer a unique culture, enabling our team members to be on the cutting edge of technology while delivering high quality solutions. We are looking for outstanding individuals who will bring unique perspectives, insight and innovation to our teams. BTS, a member company of W. R. Berkley Corporation, has facilities located in Des Moines, Iowa and Wilmington, Delaware.
Our functions include working with various third parties to develop, integrate, and support insurance systems of WRBC's operating units. BTS strives to provide these functions in a holistic manner including helpdesk support, system connectivity, and operational support. Additional responsibilities include coordinating communications regarding best practices in the use of our supported systems and researching new technology. At BTS, there are opportunities associated with being a part of an established and empowering corporation while maintaining a positive personal working environment. Additionally, we provide a competitive compensation and benefits package including a casual dress code. BTS is constantly growing and expanding to meet the changing demands of one of the most successful insurance organizations in the world. Visit us at berkley-bts.com to learn more information.
Berkley Technology Services: Right Team, Right Technology, Simple and Secure.
The Company is an equal employment opportunity employer.
Responsibilities
The Information Security Software Engineer will be responsible for designing, implementing, and maintaining the organization's information security systems, programs and security as code. They will work closely with architects, developers and business units to ensure the protection of sensitive data and minimize the risk of cyber-attacks.
Design and implement robust, scalable, and secure APIs Integrations.
Collaborate with cross-functional teams to define API requirements and ensure seamless integration.
Maintain and enhance existing APIs to improve performance and functionality.
Build workflows and pipelines.
Troubleshoot and resolve API-related issues in a timely manner.
Stay up-to-date with the latest industry trends and best practices in API development.
Qualifications
Bachelors Degree in Computer Science, Information Technology, Information Systems, or a related discipline. Equivalent experience and/or alternative qualifications will be considered.
At least 5 years of coding experience in both Python and Java.
Proven experience in API development using languages such as Python, Java, Power Query, and Power Shell.
Strong understanding of API design principles.
Experience with API testing and documentation tools (e.g., Postman, Swagger).
Familiarity with authentication and authorization mechanisms (e.g., OAuth, JWT).
Develop and implement custom solutions.
#LI-Hybrid
The company offers a competitive compensation plan and robust benefits package for full time regular employees including:
• Base Salary Range: $88k - $154k
• Benefits include: Health, dental, vision, dental, life, disability, wellness, paid time off, 401(k) and profit-sharing plans
The actual salary for this position will be determined by a number of factors, including the scope, complexity and location of the role; the skills, education, training, credentials and experience of the candidate; and other conditions of employment.
The Company is an equal employment opportunity employer.
Additional Company Details We do not accept unsolicited resumes from third party recruiting agencies or firms. Sponsorship Details Sponsorship not Offered for this Role Not ready to apply? Connect with us for general consideration.
Auto-ApplyJPMorgan Wealth Management Securities Based Lending Analyst
Cyber security analyst job in Newark, DE
JobID: 210688914 JobSchedule: Full time JobShift: Day : Join a dynamic team driving impactful credit solutions for clients. Make a difference by supporting asset-based lending and portfolio growth.
Job Summary
As a Securities Based Lending Analyst in the Securities Based Lending Team, you underwrite lines of credit secured by marketable securities, assist with loan portfolio maintenance, and support client credit needs.
