Network Security Analyst
Cyber security analyst job in Lehi, UT
Mindlance is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at ************************* Job Description Job Title: Network Security Analyst
Duration: 6 Months
Location: Lehi, UT
Required:
• Minimum 3+ years exp.
• Experience with implementing policy on firewalls (Juniper & Palo alto experience preferred)
• Review requests for new firewall policy
• Understanding of IP stack
• Ability to prioritize work and meet defined SLAs
• Good communication skills - both verbal and written
Additional Information
Thanks & Regards,
______________________________________________________________________________________________________
Vikram Bhalla | Team-Recruitment | Mindlance, Inc. | Office: **************
Sentinel - Systems Security Engineer - 16416
Cyber security analyst job in Roy, UT
RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: SecretTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Join Northrop Grumman on our continued mission to push the boundaries of possible across land, sea, air, space, and cyberspace. Enjoy a culture where your voice is valued and start contributing to our team of passionate professionals providing real-life solutions to our world's biggest challenges. We take pride in creating purposeful work and allowing our employees to grow and achieve their goals every day by Defining Possible. With our competitive pay and comprehensive benefits, we have the right opportunities to fit your life and launch your career today.
Northrop Grumman Defense Systems is seeking a Systems Security Engineer, (Level 2), that will support the Sentinel (GBSD) program performing Hardware Assurance.
This position will be located in Roy, UT and will support the Ground Based Strategic Deterrent (GBSD) program.
The Mission Defense Team (MDT) is seeking a highly motivated and qualified system engineer to serve as a Hardware Assurance Engineer, Level 2. You will be responsible for assessing and prioritizing a broad spectrum of hardware security threats. Key protection activities will involve vendor research, hardware assurance, program protection, counterfeit prevention, and supply chain security.
Additional Responsibilities include:
Assessment and analysis of threats, vulnerabilities, and risk for identified mission-critical functions and critical components
Support courses of action based on knowledge and experience, initiative, guidance, and established regulations and policies
Research, analyze data, and derive facts per identified vulnerabilities
Participate in a variety of working groups and customer meetings; ensure communication of risk environment with stakeholders
Contributes to program plans, goals, objectives, and milestones to for Hardware Assurance
Review technical security assessments of SSE environments to identify points of vulnerability, non-compliance with established standards and regulations and recommended mitigation strategies
Execute completion Statement of Work requirements, Program Milestone Exit Criteria, and program maturity commitments
Ensure the architecture and design of systems are functional and secure; support the design, development, implementation, and integration of security systems and system components
Self-starters compelled to take action in the workplace without requiring prompting from supervisors
Support MDT with other duties as assigned
In addition to technical skills, you will be a self-starter with strong time management skills. Your organizational skills and ability to anticipate future challenges will serve you well
Basic Qualifications
Must be a US Citizen with an active DoD Secret Clearance, at time of application, current and within scope, with an investigation date within the last 6 years
Must have the ability to obtain and maintain Special Access Program (SAP) approval within a reasonable period of time, as determined by the company to meet its business need
Requires a bachelor's degree in a STEM (Science, Technology, Engineering or Mathematics) discipline from an accredited university and 2 years of related experience; or a master's degree with 1 year
Minimum 2 years of applying and understanding Systems Security Engineering principles applicable to US Government Defense Programs
Minimum 2 years in showing the ability to communicate effectively and clearly present technical approaches and findings
Experience in any of the full product life cycles of: ASIC Design, FPGA Design
Experience in HDL (VHDL/Verilog), implementing designs using RTL
Ability to show self as team player, able to multi-task, able to generate quality work products independently, able to make excellent judgement and show interpersonal skills
Preferred Qualifications
Degree in Aerospace Engineering, Systems Engineering, Mechanical Engineering, Software Engineering, or similar
ICBM Experience
Experience developing Systems Security Engineering requirements for hardware and software assurance
Evaluating program processes and compliance strategies for large, complex multi-site programs
Demonstrated experience and familiarity with vulnerability management
Experience with Model-based Systems Engineering (MBSE) concepts and tools
A solid understanding of Program Protection applicable to US Government Defense Programs and applied knowledge in the application of SSE principles across a broad spectrum of security measures (Cybersecurity, Counterfeit Awareness, Anti-Tamper, HW/SW Assurance, OPSEC, etc.) to protect critical program information (CPI)
Top Secret clearance
Position Benefits
As a full-time employee of Northrop Grumman, you are eligible for our robust benefits package including:
Medical, Dental & Vision coverage
401k
Educational Assistance
Life Insurance
Employee Assistance Programs & Work/Life Solutions
Paid Time Off
Health & Wellness Resources
Employee Discounts
******************************************************************
This position's standard work schedule is a 9/80. The 9/80 schedule allows employees who work a nine-hour day Monday through Thursday to take every other Friday off.
This role may offer a competitive relocation assistance package.
#Sentinelsystems
Primary Level Salary Range: $77,200.00 - $115,800.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplySecurity Engineer Investigator, Insider Trust
Cyber security analyst job in Salt Lake City, UT
As part of Meta Security, our Insider Trust team is dedicated to identifying and responding to insider threats that target our data. Our mission is to detect, investigate, and mitigate damage caused by insider threats. We handle a wide range of abuse cases, including misuse of user data, intellectual property theft, and leaks of sensitive information.We are seeking an experienced Security Engineer to join the team. This role involves investigating, hunting, and automating internal signals to detect malicious activities related to insider threats.
**Required Skills:**
Security Engineer Investigator, Insider Trust Responsibilities:
1. Perform analysis, and threat hunting from a variety of log sources (e.g., individual host logs, network traffic logs) to identify potential insider threats
2. Create workflows and automations to streamline signal detection, threat hunts, and investigative processes
3. Collaborate with software and production engineering teams to build scalable and adaptable solutions for insider threat investigations
4. Identify gaps in our infrastructure and work with cross-functional partners to improve visibility through logging and automation
5. Build operational workflows and actions to auto-resolve false positives and provide context, scaling investigation capabilities
6. Prioritize efforts to maximize impact by enhancing visibility, automating processes, and scaling investigative capabilities
7. Coach, mentor, and support team members to foster long-term career growth, job satisfaction, and success
**Minimum Qualifications:**
Minimum Qualifications:
8. Bachelor's degree in Computer Science, Engineering, or equivalent experience
9. 5+ years of experience in Detection & Response Engineering, Insider Threat, or a similar Security Engineering role
10. Technical and procedural expertise in conducting security investigations, including response, forensics, and large-scale log analysis
11. Experience with attacker tactics, techniques, and procedures
12. Proficiency in coding or scripting in one or more general-purpose programming languages
**Public Compensation:**
$147,000/year to $208,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Data Security Analyst - C78843 7.5 Salt Lake City, Utah
Cyber security analyst job in Salt Lake City, UT
We are looking for a Data Security Analyst for our long-term multiyear project out of Salt Lake City, Utah. Build software libraries and services to provide secure-by-default services to software engineering teams, including authentication systems, secure service architectures, endpoint control solutions, and cloud controls
· Partner with colleagues from across engineering and risk to ensure an outstanding developer experience that satisfies the firm's security needs
· Collaborate on feature design and problem solving
· Help to provide frictionless integration with the firm's runtime, deployment and SDLC technologies
· Manage the full lifecycle of software components, from requirements through design, testing, development, release and demise
· Help to communicate and promote best practices for security engineering across the firm
· Engage in production troubleshooting
Basic Qualifications
· A strong grounding in security concepts, including secure coding practices, trusted computing and principles of authentication and authorization
· A good understanding of public key and symmetric key cryptography
· The ability to reason about performance, security, and process interactions in complex distributed systems
· Proficiency in designing, developing and testing cross-platform software in one or more of Java, Golang or C#; open to using multiple languages
· Experience developing, deploying and supporting software across the full Continuous Delivery life-cycle
· The ability to understand and effectively debug both new and existing software
· Experience meeting demands for high availability, low latency and scale
· The ability to communicate technical concepts effectively, both in writing and orally, as well as the interpersonal skills required to collaborate effectively with colleagues across diverse engineering teams
Preferred Qualifications
· An understanding of regulated environments, e.g. financial services
· Experience building services using public cloud providers such as AWS, Azure or GCP
· Experience with threat modeling and risk assessment
· Experience of practical security engineering in a Linux and/or Windows environment
· Familiarity with service mesh concepts and service-oriented architectures
· Familiarity with data protection principles and solutions
· Experience with deploying software to containerized environments - Kubernetes/Docker
· Experience monitoring, measuring, auditing and supporting software
· Scripting skills using Python, PowerShell or bash
· Experience with Terraform or similar infrastructure-as-code platforms, as a user and/or as a service provider
Sr. Security Analyst
Cyber security analyst job in South Jordan, UT
Lightspeed is a leading provider of cloud-based software for dealerships and Original Equipment Manufacturers (OEMs), serving the Powersport, Marine, RV, Trailer, Outdoor Power Equipment, and Golf Cart industries. Lightspeed's Dealer Management Solution (DMS) enables dealerships to optimize their end-to-end business operations, including sales, parts, service, rentals, accounting, and Customer Relationship Management (CRM). When implemented into their daily operations, Lightspeed helps dealers increase their profitability by selling more units, service, and parts, all while creating a more streamlined experience for customers. For nearly 40 years, Lightspeed has been empowering 4,500+ dealers across North America with the tools and technology they need to manage their dealerships.
