Post job

Cyber security analyst jobs in Eau Claire, WI

- 182 jobs
All
Cyber Security Analyst
Information Security Analyst
Cyber Security Specialist
Information Security Engineer
Cyber Security Engineer
Senior Cyber Security Analyst
Senior Security Engineer
Security Engineer
Security System Engineer
Senior Security Analyst
  • Cyber Security Engineer

    Mars Solutions Group 4.7company rating

    Cyber security analyst job in Milwaukee, WI

    We're seeking a senior cybersecurity engineer to design, build, and operationalize enterprise grade data protection capabilities anchored in Microsoft E5. You will lead engineering for Microsoft Purview (Information Protection & DLP, eDiscovery/Audit), Sensitivity Labels, and related guardrails-integrating telemetry and enforcement through Zscaler, CrowdStrike, and Splunk. This role bridges secure-by-default platform engineering with pragmatic automation to protect regulated data (e.g., PHI/PII) at scale. Senior leadership has prioritized accelerating Copilot and E5 controls adoption, creating a high impact opportunity to shape how we protect data across SaaS and AI workloads. What You'll Do Engineer secure-by-default E5 data protection • Design and implement Microsoft Purview DLP policies (endpoint, Exchange, SharePoint, OneDrive, Teams) and Sensitivity Label taxonomy with automated enforcement paths. • Build policy-as-code pipelines (CI/CD) to version, test, and deploy DLP rules, label configs, and governance artifacts in multiple environments. Integrate Zscaler, CrowdStrike, and Splunk • Connect Zscaler SSE inspection with Purview controls; route events to Splunk for analytics, dashboards, and detections that close visibility and enforcement loops. • Leverage CrowdStrike telemetry (e.g., Falcon/Shield) to correlate endpoint behaviors with data movement signals for insider risk and exfiltration use cases. Build automations & guardrails • Develop services and workflows (e.g., Azure Functions, Logic Apps, Graph API) to auto remediate mislabels, revoke risky shares, and notify data owners. • Implement secure-by-default configuration baselines and drift detection for E5 security controls (MCAS/Defender for Cloud Apps, Conditional Access, etc.). Operate and continuously improve • Own reliability for data protection pipelines: SLIs/SLOs, runbooks, and incident playbooks in partnership with Insider Risk team. • Create Splunk content (data models, dashboards, correlation searches) aligned to exfiltration, anomalous access, and label violations. • Partner with Privacy and Compliance for audit ready controls (eDiscovery/Audit), evidence, and exception processes. Collaborate across security & platform teams • Work with PSO, IAM, and Insider Risk to align label taxonomy and enforcement with business workflows and least privilege access. • Provide technical leadership and mentoring for engineers/analysts rolling out new E5 features and operational support. Required Qualifications • 5+ years engineering experience in enterprise security or platform engineering; hands-on with Microsoft E5 security stack (Purview DLP, Information Protection, eDiscovery). • Proven expertise building policy as code for DLP/labels (GitHub/Azure DevOps), and automating Graph/PowerShell administration. • Demonstrated ability to design secure-by-default guardrails and support rapid SaaS/AI adoption (including Copilot) without compromising compliance. Nice to Have • Strong background in data protection for regulated data (PII/PHI), insider risk detection, and evidence driven investigations. • Production experience with Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon APIs/telemetry), and Splunk (TA configs, CIM, correlation searches). • Experience migrating from legacy DLP (e.g., Forcepoint) to Microsoft DLP; building vendor neutral dictionaries and detection logic. • Familiarity with MCAS/Defender for Cloud Apps, conditional access policies, and SSPM evaluations. • Background in HIPAA/PHI audit support and exception governance workflows. Success Metrics (first 6-12 months) • DLP policy efficacy: reduction in unauthorized shares/exports; mean time to remediate violations. • Label coverage & accuracy: % of sensitive content labelled; false positive/negative rate trends. • Telemetry integration: end-to-end event flow (Purview → Zscaler/CrowdStrike → Splunk) with actionable detections. • Secure-by-default adoption: # of guardrails implemented; drift detected/resolved; Copilot controls baselined. • Audit readiness: evidence completeness for eDiscovery/Audit; exception closure rates. Tools & Technologies (primary) • Microsoft E5 / Purview: Information Protection, DLP, eDiscovery/Audit, Insider Risk • Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon/Shield), Splunk (CIM, ES) • Automation: GitHub, Graph API, PowerShell, Azure Functions/Logic Apps • Data flows: Exchange/SharePoint/OneDrive/Slack, endpoints, web proxies, CASB/SSE
    $96k-116k yearly est. 3d ago
  • Senior Cyber Security Engineer - 4825

    Tier4 Group

    Cyber security analyst job in Milwaukee, WI

    About the Role Join a specialized team of analysts and engineers dedicated to detecting and responding to insider risk events. This senior-level role focuses on engineering Microsoft E5 tools to strengthen enterprise data protection and insider threat detection capabilities. You will lead the design, build, and operationalization of secure-by-default solutions anchored in Microsoft Purview and related technologies, ensuring compliance and resilience at scale. Key Responsibilities Engineer Secure-by-Default E5 Data Protection Design and implement Microsoft Purview DLP policies across endpoints, Exchange, SharePoint, OneDrive, and Teams. Develop and maintain Sensitivity Label taxonomy with automated enforcement paths. Build Policy-as-Code Pipelines Create CI/CD workflows to version, test, and deploy DLP rules, label configurations, and governance artifacts across multiple environments. Integrate Security Telemetry Connect Zscaler SSE inspection with Purview controls; route events to Splunk for analytics and detection. Leverage CrowdStrike telemetry to correlate endpoint behaviors with data movement signals for insider-risk and exfiltration scenarios. Develop Automations & Guardrails Build services and workflows (Azure Functions, Logic Apps, Graph API) for auto-remediation, revoking risky shares, and notifying data owners. Implement configuration baselines and drift detection for E5 security controls (MCAS, Conditional Access, etc.). Operate and Continuously Improve Maintain reliability for data protection pipelines, including SLIs/SLOs, runbooks, and incident playbooks. Create Splunk dashboards and correlation searches aligned to exfiltration, anomalous access, and label violations. Collaborate Across Teams Partner with Privacy and Compliance for audit-ready controls and evidence processes. Work with IAM, Insider Risk, and platform teams to align label taxonomy and enforcement with business workflows. Provide technical leadership and mentorship for engineers and analysts implementing new E5 features. Required Qualifications 5+ years of experience in enterprise security or platform engineering. Hands-on expertise with Microsoft E5 security stack (Purview DLP, Information Protection, eDiscovery). Proven ability to build policy-as-code for DLP/labels and automate administration using Graph API and PowerShell. Experience designing secure-by-default guardrails for SaaS/AI adoption, including Copilot. Preferred Qualifications Strong background in data protection for regulated data (PII/PHI) and insider-risk detection. Experience with Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon APIs/telemetry), and Splunk (CIM, correlation searches). Familiarity with MCAS, Defender for Cloud Apps, and conditional access policies. Knowledge of HIPAA/PHI audit support and exception governance workflows. Success Metrics (First 6-12 Months) Improved DLP policy efficacy and reduced unauthorized data movement. Increased label coverage and accuracy for sensitive content. End-to-end telemetry integration across Purview, Zscaler, CrowdStrike, and Splunk. Secure-by-default adoption and Copilot controls baselined. Audit readiness with complete evidence and exception closure rates. Tools & Technologies Microsoft E5 / Purview: Information Protection, DLP, eDiscovery/Audit, Insider Risk Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon/Shield), Splunk (CIM, ES) Automation: GitHub, Graph API, PowerShell, Azure Functions/Logic Apps
    $81k-110k yearly est. 1d ago
  • Senior Security Engineer