Job Responsibilities
* Prepare analysis for underwriting, including collateral evaluation and loan grading
* Generate collateral analysis and support loan pricing
* Review lines of credit annually and recommend renewals or modifications
* Analyze client data across multiple systems for credit criteria
* Review and prepare loan documentation with high accuracy
* Ensure documentation complies with federal and local regulations
* Recommend process improvements for efficiency and consistency
* Collaborate with business partners across teams
* Support error-free environment through strong controls
* Strive to develop underwriting expertise and grow into a lender role
* Assist with credit authority responsibilities as experience increase. Maintain high standards of accuracy and compliance
Required Qualifications, Capabilities, and Skills
* Bachelor's degree or relevant credit experience
* 4 years of experience in underwriting, credit risk, or collateral valuation
* Strong interpersonal skills with business partners
* Excellent communication skills across organizational levels
* Ability to review and improve processes
* Strong understanding of controls for error-free operations
* Intermediate Microsoft Office skills, especially Excel, Word, and SharePoint
Preferred Qualifications, Capabilities, and Skills
* Working knowledge of financial markets and asset vehicles (Mutual Funds, Equities, Fixed Income, Municipals)
* Experience with underwriting, credit risk, and collateral valuation
* Ability to develop into a lender role with credit authority
* Experience supporting asset and wealth management clients
* Familiarity with federal and local lending regulations
* Proven track record of accuracy in documentation
* Demonstrated ability to work in a dynamic, client-focused environment
Auto-ApplyOffensive Security Engineer, Assessments (Web3)
Cyber security analyst job in Dover, DE
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services.
*What you'll be doing (ie. job duties):*
* Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure.
* Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities.
* Stay informed on emerging security trends, advisories, and academic research in the Web3 space.
* Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities.
* Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community.
* Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements.
* Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement.
* Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program.
* Mentor and train junior security engineers in Web3 bug bounty triage and analysis.
* Provide on-call support for critical Web3 bug bounty-related incidents.
* Document and report on Web3 bug bounty metrics and program effectiveness.
*What we look for in you (ie. job requirements):*
* Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field.
* 3+ years of experience in Web3 application security and penetration testing.
* Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components.
* Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms.
* Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25).
* Strong analytical skills to identify trends and patterns in vulnerabilities.
* Excellent communication skills for engaging with internal teams.
* Passion for security and a drive to improve Web3 security posture.
* Ability to work independently and take ownership of penetration testing initiatives.
* Energy and self-drive for continuous learning in the rapidly evolving crypto space.
* Excellence in clear, direct, and kind communication with technical and non-technical stakeholders.
* Experience building relationships with product, engineering, and security teams.
*Nice to haves:*
* Participation in CTFs, bug bounty programs, or open-source security research.
* Expertise in Application Security, Network Security, or Cloud Security.
* Relevant security certifications (e.g., OSCP, GPEN).
* Experience developing and implementing security tooling to support bug bounty triage and analysis.
* Experience with bug bounty programs and platforms, including triage, validation, and researcher communication.
* Strong analytical skills to identify trends and patterns in bug bounty submissions.
* Excellent communication skills to effectively engage with bug bounty researchers.
Position ID: P69494
\#LI-remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$152,405-$179,300 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
A4.9-Security Analyst 5026 Dover,DE
Cyber security analyst job in Dover, DE
Job Description
100% on site.
Our direct client has an opening for a Security Analyst 5026
is up to 13 months with the option of extension. The client is located in Dover,DE
If you are interested, please submit the following:
YOUR CURRENT RESUME
YOUR HOURLY RATE
Key Responsibilities
Security Monitoring: Continuously monitor network traffic, system logs, and other security tools to detect unusual or suspicious activities that could indicate an incident or vulnerability.
Incident Detection and Response: Identify and categorize security incidents such as malware infections, data breaches, and insider threats. Respond swiftly to contain, mitigate, and resolve incidents.
Alert Triage: Assess alerts generated by security tools, determine their severity, and prioritize responses accordingly.
Threat Intelligence and Hunting: Stay updated on the latest cybersecurity threats, vulnerabilities, and attack techniques to enhance monitoring and response efforts. Leverage these findings to conduct proactive threat hunting across SIEM and EDR platforms.
Log Analysis: Examine logs from a range of sources including firewalls, intrusion detection systems, antivirus software, and system endpoints to identify irregularities that may signal a threat.
Security Tool Management: Operate and manage security technologies such as SIEM systems, IDS/IPS, firewalls, PKI management, and endpoint security solutions.
Documentation and Compliance: Maintain accurate records of security incidents and ensure compliance with industry standards and regulations.
