Senior Offensive Security Engineer, Red Team
Cyber security analyst job in Cincinnati, OH
Information Technology at Procter & Gamble is where business, innovation and technology integrate to build a competitive advantage for P&G. Our mission is clear -- we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT expertise to deliver innovative, tech-focused business models and capabilities for our 65 iconic, trusted brands.
From Day 1, you'll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place! Our company offers purposeful work that will take your career places you never envisioned, in creative workspaces where innovation thrives and where your technical expertise is recognized and rewarded.
The Opportunity
Are you a person who is passionate about breaking applications, devices, services and/or processes to help protect them against the world's most advanced cyber security adversaries?
The Information Security Protect organization at P&G is responsible for providing a realistic depiction of threat actor behaviors and scenarios during simulated exercises. We drive improvements to applications and systems, as well as detection and response capabilities through regular testing of security controls across the enterprise.
Responsibilities:
Lead end-to-end red team operations aligned to priority threat actors: scenario design, ROE, pre-briefs, execution, and hot-wash/AAR.
Support purple-team engagements with DFIR/SOC and Detection Engineering to convert TTPs into durable detections, runbooks, and response improvements with measurable outcomes.
Orchestrate assumed-breach campaigns emphasizing evasion and control bypass (EDR/AV, email/web security, identity/conditional access, network segmentation, cloud guardrails).
Perform campaign/TTP research, develop internal PoCs/tooling (e.g., tradecraft to exercise specific controls, lightweight payloads), and steward OPSEC.
Produce executive-ready risk narratives and technical reporting (ATT&CK mapping, artifacts, evidence handling) and brief senior leadership.
Mentor junior engineers; set standards for craft quality, methodology, and safety.
Coordinate multi-party/third-party exercises; manage risk, deconflict with production, and ensure stakeholder alignment.
Contribute to operational expansion by researching, prototyping, and developing novel capabilities for offensive use.
Contribute to program maturity: metrics/KPIs, roadmap, methodology standardization, control validation cadence, and integration with vulnerability management.
Cyber Security Analyst
Cyber security analyst job in Detroit, MI
Security Governance, Risk & Compliance Analyst (GRC Analyst)
Direct Hire
Detroit (hybrid after 30-days) --> LOCAL candidates will only be considered
US or Green Card may only be considered
We're seeking an experienced Information Security Governance, Risk & Compliance Analyst to strengthen our IT Security program. This role is ideal for a proven GRC professional with hands-on expertise in regulatory compliance, risk assessments, and enterprise security frameworks.
Ideal Profile Highlights:
10+ years in Information Security GRC across regulated industries
Expertise in NIST, ISO 27001, SOX, GLBA, GDPR, and audit coordination
Strong operational experience with Azure, O365, CrowdStrike, Mimecast, ZenGRC, Archer, KnowBe4
Proven leader with excellent technical writing and cross-functional collaboration skills
Certifications: CIPP/US, CIPM, CDPSE, ISO 27001 Internal Auditor
Key Responsibilities:
Monitor regulatory changes and ensure compliance alignment
Conduct enterprise risk assessments and manage remediation
Support audit readiness and evidence documentation
Develop and enhance governance policies and incident response plans
Deliver GRC reporting to IT & business leadership
✅ Hybrid schedule after 30 days
Cyber Security Analyst (Rif. 2025-127)
Cyber security analyst job in Grand Rapids, MI
aizo On, a technology consulting company, is looking for Cybersecurity Analyst.
AIZOON USA is expanding its Cybersecurity Division and seeks skilled Cybersecurity Analysts to operate and manage cyber security platforms. In this critical role, you'll be responsible for security threat monitoring, incident response, risk assessment, and client advisory services.
Key Responsibilities:
Operate cybersecurity monitoring platforms and conduct threat analysis
Respond to security incidents with defined escalation procedures
Conduct risk assessments and support compliance regulatory standards
Provide client support and continuous cybersecurity advisory services
Qualifications:
Experience with SOC operations, incident response, and threat intelligence
Familiarity with cybersecurity frameworks (NIST, ISO27001)
Strong analytical and problem-solving skills
aizo On is an equal opportunity employer.
Security Analyst
Cyber security analyst job in Indianapolis, IN
Resource will work as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases.
The essential functions of this role are as follows:
• Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement;
• Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment.
• Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits.
• Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53).
• Develops Standard Operating Procedures (SOP) for implementing security polices;
• Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems;
• Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data;
• Develops and implements procedures for use of information security management software;
• Proposes information security software enhancements;
• Performs periodic audits to assure security policies and standards are being followed and are effective.
• Develops recommendations for enhancements and generates reports where necessary;
• Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security;
• Mentors and provides guidance to new or other staff as needed;
• Performs related duties as assigned.
• Assist on other task as assigned.
Thorough knowledge of information security management tools, policies, and standards of information security procedures;
• Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy;
• Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation;
• Familiarity with domain structures, user authentication, and digital signatures;
• Ability to develop and maintain information security standards;
• Ability to understand and apply complex computer logic to work;
• Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management;
• Experience in assessing security needs of teams and assist in their security training.
• Ability to communicate effectively both orally and in writing;
• Ability to be a team member as well as a team leader depending on the situation;
• Degree in information security or technology preferred;
• Security certification preferred (e.g. CISSP).
• Network Admin experience preferred.
Skills:
• To be effectively with wide range of information technologists,including systems administrators, technical support, application development, end users
• Network Admin experience
• Security certification (e.g. CISSP, CRISC)
• Ability to develop and maintain information security standards
• Ability to understand and apply complex computer logic to work
• Degree in information security or technology
• Familiar with cybersecurity security framework (e.g. NIST, ISO, SOC 2, CIS, Cobit, etc
• Computer security compliance and auditing experience
• IRS, SSA computer security compliance and audit experience
• HIPAA experience
OT Security Cyber Prevention Engineer
Cyber security analyst job in Marysville, OH
What Makes a Honda, is Who makes a Honda Honda has a clear vision for the future, and it's a joyful one. We are looking for individuals with the skills, courage, persistence, and dreams that will help us reach our future-focused goals. At our core is innovation. Honda is constantly innovating and developing solutions to drive our business with record success. We strive to be a company that serves as a source of “power” that supports people around the world who are trying to do things based on their own initiative and that helps people expand their own potential. To this end, Honda strives to realize “the joy and freedom of mobility” by developing new technologies and an innovative approach to achieve a “zero environmental footprint.”
