Post job

Cyber security analyst jobs in Evansville, IN

- 341 jobs
All
Cyber Security Analyst
Information Security Analyst
Network Security Analyst
Defense Analyst
Intrusion Detection Analyst
Information Security Officer
Data Security Analyst
Senior Security Analyst
  • Information Security Officer

    Hays 4.8company rating

    Cyber security analyst job in Chicago, IL

    Job Title: Business Information Security Officer - Clinical Employment Type: Full-Time Salary Range: $130,000 - $140,000 + Benefits (Health, Dental, Vision, PTO, 401K) About the Role: We're seeking a Business Information Security Officer (BISO) to serve as a trusted advisor and strategic partner to business and clinical leaders. In this highly visible role, you'll embed cybersecurity into everyday operations, influence security adoption, and ensure compliance with frameworks like NIST, HIPAA, and FERPA. This is an opportunity to shape cybersecurity strategy in healthcare, research, and education while collaborating with executive leadership to advance a security-first culture. Key Responsibilities: Act as the frontline cybersecurity liaison for business and clinical leaders Identify and escalate domain-specific cybersecurity risks Monitor compliance with security policies and regulatory frameworks (HIPAA, FERPA, NIST CSF) Lead security awareness and risk engagement programs Develop and execute a roadmap of security initiatives aligned with business goals Drive change management for cybersecurity adoption What We're Looking For: Bachelor's degree in Computer Science or related field 5-7 years in Information Security, GRC, or cybersecurity education 3+ years managing cross-functional teams and projects Strong background in risk management, governance, and compliance Excellent communication and leadership skills Preferred: Healthcare or clinical environment experience Certifications: CISSP, CISM, PMP
    $130k-140k yearly 2d ago
  • Global Cyber Wordings Analyst

    Liberty Mutual 4.5company rating

    Cyber security analyst job in Chicago, IL

    Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience. Key responsibilities: Wording library and drafting support Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes. Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards. Track version control, change logs, approvals, and archiving; Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance. Commercial enablement Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently. Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives. Triage wording queries from regions; track SLAs and referral approvals per the global governance framework. Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards. Regulatory and legal stewardship Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions. Maintain audit-ready documentation; assist with regulatory filings or attestations where required. Claims partnership and feedback loop Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty. Support coverage position letters and documentation packs with research, citations, and clause histories. Innovation and product development support Help draft prototype wordings for new propositions Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses. Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics. Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders. Qualifications Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience. 2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred. Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail. Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous. Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates. Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools. Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs. Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting. About Us Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role. At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve. We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: *********************** Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law. Fair Chance Notices California Los Angeles Incorporated Los Angeles Unincorporated Philadelphia San Francisco We can recommend jobs specifically for you! Click here to get started.
    $77k-98k yearly est. Auto-Apply 33d ago
  • Detection & Response Analyst