    Eclaro 4.2company rating

    Cyber security analyst job in Owatonna, MN

    Candidates Only no 3rd Party Candidates! Company is seeking a Senior Security Engineer or Security Solutions Architect with deep experience in Zscaler Internet Access (ZIA) and Secure Web Gateway (SWG) solutions. The resource will review and assess the current Zscaler deployment, identify best practices, implement configuration and policy improvements, and optimize workflows to improve security posture and user experience. Key Responsibilities Assess Company's current Zscaler ZIA (SWG) deployment and provide best practice recommendations. Perform configuration updates, policy tuning, and remediations based on assessment findings. Review and optimize the website approval workflow, reducing turnaround time for URL requests (currently 2-3 days). Implement granular Zscaler policies allowing differentiated access based on user identity (e.g., allow downloads but restrict uploads). Assist with Zscaler DLP policy design and management. Develop and document end-user and administrator processes, ensuring consistency and clarity. Identify opportunities to automate policy or workflow management via scripting or ServiceNow integrations. Collaborate with internal teams (SOC, Engineering, GRC) to align configurations with security requirements. Required Qualifications 7+ years of experience in IT security engineering or architecture. Proven expertise with Zscaler Internet Access (ZIA) and Secure Web Gateway (SWG) design, deployment, and optimization. Working knowledge of Zscaler Private Access (ZPA) and Zscaler DLP. Strong understanding of enterprise networking, including firewalls, proxies, and DNS. Experience designing and implementing identity-based policies within Zscaler. Familiarity with Zero Trust architecture, encryption, and access control principles. Proficiency in Python scripting or API integration for automation and workflow improvements. Experience integrating with ServiceNow or similar platforms. Excellent communication skills and ability to operate independently in a fast-paced environment. Strong process orientation with proven experience analyzing, optimizing, and documenting workflows.
    $93k-122k yearly est. 2d ago
  • Security Engineer (28801)

    Dahl Consulting 4.4company rating

    Cyber security analyst job in Brooklyn Park, MN

    Title: Security Engineer Job Type: Contract (12 months) Compensation: $90.00 - $112.00 per hour (W2) Industry: Retail --- About the Role We are seeking a Security Engineer to join a leading organization in the retail and e-commerce industry. This role focuses on implementing secure identity frameworks and workload authentication across distributed systems. You will work on cutting-edge technologies to ensure secure communication between services in a dynamic, large-scale environment. Job Description As a Security Engineer, you will be responsible for designing, deploying, and maintaining SPIFFE/SPIRE-based identity solutions. You will integrate these frameworks with container orchestration platforms, service meshes, and proxy workloads to enhance security posture. This position requires hands-on experience with SPIRE components and the ability to customize attestors and identity issuance workflows. Key responsibilities include: Deploy and manage SPIRE Server and SPIRE Agent in production environments. Design and implement secure workload identity solutions using SPIFFE IDs and trust domains. Build or customize workload and node attestors to meet organizational needs. Implement SVID issuance and rotation for X.509 and JWT formats. Integrate SPIRE with Kubernetes clusters, service meshes (e.g., Istio, Linkerd), and Envoy-based workloads. Collaborate with cross-functional teams to ensure seamless identity management across distributed systems. Qualifications Required: Proven hands-on experience deploying and managing SPIRE Server and SPIRE Agent. Strong understanding of SPIFFE IDs, trust domains, and workload identity concepts. Experience designing and implementing SVID issuance and rotation (X.509/JWT). Ability to build or customize workload and node attestors. Practical experience integrating SPIRE with Kubernetes, service meshes (Istio, Linkerd), and Envoy-based workloads. Preferred: Background in large-scale distributed systems or cloud-native environments. Familiarity with container security and zero-trust architectures. Experience with scripting or automation tools for identity management. Knowledge of TLS, PKI, and cryptographic principles. --- Benefits Dahl Consulting is proud to offer a comprehensive benefits package to eligible employees that will allow you to choose the best coverage to meet your family's needs. For details, please review the DAHL Benefits Summary: *********************************************** Equal Opportunity Statement As an equal opportunity employer, Dahl Consulting welcomes candidates of all backgrounds and experiences to apply. If this position sounds like the right opportunity for you, we encourage you to take the next step and connect with us. We look forward to meeting you!
    $72k-99k yearly est. 3d ago
  • Senior Cyber Security Analyst

    P&T Business Platforms

    Cyber security analyst job in Minnetonka, MN

    Senior Cyber Security Analyst - 180001PV) This role will be part of the Cyber Security Operations team within CWT's Global Security and Risk department at our Minnetonka office.You will support the global operations by participating in the security incident response program and identifying vulnerabilities via standard penetration testing assessments and identifying threats posing a genuine risk to CWT. This information will enable CWT to proactively adjust its defensive posture. We are seeking an individual to be part of the team, to help as it grows with maturity. The team will carry out or coordinate (third parties) penetration testing across a number of environments including infrastructure, web app, and mobile platforms. In addition, you will collect and distribute Cyber Threat Intelligence as it relates to CWT. The role offers some exciting opportunities including the potential to develop your talents and skills, and investigating in more detail vulnerabilities and techniques that could be used against CWT. - Ability to create investigation results into a report- Ability to influence others where there is no direct authority- Data analysis, Network, OS systems (Windows, Unix, Linux)- Strong technical background and great understanding on emerging security trends- Deep technical knowledge IT Network, Infrastructure, Software, Cloud, Mobile- Red Team experience or experience of using Open Source and COTS for penetration testing which could include Nmap, Nessus, Metasploit, Kali Linux, Burp Suite Pro and similar - Experience in common scripting languages such as Python, Ruby, LUA, Powershell or BASH - Experience in at least one development language e.g. Java, C, C# or similar - A good understanding of Cloud based architectures primarily AWS Qualifications - Bachelor's Degree in Computer Science or related field or equivalent experience - Certified Information Systems Security Professional (CISSP) and/or Certified Cloud Security Certification (CCSP) and/or equivalent - AWS certifications (or ability to obtain within 6 months- Entry to junior level, 1-2 years of hands on Penetration Testing of web applications and infrastructure experience - 2-4 years of hands on cyber security operations, threat analysis, and/or incident response- Good appreciation of other security roles such as intelligence, vulnerability and patch management, Risk, auditing, Awareness and Security Architecture - A good understanding of the OSI stack and the various protocols from layer 1 - 7 including SNMP, HTTP, VPN, 802.11. - Social engineering engagement experience (i.e. phishing) - Excellent communication skills with the ability to communicate at a technical and business user level Primary Location: MinnetonkaEmployment type: StandardJob Family: Information TechnologyScope: GlobalTravel: Yes, 5 % of the TimeShift: Day JobOrganization: P&T_Security & RiskExperience Level: 3 to 5 years Job Posting: Apr 25, 2018 As an Equal Opportunity Employer/Affirmative Action employer, the organization will not discriminate in its employment practices due to an applicant's race, color, religion, sex, national origin, veteran status, disability status, sexual orientation, gender identity or any other federal, state or local protected class
    $64k-86k yearly est. Auto-Apply 1d ago
  • Senior Cyber Security Analyst