We are looking for qualified individuals with diverse backgrounds, experiences, continuous improvement values, and a strong work ethic to join our team.
If your goals and values align with Honda's, we want you to join our team to Bring the Future!
The Honda Development and Manufacturing Production Engineering team is responsible for the operational technology
security of the manufacturing environment. The OT Security Cyber Prevention Engineer works across multiple technical
and business areas to develop, implement, and maintain procedures, standards, and controls to prevent the risk or
impact of a cyber incident. The scope of this function covers manufacturing equipment hardware/firmware/ software, OT
enterprise systems, data analysis and reporting, and collaboration with IT/business users to ensure secure operation
across all HDMA locations and equipment.
New equipment introduction - set OT standards for new equipment, integrate equipment into the OT
network, confirm vulnerabilities, perform risk assessments, and visibility of equipment within the asset
management system.
Training - support the creation, administration and maintenance of OT specific training material.
Policies/procedures/auditing - create, issue, maintain, and audit OT specific policies and procedures.
Access control (physical + logical) - set and implement technical standards for equipment level physical
access and control access to OT related systems and equipment.
OT standard creation - support the development, implementation, and maintenance of technical
standards for the OT equipment and networks
Risk metric management/assessments - establish company OT risk metrics and corresponding
assessments to determine OT risk, perform risk assessments, and establish tools for visibility and
reporting.
Sensing/industry benchmarking - research technical and business OT security industry benchmarks and
generate recommendations for adjustments to internal tools or practices to stay in alignment.
What differentiates Honda and makes us an employer of choice?
Total Rewards:
Competitive Base Salary (pay will be based on several variables that include, but not limited to geographic location, work experience, etc.)
Regional Bonus (when applicable)
Manager Lease Car Program (No Cost - Car, Maintenance, and Insurance included)
Industry-leading Benefit Plans (Medical, Dental, Vision, Rx)
Paid time off, including vacation, holidays, shutdown
Company Paid Short-Term and Long-Term Disability
401K Plan with company match + additional contribution
Relocation assistance (if eligible)
Career Growth:
Advancement Opportunities
Career Mobility
Education Reimbursement for Continued learning
Training and Development Programs
Additional Offerings:
Lifestyle Account
Childcare Reimbursement Account
Elder Care Support
Tuition Assistance & Student Loan Repayment
Wellbeing Program
Community Service and Engagement Programs
Product Programs
Honda is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, creed, religion, national origin, sex, sexual orientation, gender identity and expression, age, disability, veteran status, or any other protected factor.
Cyber Security Analyst III
Cyber security analyst job in Pontiac, MI
We are growing our Information Security Threat Intelligence and Compliance team here at UWM. This is a new position where you will be responsible for translating threat intelligence into actionable defensive measures, creating and maintaining procedural documentation and mentoring more junior analysts. Additionally, you will be detecting and analyzing suspicious or malicious events. This role will also actively participate on the Incident Response team.
WHAT YOU WILL BE DOING
* Review and analyze logs from a variety of sources
* Monitor detection systems for signs of attack or unusual activity
* Create documentation to assist with repeatable tasks and decision making
* Actively participates in incident response
* Monitors and analyzes threat intelligence sources and recommends appropriate actions
* Use penetration testing tools and techniques
* Works closely with other teams to understand the flow of sensitive data between systems and applications
* Translate threat intelligence into actionable defensive measures
* Mentor other Security Analysts
* Ability to provide on-call support on a rotating basis
WHAT WE NEED FROM YOU
Required:
* 5+ years of professional IT experience
* 2+ years of information security experience
* Subject matter expert in SIEM, forensics, malware analysis or incident handling
* Understanding of network protocols (TCP, UDP, DNS, FTP, SMTP, DHCP, etc.)
* Familiarity with industry regulations (eg. GLBA, NYCRR, etc.)
* Microsoft Windows troubleshooting skills
* GIAC or equivalent certification
* On-site attendance
* Computer related degree or equivalent
* 100% onsite attendance
THE PLACE & THE PERKS
Ready to join thousands of talented team members who are making the dream of home ownership possible for more Americans? It's all happening on UWM's campus, where our award-winning workplace packs plenty of perks and amenities that keep the atmosphere buzzing with energy and excitement.
It's no wonder that out of our six pillars, People Are Our Greatest Asset is number one. It's at the very heart of how we treat each other, our clients and our community. Whether it's providing elite client service or continuously striving to improve, our pillars provide a pathway to a more successful personal and professional life.
From the team member that holds a door open to the one that helps guide your career, you'll feel the encouragement and support on day one. No matter your race, creed, gender, age, sexual orientation and ethnicity, you'll be welcomed here. Accepted here. And empowered to Be You Here.
More reasons you'll love working here include:
* Paid Time Off (PTO) after just 30 days
* Additional parental and maternity leave benefits after 12 months
* Adoption reimbursement program
* Paid volunteer hours
* Paid training and career development
* Medical, dental, vision and life insurance
* 401k with employer match
* Mortgage discount and area business discounts
* Free membership to our large, state-of-the-art fitness center, including exercise classes such as yoga and Zumba, various sports leagues and a full-size basketball court
* Wellness area, including an in-house primary-care physician's office, full-time massage therapist and hair salon
* Gourmet cafeteria featuring homemade breakfast and lunch
* Convenience store featuring healthy grab-and-go snacks
* In-house Starbucks and Dunkin
* Indoor/outdoor café with Wi-Fi
DISCLAIMER
All the above duties and responsibilities are essential job functions subject to reasonable accommodation and change. All job requirements listed indicate the minimum level of knowledge, skills and/or ability deemed necessary to perform the job proficiently. Team members may be required to perform other or different job-related duties as requested by their team lead, subject to reasonable accommodation. This document does not create an employment contract, implied or otherwise. Employment with UWM is "at-will." UWM is an Equal Opportunity Employer. By selecting "Apply for this job online" you provide consent to UWM to record phone call conversations between you and UWM to be used for quality control purposes.