Collaboration: Work closely with other security and IT professionals to investigate and resolve security issues.
Continuous Improvement: Contribute to refining security processes and developing new detection and prevention rules.
Required Skills
Technical Proficiency: Strong understanding of IT basics, including operating systems, network protocols, and security tools.
Hands-on Experience with Security Tools: Proficiency in using SIEM systems, IDS/IPS, firewalls, antivirus, and endpoint detection tools.
Coding Skills: Knowledge of programming languages like Python or PowerShell for automating tasks and creating scripts.
Forensics Knowledge: Basic understanding of computer forensics for incident investigation.
Log Analysis: Ability to analyze logs to spot patterns and anomalies.
Incident Response: Experience in responding to security incidents effectively.
Threat Intelligence: Understanding of attack patterns and tactics used by cybercriminals.
Communication: Excellent communication skills for reporting and collaboration.
Problem-Solving: Strong analytical and problem-solving abilities.
Adaptability: Ability to adapt quickly to evolving cyber threats.
Qualifications
Education: Bachelor's degree or higher in Computer Science, Information Technology, Cybersecurity, or a related field.
Experience: Previous experience in a security-related role with a strong understanding of cybersecurity principles and technologies.
Certifications: Relevant certifications such as CompTIA Security+ or equivalent are beneficial.
Skill
Technical Proficiency: Strong understanding of IT basics, including operating systems, network protocols, and security tools.
Skill
Hands-on Experience with Security Tools: Proficiency in using SIEM systems, IDS/IPS, firewalls, antivirus, and endpoint detection tools.
Skill
Coding Skills: Knowledge of programming languages like Python or PowerShell for automating tasks and creating scripts.
Skill
Forensics Knowledge: Basic understanding of computer forensics for incident investigation.
By replying to this job advertisement, I agree I want to receive additional job advertisements from Focused HR Solutions, including email, phone and mail to the contact information I am submitting. I consent to Focused HR Solutions, its affiliates, third parties and partners processing my personal data for these purposes and as described in the Privacy Policy. I understand that I can withdraw my consent at anytime.
Lead Security Engineer- Big Data Architecture
Cyber security analyst job in Wilmington, DE
Join our team to take on a crucial role where you'll be a key part of a high-performing team delivering secure software solutions.
As a Lead Security Engineer at JPMorgan Chase within the Cybersecurity and Tech Controls team, you are an integral part of team that
works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing
misuse, circumvention, and malicious behavior. As a core technical contributor, you are responsible for carrying out critical technology
solutions with tamper-proof, audit defensible methods across multiple technical areas within various business functions.
Job responsibilities
Executes creative security solutions, design, development, and technical troubleshooting with the ability to think beyond
routine or conventional approaches to build solutions and break down technical problems.
Develops secure and high-quality production code and reviews and debugs code written by others.
Minimizes security vulnerabilities by following industry insights and governmental regulations to continuously evolve
security protocols, including creating processes to determine the effectiveness of current controls.
Works with stakeholders and business leaders to understand security needs and recommend business modifications during
periods of vulnerability.
Conducts discovery, vulnerability, penetration testing, and threat scenarios on multiple organizational assets to identify and
assess if vulnerabilities are present, and executes threat modeling for multiple applications including external applications
interacting with the internal JPMorgan Chase network.
Works across customer engineering teams to help apply our framework and applications to their problem domain.
Prototypes and recommends changes and additions to system components based on engineering customer experiences.
Focuses on an integrated system approach to delivery versus ad-hoc add- ons to the architecture; looks for commonality
and patterns in the needs of the engineering teams.
Required qualifications, capabilities, and skills
Formal training or certification on software engineering concepts and 5+ years applied experience.
Skilled in planning, designing, and implementing enterprise level security solutions.
Advanced in one or more programming languages like Java or Python.
Proficient in all aspects of the Software Development Life Cycle.