    CWT

    Cyber security analyst job in Minnetonka, MN

    - Bachelor's Degree in Computer Science or related field or equivalent experience - Certified Information Systems Security Professional (CISSP) and/or Certified Cloud Security Certification (CCSP) and/or equivalent - AWS certifications (or ability to obtain within 6 months - Entry to junior level, 1-2 years of hands on Penetration Testing of web applications and infrastructure experience - 2-4 years of hands on cyber security operations, threat analysis, and/or incident response - Good appreciation of other security roles such as intelligence, vulnerability and patch management, Risk, auditing, Awareness and Security Architecture - A good understanding of the OSI stack and the various protocols from layer 1 - 7 including SNMP, HTTP, VPN, 802.11. - Social engineering engagement experience (i.e. phishing) - Excellent communication skills with the ability to communicate at a technical and business user level This role will be part of the Cyber Security Operations team within CWT's Global Security and Risk department at our Minnetonka office. You will support the global operations by participating in the security incident response program and identifying vulnerabilities via standard penetration testing assessments and identifying threats posing a genuine risk to CWT. This information will enable CWT to proactively adjust its defensive posture. We are seeking an individual to be part of the team, to help as it grows with maturity. The team will carry out or coordinate (third parties) penetration testing across a number of environments including infrastructure, web app, and mobile platforms. In addition, you will collect and distribute Cyber Threat Intelligence as it relates to CWT. The role offers some exciting opportunities including the potential to develop your talents and skills, and investigating in more detail vulnerabilities and techniques that could be used against CWT. - Ability to create investigation results into a report - Ability to influence others where there is no direct authority - Data analysis, Network, OS systems (Windows, Unix, Linux) - Strong technical background and great understanding on emerging security trends - Deep technical knowledge IT Network, Infrastructure, Software, Cloud, Mobile - Red Team experience or experience of using Open Source and COTS for penetration testing which could include Nmap, Nessus, Metasploit, Kali Linux, Burp Suite Pro and similar - Experience in common scripting languages such as Python, Ruby, LUA, Powershell or BASH - Experience in at least one development language e.g. Java, C, C# or similar - A good understanding of Cloud based architectures primarily AWS
    $64k-86k yearly est. Auto-Apply 60d+ ago
  • Cyber Resilience Specialist

    Slalom 4.6company rating

    Cyber security analyst job in Minneapolis, MN

    Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery. What You'll Do * Lead and facilitate Business Impact Assessments (BIAs) across business units * Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems * Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience * Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles * Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews * Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations * Support program governance, metrics, training, and awareness efforts What You'll Bring * 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting * Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning * Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms) * Experience supporting risk assessments and regulatory audits * Excellent facilitation and stakeholder management skills * Strong writing skills to produce clear, client-ready plans and reports About Us Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all. Compensation and Benefits Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance. Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time. We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************. EEO and Accommodations Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process. #LI-MS12
    $153k-186k yearly Easy Apply 2d ago
  • Cyber Security Specialist IV

    QED National 4.6company rating

    Cyber security analyst job in Eagan, MN

    Title: Cyber Security Risk Expert IV Terms: 6 months contract with possible extension * Design, administer, and execute procedures for the identification, assessment, documentation, and communication of risks that could compromise Postal Service data and operations stemming from weaknesses in technology platforms, solution architectures, governance processes, and security capabilities, against industry standards and best practices. * Provide recommendations to improve and sustain the security of the enterprise's data and operations and document the organizational risk response plan (accept, mitigate, transfer, or avoid). * Monitor, report on, and validate, the status and efficacy of risk mitigation, transfer, or avoidance plans. Task description and/or any specific requirements: * Demonstrate expert-level knowledge and proficiency with ServiceNow (SNow) Vulnerability Response (VR) and generally associated modules, including but not limited to the following skills, abilities and knowledge: * General: Deep understanding of SNow platforms core functionalities and components, including forms, MID servers, tables, dashboards and access control lists (ACLs) * Scripting: Proficiency in rules and scripting (e.g., JavaScript), adequate to develop, test and deploy * Integrations: Proficiency to develop and troubleshoot VR integrations, including knowledge of APIs and service graph connectors * ]Dashboarding: Proficiency in designing and developing VR-focused dashboards and reports * Design and administer procedures within the organization to sustain the security of the organizations data and access to its technology and communication systems * Assess the risk of exposure of proprietary data through weaknesses in platforms, access procedures and forms of access, to the organizations systems and data contained within * Ability to review, collate, understand and present data, from various sources, to meet the remediation needs and expectations of the organization * Knowledge of automation coding, to automate data extrapolation, organization and dissemination, to meet the needs of the organization * Ability to review, investigate and assign cybersecurity vulnerabilities, for a variety of applications, systems and hardware, including cloud computing * Manage several projects/initiatives of various sizes, complexities and risks * Demonstrated proficiency in successfully evaluating and supporting documentation, validation and remediation processes required to ensure new and existing information technology (IT) systems meet the organization's vulnerability remediation expectations and requirements * Demonstrated ability to review and understand security blueprints, principles, models, designs, standards, and guidelines to ensure enterprise cybersecurity remediation support is consistent and beneficial to the organization * Experience with vulnerability remediation and remediation processes and efforts, as well as remediation tools * Ability to serve as subject matter expert (SME) for the USPS VRM process, including providing guidance to stakeholders, business units and new CISO resources, as necessary * Strong organizational skills and ability to build and maintain schedules and step-by-step action plans * Effective communication and collaboration skills to work with cross-functional teams, business units, stakeholders and IT professionals, and to conduct presentations to varying audiences and technical knowledge levels. Experience/Education: * A minimum of thirteen (13) to twenty (20) years relevant experience. * A degree from an accredited College/University in the applicable field of services is preferred. four additional years of relevant experience in lieu of a college degree is required. If the indiviual's degree is not in the applicable field then four additional years of related experience is required. * Works on high-visibility, or mission critical aspects of a given program, and performs all functional duties independently. * Oversees the efforts of direct reporting resources and/or be responsible for the efforts of all staff assigned to a specific job. * Note: Special credentials (licenses and/or certifications) may be required at the Task Order level on a case-specific basis. Pay Range: $45-$50/hr W2 About Seneca Resources: At Seneca Resources, we are more than just a staffing and consulting firm-we are a trusted career partner. With offices across the U.S. and clients ranging from Fortune 500 organizations to government agencies, we connect professionals with opportunities that drive meaningful impact and support long-term career growth. When you join Seneca, you gain a team committed to your success. We offer competitive compensation, comprehensive health, dental, and vision coverage, 401(k) plans, and continuous support throughout your assignment. Our recruiters and account managers invest in understanding your goals and placing you in roles aligned with your talents and ambitions. Seneca Resources is proud to be an Equal Opportunity Employer, dedicated to building a diverse and inclusive workplace where all qualified applicants are encouraged to apply.
    $45-50 hourly 1d ago
  • Information Security Analyst