Auto-ApplyCyber Security Analyst - Awareness and Communication
Cyber security analyst job in Southfield, MI
Under general supervision, the Awareness & Communication Specialist, Cybersecurity will focus on user communications, awareness, and training. This role is crucial in mitigating human error, enhancing our security culture, ensuring compliance with regulatory requirements, reducing incident response time, and protecting DENSOs reputation. The ideal candidate will develop and implement comprehensive training programs, lead initiatives to promote security awareness, and prepare the workforce through regular drills and clear communication protocols.
ESSENTIAL DUTIES AND RESPONSIBILITIES:
Develop, curate and maintain security awareness training
Develop, curate and deliver periodic security awareness reinforcement communications
Conduct phishing simulations and track results
Conduct other user-behavior assessments
Create and deliver presentations
Author and maintain information security policies.
Support security assessments and audits
Manage security projects and initiatives
Create & maintain security guidelines for users
Coordinate communications with key security advocates (Champions)
Performs other duties as assigned
QUALIFICATIONS:
0-3 years of relevant experience
Bachelor's degree in Marketing, Communications, Project management, Behavioral Science, or related.
Experience working with MS Suite ( SharePoint Preferred )
Excellent verbal and written communication skills to convey complex security concepts clearly to all levels of associates
SKILLS AND ABILITIES:
Basic understanding of cybersecurity principles (preferred)
Basic knowledge of information systems, policies, procedures, and terms (preferred)
Experience in creating and delivering effective education/training programs for diverse audiences.
Experience in developing and executing internal communication campaigns
Data analysis skills, including the ability to identify behavior patterns and develop countermeasures to improve behaviors
Proficiency in managing multiple projects and initiatives simultaneously
Ability to work collaboratively with various departments and stakeholders
Solid experience with M365 applications like Word, PowerPoint, and Excel
BENEFITS SUMMARY:
Health, Dental, Vision, Prescription Drug plans
Life and Accidental Death & Dismemberment Insurance
Flexible Spending Account
Employee Assistance Program
401K with 4% company match
Bonus Program
Wellness Program
Onsite Fitness Center (vary by location)
Tuition Reimbursement
Career Development and Ongoing Training
Paid holidays and vacation
Cafeteria and food markets (vary by location)
Volunteer opportunities
Employee recognition (employee and milestone events)
Annual Salary: $78,000 - $98,000
Auto-ApplyCyber Security Analyst
Cyber security analyst job in Ohio
We are looking to add a cyber security analyst team member to our IT Department. The cyber security analyst will play a key role in enhancing and improving the security posture across the organization. You will be responsible for identifying and mitigating areas of vulnerability and potential exposure from a cyber security standpoint. The successful candidate will have hands-on and practical experience in areas of cyber and data security, cyber security methodologies and frameworks, including experience in establishing both technical and organizational controls to protect the confidentiality, integrity, and availability of data.
RESPONSIBILITIES
Provides seamless customer service support to end users in relation to cyber security within the organization.
Works closely with operations staff, IT management and information security teams.
Builds a security minded culture that keeps communication and transparency at the forefront of securing the organization.
Demonstrate working knowledge in the following: Networks and Network Security, Identity & Access Management, Data Management, Incident Management and Threat & Vulnerability Management.
Perform information security reviews and scans of designated systems to assess the effectiveness of overall system security, identify vulnerabilities and make mitigation recommendations.
Support the implementation, operation, and maintenance of vulnerability management projects.
Proactively collaborate and communicate within the IT team to address and mitigate vulnerabilities actively leveraged by malicious actors.
Recommend and support the implementation, operation, testing and on-going sustainment of HIPAA and PHI/PII security and compliance.
Constantly working to evolve and improve technologies and processes to ensure confidentiality, integrity and availability of data.
Perform enterprise vulnerability scanning, secure configuration baseline verification, tool validation, data and identity protection activities.
Detect and, as required, perform, or oversee remediation of information security vulnerabilities to minimize risks to operating environments.
Collaborates with external vendors and service providers, auditors or partner organizations to further cyber security objectives, reviews, mitigations and overall security posture improvements.
Seeks opportunities for additional responsibilities and growth within organization. Shows initiative and enthusiasm in suggesting and implementing new concepts and/or ideas for improvement.
These areas include IT cyber security support and troubleshooting, project management, system design and implementation.
Other duties as assigned.
REQUIREMENTS AND EXPERIENCE
Bachelor's Degree in Computer Science, Healthcare Information Technology, or relevant field or equivalent knowledge and skills obtained through a combination of education, training and experience required.
Knowledgeable and deep understanding of vulnerability and risk management.
Experience with NIST frameworks preferred.
Strong verbal and written communication skills required, and problem-solving ability.
Minimum of 3 years of experience with vulnerability scanning and reporting assessment tools.
Ability to articulate raw vulnerability and audit data into executive reports.
Experience with patch management software.
Understanding of SEIM / Log Aggregation tools.
Familiar with attack and exploitation techniques involving operating systems, applications, and devices.
Minimum of five (5) years of experience in configuration management compliance baselines for Windows, Mac, Linux.
Minimum of three (3) years of experience with Incident Response Team (IR/IRT) troubleshooting, root cause analysis and remediation verification.
Knowledgeable of Identity Management and authorization, least privilege, and reducing unauthorized elevated access.
Understanding of Firewalls to include basic networking, sub-netting, IDS, NAT, ACL's.
Deep knowledge of Office 365, Azure Security concepts and best practices.
Minimum of five (5) years of experience in IT, information security, cyber risk management, compliance or a related field required; of which at least 3 years' experience in information security is required.