The Senior Security Analyst is responsible for team lead activities, such as monitoring, analyzing, and responding to security incidents across enterprise systems, cloud environments, and networks. This role ensures the confidentiality, integrity, and availability of organizational information through proactive detection, incident response, and continuous improvement. The ideal candidate will have a strong technical background in leading threat analysis, SIEM integration and management, vulnerability management, and incident handling.
What you'll do:
Monitor and investigate security alerts and events across SIEM, EDR, and network systems.
Conduct root cause analysis and coordinate remediation of security incidents.
Lead vulnerability assessments and ensure timely patching and mitigation.
Develop and maintain incident response playbooks and escalation procedures.
Collaborate with IT, DevOps, and Development teams to strengthen overall security posture.
Lead proactive threat hunting and continuous tuning of detection mechanisms.
Support internal and external audits (e.g., SOC 2) and risk assessments by providing evidence and guidance.
Perform firewall management, including rule changes, troubleshooting, and SOP development for hybrid cloud/on-prem environments.
Lead to red/blue team exercises and implement findings to improve defenses.
Coordinate and assist with enterprise pen-tests, risk assessments, and compliance initiatives.
Serve as a lead security advisor to business and technical teams, providing guidance on secure design, risk mitigation, and compliance using industry frameworks and best practices.
What you should have:
Qualifications:
Bachelor's degree in Cybersecurity, Information Technology, or a related field, or equivalent experience.
8+ years of experience in information security, incident response, or SOC operations.
Proven hands-on experience with SIEM tools (Splunk, Sentinel, QRadar, etc.) and EDR/XDR platforms (CrowdStrike, Darktrace, Microsoft Defender).
Strong experience securing and monitoring cloud environments (AWS, Azure).
Deep knowledge of security frameworks (NIST CSF, ISO 27001, SOC 2).
Advanced scripting and automation proficiency (Python, PowerShell, Terraform).
Excellent analytical, problem-solving, and communication skills.
Preferred Qualifications:
Relevant certifications such as AWS Security, CISSP, GCIH, GCIA, GPEN, GWAPT preferred.
Experience integrating AI and automation into security operations workflows.
Hands-on experience performing dynamic application security testing and red team exercises across endpoint and cloud environments.
Expert-level networking and firewall expertise with platforms such as Palo Alto, Cisco, or Checkpoint.
Master's degree in Cybersecurity, Information Technology, or a related field.
Inclusion and Diversity at Lightspeed:
At Lightspeed, we celebrate the uniqueness of every individual and encourage diverse perspectives. We believe that inclusion drives innovation and fosters meaningful connections. We are committed to building an environment where everyone feels valued and empowered to make an impact.
Equal Employment Opportunity Statement:
Lightspeed is an Equal Opportunity Employer and is dedicated to building a diverse and inclusive workforce. All qualified applicants will be considered for employment without regard to race, color, creed, ancestry, national origin, gender, sexual orientation, gender identity, gender expression, marital status, religion, age, disability, veteran status, or any other protected category.
Important Note:
Applicants must be authorized to work in the U.S.
Ready to apply?
Take the next step in your career-apply today and join a team where your skills will make an impact!
Auto-ApplyCyber Countermeasures Engineer
Cyber security analyst job in Clearfield, UT
By Light Professional IT Services LLC readies warfighters and federal agencies with technology and systems engineered to connect, protect, and prepare individuals and teams for whatever comes next. Headquartered in McLean, VA, By Light supports defense, civilian, and commercial IT customers worldwide.
Position Overview
By Light is seeking a Cyber Countermeasures Engineer who's primary duty location is DISA Global Field Command (DGFC),Hill AFB, Utah.
Responsibilities
* Provide mission support, as necessary for a new cyber capability
* Serve as the cyber countermeasure Subject Matter Expert for a new cyber capability.
* Work directly with commercial vendor cyber fusion/threat analyst teams to develop effective countermeasures addressing a wide range of priority and/or emerging cyber threats.
* Ensure countermeasures are effective in supporting desired mission outcomes.
* Provide critical integration for commercial vendors teams
* Analyze signatures (ex. YARA, Snort) in Cyber Threat Intelligence or DoD orders and assess new capability coverage for these threats
Required Experience/Qualifications
* 2+ years of experience in cyber analyst role
* Experience conducting malware analysis
* Experience developing behavioral threat signatures, such as YARA rules
* Experience with cyber operations and cyber operation planning processes
* Understands malicious cyber actor TTPs to include initial access and command-and-control
* Understands how to use cyber security tools and data to conduct defensive cyber operations
* Understands cyber threats and cyber threat frameworks such as Cyber Kill Chain and MITRE ATT&CK framework
* Understands Cyber Threat Intelligence (CTI) and how to integrate CTI into defensive cyber operations
Preferred Experience/Qualifications
* Hands on SIEM experience, preferably with Splunk, to include configuration, query development, log review/analysis, and correlation of event data
* 5+ years of experience in cyber analyst role, preferably supporting DGFC or JFHQ
* Experience with regex and signature development
* Experience with coding/scripting
* Cybersecurity certifications such as CISSP and/or GIAC certifications
* Splunk certifications
Special Requirements/Security Clearance
* Active TS/SCI clearance required
Engineer, Information Security and Risk
Cyber security analyst job in Salt Lake City, UT
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security and Compliance Analyst
Cyber security analyst job in Pleasant Grove, UT
Job DescriptionAt Veracity, we aim to be a different kind of insurance partner - one that is free from outside investors, venture capital, or the pressures of a corporate parent. Ours is a culture of empowerment - one that believes in effort, results, and accountability. We believe that transparency fosters trust, trust fosters growth, and that growth drives innovation. Our commitment to rigorous evaluation and relentless execution lead to rapid evolution.
We answer only to the small business owners we serve, and this independence allows us to stay focused on what matters most: helping their businesses thrive by providing expert guidance and best-in-class insurance policies.
We're growing fast and want you to be a part of it!
We're seeking a talented, detail-oriented Information Security and Compliance Analyst to join our team. Reporting to the Technical Operations and Information Security Manager, this role is responsible for supporting the organization's cybersecurity posture by maintaining and enhancing security policies, controls, and monitoring systems, and ensuring compliance with frameworks such as SOC 2 and PCI DSS to protect company and client data.