    Trustage

    Cyber security analyst job in Madison, WI

    At TruStage, we're on a mission to make a brighter financial future accessible to everyone. We put people first, and work hand in hand with employees and customers to create a diverse and inclusive environment. Passionate about building insurance and financial services solutions, we push the boundaries of what's possible. We need you to help us shape what's next. You'll be encouraged to share your experiences, ideas and skills to help others take control of their financial future. Join a team that has received numerous awards for being a top place to work: TruStage awards and recognition Job Summary Under the guidance of Information Security leadership, the Information Security Analyst supports TruStage's cybersecurity program by delivering integrated threat intelligence and digital forensic services. This hands-on role is responsible for reviewing and analyzing incoming threat intelligence to assess risk and potential impact to the organization, applying best practices to inform proactive defense strategies. The analyst plays a critical role in the incident response lifecycle by investigating escalated threats-such as malware infections, phishing attempts, or unauthorized access-through structured processes that include detection, containment, eradication, recovery, and root cause analysis. Responsibilities also include conducting forensic investigations, performing advanced data collections, and executing eDiscovery requests. The analyst may be called upon to support investigations led by Legal, Human Resources, or other internal stakeholders, ensuring evidence integrity and alignment with regulatory and organizational standards. The ideal candidate will have experience using tools such as Magnet Forensics Axiom Cyber, Splunk, Microsoft Defender, and the MITRE ATT&CK framework to detect, investigate, and respond to complex security incidents. This role requires a strong analytical mindset, attention to detail, and the ability to work collaboratively across teams to enhance the organization's security posture. Excellent verbal and written communication skills are essential, as the analyst will be expected to clearly document findings, articulate technical concepts to non-technical stakeholders, and contribute to incident reports, threat briefings, and cross-functional discussions. Job Responsibilities: * Support Information Security Leadership regarding all aspects of the information security program, with minimal supervision. Responsibilities include facilitating the identification of risks throughout the organization, developing, reporting and monitoring formats on risk management issues and developing methodologies for the assessment of risks throughout the organization. * Continuously monitor the internal and external landscape for relevant events, risks, and threats related to malicious code, vulnerabilities, and potential attacks. * Coordinate and ensure cybersecurity related alerts and incidents are prioritized and responded to at all hours of the day. * Remain current with emerging threats and share knowledge with colleagues to improve incident response processes. * Participate in the creation and execution of tabletop exercises designed to identify gaps, improve skills, enhance communication and engage with key stakeholders. * Review reports from tabletop exercises, vulnerability scans and penetration testing to identify weaknesses or gaps in existing security controls and provide recommendations where appropriate. * Lead coordination, consultation, and assessment efforts to track and remediate events and alerts, directs response to related incidents, internal or external audits, and / or control assessments. * Identify, report, and assist in resolving privacy, compliance or security violations and control gaps. * Lead feedback with other IT teams to protect data from compliance, privacy or security compromise. * Contribute to the strategic direction of the Information Security team to develop new capabilities, process efficiencies and goals. * Participate in the development, review, ongoing maintenance and development of security policies, standards, processes, procedures and requirements to facilitate the establishment of common administrative controls for the delivery of security capabilities. * Security Awareness: Develop content for organization wide and targeted security awareness training. Present relevant information security topics through a variety of forums depending on the audience. * The above statement of duties is not intended to be all inclusive and other duties will be assigned from time to time. The above statement of duties is not intended to be all inclusive and other duties will be assigned from time to time. Job Requirements: * Bachelor's degree in computer science, information systems or related field, or equivalent combination of education and/or related professional work experience. * 5 or more years of demonstrated proficiency with an information security audit, assessment, engineering or architecture focus or comparable, professional experience. * Proven ability to clearly and effectively communicate business and technical information, both verbally and in writing. * Aptitude for speaking or communicating to varied groups of business and technical professionals. * Experience in presenting technical material to a nontechnical audience and to senior management. * Established skills and experience in the development of security policies, standards or other governance practices. * Demonstrated relationship management and consulting skills, including ability to effectively influence and negotiate. * Proven ability to provide high quality customer service. * Financial Services industry experience strongly preferred. * Experience with law enforcement preferred * Experience with forensics preferred #LI-SW If you're ready to help make a difference, apply today. A resume is required to apply. TruStage may process applicant information using an Artificial Intelligence (AI) tool. This tool automatically generates a screening score based on how well applicant information matches the requirements and qualifications for the position. TruStage recruiters use the screening score as a guide to further evaluate candidates; the score is one component of an application review and does not automatically determine whether a candidate moves forward. Candidates may choose to opt out of this process. Compensation may vary based on the job level, your geographic work location, position incentive plan and exemption status. Base Salary Range: $97,800.00 - $146,800.00 At TruStage, we believe a sound, inclusive benefits program is of vital importance, along with a flexible workplace that allows for work-life balance, career growth and retirement assistance. In addition to your base pay, your position may be eligible for an annual incentive (bonus) plan. Additional benefits available to eligible employees include medical, dental, vision, employee assistance program, life insurance, disability plans, parental leave, paid time off, 401k, and tuition reimbursement, just to name a few. Beyond pay and benefits, we also recognize that flexibility, including working in a place you prefer, is essential to caring for our employees. We will continue to strive to offer flexibility and invest in technology and other tools that will make hybrid working normal rather than an exception, so that when "life happens," you can focus on what's most important. Accommodation request TruStage is a place where everyone can bring their best self and thrive. If you need application or interview process accommodations, please contact the accessibility department.
    $97.8k-146.8k yearly Auto-Apply 1d ago
  • Information Security Analyst

    Collabera 4.5company rating

    Cyber security analyst job in Eagan, MN

    Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs. Job Description Position Details: Job Title - Information Security Analyst Duration - 3 Months (with a possibility of an extension) Location - Eagan , MN - 55123 Qualifications Primary Objective Perform in the delivery and development of processes and services which support best practices in information security and risk management for Client enterprise. Knowledge, Skills & Behaviors • 2+ years related information security risk management experience • 3+ years related information technology experience • Preferred industry-related certifications: GSEC, CISSP, CISA, CISM, ITIL • Preferred exposure in SOC2, ISO 27000, risk assessment methodologies, Shared Assessments, ITIL practices, and GRC • Demonstrate results in planning and delivering complex projects on time • Maintain focus and manage multiple efforts concurrently • Perform independently to expectations while being collaborative and maintaining alignment with the team • Work effectively with all levels of the organization including subject matter experts, stakeholders, and leadership • Strong written and verbal communication skills to include executive audiences • Apply tactical and strategic methods appropriately • Effective negotiation and influence • Focused on supporting the customer, the team, and the business • Strong collaboration and problem-solving skills Major Areas of Accountability • Operate as a key contributor to the Vendor Risk Management processes. • Interface with subject matter experts, peers and stakeholders; and business or technology leaders across the Client enterprise. • Demonstrate subject matter expertise on information security best practices and Client security posture focused on performing due diligence for vendor assurance inquiries and attestations. • Assist in initiatives to evaluate and provide input on the effectiveness of processes and solutions, and to determine or support a course of action. Track and report on mitigation progress. • Contribute to the strategic and tactical development of information security, risk management and compliance initiatives, to include policy and standards development, solution development, security awareness and training, and other information security initiatives as assigned. • Track, verify and collect data points for reporting and metrics on identified services to identify gaps and inform leadership. • Serve as a subject matter expert in information technology operations, information security and risk management practices, global legal and regulatory requirements, and other applicable security and privacy trends and practices. • Participate as a member of a team for Vendor Risk Management • Contribute to and achieve business and departmental goals and objectives • Deliver processes and services consistently and accurately • Accept feedback and flex to address tactical needs • Report on status of initiatives to all levels in the organization • Work across the organization to contribute to departmental initiatives and programs Education • Prefer 4 year (Bachelor's) Degree in a technology related field If you are interested please contact NEHA KALIA (Technical Recruiter) at ************ and email an updated copy of your resume (preferably WORD format) to *************************** Additional InformationIf you are interested please contact NEHA KALIA (Technical Recruiter) at ************ and email an updated copy of your resume (preferably WORD format) to ***************************
    $79k-107k yearly est. Easy Apply 60d+ ago
  • Senior Security Analyst - AppSec