Healthcare experience preferred.
Strong interpersonal skills and ability to work both independently and as part of a team required
Certification:
One or more relevant information security-related certifications preferred. Examples include: CISSP, CISA, HCISPP, CCSP, CRISC, CISM, CGIH, GCFA, GNFA, GPEN, GSEC, QSA and CEH.
Microsoft AZ-500 preferred.
PHYSICAL DEMANDS AND WORK ENVIRONMENT
Must have use of sensory skills to effectively communicate and interact with other employees and the public through use of the telephone, email, video conference and face to face contact
Must have manual dexterity, visual acuity and hearing acuity to effectively use and operate office related equipment such as but not limited to a computer, copier, scanner, camera, phone, headset, keyboard and mouse
Must be able to sit for extended periods of time at a keyboard and workstation with low periods of reaching and standing
EQUAL EMPLOYMENT OPPORTUNITY STATEMENT
Ingenovis Health is an equal opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination and harassment of any kind on the basis of race, color, national origin, religion, gender, gender identity, sexual orientation, disability, genetic information, pregnancy, age, or any other protected status set forth in federal, state, or local laws. This policy applies to all employment practices within our organization.
RESERVATION OF RIGHTS
Essential functions contained within this job description are listed above; they are subject to change at any time due to reasonable accommodation or other reasons set forth by management.
SIGNATURE
Employee signature below constitutes employee's understanding of the requirements, essential functions and duties of the position.
Employee Name:
Employee Signature:
Date:
Compensation Range
$78,600.00 - $98,300.00
Benefits include: health, dental, vision, FSA/HSA, company-paid life insurance, 401K with discretionary match, paid time off, paid parental leave, and tuition reimbursement.
Job will remain open until position is filled.
Auto-ApplyCyber Security Analyst/Implementation Specialist
Cyber security analyst job in Columbus, OH
Responsibility for information cyber security analysis & response with the mission of protecting the firm from internet attacks / threat actors. Lead initiatives and the implementation of capabilities in order to advance the Cyber Threat program Enhance and distribute security incident response and escalation procedures to ensure timely and effective handling of security events and alerts
Apply knowledge of technical, analytical skills to ensure the confidentiality, integrity, and availability of all information systems assets and ensure compliance with company policies, procedures, contractual, and regulatory requirements.
A solid understanding of Penetration Testing, Vulnerability Management, Threat Vector Analysis, Intrusion Detection and Prevention, Incident Management and Response, Web Application Security, Risk Assessment and Mitigation methodologies, and Counter Threat Operations.
Qualifications
Cyber Security Analyst/Implementation Specialist - need someone that has broad cyber security knowledge that can not only recommend solutions, but more importantly also has experience implementing/managing those solutions.
MUST HAVE JAVA DEVELOPMENT BACKGROUND
Need solid remediation experience - how to remediate vulnerabilities in a web application
CISSP certification is nice to have, not mandatory
Additional Information
Job Status: Contract to Hire
Eligibility: EAD Green Card/ Green Card/ US Citizens
Share the Profiles to *********************
Contact:
************
Keep the subject line with Job Title and Location
Easy ApplyEntry Level Cyber Security Analyst
Cyber security analyst job in Dayton, OH
":"As an Entry Level Cyber Security Analyst, you will become a part of an elite team of individuals committed to the security of Customer information and the Company's intellectual property. You will manage the various security tools to identify and evaluate complex business and technology risks.
You must also be able to communicate your findings and recommendations for management.
You will work with teams across the organization including partnering with IT and Software Development on security related matters.
If you are an innovative problem solver in technology who enjoys working in a team environment, this is the position for you! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Entry Level Cyber Security Analyst","date":"2025-11-22","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Bachelor's degree, certificate, or boot camp in CIS, IT, or Cyber Security related fields a plus~^~Linux and Windows operating systems experience and knowledge required~^~Excellent oral and written communication skills~^~Industry standard certifications a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
Cyber Security Analyst
Cyber security analyst job in Crane, IN
ManTech seeks a motivated, career and customer-oriented **Cyber Security Analyst** to join our team in **Crane, Indiana.** This is an onsite position. As a core member, you will assist in the research & design, engineering, integration, testing, training, logistics, laboratory research, field engineering, and acquisition and operations analysis in support of a variety of Navy and Marine Corps programs and projects with a focus on defensive cyber technologies, mission assurance, and resilience capabilities for the tactical network environment. Your effort will go towards dramatically increasing the warfighter's effectiveness. If you enjoy working on a highly collaborative and dynamic team and want to make a difference for the warfighter, then we would love to have you on our team!
**Responsibilities include but are not limited to:**
+ Review and evaluate System Security Plans (SSPs), System Security Authorization Agreements (SSAAs), systems and networks diagrams, Security Requirements Traceability Matrices (SRTMs), Risk Assessments, and associated Information Systems (IS) Certification and Accreditation (C&A) documents in accordance with Department of Defense (DoD), Intelligence Community (IC), National and Agency standards
+ Observe, evaluate, and document IS security certification testing and prepare Security Certification Test Reports (SCTRs) with findings and recommendations regarding systems; Approval To Operate (ATO)
+ Inspect systems, networks, sites for compliance to InfoSec standards and policies
+ Additional duties include producing periodic progress reports, preparing various forms of correspondence concerning deficiencies and statuses of SSPs/SSAAs, maintaining and reporting statistics on personal C&A efforts
+ Knowledge of DoD, IC, and National Security Policies, Regulations, Directives, and Instructions
**Minimum Qualifications:**
+ High School Diploma
+ Knowledge of commonly used concepts, practices, and procedures within the particular field
+ 1+ years of experience in the field or in a related area
+ Hands-on experience with networking technologies such as routers, switches, firewalls, and VPNs
**Preferred Qualifications:**
+ Bachelors Degree
+ Familiarity with network vulnerability scanners, web scanners, and database scanners is a plus
+ Knowledge of cloud computing concepts and technologies
+ CISSP, CISM, CCNA, CASP, or equivalent.