Key Responsibilities
Strengthen the organization's cybersecurity posture by implementing, maintaining, and improving security policies, standards, and technical controls
Monitor security tools and system activity to identify, investigate, and escalate potential threats or vulnerabilities
Support vulnerability management, including performing scans, tracking remediation, and validating fixes
Maintain accurate, audit-ready documentation and coordinate evidence collection for SOC 2, PCI DSS, and other compliance frameworks
Support incident response processes, including triage, documentation, and post-incident follow-up
Assist with user access reviews, control testing, risk assessments, and security awareness efforts
Collaborate with IT, Engineering, and Compliance teams on secure configurations, remediation plans, and cross-functional security initiatives
Participate in routine policy, procedure, and control reviews to ensure alignment with regulatory requirements and security best practices
Maintain detailed logs and reports of security activities, metrics, and compliance obligations
Identify opportunities to strengthen controls, streamline processes, and enhance overall security program maturity
Required to perform other duties as requested, directed, or assigned
Requirements and Qualifications
Bachelor's degree in information systems, IT, Cybersecurity, or a related field
2-3 years of experience in security compliance, auditing, or governance (SOC 2 experience preferred)
Strong integrity, attention to detail, and accountability in handling sensitive or regulated information
Proactive problem-solving skills with the ability to anticipate and address risks effectively
Strong collaboration and communication skills with experience working across technical and compliance teams
Ability to remain composed and effective under pressure, including during audits and security incident
Perks
Health, dental, and vision plans
Amazing work-life balance with 4 weeks of Paid Time Off
10 Paid Company Holidays with 2 floating holidays
401K Programs with employer match
Personal assistance programs for support in a healthy personal and work life
Why Veracity?
Here at Veracity, you'll be part of a team of trailblazers and visionaries. We're not just revolutionizing the way people “do” insurance; we are creating a whole new paradigm. Here, you will experience a vibrant and inclusive workplace where your ideas matter! With us, you have a chance to:
Engage in groundbreaking projects that are reshaping the insurance landscape
Collaborate with a group of dedicated, like-minded professionals
Experience a culture that prioritizes growth and development
Compensation Range: $75k/yr - $85k/yr
We are proud to be an equal-opportunity employer. We are committed to providing equal opportunities to all qualified applicants, regardless of race, color, religion, sex, national origin, disability, or any other legally protected characteristics.
If you need accommodation, please let us know during the interview process.
Powered by JazzHR
tg FX77drAm
Information Systems Security Officer
Cyber security analyst job in Clearfield, UT
**MANTECH** seeks a motivated, career and customer-oriented **Information Systems Security Officer (ISSO)** to join our Air Force / Space team at **Hill AFB** . The ISSO's primary function is to support the United States Air Force's 53rd Wing Technical Support Services (53rd WTSS) contract.
**Responsibilities include, but are not limited to:**
+ Perform ISSO duties in support of in-house and external customers
+ Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
+ Conduct periodic reviews of information systems to ensure compliance with the security authorization package
+ Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
+ Ensure all IS security-related documentation is current and accessible to properly authorized individuals
+ Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
+ Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
+ Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
**Minimum Qualifications:**
+ Bachelor's degree in related discipline from an accredited college or university. 2 additional years of experience may be substituted for a degree.
+ 4+ years direct/related experience
+ Active / valid DoD 8570.01-M IAT-II certification
+ Experience with DoD/USAF information security policy background with practical / hands-on experience applying RMF processes and principles.
+ Experience developing and/or contributing to an RMF body of evidence composition, applicable artifacts, and associated control families.
**Clearance Requirements:**
+ Active Top Secret Clearance
+ Must be able to obtain and maintain a DoD TS/SCI-eligible clearance (i.e. DCID 6/4 eligibility)
+ Eligibility for access to Special Access Program Information
+ Willingness to submit to a Polygraph.
**Physical Requirements:**
+ Must be able to remain in a stationary position 50%
+ Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
+ Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
+ Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
Information Security Analysts
Cyber security analyst job in Salt Lake City, UT
Bookmark this Posting Print Preview | Apply for this Job Please see Special Instructions for more details. About UIT: University Information Technology (UIT), the central IT service provider for the University of Utah, reports to the U's Chief Information Officer and is responsible for many of the U's shared IT services including the wired and wireless network; Campus Information Services (CIS) portal; UMail, telephone, and online collaboration; digital learning technologies; information security; software licensing; and a host of other IT systems and services.
About the University of Utah: Located in Salt Lake City, the U is the flagship institution of the State of Utah's system of higher education, home to arts and museum venues and a member of the BIG-12 Conference. Skiing and snowboarding opportunities are a short distance from campus, and opportunities to pursue activities from biking to hiking to fishing abound. Salt Lake City is home to the Utah Symphony and Opera, Ballet West, professional sports teams, and a wide range of other cultural and recreational activities.
The University of Utah offers a comprehensive benefits package for eligible employees including:
* Excellent health, dental, and wellness coverage at affordable rates
* 14.2% retirement contributions
* Generous paid leave time
* 11 paid holidays per year
* 50% tuition reduction for employees after completing probationary period, and spouse, and dependent children after three years
* Flex spending accounts
* Free transit on most UTA services
* Employee discounts on a variety of products and services including cell phones & plans, entertainment, health and fitness, restaurants, retail, and travel
* Professional development opportunities
* A wellness program to promote health and quality of life
* Learn more about the great benefits of working for University of Utah: benefits.utah.edu
For more information regarding how our salary and benefit offerings impact the overall compensation here at the University of Utah, please see our Total Compensation Calculator: ******************************************
Announcement
Details
Open Date 12/15/2025 Requisition Number PRN43780B Job Title Information Security Analysts Working Title Information Security Analysts Career Progression Track P00 Track Level P5 - Expert, P4 - Advanced, P3 - Career FLSA Code Computer Employee Patient Sensitive Job Code? No Standard Hours per Week 40 Full Time or Part Time? Full Time Shift Day Work Schedule Summary
Monday - Friday, 8:00 AM - 5:00 PM. Some nights or weekends are possible based on a rotating on call shift. This is a hybrid position.
VP Area President Department 00954 - UIT Systems & Security Location Campus City Salt Lake City, UT Type of Recruitment External Posting Pay Rate Range $88,000 - $131,300 Close Date 02/28/2026 Priority Review Date (Note - Posting may close at any time) Job Summary
Information Security Analysts
The incumbent will play a critical role in safeguarding regulated data across the enterprise by monitoring and analyzing the organization's data security posture. This position focuses on configuring Data Security Posture Management (DSPM) settings and policies, interpreting results, creating reports, identifying risks, and ensuring compliance. The analyst will take a risk-based approach to assess and remediate issues related to unauthorized storage or transmission of regulated data across cloud and on-premise environments.
Learn more about the great benefits of working for University of Utah: benefits.utah.edu
The department may choose to hire at any of the below job levels and associated pay rates based on their business need and budget.
Responsibilities
Data Security Monitoring
* Review and analyze DSPM tool outputs to identify misconfigurations, unauthorized data flows, and storage of regulated data in non-approved locations.
* Monitor the movement of sensitive data across cloud and on-prem systems, ensuring compliance with internal policies and regulatory requirements.
Risk Assessment & Governance
* Apply a risk-based methodology to prioritize remediation efforts.
* Maintain applicable risk register entries and document findings for governance reporting.
Collaboration
* Partner with the Enterprise Security team to validate technical controls.
* Work closely with the Chief Data Officer and Privacy Office to align DSPM findings with data governance and privacy requirements.
Compliance & Policy Alignment
* Ensure adherence to frameworks such as NIST CSF, CIS 18, and other applicable regulations (e.g., HIPAA, FERPA, etc. etc.).
* Support audits and compliance reviews by providing DSPM-related evidence.
Reporting & Communication
* Prepare dashboards and reports for leadership summarizing DSPM findings, trends, and risk posture.
* Communicate actionable insights to stakeholders in clear, business-focused language.
Minimum Qualifications
EQUIVALENCY STATEMENT: 1 year of higher education can be substituted for 1 year of directly related work experience (Example: bachelor's degree = 4 years of directly related work experience).
Department may hire employee at one of the following job levels:
Information Security Analyst, III: Requires a bachelor's (or equivalency) + 6 years or a master's (or equivalency) + 4 years of directly related work experience.
Information Security Analyst, IV: Requires a bachelor's (or equivalency) + 8 years or a master's (or equivalency) + 6 years of directly related work experience.
Information Security Analyst, V: Requires a bachelor's (or equivalency) + 10 years or a master's (or equivalency) + 8 years of directly related work experience.