    Hawaii Mega-Cor

    Cyber security analyst job in Saint Paul, MN

    Patterson isn't just a place to work, it's a partner that cares about your success. One of the distinguishing marks of our company is the talented people who embrace the people-first, always advancing, and results-driven culture. Professional growth abounds in this motivating environment. We value the diverse talents and experiences our employees bring to Patterson and believe that they build a stronger and successful organization. Job Description: The Application Senior Security Analyst leads the implementation and maintenance of network and application security systems to protect Patterson's information assets. This role drives technical support, incident response, and ensures alignment with security and project goals. The analyst develops and enhances the application security program using industry best practices and frameworks. Expertise in secure coding, static and dynamic code analysis, and vulnerability remediation is essential. The candidate integrates security controls into CI/CD pipelines using SecDevOps methodologies. Responsibilities include tool integration, policy enforcement, and continuous monitoring. Collaboration across DevOps, compliance, risk, and audit teams ensures enterprise-wide security alignment. A methodical approach to assessing and triaging security findings is critical for success. Essential Functions To perform this job successfully, an employee must be able to perform each essential function satisfactorily, with or without reasonable accommodation. To request a reasonable accommodation, notify Human Resources or the manager who oversees the position. Perform application security triage, oversee issue resolution, and track remediation metrics Oversees the maintenance, support, and delivery of associated security platforms Drives continuous improvements in acting on alerts, service requests, and incidents Integrates best practices to proactively analyze and monitor systems and applications for system and security related issues Considered subject matter expert in assigned platforms and keeps up-to-date knowledge to drive improvements Strong mentor with the ability to work with junior team members and provide leadership and training on new tools or projects Provide support and ongoing input in the evolution of the application security program Ensure the application security tool set is optimized, tuned, and maintained Collaborate with Devs and Ops teams to embed security into CI/CD pipelines and SecDevOps workflows Perform security testing to include SAST, DAST, SCA, Container, APIs, IaC, Secrets Interact with Infrastructure, DevOps, and application owners to ensure alignment with Patterson's roadmaps Prioritize workload depending on business direction, compliance, and / or security requirements Embedded in the SDLC process for all major applications, working with DevOps, SecDevOps, Developers, QA, Principal Architects, Security Champions, Actively participate and / or lead weekly meetings with application team leads and security champions Track and manage identified vulnerabilities through resolution, ensuring timely remediation and documentation. Oversee the planning, execution, and follow-up of penetration tests conducted by internal teams and external security partners. Additional functions In addition to the essential functions listed above, the incumbent may perform the following additional functions. Experience with .Net, C#, Javascript, Angular and related languages Familiarity with AzureDevOPs (ADO), Package Management, SBOM, TFS and / or VSTS Familiarity with major cloud platforms, including Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP) General knowledge of Application Security frameworks such as BSIMM, OWASP SAMM / ASVS, NIST, etc Experience with Thick Clients, Web Apps, Cloud Solutions, SPA, Web Services, MVC, APIs, etc Familiar with Azure DevOps Pipelines for automated build, test and deployment workflows Ability to support and manage Azure services including Azure Container Apps (ACA), Azure Kubernetes Service (AKS), and Azure Artifacts Familiarity with software supply chain security processes, including vulnerability scanning, artifact integrity validation, and dependency risk management Experience implementing and maintaining gating workflows in CI/CD pipelines to enforce security and compliance checks prior to deployment Experience communicating security concerns and issues to non-technical audiences Proficient in assessing microservices and APIs for security flaws using automated and manual testing techniques. Familiar with key application security tools such as BurpSuite, HCL AppScan, Veracode, Qualsys WAS, Micro Focus WebInspect, Checkmarx, Mend.io (White Source), DevTools, Fiddler, Owasp Zap, Metasploit, BeeF, SQLMap, Postman, etc Experience with Swagger, SOAPUI, Visual Studio Required Qualifications Bachelor's Degree with an emphasis in security, technology, or engineering or equivalent work experience At least 4 years work experience in information technology, cyber security, or information security Preferred Qualifications Security industry certification desired This person must be located within a commutable distance to Mendota Heights, MN or Loveland, CO. This will be 2 days in the office hybrid model. What's In It For You We provide competitive benefits, unique incentive programs and rewards for our eligible employees: Full Medical, Dental, and Vision benefits and an integrated Wellness Program. 401(k) Match Retirement Savings Plan. Paid Time Off (PTO). Holiday Pay & Floating Holidays. Volunteer Time Off (VTO). Educational Assistance Program. Full Paid Parental and Adoption Leave. LifeWorks (Employee Assistance Program). Patterson Perks Program. The potential compensation range for this role is below. The final offer amount could exceed this range, based on various factors such as candidate location (geographical labor market), experience, and skills. $94,100.00 - $117,700.00EEO Statement Patterson provides equal employment opportunities to applicants and employees without regard to race; color; sex; gender identity; sexual orientation; religious practices and observances; national origin; pregnancy, childbirth, or other related medical conditions; status as a protected veteran or spouse/family member of a protected veteran; or disability.
    $94.1k-117.7k yearly Auto-Apply 43d ago
  • Information Security Analyst

    Capspecialty 4.0company rating

    Cyber security analyst job in Middleton, WI

    Job Description This is a hybrid position requiring 3 days in office at our Middleton, WI office location. #LI-Hybrid At CapSpecialty, we are a specialty underwriting company being driven by well-informed, entrepreneurial and proactive employees. Come join our exciting company where you can really make an impact, and each individual's unique skills and talents are recognized and valued. You will find an accessible leadership team that welcomes opinions and ideas. We owe much of our success to our collaborative environment and set of three guiding principles rooted in customer-centricity, employee excellence and corporate culture. We offer competitive compensation and benefits packages - including an innovative open vacation plan, generous paid sick and parental leave, fully vested matching 401k, company-paid group term life insurance and short- & long-term disability plans, professional and educational growth opportunities, flexible and casual work environment, and recognition for exceptional performance. Please see our full list of Total Rewards here. CapSpecialty is seeking an Information Security Analyst who will support our organization's cybersecurity operations. The analyst will assist in monitoring systems, investigating alerts, managing access controls, and supporting compliance efforts. This role includes exposure to Identity & Access Management (“IAM”) and other key areas of information security. Duties/Responsibilities: Conduct investigations into and properly document security incidents, including evaluating incident impact and recommending corrective actions to management. Collate security metrics and generate reports from the security systems as needed. Support managing accounts and permissions in IAM systems, including recommending improvements to identity governance where appropriate. Perform tasks as assigned to meet any audit requests. Help maintain IAM documentation and workflows. Help maintain and promote security policies, procedures, and training materials. Oversee assigned components of the security awareness programs, and track employee participation including following up on training completion. This may include reporting compliance metrics to leadership. Manage the physical security program, providing recommendations for updates as needed. Keep up to date and current on security trends. Other related duties and initiatives, as assigned. Supervisory Responsibilities: None. Core Competencies: Proven ability to deal well with ambiguity, prioritize tasks, resolve issues and deliver measurable results in an agile, fast-paced environment. Excellent oral and written communication skills. Ability to manage difficult customer situations, elicit customer feedback, analyze and resolve customer issues. Excellent analytical, problem solving, collaboration and time-management skills. A high level of integrity and commitment to confidentiality. Must be highly self-motivated requiring minimal direction. Have a passion for Information Security and a desire to advance personal growth through continuing professional education, self-study, and pursuit of technical certifications. Education and Experience: Associate's degree in computer science or equivalent. 1+ years of relevant experience in IT with exposure to cybersecurity practices, technologies, and methodologies is preferred. Basic understanding of security principles, threats, and controls is desirable. Familiarity with IAM concepts and tools (i.e. Active Directory, Okta, Azure AD) is a plus but not required. Familiarity with security controls and technologies desired (i.e. firewall, SIEM, DLP, WAF, and IPS.). Physical Demands Prolonged periods of sitting at a desk and working on a computer. May be required to lift up to 15 pounds at times. CapSpecialty is a leading provider of specialty insurance and bonds for small- to mid-sized businesses in the U.S., offering casualty, professional liability, surety and fidelity products in all 50 states and the District of Columbia. By working with select partners through a limited distribution model, CapSpecialty's creative, hard-working team provides personalized service and cultivates mutually successful partnerships to deliver positive results. CapSpecialty is an operating subsidiary of Berkshire Hathaway, and its carriers have an A ("Excellent") rating from A.M. Best, writing both admitted and non-admitted policies. For more information, please visit CapSpecialty.com. Apply today! Equal Employment Opportunity Employer Powered by ExactHire:184950
    $82k-110k yearly est. 18d ago
  • Information Security Engineering & Operations Analyst