**Clearance Requirements:**
+ Must have a current and active TS/SCI clearance
**Physical Requirements:**
+ The person in this position must be able to remain in a stationary position 50% of the time.
+ Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
Cyber Network Defense Analyst
Cyber security analyst job in Wright-Patterson Air Force Base, OH
Bowhead seeks a Cybersecurity Network Defense Analyst to join our team in Dayton, OH. The Cybersecurity Network Defense Analyst uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. They provide on-site 24x7x365 operational support in the form of event/incident handling and analysis capability to cybersecurity service subscribers. These highly skilled individuals will work in various capacities alongside Warning Intelligence Analysts and Engineers.
The Cybersecurity Network Defense Analyst will work in the Attack Sensing and Warning (AS&W) division which senses changes in subscriber networks through comparison to established baselines and the fusion/integration of closed and open source intelligence to enhance sensing capability. They will perform the analysis of disparate data sources to form a cohesive view of the current cyber security state. They will characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
**Responsibilities**
- Receive and distribute AS&W information
- Conduct AS&W activities to develop appropriate response (receives and archive task orders, directives, and other required actions, and maintain internal and external source location information)
- Coordinate AS&W information from other sources to aid in analysis of alerts
- Analyze the Intrusion Detection System alerts to identify unauthorized or anomalous activity
- Identify, documents, and reports unauthorized activity/attacks (including IP addresses and ports, attack vector, and attack timeframe) in all incidents and reports per HPCMP CSSP sops
- Take action, if appropriate, to prevent or mitigate potential impact to the DODIN based on cyber threats, and develop and distribute countermeasures and interim guidance to prevent or mitigate threats and/or attacks on DODIN
- Monitor a platform capable of performing information security continuous monitoring (ISCM) for the purposes of detecting cyber intrusions, attacks, anomalous behavior, and possible insider threats
- Collect intrusion artifacts (e.g., source code, malware, and trojans)
- Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation
- Report incidents and events within proper channels and within timelines identified in the CJCSM 6510.01B
- Provide a 24/7x365 event/incident handling and analysis capability
- Provide operations log accessible to personnel documenting all mandated reportable cyber events/incidents
- Analyze detected cyber events to identify incidents
- Categorize and characterize cyber incidents
- Notify affected Subscribers of cyber incidents and collect assessments of mission impact for the loss of the system during the incident response process
- Analyze cyber incidents to develop specific responses
- Distribute tailored countermeasures or interim guidance to Subscribers to eradicate and prevent cyber incidents across all subscribers
- Perform forensic analysis of systems and malware in cases where subscribers lack the capability and ensure relevant IOCs are shared with Warning Intelligence
- Mitigate operational and/or technical impact due to cyber incidents
- Contain the spread of malware to prevent further damage to IT systems through detection, analysis, and execution of containment measures
**Qualifications**
- Must possess Bachelor's degree or equivalent experience
- Must have at least 2 years intrusion detection experience
- Must have at least 2 years relevant IT and/or System administrator experience and 2 years relevant Information Security experience
- Must have the certifications for DOD 8570 IAT Level II minimally
- Must have the certifications for DOD 8570 CSSP-Analyst or CSSP-Incident Responder
- Must have the ability to earn DoD 8570 computing environment certification within 6 months
- Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience
- Ability to demonstrate strong knowledge of computer security concepts
- Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience
- Advanced knowledge of network technologies and protocols
- Advanced understanding of current threats and trends present in the Information Security and Technology field
- Must complete the specified Joint Qualification Requirement training within 180 days of date of hire, unless otherwise specified
SECURITY CLEARANCE REQUIRED: Must currently hold a security clearance at the Secret level. US Citizenship is a requirement for Secret clearance at this location.
Physical Demands:
- Must be able to lift up to 25 pounds
- Must be able to stand and walk for prolonged amounts of time
- Must be able to twist, bend and squat periodically
\#LI-MN1
Applicants may be subject to a pre-employment drug & alcohol screening and/or random drug screen, and must follow UIC's Non-DOT Drug & Alcohol Testing Program requirements. If the position requires, an applicant must pass a pre-employment criminal background history check. All post-secondary education listed on the applicant's resume/application may be subject to verification.
Where driving may be required or where a rental car must be obtained for business travel purposes, applicants must have a valid driver license for this position and will be subject to verification. In addition, the applicant must pass an in-house, online, driving course to be authorized to drive for company purposes.
UIC is an equal opportunity employer. We evaluate qualified applicants without regard to race, age, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics EOE/D/V. In furtherance, pursuant to The Alaska Native Claims Settlement Act 43 U.S.C. Sec. 1601 et seq., and federal contractual requirements, UIC and its subsidiaries may legally grant certain preference in employment opportunities to UIC Shareholders and their Descendants, based on the provisions contained within The Alaska Native Claims Settlement Act. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities.
All candidates must apply online at ****************** and submit a completed application for all positions they wish to be considered. Once the employment application has been completed and submitted, any changes to the application after submission may not be reviewed. Please contact a UIC HR Recruiter if you have made a significant change to your application. In accordance with the Americans with Disabilities Act of 1990 (ADA), persons unable to complete an online application should contact UIC Human Resources for assistance (********************************************
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
UIC Government Services (UICGS / Bowhead) provides innovative business solutions to federal and commercial customers in the areas of engineering, maintenance services, information technology, program support, logistics/base support, and procurement. Collectively, the fast-growing Bowhead Family of Companies offers a breadth of services which are performed with a focus on quality results. Headquartered in Springfield, VA, we are a fast-growing, multi-million-dollar company recognized as a top Alaska Native Corporation providing services across the Department of Defense and many federal agencies. Bowhead offers competitive benefits including medical, dental, vision, life insurance, accidental death and dismemberment, short/long-term disability, and 401(k) retirement plans as well as a paid time off programs for eligible full-time employees. Eligible part-time employees are able to participate in the 401(k) retirement plans and state or contract required paid time off programs.
**Join our Talent Community!**
Join our Talent Community (************************************************************************ to receive updates on new opportunities and future events.