Preferences
Certifications such as CISSP, CRISC, or equivalent.
Master's degree in information security or another relevant field.
Experience with a DSPM tool.
3+ years that are specifically tied to GRC experience.
Type Benefited Staff Special Instructions Summary
About UIT: University Information Technology (UIT), the central IT service provider for the University of Utah, reports to the U's Chief Information Officer and is responsible for many of the U's shared IT services including the wired and wireless network; Campus Information Services (CIS) portal; UMail, telephone, and online collaboration; digital learning technologies; information security; software licensing; and a host of other IT systems and services.
About the University of Utah: Located in Salt Lake City, the U is the flagship institution of the State of Utah's system of higher education, home to arts and museum venues and a member of the BIG-12 Conference. Skiing and snowboarding opportunities are a short distance from campus, and opportunities to pursue activities from biking to hiking to fishing abound. Salt Lake City is home to the Utah Symphony and Opera, Ballet West, professional sports teams, and a wide range of other cultural and recreational activities.
The University of Utah offers a comprehensive benefits package for eligible employees including:
* Excellent health, dental, and wellness coverage at affordable rates
* 14.2% retirement contributions
* Generous paid leave time
* 11 paid holidays per year
* 50% tuition reduction for employees after completing probationary period, and spouse, and dependent children after three years
* Flex spending accounts
* Free transit on most UTA services
* Employee discounts on a variety of products and services including cell phones & plans, entertainment, health and fitness, restaurants, retail, and travel
* Professional development opportunities
* A wellness program to promote health and quality of life
* Learn more about the great benefits of working for University of Utah: benefits.utah.edu
For more information regarding how our salary and benefit offerings impact the overall compensation here at the University of Utah, please see our Total Compensation Calculator: ******************************************
Additional Information
The University of Utah values candidates who have experience working in settings with students from diverse backgrounds and possess a strong commitment to improving access to higher education for historically underrepresented students.
Individuals from historically underrepresented groups, such as minorities, women, qualified persons with disabilities and protected veterans are encouraged to apply. Veterans' preference is extended to qualified applicants, upon request and consistent with University policy and Utah state law. Upon request, reasonable accommodations in the application process will be provided to individuals with disabilities.
The University of Utah is an Affirmative Action/Equal Opportunity employer and does not discriminate based upon race, ethnicity, color, religion, national origin, age, disability, sex, sexual orientation, gender, gender identity, gender expression, pregnancy, pregnancy-related conditions, genetic information, or protected veteran's status. The University does not discriminate on the basis of sex in the education program or activity that it operates, as required by Title IX and 34 CFR part 106. The requirement not to discriminate in education programs or activities extends to admission and employment. Inquiries about the application of Title IX and its regulations may be referred to the Title IX Coordinator, to the Department of Education, Office for Civil Rights, or both.
To request a reasonable accommodation for a disability or if you or someone you know has experienced discrimination or sexual misconduct including sexual harassment, you may contact the Director/Title IX Coordinator in the Office of Equal Opportunity and Affirmative Action:
Director/ Title IX Coordinator
Office of Equal Opportunity and Affirmative Action (OEO/AA)
383 University Street, Level 1 OEO Suite
Salt Lake City, UT 84112
************
************
Online reports may be submitted at oeo.utah.edu
For more information: ***************************************
To inquire about this posting, email: ******************* or call ************.
The University is a participating employer with Utah Retirement Systems ("URS"). Eligible new hires with prior URS service, may elect to enroll in URS if they make the election before they become eligible for retirement (usually the first day of work). Contact Human Resources at ************** for information. Individuals who previously retired and are receiving monthly retirement benefits from URS are subject to URS' post-retirement rules and restrictions. Please contact Utah Retirement Systems at ************** or ************** or University Human Resource Management at ************** if you have questions regarding the post-retirement rules.
This position may require the successful completion of a criminal background check and/or drug screen.
************************************ This report includes statistics about criminal offenses, hate crimes, arrests and referrals for disciplinary action, and Violence Against Women Act offenses. They also provide information about safety and security-related services offered by the University of Utah. A paper copy can be obtained by request at the Department of Public Safety located at 1658 East 500 South.
Posting Specific Questions
Required fields are indicated with an asterisk (*).
* * What is your highest level of completed education?
* None
* High School Diploma or Equivalent
* Associate Degree
* Bachelor's Degree
* Master's Degree
* Doctorate Degree
* * How many years of related work experience do you have?
* Less than 6 years
* 6 years or more, but less than 9 years
* 9 years or more, but less than 12 years
* 12 years or more, but less than 15 years
* 15 years or more
Applicant Documents
Required Documents
* Resume
* Cover Letter
* List of References
Optional Documents
Auto-ApplySenior Security Engineer
Cyber security analyst job in Lehi, UT
Our Company Changing the world through digital experiences is what Adobe's all about. We give everyone-from emerging artists to global brands-everything they need to design and deliver exceptional digital experiences! We're passionate about empowering people to create beautiful and powerful images, videos, and apps, and transform how companies interact with customers across every screen.
We're on a mission to hire the very best and are committed to creating exceptional employee experiences where everyone is respected and has access to equal opportunity. We realize that new ideas can come from everywhere in the organization, and we know the next big idea could be yours!
Position summary:
The Senior Security Engineer position will be part of the Enterprise Security organization consisting of IAM professionals across several technologies. This specific position will have a specialized role in directory services and SaaS applications! It will focus on large implementations of Entra ID with integrations with other directories, IDPs, applications, and automated workflows. We give technical direction, administer tools, and provide support for various security technologies. We participate in driving Enterprise Security projects that use our cloud directory services for various internal and external Adobe services. We work with other specialists, architects, security teams, and software engineer teams across Adobe and collectively provide services, guidance, and strategies that protect services and data as well as adhere to various global government regulations. You will work with business customers, management teams, infrastructure teams, development teams, project managers, and other security teams to help implement the vision, structure, standards, and plan solutions that support the future architecture.
At Adobe, you will be immersed in an exceptional work environment that is recognized throughout the world on Best Companies lists! You will also be surrounded by colleagues who are committed to helping each other grow through our Check-In approach where ongoing feedback flows freely.
If you're looking to make an impact, Adobe is the place for you. Discover what our employees are saying about their career experiences on the Adobe Life blog and explore the meaningful benefits we offer.
Adobe is an equal opportunity employer. We welcome and encourage diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability or veteran status.
Primary Responsibilities May Include, but Are Not Limited To:
* Managing deep and complex directory architectures and services span directories, IDPs, and federated environments.
* Providing guidance and architecting solutions for directory service strategies across a variety of internal customers at Adobe.
* We help test, implement, and support secure services used by end-users, devices, and application workflows to all of Adobe.
* We engineer secure identity solutions for on-premises and cloud environments.
* We are a team of Security Engineers that handle incoming requests, respond to issues, solve reported problems, and develop solutions.
* We meet with teams to get business requirements, understand workflows, and devise solutions.
* We help assess SaaS implementations for identity integrations and general security.
* We generate useful metrics to help make decisions, identify issues, and manage our sevices.
Requirements:
* Possess a Bachelor's or advanced degree in MIS, Computer Science, Cybersecurity, or Engineering OR 10+ years in IT or Cybersecurity
* Comfortable working on and leading different projects with many teams at one time
* In-depth understanding of Windows, Mac and UNIX/Linux based systems, permissions, and interoperability.
* Strong knowledge of machine to machine and application to machine connections using MFA, certificates, tokens, and other methods.
* Strong understanding of the identity lifecycle, secure by design, least privileged and zero trust.
* An in-depth knowledge and understanding of managing and securing cloud directories (e.g. Entra ID/AWS/Okta) and integrating with traditional directories (e.g. Active Directory/389DS/ LDAP based directories).
* Proficient in written and verbal communications, skilled at working alongside differing viewpoints to accomplish shared objectives.
* Able to work independently and as a team member.
* Capable of conveying technical concepts to diverse audiences including non-technical users, architects, and senior leadership.
* Professional written, verbal, and presentation communication skills to engage with senior leadership.