    Johnson Financial Group 3.9company rating

    Cyber security analyst job in Racine, WI

    The JFG Information Security Engineering & Operations Analyst plays a key role in supporting JFG's Identity & Access Management (IAM), Cyber Threat Management, and Vulnerability Management services. This role helps support IAM services to provision, deprovision, and certify access to JFG systems. It also helps detect, analyze, hunt for, and report on cybersecurity events related to malware, network intrusion, and data loss protection and insider threat incidents. This role is also responsible for finding and reporting on internal and external vulnerabilities on JFG systems. This role will be supported by a Managed Detection & Response (MDR) services and Identity & Access Management Managed services. Occasional off-hour and weekend work will be expected. Very little (less than 5%) business travel is expected in this role. This role will be located in Racine, Wisconsin. Ability to come in-office would be required (working a hybrid schedule.) KEY RESPONSIBILITIES: * Detect, analyze, contain, and remediate threats and vulnerabilities across the JFG environment. * Operate and support vulnerability management, data loss protection, cybersecurity monitoring, cybersecurity incident response, intrusion analysis, root-cause-analysis (digital forensics), cyber-threat intelligence, and malware analysis technologies. * Lead and report on incidents involving malware, network intrusion, insider-threat, internal investigations and litigation support activities. * Incorporate Cyber Threat Intelligence into operational signal intelligence and reporting. * Proactively investigate JFG environment for threats based on Cyber Threat Intelligence and known threat methods and patterns (aka Threat Hunting). * Operate and support Identity Governance and Administration technologies to support timely on/off-boarding of people and regular access governance reviews to ensure appropriate access. * Support weekly/monthly/quarterly/annual operational metrics, reports and dashboards. * Assist with maintaining the Cybersecurity Incident Response Plan. * Collaborate on the continuous improvement of Information Security Operations processes, workflows, and procedures (e.g. RunBooks). * Automate repetitive tasks and drive efficiencies with measurable benchmarks to show progress. JOB REQUIREMENTS: * Associates degree in Information Security, Cybersecurity preferred * 0-2 years' experience * Types of certification preferred: Security+, CEH, SSCP * Experience with Python and PowerShell scripting languages for automation preferred * Good report writing and communication skills * Has a basic understanding of the Information Security platforms at JFG, common Information Security controls and frameworks, networking concepts and technologies, as well as Windows and Linux environments Come as you are. Johnson Financial Group supports and is committed to the principle of equal employment opportunity. We make all employment-related decisions without regard for an individual's race, color, religion, sex, sexual orientation, age, national origin, citizenship, disability, veteran status, or any other protected status as required by law.
    $71k-87k yearly est. Auto-Apply 29d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Saint Paul, MN

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 32d ago
  • Information Security Analyst

    WuXi Apptec

    Cyber security analyst job in Saint Paul, MN

    The Information Security Analyst Identifies security risks and exposures, determine the causes of security violations, and configuring systems to optimize notification of future incidents. The Security Analyst Integrates appropriate systems and logs into the enterprise security incident and event management system to effectively monitor and detect various people and enterprise asset activity. The Information Security Analyst works under the direction of the Information Security Director on the IT Security Operations Team. **This is a hybrid job, must be located in Saint Paul MN** **Responsibilities** - Investigates and analyzes security events to evaluate risk, prioritizing findings based on internal and external information. - Configures and maintains SIEM platform, including areas such as source feeds, alerts, alarms, and API integrations. - Configures and maintains EDR/antivirus. - Configures and maintains vulnerability management platform, including areas such as vulnerability scanning, remediation, and mitigation as well as impact and risk analysis. - Communicates security concerns to the business stakeholders to collectively develop and execute an appropriate remediation/mitigation plan. - Interacts with security risk and compliance group, adjacent IT departments, and business units as needed to ensure compliance with IT Security goals and policies. - When needed, assists in administration of other security tools (Data Loss Prevention, Email Security/Spam Filter, End User Training, Mobile Device Management). - Maintains up-to-date knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and evolving attacks and threat vectors. General Job Responsibilities: - Ability to work in a team environment and independently as required - Contributes to project planning and scheduling. - Normally receives minimal instructions on routine work and detailed instructions on new assignments. - Participate in Architecture design reviews and other technical governance forums across the organization representing the security team across multiple projects. - Be on call and available after business hours, would require working Holidays and weekends if major security incident occurs. - Establish and maintain pertinent policies, standards, and procedures - Perform duties in compliance with applicable regulations and standards such as Sarbanes Oxley Act, FDA Quality System, and ISO (International Organization for Standardization) Works on routine assignments per written procedures, where ability to recognize deviation from accepted practice is required. - Contributes to the overall operations and to the achievement of departmental goals - Perform job specific tasks in compliance with applicable Regulations, International Standards, and WuXi AppTec Policies and Standard Operating Procedures. - Understanding of Good Laboratory Practices and Good Manufacturing Practices - Other duties as assigned **Qualifications** - Degree in Cyber Security, Management Information Systems, Information Security or equivalent work experience o Minimum 2 years prior experience in a Cyber Security - In depth knowledge of LogRhythm SIEM platform or other SIEM platforms, which includes configuring and maintaining API integrations and source feeds, alerts and alarms - In depth knowledge in Qualys Vulnerability Management System, which includes configuring and maintaining - In depth knowledge in Cisco AMP Anti-Virus software, which includes configuring and maintaining - Knowledge of ISO/IEC 27001 standards. - Strong technical acumen with a solid understanding of security technologies and network architecture - Strong verbal and written communication skills - Independent driver of self-development and continuous learning - Knowledge of information security technology, design, research techniques, administration, operating standards, and quality control methods. - Basic understanding of LAN/WAN technologies and protocols, FTP, Active Directory, VPN technologies (MPLS, IPSEC, etc.), IIS and other network services. - Experience in a large, formal vulnerability program. - General knowledge of cloud, wireless network and mobile security. - Team-oriented and skilled in working within a collaborative environment. **An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability** This job description does not state or imply that the above are the only duties and responsibilities assigned to this position. Employees holding this position will be required to perform any other job-related duties as requested by Management. **Need help finding the right job?** We can recommend jobs specifically for you! An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability (************************************************************************************************** **Job Locations** _US-MN-St. Paul_ **Job ID** _2025-13901_
    $76k-108k yearly est. 5d ago
  • Information System Epic Security Analyst