**ID** _2025-24272_
**Category** _Information Technology_
**Location : Location** _US-OH-Wright-Patterson AFB_
**Minimum Clearance Required** _Secret_
**Travel Requirement** _N/A_
Computer Network Defense(CND)Analyst
Cyber security analyst job in Columbus, OH
Overall Assignment Description:
The CND Analyst will perform actions to protect, monitor, detect, analyze and respond to unauthorized activity within assigned information systems and computer networks. Duties include: Employs Cybersecurity capabilities and
deliberate actions to respond to a CND alert or emerging situational awareness/threat.
Serves as an expert on CND requirements and compliance to such requirements by using IA
tools and techniques to perform compliance analysis and correlation, tracking and remediation,
coordination and escalating CND non-compliance.
Provides technical analysis and sustainment support for the enterprise for IA tools and
applications, and assists with the application of Defense-In-Depth signatures and perimeter
defense controls to diminish network threats
Skills and Experience:
Required:
Must possess a current DOD Top Secret Clearance and be eligible for SCI and IT-1 access at
time of proposal submission
Five (5) years of relevant experience or related formal education
Two (2) years of experience performing root cause analysis of cybersecurity events and incidents
Two (2) years of experience analyzing network traffic and/or system logs
DOD Approved 8570/8140 Baseline Certification : Category IAT Level II
DOD Approved 8570/8140 CSSP Certification : CSSP-IR
Must possess written and verbal skills to appropriately document and brief Cybersecurity
Incidents
Working knowledge of at least two cybersecurity areas:
Firewall
IDS/IPS
Host based antivirus
Vulnerability Management
JETS RFQ SP4709-24-Q-0002
DLA Cyber Emergency Response Team (CERT) Cyber Security Service Provider (CSSP)
Support
Forensics
Malware Analysis
Device Hardening
Understanding of Defense-in-Depth
Ability to build and read scripts in languages such as Perl, Bash, Powershell, Ruby, Python
Cyber Defense Analyst
Cyber security analyst job in Allen Park, MI
This position is for a Cyber Defense Center (CDC) Detection Analyst specializing in initial threat triage. A Detection Analyst involves swiftly assessing and prioritizing security incidents to determine their severity and potential impact. You will be responsible for promptly identifying and investigating various threats, initiating timely response actions, and escalating to appropriate teams for further investigation and/or remediation. This role is hybrid, with on-site work in Southeast Michigan. Candidates in Pacific or Mountain time zones may be considered for a fully remote arrangement to meet business needs. Additionally, candidates must be willing to work at least 1 weekend per calendar quarter. For those weeks, only when you're Shift Lead, you work 11am-8pm shift during Eastern Daylight Savings time and 10am-7pm shift during Eastern Standard time. Enterprise Technology plays a critical part in shaping the future of mobility. If you're looking for the chance to leverage advanced technology to redefine the transportation landscape, enhance the customer experience and improve people's lives, this is the opportunity for you. Join us and challenge your IT expertise and analytical skills to help create vehicles that are as smart as you are. Minimum Qualifications:
Bachelor's degree in a computer related field
2+ years of experience with SIEM tools and/or reviewing system log files, data correlation, and analysis (i.e. firewall, network flow, system logs, IDS)
2+ years of experience in customer service including the resolution of escalations, incident handling, and response
In depth knowledge of servers, clients, various computer peripherals, network and/or storage technologies with various operating systems including Windows, Linux, and Mac
Experience in a fast paced, high stress, support environment, able to work with a sense of urgency and attention to detail
Must work well with others including peers and end-users
Strong interest in cyber security with an eagerness and willingness to learn
Strong deductive reasoning, critical and analytical thinking, problem solving, and prioritization skills
Disciplined approach utilized when completing work and adhering to procedure
Strong oral and written communications skills - able and willing to communicate technical items in non-technical terms
Demonstrate high level of independent initiative, drive for results and commitment to integrity
Ability to concurrently work on multiple assignments/projects and complete on schedule with high quality
Preferred Qualifications:
2+ years of Cyber Security experience
2+ years Cloud experience in Google Cloud Platform (GCP) or Microsoft Azure
Experience applying Artificial Intelligence (AI) and Machine Learning (ML) to improve processes, decision-making, or analysis within your current job responsibilities
Familiar with Ford Computing Infrastructure and application development life cycle (SDM)
Scripting abilities (Python, PowerShell, Bash/Shell, SQL)
GIAC, CEH, CISSP or other security credentials
You may not check every box, or your experience may look a little different from what we've outlined, but if you think you can bring value to Ford Motor Company, we encourage you to apply!
As an established global company, we offer the benefit of choice. You can choose what your Ford future will look like: will your story span the globe, or keep you close to home? Will your career be a deep dive into what you love, or a series of new teams and new skills? Will you be a leader, a changemaker, a technical expert, a culture builder…or all of the above? No matter what you choose, we offer a work life that works for you, including:
• Immediate medical, dental, vision and prescription drug coverage
• Flexible family care days, paid parental leave, new parent ramp-up programs, subsidized back-up child care and more
• Family building benefits including adoption and surrogacy expense reimbursement, fertility treatments, and more
• Vehicle discount program for employees and family members and management leases
• Tuition assistance
• Established and active employee resource groups
• Paid time off for individual and team community service
• A generous schedule of paid holidays, including the week between Christmas and New Year's Day
• Paid time off and the option to purchase additional vacation time.
This position is a salary grade 6-8
For more information on salary and benefits, click here: *****************************
Visa sponsorship is not available for this position.
Candidates for positions with Ford Motor Company must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status. In the United States, if you need a reasonable accommodation for the online application process due to a disability, please call **************.
This position is hybrid. Candidates who are in commuting distance to a Ford hub location may be required to be onsite four or more days per week.