Advanced understanding of agile methodologies such as CI/CD, Application Resiliency, and Security.
Understand requirements management processes for highly regulated environments.
Cloud experience (AWS, Azure) and delivery mechanisms such as Terraform.
Kubernetes and related tooling experience.
Experience with threat modeling, discovery, vulnerability, and penetration testing.
In-depth knowledge of the financial services industry and their IT systems.
Experience with big data platforms and technologies such as Apache Flink, Apache Spark, Trino, Kafka, Apache Iceberg.
Preferred qualifications, capabilities, and skills
Experience effectively communicating with senior business leaders.
Experience with Data Lake and Lake House Architectures and tooling.
Auto-ApplySecurity Engineer- CTH
Cyber security analyst job in Wilmington, DE
Pyramid is a leading Information Technology Consulting services company headquartered in metropolitan Atlanta, GA with prime emphasis on the following service offerings: • Staff Augmentation • Lifecycle IT solutions o Application Development & Support
o Outsourced Testing
• Mobile Development and Test Automation
The company was incorporated in the State of Georgia in 1996 and has grown to over 2500 Information Technology consultants serving clients across the United States and around the globe. In addition to Atlanta, Pyramid has offices worldwide including Charlotte, NC; Chicago, IL; Dallas, TX; Richmond, VA; San Francisco, CA and Somerset, NJ in the United States, London in the United Kingdom, Singapore, and three offices in India (New Delhi, Hyderabad and Chandigargh).
Pyramid has been ranked by Staffing Industry Analysts as one of the largest diversity staffing firms specializing in IT and among the fastest growing U.S. staffing firm overall. In addition, Pyramid is a previous winner of the National Minority Supplier Development Council's Supplier of the Year and has won numerous Supplier of the Year awards from the Georgia Minority Supplier Development Council.
see less
Specialties
IT Staff Augmentation, Application Management Services, Enterprise Project Solutions, Mobile Development, Mobile Test Automation, Product and Engineering Services, Enterprise Mobility, Test Automation, QA - Manual and Automated Testing, QA Strategy
Website
************************
Industry
Information Technology and Services
Type
Privately Held
Company Size
1001-5000 employees
Founded
1996
Job Description
Description -
·
We need a Security Engineer who can provide clear and concise security requirements that meet corporate direction.
·
CISSP certification must
Additional Information
All your information will be kept confidential according to EEO guidelines.
Principal Data Center Security Systems Engineer
Cyber security analyst job in Middletown, DE
Insight Global is seeking an experienced, driven Principal Security Systems Engineer to join a growing AI and GPU infrastructure start-up based in SF, NYC, or Seattle. This is a full-time, permanent role with competitive salary, bonus, equity, and benefits.
In this role, the Principal Data Center Security Systems Engineer will lead and design the multi-layer physical security stack that protects this company's data. This engineer's work spans perimeter hardening to rack-level tamper detection, all integrated into a zero-trust monitoring framework.
Day-to-day responsibilities:
- Manage all aspects of the security system for data centers coordinating with all other discipline requirements
- Create strategy for data center security system design and deployment
- Develop security system standards in compliance with US - DoD and other international standards
- Develop and maintain the basis of design, master specification, master drawings
- Facilitate developing project specific drawings and documentation based on the master design with local adaptation working with external design consultants
- Engineer access-control, CCTV, intrusion-detection and biometric systems to meet SOC 2 & ISO 27001
- Create zoning and mantrap layouts, badge/biometric authentication flows and visitor-management SOPs
- Specify encryption and retention policies for video, logs and alarms
- Integrate security events into DCIM and corporate SIEM platforms
- Drive resiliency (dual-path comms, battery backup) and regular penetration-test programs
We are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form (****************************************** Og4IQS1J6dRiMo) . The EEOC "Know Your Rights" Poster is available here (*********************************************************************************************** .
To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: *************************************************** .
Skills and Requirements
- 10+ years designing hyperscale / enterprise or mission-critical physical-security systems.