    CWI Landholdings 3.0company rating

    Cyber security analyst job in Milwaukee, WI

    At Children's Wisconsin, we believe kids deserve the best. Children's Wisconsin is a nationally recognized health system dedicated solely to the health and well-being of children. We provide primary care, specialty care, urgent care, emergency care, community health services, foster and adoption services, child and family counseling, child advocacy services and family resource centers. Our reputation draws patients and families from around the country. We offer a wide variety of rewarding career opportunities and are seeking individuals dedicated to helping us achieve our vision of the healthiest kids in the country. If you want to work for an organization that makes a difference for children and families, and encourages you to be at your best every day, please apply today. Please follow this link for a closer look at what it's like to work at Children's Wisconsin: *********************************** Children's Wisconsin is seeking a Senior Information Epic Security Analyst- to join our team! Location: Remote but must be local to Milwaukee What you will do: The IS Security Analyst-Epic will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Ensures that user community understands and adheres to necessary procedures to maintain security. Must be able to weigh business needs against security concerns and articulate issues to management. Primary EPIC security lead on Enterprise Information Security team responsible for management of Epic user records (EMP users, including background users) which includes the life cycle management of the records (creation, modification, inactivation) and auditing as appropriate. Collaborates with app analysts teams who manage the templates and sub templates. Participates in the development of workflows, system configuration, change documentation, optimization and support related to Epic security, while working with application teams to deploy functionality changes, new modules or departments, update security classes, modify provider records, conduct user analysis, and implement security enhancements. Leads and assists in the development of department and organization wide policies and procedures, while effectively communicating policies and procedures impacting Identity and Access management to end users, leadership, and peers to ensure compliant practices. Provides guidance on optimizing security build based on appropriate minimum necessary standards. Responsible for the on-going maintenance, testing, support and optimization of Epic user security and provider management, with focus on role based access. Epic certification is a requirement. Excellent organizational skills and ability to manage work load while assigned to multiple simultaneous projects with minimal supervision. Thorough understanding of user account administration in a network environment. Thorough understanding of security auditing principles. Familiarity with current common paradigms for violating system integrity. Top-tier security performance tuning skills and trouble-shooting required. Works closely with all levels of the organization to ensure that security is consistent with organizational security standards, information access requirements and business strategies. Coordinates with IS entities regarding technical considerations (user rights/privileges, system access) to ensure proper implementation and provides on-going support for all security operations. Works collaboratively with Internal Audit, Corporate Compliance, Human Resources and other departments on security related issues and projects. Works with cross-functional teams to perform reviews and tests of IS internal controls to ensure existing systems are operating as designed and contain adequate controls. Monitors and analyzes technology security and recommends appropriate IS policies, procedures and practices to strengthen security operations. Provides consultation regarding audit, regulatory and security management activities across IS functional areas. Coordinates the IS component of both internal and external audits, federal and state examinations. ESSENTIAL FUNCTIONS: Demonstrates behaviors outlined in the Core Competencies the Blue Kids Way to provide service excellence as a committed partner to children, families and co-workers. Recommends and maintains policies and procedures related to information security. Monitors the organization's overall security fabric. Assesses security needs and capabilities of the organization. Makes regular reports to management concerning security measures. Makes recommendations for improvement as required. Identifies and provides information security awareness training as appropriate. Identifies appropriate courses to enhance security capabilities and competencies of the organization. Works with management to perform and maintain risk assessments. Ensures organization compliance with the security sections of Federal and State statutes, including HIPAA, as well as regulatory requirements. Coordinates investigations into potential security infractions. Determines and designs appropriate tests for all aspects of information security. Activities may include attempted “cracking” of system security, review of audit trails and attempted theft of devices. Evaluates system effectiveness and makes change recommendations as necessary. Coordinates periodic reviews of system security by outside consultants, including vulnerability assessments, penetration tests, HIPAA reviews and PCI compliance. Works with IS teams to implement recommendations as appropriate. Monitors, evaluates and makes recommendations regarding perimeter security including prevention against attack, viruses, and other forms of malicious software. Monitors, evaluates and makes recommendations regarding email and Internet content filtering. Evaluates and makes recommendations regarding requested changes to perimeter security. Recommends policies and procedures for controlling remote access by employees, non-employees and vendors. Reviews and makes recommendations regarding security oriented software applications and workstation security, including patch management, user rights management, and operating system configuration. Keeps current on security issues through seminars, publications and self-education on an on-going basis. MINIMUM KNOWLEDGE, SKILLS AND ABILITIES REQUIRED: Requires bachelor's degree in computer science or related technology field. Master's degree preferred. Requires 7 years of relevant computer systems experience, preferably in a hospital or healthcare setting. Significant experience in IS security administration including compliance, audit, and information security management. Epic Security certification is a requirement. Professional certification (e.g. CISA, CISM or CISSP) preferred. Thorough understanding of risk analysis, disaster recovery and audit tracking. Familiarity with current common paradigms for violating system integrity. Must have excellent interpersonal skills to effectively communicate with all levels of hospital personnel, vendors and IS personnel. Must possess the ability to deliver clear, concise communications and presentations. Must be able to train others on key IS security concepts. Children's Wisconsin is an equal opportunity / affirmative action employer. We are committed to creating a diverse and inclusive environment for all employees. We treat everyone with dignity, respect, and fairness. We do not discriminate against any person on the basis of race, color, religion, sex, gender, gender identity and/or expression, sexual orientation, national origin, age, disability, veteran status, or any other status or condition protected by the law. Certifications/Licenses:
    $74k-107k yearly est. Auto-Apply 60d+ ago
  • Systems Security Engineer

    Gaming Enterprise 3.9company rating

    Cyber security analyst job in Prior Lake, MN

    Are you an identity innovator ready to jump in, look at a system, and take it somewhere? Join us as a Systems Security Engineer - a role that blends the technical depth of IAM with the creativity to improve and automate how access happens across the enterprise. This isn't your typical side of cybersecurity - it's where code development, system management, and smart integration meet. From auditing permissions and refining processes to collaborating across teams, you'll have the opportunity to make a wide variety of impacts every day. Enjoy weekly pay, 401(k) starting day one, and health benefits. Whatever your career goals may be, let Mystic Lake Casino help get you there! Job Overview: Provide engineering development and support for Identity and Access (IAM) management activities related to system software, hardware, performance, problem determination or resource management requiring communication and coordination with vendors, technicians, clients, and management. Actively integrate identity system with other operational systems to achieve single view of all identity access, while providing efficient automation for identity access changes. Perform procedures necessary to manage security and account permissions to protect information systems across the enterprise. Validate information security procedures are updated, communicated and followed. Audit and grant account permissions to network resources and applications. Perform reviews of security logs and controls. Facilitate the remediation of vulnerabilities and inconsistencies. Document and track information security issues or incidents. Assist with security assessments based on the direction of the Director of Cybersecurity. Elevate & Thrive: Key Responsibilities: Work with Identity Access Management (IAM) suite of products and processes; developing and providing support services for IAM deployment; defining and standardizing IAM processes; code development; performing analysis of various projects and requests; developing designs for projects that have medium to high complexity; formulating procedures and implementing business solutions. Building Identity and Access (IAM) management systems integrations across various applications, technologies and cloud services, providing both identity and data governance to entire organization. Work closely with business units, application teams, infrastructure areas and vendors to identity, review and evaluate the solution requirements. Review and provide recommendation on new technologies, roadmaps and vendor product offerings specific to server, software technologies and other products. Provide consultation and work closely with other functional infrastructure areas on multiple initiatives to meet common organizational business goals and objectives. Participate in and provide consulting to project teams on design development, integration opportunities, planning of systems and assures it is aligned to our established strategies, guiding principles, rationales and practices. Ensure IAM solution provides best in class governance, availability and operational efficiency to meet business needs. Job Requirements: Bachelor's degree required (Cybersecurity or an equivalent discipline preferred) 5+ years of IT experience with 3+ years of Information Security experience Strong scripting knowledge (PowerShell, Beanshell and JavaScript) preferred Sailpoint IAM product suite experience preferred Demonstrate a strong understanding of tools, technologies, security strategies and their implications on the broader business environment Have a strong understanding of Information Security concepts, protocols, industry best practices and strategies Have experience with Active Directory security administration in a large Windows network Demonstrated background of Windows NTFS and Share Permissions Ability to develop internal processes and procedures as it relates to day-to-day system security administration Have experience with common Information Security Management frameworks, such as International Standards Organization (ISO) 17799/27001, the IT Infrastructure Library (ITIL) and the National Institute of Standards and Technology (NIST) frameworks Have excellent technical knowledge of mainstream operating systems (for example, Microsoft Windows and Unix/Linux) and a range of security technologies such as identity and access management systems Experience in general technical knowledge of current network hardware/software, protocols, and standards Experience in conducting research into information security issues, reviewing logs and evaluating security controls Outstanding Benefits & Awesome Perks: Enjoy competitive weekly pay, outstanding benefits, and advancement opportunities at the SMSC Gaming Enterprise. Eligible Team Members are offered a comprehensive benefits package include medical, dental, life and disability insurance, onsite medical clinics and pharmacy, 401(k) retirement plan, paid time off, wellness programs and more. Plus, take advantage of perks like discounts on childcare, fuel, bus passes and fitness membership, free uniforms and free uniform cleaning, and tuition reimbursement. Who We Are: We're not just in the business of entertainment; we're in the business of crafting unforgettable experiences. We believe in the power of possibility, to unite and uplift, rallying around every triumph, big and small. At Mystic Lake and Little Six, every moment is a chance to be the experience. Different backgrounds, different strengths, and different passions, we value the diversity that everyone brings to the table. Our values are a direct reflection of the diverse communities that we proudly serve, represent, and invest in. We invite you to the place to learn, grow, thrive and lead. Let's create moments that matter, celebrate diversity, and build a brighter future for all. Be the Experience. Be Bold. Be Mystic.
    $93k-128k yearly est. 59d ago
  • Information Security Analyst