#LI-Hybrid
#LI-GR
What You'll Do:
Perform initial triage of various security incidents to determine if a threat applies to Ford including phishing, malicious software, hostile probes, information theft, and misuse of computing facilities
Conduct daily analysis on the aforementioned incidents using a range of tools such as SIEM, EDR, IDS/IPS, Cloud, and Sandbox analysis
Collaborate with internal and customer teams to investigate and contain incidents
Respond to cyber security queries received from Ford personnel
Adhere to various playbooks/procedures to provide consistent and repeatable methods to resolve security incidents
Effectively document investigation details for both technical and non-technical audiences
Recognize attacker Tools, Techniques, and Procedures (TTPs) and Indicator of Compromises (IOCs) that apply to current and future investigations
Support Shift Lead rotation at least once per calendar quarter
Keeping up-to-date with emerging cybersecurity threats to proactively prevent potential attacks and improve Ford's cyber security posture
Leverage AI-driven threat detection and analysis tools to enhance triage accuracy and accelerate identification of emerging attack patterns
Auto-ApplyIT Compliance and Risk Management Analyst/ IT Security Analyst/ IT Auditor/ PCI Analyst (Cont to Hire)
Cyber security analyst job in Columbus, IN
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Location: Columbus, IN 47201
Job Title: Sr. IT Compliance and Risk Management Analyst
Duration: 6 months (Contract to Hire)
Job description:
•Responsible for the execution of compliance audits. Reviews procedures and corresponding evidence to determine whether or not internal controls are being properly applied.
•Leads or executes compliance audits and risk assessments within established control areas.
•Tests and documents more complex computer system records for information system integrity and transaction accuracy; reports discrepancies.
•Prepares less complex audit plans or assists with more complex plans.
•Prepares formal written reports to communicate audit results to management, and makes recommendations as appropriate; defines compliance issues and identifies root causes for review by manager.
•May provide technical guidance to contract audit staff to ensure that audit objectives are met.
•May coach and mentor less experienced analysts.
Qualifications
• Bachelors Degree Required: PCI (Payment Card Industry)- this is a higher level position and only looking for PCI SME (Subject Matter Expert) experience.
• Must Have IT Compliance Experience with PCI Management Side experience
• This manager is looking for a candidate that has seasoned PCI Experience on is a subject matter ex]pert and worked with the management side if PCI with the ability to set the right type of internal controls.
Additional Information
If interested please contact:
Himanshu Prajapat
************
himanshu.prajapat(@)collabera.com
Information Security Specialist
Cyber security analyst job in Kokomo, IN
The Information Security Specialist supports the planning, implementation, and operation of StarPlus Energy's global and local security management systems. This position ensures compliance with international and Korean security regulations, establishes physical and IT infrastructure security systems, and coordinates with both corporate headquarters and Korean government authorities to prevent information leaks and respond to potential security threats. This position reports to the Information Security Manager.
Roles & Responsibilities:
Plan, develop, and operate corporate information security systems for facility and IT infrastructure protection
Establish incident response procedures and maintain readiness against internal and external security threats
Develop and operate the site's physical security management system, including access control, CCTV, and intrusion detection system
Manage and oversee external security service providers (e.g., physical security guards, monitoring services, and system maintenance vendors) to sure proper performance and contract compliance
Support vendor performance evaluations, documentation, and corrective actions when service issues arise
Define and enforce information protection policies and procedures to ensure consistent implementation across the organization
Establish and operate a security management framework for Korean National Core Technology (KNCT) compliance
Assign protection grades, define and manage secure communication systems, and safeguard all data and documentation related to KNCT
Coordinate and conduct security education and training for employees
Develop and maintain incident response systems to address potential data or technology leakage
Support internal and external security audits and inspections from Korean government and SDI Headquarters
Perform security infrastructure vulnerability assessments and implement corrective actions as needed
Prepare technical report, standard operating procedures (SOPs), and other documentation required for compliance and audit response
Perform other position related duties as assigned
Analyst, IT Security Compliance
Cyber security analyst job in Indiana
3M has a long-standing reputation as a company committed to innovation. We provide the freedom to explore and encourage curiosity and creativity. We gain new insight from diverse thinking, and take risks on new ideas. Here, you can apply your talent in bold ways that matter.
Job Description:
About the Role
Join the dynamic and innovative team at 3M Global Technology Center LLP as an Analyst - Security Compliance and take your career to new heights.
At 3M, innovation is at the core of everything we do. We empower curiosity, creativity, and bold thinking, while fostering an environment where diverse ideas thrive. By joining our team, you will have the opportunity to work with industry experts and cutting-edge technologies, helping shape a world-class security compliance program.
What You'll Do
As a key member of the Security Compliance team, reporting to the Team Lead - Security Compliance, you will:
* Execute day-to-day cybersecurity risk, compliance, and assurance activities.
* Support global cybersecurity certifications including ISO 27001 and ISO 27017, evaluating control effectiveness and reviewing evidence of controls.
* Assist in achieving ISO 27001 certification by identifying risks and implementing controls.
* Maintain and continuously improve 3M's Information Security Management System (ISMS).
* Create, update, and manage ISMS documentation, reports, and audit records.
* Act as Subject Matter Expert (SME) for PCI DSS, advising stakeholders, conducting internal assessments, and driving PCI DSS v4.0.1 reviews, gap assessments, and control evaluations.
* Provide high-level knowledge support on other frameworks and standards including SOC 2, COBIT, NIST, SWIFT, and GDPR.
* Deliver timely written reports, metrics, and updates to cybersecurity management.
* Collaborate and communicate effectively across teams and with stakeholders.
What We're Looking For
* Education: Bachelor's degree with a minimum of 3 years of experience in Information Security, GRC, or related roles.
* Certifications (preferred): ISO 27001 Lead Auditor/Implementer, PCI ISA, CISA, CISM, CRISC, CISSP, or equivalent.
* Skills & Knowledge:
* Strong knowledge of information security risk standards, frameworks, and methodologies.
* Experience working with GRC tools such as Archer (or similar).
* Excellent written and verbal communication skills.
* Ability to manage multiple priorities and adapt to evolving business needs.
Learn more about 3M's creative solutions to the world's problems at ********** or on Instagram, Facebook, and LinkedIn @3M.