- Deep knowledge of ONVIF, SIA DC-09, OSDP, Wiegand, BACnet.
- Experience with Genetec, LenelS2, Honeywell or Avigilon ecosystems.
- CISSP-ISSAP or PSP certification is desirable
Security Engineer II
Cyber security analyst job in Dover, DE
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Product Security Engineer, Instagram
Cyber security analyst job in Dover, DE
The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform.
**Required Skills:**
Product Security Engineer, Instagram Responsibilities:
1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products
2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code
3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities
4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage
5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience
8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP)
9. Extensive, proven experience in threat modeling and secure systems design
10. Experience with exploiting common security vulnerabilities
**Preferred Qualifications:**
Preferred Qualifications:
11. Product software engineering or product management experience
12. Experience in security consulting or other leadership-facing security advisory roles
13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response
14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.)
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Engineer, Information Security and Risk
Cyber security analyst job in Dover, DE
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
JPMorgan Wealth Management Securities Based Lending Analyst
Cyber security analyst job in Newark, DE
Join a dynamic team driving impactful credit solutions for clients. Make a difference by supporting asset-based lending and portfolio growth. As a Securities Based Lending Analyst in the Securities Based Lending Team, you underwrite lines of credit secured by marketable securities, assist with loan portfolio maintenance, and support client credit needs.
Job Responsibilities
+ Prepare analysis for underwriting, including collateral evaluation and loan grading
+ Generate collateral analysis and support loan pricing
+ Review lines of credit annually and recommend renewals or modifications
+ Analyze client data across multiple systems for credit criteria
+ Review and prepare loan documentation with high accuracy
+ Ensure documentation complies with federal and local regulations
+ Recommend process improvements for efficiency and consistency
+ Collaborate with business partners across teams
+ Support error-free environment through strong controls
+ Strive to develop underwriting expertise and grow into a lender role
+ Assist with credit authority responsibilities as experience increase. Maintain high standards of accuracy and compliance
Required Qualifications, Capabilities, and Skills
+ Bachelor's degree or relevant credit experience
+ 4 years of experience in underwriting, credit risk, or collateral valuation
+ Strong interpersonal skills with business partners
+ Excellent communication skills across organizational levels
+ Ability to review and improve processes
+ Strong understanding of controls for error-free operations
+ Intermediate Microsoft Office skills, especially Excel, Word, and SharePoint
Preferred Qualifications, Capabilities, and Skills
+ Working knowledge of financial markets and asset vehicles (Mutual Funds, Equities, Fixed Income, Municipals)
+ Experience with underwriting, credit risk, and collateral valuation
+ Ability to develop into a lender role with credit authority
+ Experience supporting asset and wealth management clients
+ Familiarity with federal and local lending regulations
+ Proven track record of accuracy in documentation
+ Demonstrated ability to work in a dynamic, client-focused environment
JPMorganChase, one of the oldest financial institutions, offers innovative financial solutions to millions of consumers, small businesses and many of the world's most prominent corporate, institutional and government clients under the J.P. Morgan and Chase brands. Our history spans over 200 years and today we are a leader in investment banking, consumer and small business banking, commercial banking, financial transaction processing and asset management.
We offer a competitive total rewards package including base salary determined based on the role, experience, skill set and location. Those in eligible roles may receive commission-based pay and/or discretionary incentive compensation, paid in the form of cash and/or forfeitable equity, awarded in recognition of individual achievements and contributions. We also offer a range of benefits and programs to meet employee needs, based on eligibility. These benefits include comprehensive health care coverage, on-site health and wellness centers, a retirement savings plan, backup childcare, tuition reimbursement, mental health support, financial coaching and more. Additional details about total compensation and benefits will be provided during the hiring process.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.
JPMorgan Chase & Co. is an Equal Opportunity Employer, including Disability/Veterans
Engineer, Information Security and Risk
Cyber security analyst job in Dover, DE
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************