* A deep understanding of Cloud Directories, especially Entra ID, and how to secure it, use conditional access policies, and apply/create automation.
* Ability to teach and mentor others while fostering a collaborative environment.
* Can model leadership behavior and help to grow other's leadership behavior.
Preferred:
* Understanding of Desktop operating systems including Windows, Linux, and Mac
* Experience or knowledge of Public Key Infrastructure
* Strong abilities in programming/scripting languages for automating repeatable tasks like Python, PowerShell, etc.
* Experience and/or Knowledge of dashboarding and log correlation engines such as Grafana, Telegraph, Splunk, etc.
* Experience with SaaS Security Posture Management technologies.
* Experience with developing PowerBI dashboards.
The Person Should:
* Have strong social skills, ability to "win people over" and be a great teammate.
* Be able to communicate, influence and mentor across business and executive leadership as well as partners while being able to explain the benefits for their teams.
* Be neutral toward technology, vendor and product choices; more interested in results than in personal preferences.
* Have the ability to think creatively and to solve complex tasks and problems with minimal direction.
Our compensation reflects the cost of labor across several U.S. geographic markets, and we pay differently based on those defined markets. The U.S. pay range for this position is $160,900 -- $297,400 annually. Pay within this range varies by work location and may also depend on job-related knowledge, skills, and experience. Your recruiter can share more about the specific salary range for the job location during the hiring process.
At Adobe, for sales roles starting salaries are expressed as total target compensation (TTC = base + commission), and short-term incentives are in the form of sales commission plans. Non-sales roles starting salaries are expressed as base salary and short-term incentives are in the form of the Annual Incentive Plan (AIP).
In addition, certain roles may be eligible for long-term incentives in the form of a new hire equity award.
State-Specific Notices:
California:
Fair Chance Ordinances
Adobe will consider qualified applicants with arrest or conviction records for employment in accordance with state and local laws and "fair chance" ordinances.
Colorado:
Application Window Notice
Nov 10 2025 12:00 AM
If this role is open to hiring in Colorado (as listed on the job posting), the application window will remain open until at least the date and time stated above in Pacific Time, in compliance with Colorado pay transparency regulations. If this role does not have Colorado listed as a hiring location, no specific application window applies, and the posting may close at any time based on hiring needs.
Massachusetts:
Massachusetts Legal Notice
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Adobe is proud to be an Equal Employment Opportunity employer. We do not discriminate based on gender, race or color, ethnicity or national origin, age, disability, religion, sexual orientation, gender identity or expression, veteran status, or any other applicable characteristics protected by law. Learn more.
Adobe aims to make Adobe.com accessible to any and all users. If you have a disability or special need that requires accommodation to navigate our website or complete the application process, email accommodations@adobe.com or call **************.
Senior Security Engineer
Cyber security analyst job in Lehi, UT
About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America.
Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information.
The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services.
Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response.
Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed.
While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities
Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes.
Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements.
Support or develop components of the security analytics platform.
Contribute to investigations, threat hunting, and incident response activities in a supporting role.
Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns.
Support the security operations team with the vulnerability management lifecycle for products and services under your purview.
Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities.
Required Skills, Knowledge & Abilities
Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences.
Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization.
Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments.
Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus).
Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble.
Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc.
Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases.
Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault.
Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed.
Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas.
Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments.
Experience engaging with vendors in design partnerships.
Experience overseeing vulnerability and threat management at the platform and application levels.
Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement.
Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution.
Additional Information Regarding Job Duties and s:
Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law.
If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today!
We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
Auto-ApplyInformation Assurance (IA) System Security Engineer (ISSE) I
Cyber security analyst job in Ogden, UT
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Computer Security, Information Assurance, Information System Security
Certifications:
None
Experience:
10 + years of related experience
US Citizenship Required:
Yes
Job Description:
The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration. The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position's main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them
Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems
Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts
Contributes to the development of new principles, concepts, and methodologies.
Works on unusually complex technical problems and provides highly innovative and ingenious solutions
Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs
Leads technical teams in implementation of predetermined long- range goals and objectives
Support customer and SAP community IA working groups, participate in SSE IPT reviews
Provides expert level consultation and technical services on all aspects of Information Security
Review ISSE related designs and provides security compliance recommendations
Develop and provide IA risk management recommendations to the customer
Assist with development and maintenance of the Program Protection Plan
Assist with site activation activities and design reviews
Interface and support the System Engineer (SE) on system security design, interoperability, and basic engineering endeavors implementing cybersecurity policy, system security engineering processes, and basic system engineering (SE) processes
Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings
Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes
Perform security assessments of servers/network devices/security appliances
Develop improvements to security assessments with regard to accuracy and efficiency
Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports
Write and execute cybersecurity test procedures for validation of control compliance
Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk
Analyze technical risk of emerging cybersecurity tools and processes
Work as part of a security incident response team as needed
Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists
Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels
Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper- V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office
Maintain relationship with System Engineer (SE). SSE is responsible for system security design, interoperability and basic engineering endeavors with a firm grasp of cybersecurity policy, system security engineering processes and system engineering processes
Experience:
10+ years related experience
SAP experience desired
Education:
Bachelor's degree in related discipline OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
Certifications:
IAM Level III or IAAE I - within 6 months of hire
Clearance Required to Start:
TS/SCI required
Must be able to Attain - TS/SCI with CI Polygraph
#AirforceSAPOpportunities
The likely salary range for this position is $141,355 - $191,245. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
10-25%
Telecommuting Options:
Onsite
Work Location:
USA UT Ogden
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyConcierge Security Engineer 2
Cyber security analyst job in Pleasant Grove, UT
At Arctic Wolf, we're not just navigating the cybersecurity landscape - we're redefining it. Our global team of dedicated Pack members is driving innovation and setting new industry standards every day. Our impact speaks for itself: we've earned recognition on the Forbes Cloud 100, CNBC Disruptor 50, Fortune Future 50, and Fortune Cyber 60 lists, and we recently took home the 2024 CRN Products of the Year award. We're proud to be named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services and earning a Customers' Choice distinction from Gartner Peer Insights. Our Aurora Platform also received CRN's Products of the Year award in the inaugural Security Operations Platform category. Join a company that's not only leading, but also shaping, the future of security operations.
Our mission is simple: End Cyber Risk. We're looking for a Concierge Security Engineer 2 to be part of making that happen.
About the Role:
The Concierge Security Engineer 2 (CSE2) is a key member of the Concierge Security Team that delivers world-class Arctic Wolf security services. The CSE2 supports the technical relationship with their assigned customers and leverages their skills and expertise to fulfill key responsibilities.
As a Concierge Security Engineer 2, you will:
* Create and maintain an outstanding partnership with customers;
* Support the direct delivery of Arctic Wolf network and endpoint security solutions to customers, including tasks such as investigating security events, and configuring, troubleshooting and verifying data sources;
* Action or escalate customer requests for guidance, information or support in a timely manner, including coordinating efforts with other teams, as needed.
* Proactively interact and communicate with internal and external stakeholders.
* To support effective communication and collaboration, this role requires on-camera participation (Zoom) during all customer and internal meetings.
The CSE2 role combines aspects of an IT Security Analyst, a Security Architect, and an Incident Response Consultant. A successful CSE2 possesses strong technical aptitude and an ability to communicate, educate, and share information effectively with non-technical people.
Who You Are:
You thrive in fast-paced environments and have a positive can-do attitude. You are a critical thinker that continually learns and can navigate uncertainty. You enjoy working with customers and in a team, are an excellent communicator, and are able to easily interact with a variety of people, personalities and technical skill levels. Above all, your passion for cybersecurity and partnering with customers shows in everything you do!
Your experience could look like:
* 1-5 years of experience in a hands-on security role with a good knowledge of security architecture
* Degree or diploma in a relevant field, or certifications and experience equivalent
* Strong partnering and relationship building skills in a professional context
* Strong communication skills, both written and verbal
* Strong analytical and problem-solving skills
Additional skills and experience:
* Security testing and forensics tools
* Malware analysis
* Scripting/Coding experience
* Incident response
* Authentication and identity management
* Risk management, assessment and common compliance frameworks
* Penetration testing and attack simulation
On-Camera Policy
* To support a fair, transparent, and engaging interview experience, candidates interviewing remotely are expected to be on camera during all video interviews.