Safety is a core value at 3M. All employees are expected to contribute to a strong Environmental Health and Safety (EHS) culture by following safety policies, identifying hazards, and engaging in continuous improvement.
Please note: your application may not be considered if you do not provide your education and work history, either by: 1) uploading a resume, or 2) entering the information into the application fields directly.
3M Global Terms of Use and Privacy Statement
Carefully read these Terms of Use before using this website. Your access to and use of this website and application for a job at 3M are conditioned on your acceptance and compliance with these terms.
Please access the linked document by clicking here, select the country where you are applying for employment, and review. Before submitting your application, you will be asked to confirm your agreement with the terms.
Auto-ApplyIT Security Analyst - IT Solutions - Indianapolis, IN
Cyber security analyst job in Indianapolis, IN
Join American Structurepoint and become part of a team that goes the extra mile for our clients and communities. We live by our values - respect, staff development, results and family. Our team is encouraged to explore new ideas and turn our clients' dreams into reality. With exceptional benefits, training, and mentorship, we pave the way for a rewarding career. Ready for more than just a job? Explore opportunities with us and help improve the quality of life in the communities we serve.
Group: Information Technology
Position: IT Security Analyst
Location: Indianapolis, IN
Are you passionate about cybersecurity and ready to protect the digital backbone of an innovative engineering firm? We're looking for a skilled IT Security Analyst to join our team and help secure mission-critical systems, proprietary data, and infrastructure. Join a team where your cybersecurity expertise directly supports groundbreaking engineering projects. Apply now or message us to learn more!
Responsibilities
• Monitor and analyze network traffic for threats and vulnerabilities
• Conduct regular security assessments and penetration testing
• Work collaboratively with Infrastructure team to learn and review firewalls, antivirus, and intrusion detection/prevention systems - Maintain Secure by Design Approach
• Investigate and respond to security incidents
• Continually develop (update) and implement cybersecurity policies and procedures
• Collaborate with engineering and IT teams to secure sensitive project data
• Stay ahead of emerging threats and technologies
• Be passionate about:
o Learning new technologies
o Working collaboratively in a team atmosphere
Qualifications
Must-Haves:
• Bachelor's degree in Computer Science, Cybersecurity, or related field
• 3+ years of experience in IT security roles
• Strong knowledge of network protocols, firewalls, and endpoint protection
• Experience with SIEM tools - Understand and develop queries and expressions
• Basic Understanding of NIST, SOC2, CMMC or similar frameworks
• Excellent communication and problem-solving skills
• Excellent written and documentation skills
Nice-to-Haves:
• Certifications: CISSP, CISM, CEH, or Security+
• Experience with cloud security (AWS, Azure)
• Scripting knowledge (Python, PowerShell)
• Exposure to engineering software platforms (AutoCAD, SolidWorks)
• Familiarity with Zero Trust architecture
Auto-ApplyInformation Security Analyst 2
Cyber security analyst job in New Bremen, OH
: Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
**Information Security Analyst 2**
**Job Duties**
+ Governance, Risk, & Compliance (GRC) Application Subject Matter Expert - Operate and maintain Company's Governance, Risk and Compliance (GRC) platform, its libraries, reports, portals, and data integrations to effectively support operations, data accuracy and user processes. Serve as the primary liaison for GRC software vendors, by maintaining contact with vendor representatives, submitting troubleshooting tickets and software feedback to improve the user experience. Support Company's Enterprise Risk Management, Compliance, Vendor Management, Business Continuity Planning, Information Technology and Security, Project Management and Audit Programs with data entry, maintenance, and configuration. Develop, maintain, and distribute custom and ad hoc reporting of risk data including taxonomy analytics and Key Risk Indicators (KRI's).
+ Security Architecture & Control Design - Develop/integrate cybersecurity designs for systems and networks for the processing of company data. Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements. Ensure that acquired or developed systems and architectures are consistent with company's cybersecurity architecture guidelines.
+ Risk Assessment - Coordinate external risk assessments including audits, gap assessments, and penetration testing to evaluate security architectures and designs to determine the adequacy of security design and architecture. Determine protection needs (i.e., security controls) for company's information processing and document appropriately. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
+ Incident Response Communication- Coordinate communication and information sharing aspects of incident response. Draft messages and updates to internal and external audiences for Incident Response Team (IRT) review, such as employees, customers, partners, media, or public. Handle crisis management issues and provides guidance and education on incident prevention and response best practices. Perform other duties as assigned.
**Minimum Qualifications**
+ 2-4 years related experience
+ Associate's degree (Information Technology, Cyber Security, Computer Science)
+ Non-degree considered if 6+ years of related experience along with a high school diploma (GED)
**Preferred Qualifications**
Intermediate knowledge of various Information Security & Privacy Frameworks such as the Secure Controls Framework, NIST CSF, NIST 800-171, NIST 800-53, NIST Privacy Framework, ISO-27001, ISO-27701, GDPR, US & other global privacy regulations. Work experience in other Information Technology disciplines such as software development, help desk, networking, systems administration or similar in conjunction with professional certifications such as CASP+, CISSP Associate, or AWS Associate Level Certifications. Intermediate level of knowledge in at least one scripting or software development language such as PowerShell, Bash, Java, or Python. Good written and oral communication skills, deductive reasoning, and analytical investigative skills. Good interpersonal skills to facilitate positive relations between business groups. Requires excellent verbal and written communication skills, as well as a knowledge of company's culture and values.
**Work Authorization:**
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
**Compensation and Benefits:**
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities
Information Security Expert
Cyber security analyst job in Columbus, OH
Title: Information Security SME/Developer with .NET development Duration : 5 Months contract (High possibility of Extension) Interview Type: Both iLinc Web Cam and In Person Interview Skills Required Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
.NET development experience Required 5 Years
Thanks
Naimesh Solanki
Sr. Technical Recruiter
Phone: ************ x 6578
Qualifications
Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
Additional Information
All your information will be kept confidential according to EEO guidelines.