    Collabera 4.5company rating

    Cyber security analyst job in Eagan, MN

    Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace. With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including. Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here) Collabera listed in GS 100 - recognized for excellence and maturity Collabera named among the Top 500 Diversity Owned Businesses Collabera listed in GS 100 & ranked among top 10 service providers Collabera was ranked: 32 in the Top 100 Large Businesses in the U.S 18 in Top 500 Diversity Owned Businesses in the U.S 3 in the Top 100 Diversity Owned Businesses in New Jersey 3 in the Top 100 Privately-held Businesses in New Jersey 66th on FinTech 100 35th among top private companies in New Jersey *********************************************** Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance. Job Description Position Details: Job Title - Information Security Analyst Duration - 3 Months (with a possibility of an extension) Location - Eagan , MN - 55123 Qualifications Primary Objective Perform in the delivery and development of processes and services which support best practices in information security and risk management for Client enterprise. Knowledge, Skills & Behaviors • 2+ years related information security risk management experience • 3+ years related information technology experience • Preferred industry-related certifications: GSEC, CISSP, CISA, CISM, ITIL • Preferred exposure in SOC2, ISO 27000, risk assessment methodologies, Shared Assessments, ITIL practices, and GRC • Demonstrate results in planning and delivering complex projects on time • Maintain focus and manage multiple efforts concurrently • Perform independently to expectations while being collaborative and maintaining alignment with the team • Work effectively with all levels of the organization including subject matter experts, stakeholders, and leadership • Strong written and verbal communication skills to include executive audiences • Apply tactical and strategic methods appropriately • Effective negotiation and influence • Focused on supporting the customer, the team, and the business • Strong collaboration and problem-solving skills Major Areas of Accountability • Operate as a key contributor to the Vendor Risk Management processes. • Interface with subject matter experts, peers and stakeholders; and business or technology leaders across the Client enterprise. • Demonstrate subject matter expertise on information security best practices and Client security posture focused on performing due diligence for vendor assurance inquiries and attestations. • Assist in initiatives to evaluate and provide input on the effectiveness of processes and solutions, and to determine or support a course of action. Track and report on mitigation progress. • Contribute to the strategic and tactical development of information security, risk management and compliance initiatives, to include policy and standards development, solution development, security awareness and training, and other information security initiatives as assigned. • Track, verify and collect data points for reporting and metrics on identified services to identify gaps and inform leadership. • Serve as a subject matter expert in information technology operations, information security and risk management practices, global legal and regulatory requirements, and other applicable security and privacy trends and practices. • Participate as a member of a team for Vendor Risk Management • Contribute to and achieve business and departmental goals and objectives • Deliver processes and services consistently and accurately • Accept feedback and flex to address tactical needs • Report on status of initiatives to all levels in the organization • Work across the organization to contribute to departmental initiatives and programs Education • Prefer 4 year (Bachelor's) Degree in a technology related field Additional Information To know more about this opportunity or to schedule an interview, Please Contact: Neha Kalia *************************** ************
    $79k-107k yearly est. Easy Apply 60d+ ago
  • Cyber Resilience Specialist

    Slalom 4.6company rating

    Cyber security analyst job in Washington, MN

    Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery. What You'll Do * Lead and facilitate Business Impact Assessments (BIAs) across business units * Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems * Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience * Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles * Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews * Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations * Support program governance, metrics, training, and awareness efforts What You'll Bring * 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting * Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning * Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms) * Experience supporting risk assessments and regulatory audits * Excellent facilitation and stakeholder management skills * Strong writing skills to produce clear, client-ready plans and reports About Us Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all. Compensation and Benefits Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance. Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time. We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************. EEO and Accommodations Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process. #LI-MS12
    $153k-186k yearly Easy Apply 2d ago
  • Information Security Analyst

    WuXi Apptec

    Cyber security analyst job in Saint Paul, MN

    The Information Security Analyst Identifies security risks and exposures, determine the causes of security violations, and configuring systems to optimize notification of future incidents. The Security Analyst Integrates appropriate systems and logs into the enterprise security incident and event management system to effectively monitor and detect various people and enterprise asset activity. The Information Security Analyst works under the direction of the Information Security Director on the IT Security Operations Team. This is a hybrid job, must be located in Saint Paul MN Responsibilities • Investigates and analyzes security events to evaluate risk, prioritizing findings based on internal and external information. • Configures and maintains SIEM platform, including areas such as source feeds, alerts, alarms, and API integrations. • Configures and maintains EDR/antivirus. • Configures and maintains vulnerability management platform, including areas such as vulnerability scanning, remediation, and mitigation as well as impact and risk analysis. • Communicates security concerns to the business stakeholders to collectively develop and execute an appropriate remediation/mitigation plan. • Interacts with security risk and compliance group, adjacent IT departments, and business units as needed to ensure compliance with IT Security goals and policies. • When needed, assists in administration of other security tools (Data Loss Prevention, Email Security/Spam Filter, End User Training, Mobile Device Management). • Maintains up-to-date knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and evolving attacks and threat vectors. General Job Responsibilities: • Ability to work in a team environment and independently as required • Contributes to project planning and scheduling. • Normally receives minimal instructions on routine work and detailed instructions on new assignments. • Participate in Architecture design reviews and other technical governance forums across the organization representing the security team across multiple projects. • Be on call and available after business hours, would require working Holidays and weekends if major security incident occurs. • Establish and maintain pertinent policies, standards, and procedures • Perform duties in compliance with applicable regulations and standards such as Sarbanes Oxley Act, FDA Quality System, and ISO (International Organization for Standardization) Works on routine assignments per written procedures, where ability to recognize deviation from accepted practice is required. • Contributes to the overall operations and to the achievement of departmental goals • Perform job specific tasks in compliance with applicable Regulations, International Standards, and WuXi AppTec Policies and Standard Operating Procedures. • Understanding of Good Laboratory Practices and Good Manufacturing Practices • Other duties as assigned Qualifications • Degree in Cyber Security, Management Information Systems, Information Security or equivalent work experience o Minimum 2 years prior experience in a Cyber Security • In depth knowledge of LogRhythm SIEM platform or other SIEM platforms, which includes configuring and maintaining API integrations and source feeds, alerts and alarms • In depth knowledge in Qualys Vulnerability Management System, which includes configuring and maintaining • In depth knowledge in Cisco AMP Anti-Virus software, which includes configuring and maintaining • Knowledge of ISO/IEC 27001 standards. • Strong technical acumen with a solid understanding of security technologies and network architecture • Strong verbal and written communication skills • Independent driver of self-development and continuous learning • Knowledge of information security technology, design, research techniques, administration, operating standards, and quality control methods. • Basic understanding of LAN/WAN technologies and protocols, FTP, Active Directory, VPN technologies (MPLS, IPSEC, etc.), IIS and other network services. • Experience in a large, formal vulnerability program. • General knowledge of cloud, wireless network and mobile security. • Team-oriented and skilled in working within a collaborative environment. An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability This job description does not state or imply that the above are the only duties and responsibilities assigned to this position. Employees holding this position will be required to perform any other job-related duties as requested by Management.
    $76k-108k yearly est. Auto-Apply 4d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Eau Claire, WI?

The average cyber security analyst in Eau Claire, WI earns between $60,000 and $109,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Eau Claire, WI

$81,000
Job type you want
Full Time
Part Time
Internship
Temporary