* Being on camera fosters authentic connection, improves communication, and allows for full engagement from both candidates and interviewers.
* We understand that technical, bandwidth, or location-related challenges may occasionally prevent video use. If this applies, candidates are required to notify us in advance so we can explore appropriate accommodations.
About Arctic Wolf
At Arctic Wolf, we foster a collaborative and inclusive work environment that thrives on diversity of thought, background, and culture. This is reflected in our multiple awards, including Top Workplace USA (2021-2024), Best Places to Work - USA (2021-2024), Great Place to Work - Canada (2021-2024), Great Place to Work - UK (2024), and Kununu Top Company - Germany (2024). Our commitment to bold growth and shaping the future of security operations is matched by our dedication to customer satisfaction, with over 7,000 customers worldwide and more than 2,000 channel partners globally. As we continue to expand globally and enhance our technology, Arctic Wolf remains the most trusted name in the industry.
Our Values
Arctic Wolf recognizes that success comes from delighting our customers, so we work together to ensure that happens every day. We believe in diversity and inclusion, and truly value the unique qualities and unique perspectives all employees bring to the organization. And we appreciate that-by protecting people's and organizations' sensitive data and seeking to end cyber risk- we get to work in an industry that is fundamental to the greater good.
We celebrate unique perspectives by creating a platform for all voices to be heard through our Pack Unity program. We encourage all employees to join or create a new alliance. See more about our Pack Unity here.
We also believe and practice corporate responsibility, and have recently joined the Pledge 1% Movement, ensuring that we continue to give back to our community. We know that through our mission to End Cyber Risk we will continue to engage and give back to our communities.
All wolves receive compelling compensation and benefits packages, including:
* Equity for all employees
* Flexible time off and paid volunteer days
* RRSP and 401k match
* Training and career development programs
* Comprehensive private benefits plan including medical, mental health, dental, disability, life and AD&D, and value-added services
* Robust Employee Assistance Program (EAP) with mental health services
* Fertility support and paid parental leave
Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race, color, religion, sex, orientation, national origin, age, disability, genetics, or any other basis forbidden under federal, provincial, or local law. Arctic Wolf is committed to fostering a welcoming, accessible, respectful, and inclusive environment ensuring equal access and participation for people with disabilities. As such, we strive to make our entire employee experience as accessible as possible and provide accommodations as required for candidates and employees with disabilities and/or other specific needs where possible. Please let us know if you require any accommodations by emailing *************************.
Security Requirements
* Conducts duties and responsibilities in accordance with AWN's Information Security policies, standards, processes and controls to protect the confidentiality, integrity and availability of AWN business information (in accordance with our employee handbook and corporate policies).
* Background checks are required for this position.
* This position may require access to information protected under U.S. export control laws and regulations, including the Export Administration Regulations ("EAR"). Please note that, if applicable, an offer for employment will be conditioned on authorization to receive software or technology controlled under these laws and regulations.
Auto-ApplyConcierge Security Engineer 3
Cyber security analyst job in Pleasant Grove, UT
At Arctic Wolf, we're not just navigating the cybersecurity landscape - we're redefining it. Our global team of dedicated Pack members is driving innovation and setting new industry standards every day. Our impact speaks for itself: we've earned recognition on the Forbes Cloud 100, CNBC Disruptor 50, Fortune Future 50, and Fortune Cyber 60 lists, and we recently took home the 2024 CRN Products of the Year award. We're proud to be named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services and earning a Customers' Choice distinction from Gartner Peer Insights. Our Aurora Platform also received CRN's Products of the Year award in the inaugural Security Operations Platform category. Join a company that's not only leading, but also shaping, the future of security operations.
Our mission is simple: End Cyber Risk. We're looking for a Concierge Security Engineer 3 to be part of making that happen.
About the Role:
The Concierge Security Engineer supports the technical relationship with their
assigned customers and leverages their skills and expertise to create and maintain an outstanding partnership with customers around the provision of security services.
As a Concierge Security Engineer, you will:
Creating and maintaining a partnership with our customers
Analyze log and system data
Interact with, and manage, internal and external stakeholders
Communicate, educate, and share information with non-technical people
Help our customers diagnose problems as well as support specific customer requests
Primary technical point of contact for our customers
Champion for our customers within the Arctic Wolf Team
Mentoring junior analysts with their technical and soft skills
To support effective communication and collaboration, this role requires on-camera participation (Zoom) during all customer and internal meetings
This is a role that combines aspects of an IT Security Analyst, Security Architect, Incident Response Consultant, a Security Sales Engineer, and Technical Support. The CSE will be responsible for implementing, overseeing, managing, and supporting the network security infrastructure for multiple enterprises by leveraging Arctic Wolf's cloud infrastructure and their expertise in a wide variety of fields. The CSE works in a team along with an assigned Concierge Security Analyst and Customer Success Managers. Arctic Wolf CSEs develop strong working relationships with our customers and feel ownership over their security posture.
We are looking for someone who has most of the following:
3+ years in Information Security, Network Security, or Cyber Security
3+ years additionally as a Network Admin, System Admin, Cloud Admin, or similar is strongly preferred
Have a detailed understanding of Enterprise IT Security, including: Firewalls, Intrusion Detection, Antivirus, Content Filtering, and Proxies
Have an understanding of Enterprise IT Operations, including: Networking, Active Directory, LDAP, Windows Server, and Cloud Infrastructures
Analyze log and system data from the above list and other IT systems
Know how to use one or more scripting tools and languages such as Python, Bash, and Power Shell
Great writing and speaking skills
Excellent relationship building skills in a professional context
A positive “can-do” attitude
A willingness to learn and continuous self-improvement
There are no specific degree or certification requirements but degrees in engineering or technology are a plus. Any security or IT certification such as CISSP is also positive.
Additional skills and experience:
Security forensics
Malware analysis
E-discovery
Threat containment
Firewall and IDS provisioning
Proxy and content filtering provisioning
Authentication and identify management
Risk and vulnerability Assessment
Network and security Auditing
Network troubleshooting
Penetration testing
Attack simulation
PowerPoint presentation skills
On-Camera Policy
To support a fair, transparent, and engaging interview experience, candidates interviewing remotely are expected to be on camera during all video interviews.
Being on camera fosters authentic connection, improves communication, and allows for full engagement from both candidates and interviewers.
We understand that technical, bandwidth, or location-related challenges may occasionally prevent video use. If this applies, candidates are required to notify us in advance so we can explore appropriate accommodations.
About Arctic Wolf
At Arctic Wolf, we foster a collaborative and inclusive work environment that thrives on diversity of thought, background, and culture. This is reflected in our multiple awards, including Top Workplace USA (2021-2024), Best Places to Work - USA (2021-2024), Great Place to Work - Canada (2021-2024), Great Place to Work - UK (2024), and Kununu Top Company - Germany (2024). Our commitment to bold growth and shaping the future of security operations is matched by our dedication to customer satisfaction, with over 7,000 customers worldwide and more than 2,000 channel partners globally. As we continue to expand globally and enhance our technology, Arctic Wolf remains the most trusted name in the industry.
Our Values
Arctic Wolf recognizes that success comes from delighting our customers, so we work together to ensure that happens every day. We believe in diversity and inclusion, and truly value the unique qualities and unique perspectives all employees bring to the organization. And we appreciate that-by protecting people's and organizations' sensitive data and seeking to end cyber risk- we get to work in an industry that is fundamental to the greater good.
We celebrate unique perspectives by creating a platform for all voices to be heard through our Pack Unity program. We encourage all employees to join or create a new alliance. See more about our Pack Unity here.
We also believe and practice corporate responsibility, and have recently joined the Pledge 1% Movement, ensuring that we continue to give back to our community. We know that through our mission to End Cyber Risk we will continue to engage and give back to our communities.
All wolves receive compelling compensation and benefits packages, including:
· Equity for all employees
· Flexible time off and paid volunteer days
· RRSP and 401k match
· Training and career development programs
· Comprehensive private benefits plan including medical, mental health, dental, disability, life and AD&D, and value-added services
· Robust Employee Assistance Program (EAP) with mental health services
· Fertility support and paid parental leave
Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race, color, religion, sex, orientation, national origin, age, disability, genetics, or any other basis forbidden under federal, provincial, or local law. Arctic Wolf is committed to fostering a welcoming, accessible, respectful, and inclusive environment ensuring equal access and participation for people with disabilities. As such, we strive to make our entire employee experience as accessible as possible and provide accommodations as required for candidates and employees with disabilities and/or other specific needs where possible. Please let us know if you require any accommodations by emailing *************************.
Security Requirements
Conducts duties and responsibilities in accordance with AWN's Information Security policies, standards, processes and controls to protect the confidentiality, integrity and availability of AWN business information (in accordance with our employee handbook and corporate policies).
Background checks are required for this position.
This position may require access to information protected under U.S. export control laws and regulations, including the Export Administration Regulations (“EAR”). Please note that, if applicable, an offer for employment will be conditioned on authorization to receive software or technology controlled under these laws and regulations.
Auto-ApplyApplication Security Engineer
Cyber security analyst job in Salt Lake City, UT
Job Details 110 S. REGENT STREET SUITE 500 - SALT LAKE CITY, UTDescription
Here at Priority Dispatch, we know that protecting lives starts with the right protocols, training, and ensuring systems are safe and reliable. We're looking to hire a full time Application Security Engineer to use their expertise to build and defend secure systems that support our mission of delivering life saving dispatch systems! This is your chance to join an award winning company while having your work contribute and make a direct impact for good in communities around the world.
We offer benefits that include medical, dental, vision, legal, and pet insurance, 401K and company contributions, PTO, short and long term disability and life insurance, and more while having meaningful work at a company that's been voted as a top place to work in Utah for the past 5 years running! Come see why our teams love to work here!
Job Summary
We are seeking an experienced Application Security Engineer to secure our web and desktop applications by implementing and managing SAST, DAST, and SCA processes. This role partners with developers, QA, and DevOps to embed security into CI/CD pipelines, conduct code reviews, and promote secure coding practices. The ideal candidate has deep expertise in OWASP Top Ten risks, API security, and threat modeling, with experience addressing unique challenges in desktop applications where automation is limited. Familiarity with cloud-native and AI-driven systems is essential, along with knowledge of compliance frameworks such as ISO 27001, NIST, CMMC, and Cyber Essentials. This position reports to the Director of Enterprise Solutions and Technology and plays a critical role in strengthening the organization's overall security posture. This is a hybrid role based in Salt Lake City, Utah.
Major Responsibilities
Ensure all application code is thoroughly tested and scanned for risks, vulnerabilities, and third-party dependencies using SAST, DAST, and SCA tools.
Provide additional attention to desktop applications where automated security tooling may be limited, developing custom solutions as needed.
Conduct penetration testing on core products, as well as other web applications and public-facing websites.
Design and implement security controls for APIs, including secure authentication, authorization, and protection against common threats such as cross-site request forgery (CSRF).
Collaborate with development teams to integrate Identity and Access Management (IAM) solutions aligned with least privilege and zero trust principles.
Serve as a key contributor to the security architecture and design of software systems, working closely with engineering teams to embed security into technical decisions.
Participate in the internal Security Council, contributing to strategic decisions and security governance.
Lead training initiatives for developers, QA, and DevOps teams to promote secure design principles and a security-first mindset.
Collaborate with engineering teams to integrate security into the software development lifecycle (SDLC).
Perform threat modeling and risk assessments to identify and mitigate potential vulnerabilities early in the development process.
Stay current with evolving security regulations, compliance standards, and emerging threats, ensuring organizational alignment and readiness.
Qualifications
Qualifications
Bachelor's degree in Computer Science, Information Security, or a related field.
3-5 years of experience in application security, software development, or related technical roles.
Strong understanding of secure coding practices, OWASP Top Ten, and software security testing methodologies.
Hands-on experience with SAST, DAST, and SCA tools and techniques.
Ability to develop custom scripts and automation to support security scanning, especially for desktop applications where tooling may be limited.
Familiarity with penetration testing, threat modeling, and secure architecture design.
Knowledge of API security, IAM, authentication and authorization protocols, and common web vulnerabilities such as CSRF and XSS.
Experience working with cloud-native applications and modern development environments.
Familiarity with security regulations and compliance frameworks such as ISO 27001, SOC 2, and GDPR.
CISSP or other relevant security certifications (e.g., OSCP, CSSLP) preferred.
Excellent communication skills and ability to collaborate across engineering, QA, and DevOps teams.
Physical Requirements/Essential Job Functions
Design and implement security controls to ensure all application code is tested and up to security standards
Conducting testing on core products, web applications, and other public facing websites to identify and reduce security threats
Collaborate closely with development teams to provide security guidance into technical decisions
Ability to multi-task technical problems efficiently
Ability to communicate technical concepts to both users and programmers effectively.
Problem-solving
Frequent computer and telephone use
Sitting for long periods of time
Concentrating for long periods of time.
Occasional travel of less than 10% may be required.
Our Company: Priority Dispatch Corp. is an Equal Opportunity Employer. We are a small, fast-growing provider of consulting, training, and software products for the public safety market. Priority Dispatch is based in the U.S. in downtown Salt Lake City, Utah. We offer a comprehensive benefits package including medical, dental, and matching 401(k) programs, etc. Priority Dispatch Corp. (PDC) provides comprehensive, integrated solutions for Police, Fire, and Medical emergency dispatching. We incorporate the Priority Dispatch System approved by the International Academies of Emergency Dispatch in all our products. PDC offers multi-agency emergency dispatching ProQA software, as well as a card-set version, AQUA quality improvement software, training, consulting, and Academy accreditation support. ************************
Security Engineer
Cyber security analyst job in Orem, UT
The Security Engineer works under the general direction of the Information Security Officer (ISO). This position is responsible for the engineering, administration, monitoring, and maintenance of the City's information security systems, tools, and controls.
The Security Engineer supports City-wide information security efforts by managing security controls, monitoring security events, assisting with incident response, supporting governance and compliance initiatives, and ensuring that technical safeguards are properly configured and maintained.
This role may serve as a hybrid position that incorporates both technical and administrative responsibilities.
The Security Engineer assists with related IT infrastructure and services, cybersecurity and information governance programs, participates in compliance and data management activities, and collaborates with various work groups to ensure security practices align with City policies, standards, and regulatory requirements.
ESSENTIAL DUTIES AND FUNCTIONS: Engineer, administer, configure, monitor, and maintain the City's information security systems, including to but not limited to: endpoint protection platforms, email and web security tools, identity and access management systems, logging and monitoring systems, authentication infrastructure, and other security related services.
Assist in user lifecycle management, security groups, access privileges, and authentication controls for proper authorization and least-privilege access to City systems.
Monitor security alerts, analyze logs and events, and escalate issues as needed.
Assist in the detection, containment, and remediation of cybersecurity incidents.
Assist the ISO and City IT Division with implementation of the City's information security and privacy programs, ensuring alignment with applicable regulations, including CJIS/UCJIS, PCI-DSS, GDPA, and other relevant standards.
Perform routine security audits of systems, configurations, access controls, and data-handling practices to support compliance and the security posture.
May assist with vendor and third-party risk assessments to ensure alignment with City security and privacy requirements.
Maintain documentation, including system configurations, procedures, asset records, incident logs, and compliance evidence.
Support the City's security posture by performing vulnerability scans, reviewing findings, and coordinating remediation with IT, Software Development, and other business units.
Assist in the maintenance of disaster recovery, backup, and business continuity playbooks; support recovery activities as directed.
Provide technical support to City staff regarding cybersecurity tools, access controls, and secure computing practices.
Control or assist with security awareness training and facilitate cybersecurity best-practice education for City employees.
Work cohesively with all City business units, vendors, and outside governmental agencies as required.
Performs other duties as assigned.
Operational knowledge of security technologies, including antivirus/EDR, MFA, IAM, SIEM/logging tools, email security, firewalls, and endpoint management systems.
Working knowledge of Windows Desktop/Server, Active Directory, Azure AD, group policies, and identity management concepts (OpenID, SAML, OAuth) Working knowledge of network security concepts including VLANs, VPNs, DNS, CHDP, and authentication protocols.
Understanding of cybersecurity frameworks and standards such as CIS Controls, NIST, and ISO.
Knowledge of regulatory and compliance requirements applicable to City information systems including CJIS, PCI-DSS, GDPA, and GRAMA.
Ability to analyze logs, alerts, and events from various security systems and identify suspicious or malicious activity.
Ability to troubleshoot security and systems issues and perform routine maintenance on security tools and computing infrastructure.
Ability to create and maintain documentation, procedures, checklists, and records related to security operations.
Strong communications skills, with the ability to explain technical security concepts to both technical and non-technical audiences.
Ability to work independently or as part of a team, manage competing priorities, and adapt to changing security threats and business needs.
Demonstrates professionalism, integrity, courtesy, and respect in interactions with co-workers, management, vendors, and the public.
Continually gains knowledge of new security technologies and practices by reading and understanding technical publications and attending training as assigned.
Requires a Bachelor's Degree in Computer Science, Information Technology, Cybersecurity, or a related field; or 4 years of experience in information security, systems administration, or related disciplines; or a combination of education and experience commensurate with the requirements of this position.
Industry-recognized certifications (e.
g.
, Security+, CySA+, SSCP, CC, or similar) are desired.
Maintains a valid Utah Driver's License.
Individual starting salary will depend on qualifications, certifications, and experience.
The City also provides a comprehensive and competitive benefits package.
Full TimeThose interested in applying should submit their application online.
ONLY THE INFORMATION ON OR ATTACHED TO THE APPLICATION WILL BE USED FOR SCREENING PURPOSES.
Sr. Security Analyst
Cyber security analyst job in South Jordan, UT
Job Description
Lightspeed is a leading provider of cloud-based software for dealerships and Original Equipment Manufacturers (OEMs), serving the Powersport, Marine, RV, Trailer, Outdoor Power Equipment, and Golf Cart industries. Lightspeed's Dealer Management Solution (DMS) enables dealerships to optimize their end-to-end business operations, including sales, parts, service, rentals, accounting, and Customer Relationship Management (CRM). When implemented into their daily operations, Lightspeed helps dealers increase their profitability by selling more units, service, and parts, all while creating a more streamlined experience for customers. For nearly 40 years, Lightspeed has been empowering 4,500+ dealers across North America with the tools and technology they need to manage their dealerships.
The Senior Security Analyst is responsible for team lead activities, such as monitoring, analyzing, and responding to security incidents across enterprise systems, cloud environments, and networks. This role ensures the confidentiality, integrity, and availability of organizational information through proactive detection, incident response, and continuous improvement. The ideal candidate will have a strong technical background in leading threat analysis, SIEM integration and management, vulnerability management, and incident handling.
What you'll do:
Monitor and investigate security alerts and events across SIEM, EDR, and network systems.
Conduct root cause analysis and coordinate remediation of security incidents.
Lead vulnerability assessments and ensure timely patching and mitigation.
Develop and maintain incident response playbooks and escalation procedures.
Collaborate with IT, DevOps, and Development teams to strengthen overall security posture.
Lead proactive threat hunting and continuous tuning of detection mechanisms.
Support internal and external audits (e.g., SOC 2) and risk assessments by providing evidence and guidance.
Perform firewall management, including rule changes, troubleshooting, and SOP development for hybrid cloud/on-prem environments.
Lead to red/blue team exercises and implement findings to improve defenses.
Coordinate and assist with enterprise pen-tests, risk assessments, and compliance initiatives.
Serve as a lead security advisor to business and technical teams, providing guidance on secure design, risk mitigation, and compliance using industry frameworks and best practices.
What you should have:
Qualifications:
Bachelor's degree in Cybersecurity, Information Technology, or a related field, or equivalent experience.
8+ years of experience in information security, incident response, or SOC operations.
Proven hands-on experience with SIEM tools (Splunk, Sentinel, QRadar, etc.) and EDR/XDR platforms (CrowdStrike, Darktrace, Microsoft Defender).
Strong experience securing and monitoring cloud environments (AWS, Azure).
Deep knowledge of security frameworks (NIST CSF, ISO 27001, SOC 2).
Advanced scripting and automation proficiency (Python, PowerShell, Terraform).
Excellent analytical, problem-solving, and communication skills.
Preferred Qualifications:
Relevant certifications such as AWS Security, CISSP, GCIH, GCIA, GPEN, GWAPT preferred.
Experience integrating AI and automation into security operations workflows.
Hands-on experience performing dynamic application security testing and red team exercises across endpoint and cloud environments.
Expert-level networking and firewall expertise with platforms such as Palo Alto, Cisco, or Checkpoint.
Master's degree in Cybersecurity, Information Technology, or a related field.
Inclusion and Diversity at Lightspeed:
At Lightspeed, we celebrate the uniqueness of every individual and encourage diverse perspectives. We believe that inclusion drives innovation and fosters meaningful connections. We are committed to building an environment where everyone feels valued and empowered to make an impact.
Equal Employment Opportunity Statement:
Lightspeed is an Equal Opportunity Employer and is dedicated to building a diverse and inclusive workforce. All qualified applicants will be considered for employment without regard to race, color, creed, ancestry, national origin, gender, sexual orientation, gender identity, gender expression, marital status, religion, age, disability, veteran status, or any other protected category.
Important Note:
Applicants must be authorized to work in the U.S.
Ready to apply?
Take the next step in your career-apply today and join a team where your skills will make an impact!
Engineer, Information Security and Risk
Cyber security analyst job in Salt Lake City, UT
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Analysts
Cyber security analyst job in Salt Lake City, UT
Information Security Analysts The incumbent will play a critical role in safeguarding regulated data across the enterprise by monitoring and analyzing the organization's data security posture. This position focuses on configuring Data Security Posture Management ( DSPM ) settings and policies, interpreting results, creating reports, identifying risks, and ensuring compliance. The analyst will take a risk-based approach to assess and remediate issues related to unauthorized storage or transmission of regulated data across cloud and on-premise environments. Learn more about the great benefits of working for University of Utah: benefits.utah.edu The department may choose to hire at any of the below job levels and associated pay rates based on their business need and budget.
Responsibilities
Data Security Monitoring -Review and analyze DSPM tool outputs to identify misconfigurations, unauthorized data flows, and storage of regulated data in non-approved locations. -Monitor the movement of sensitive data across cloud and on-prem systems, ensuring compliance with internal policies and regulatory requirements. Risk Assessment & Governance -Apply a risk-based methodology to prioritize remediation efforts. -Maintain applicable risk register entries and document findings for governance reporting. Collaboration -Partner with the Enterprise Security team to validate technical controls. -Work closely with the Chief Data Officer and Privacy Office to align DSPM findings with data governance and privacy requirements. Compliance & Policy Alignment -Ensure adherence to frameworks such as NIST CSF , CIS 18, and other applicable regulations (e.g., HIPAA , FERPA , etc. etc.). -Support audits and compliance reviews by providing DSPM -related evidence. Reporting & Communication -Prepare dashboards and reports for leadership summarizing DSPM findings, trends, and risk posture. -Communicate actionable insights to stakeholders in clear, business-focused language.
Minimum Qualifications
EQUIVALENCY STATEMENT : 1 year of higher education can be substituted for 1 year of directly related work experience (Example: bachelor's degree = 4 years of directly related work experience). Department may hire employee at one of the following job levels: Information Security Analyst, III : Requires a bachelor's (or equivalency) + 6 years or a master's (or equivalency) + 4 years of directly related work experience. Information Security Analyst, IV: Requires a bachelor's (or equivalency) + 8 years or a master's (or equivalency) + 6 years of directly related work experience. Information Security Analyst, V: Requires a bachelor's (or equivalency) + 10 years or a master's (or equivalency) + 8 years of directly related work experience.