    Ann & Robert H. Lurie Children's Hospital of Chicago 4.3company rating

    Cyber security analyst job in Chicago, IL

    Ann & Robert H. Lurie Children's Hospital of Chicago provides superior pediatric care in a setting that offers the latest benefits and innovations in medical technology, research and family-friendly design. As the largest pediatric provider in the region with a 140-year legacy of excellence, kids and their families are at the center of all we do. Ann & Robert H. Lurie Children's Hospital of Chicago is ranked in all 10 specialties by the U.S. News & World Report. Location 680 Lake Shore Drive Job Description The Incident Response Analyst helps guide resources to prepare for, coordinate, and respond to incidents, including, but not limited to, computer security vulnerabilities, malware, phishing, and social engineering, as well as associated forensic investigations. This position utilizes industry-leading security incident response procedures, performing frequent monitoring of incident detection control effectiveness and helping to inform preparedness exercises. This position effectively collaborates with managed detection and response, incident assistance, and security forensics partners. This position coordinates with internal emergency preparedness teams and contributes to a resilient business continuity posture. Essential Job Functions: Area Specific Job Accountabilities: Receive and triage incoming security alerts to determine their severity, priority, and relevance. Conduct initial triage and investigation of security incidents, including gathering and analyzing relevant data and logs. Analyze logs and security event data to identify indicators of compromise (IOCs) and potential security incidents. Conduct analysis of suspicious files, malware samples, or artifacts to understand their behavior and potential impact. Assist in the collection and preservation of digital evidence during incident investigation. Prepare detailed incident reports, documenting the timeline, actions taken, and lessons learned from each incident. Performs other duties as assigned. Knowledge, Skills, & Abilities: Bachelor's degree, preferably in Computer Science or related information security expertise. 2+ years of experience in information security incident response required. SANS GCIH (GIAC Certified Incident Handler), CISSP (Certified Information Systems Security Professional), CISA (Certified Information Security Auditor) or equivalent certification highly desired. Strong knowledge of information security forensics, security operations, security monitoring, technology implementation, risk analysis strategy, and NIST incident response life cycle. Experience and knowledge with information security frameworks, regulatory compliance, and regulatory bodies (e.g., HITRUST, NIST, HIPAA, DHHS). Goal oriented with the ability to lead team achievements toward desired results utilizing both internal and external resources. Professional communication, disciplined documentation, and commitment to following and improving processes and procedures. Familiarity and experience with crisis management, disaster recovery, and business availability programs and procedures Education High School Diploma/GED (Required) Pay Range $93,600.00-$154,440.00 Salary At Lurie Children's, we are committed to competitive and fair compensation aligned with market rates and internal equity, reflecting individual contributions, experience, and expertise. The pay range for this job indicates minimum and maximum targets for the position. Ranges are regularly reviewed to stay aligned with market conditions. In addition to base salary, Lurie Children's offer a comprehensive rewards package that may include differentials for some hourly employees, leadership incentives for select roles, health and retirement benefits, and wellbeing programs. For more details on other compensation, consult your recruiter or click the following link to learn more about our benefits. Benefit Statement For full time and part time employees who work 20 or more hours per week we offer a generous benefits package that includes: Medical, dental and vision insurance Employer paid group term life and disability Employer contribution toward Health Savings Account Flexible Spending Accounts Paid Time Off (PTO), Paid Holidays and Paid Parental Leave 403(b) with a 5% employer match Various voluntary benefits: Supplemental Life, AD&D and Disability Critical Illness, Accident and Hospital Indemnity coverage Tuition assistance Student loan servicing and support Adoption benefits Backup Childcare and Eldercare Employee Assistance Program, and other specialized behavioral health services and resources for employees and family members Discount on services at Lurie Children's facilities Discount purchasing program There's a Place for You with Us At Lurie Children's, we embrace and celebrate building a team with a variety of backgrounds, skills, and viewpoints - recognizing that different life experiences strengthen our workplace and the care we provide to the Chicago community and beyond. We treat everyone fairly, appreciate differences, and make meaningful connections that foster belonging. This is a place where you can be your best, so we can give our best to the patients and families who trust us with their care. Lurie Children's and its affiliates are equal employment opportunity employers. All qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity or expression, religion, national origin, ancestry, age, disability, marital status, pregnancy, protected veteran status, order of protection status, protected genetic information, or any other characteristic protected by law. Support email: ***********************************
    $93.6k-154.4k yearly Auto-Apply 47d ago
  • Cyber Security Analyst

    OSC Global

    Cyber security analyst job in Radcliff, KY

    OSC EdgeTech, LLC is seeking a talented Cyber Security Analyst to join the team. OSC EdgeTech is a wholly owned subsidiary of Cook Inlet Region, Inc. (CIRI), an Alaska Native Corporation proudly owned by over 9,400 Shareholders. OSC EdgeTech was created to deliver agile, responsive IT solutions to meet the evolving needs of federal and defense customers. As an SBA-certified 8(a) entity with a Facility Clearance (FCL), OSC EdgeTech streamlines the acquisition process while maintaining the trusted quality, security, and innovation that define OSC Edge. Cook Inlet Region, Inc., also known as CIRI, is one of 12 land-based Alaska Native regional corporations created pursuant to the Alaska Native Claims Settlement Act (ANCSA). CIRI's regional boundaries roughly follow the traditional Dena'ina territory of Southcentral Alaska. CIRI was incorporated on June 8, 1972, and is owned today by a diverse group of more than 9,500 Shareholders who live in Alaska and throughout the world. OSC EdgeTech offers excellent benefits for eligible employees. Benefits include paid holidays, paid time off, 401K with employer match, dental, vision, health insurance plans, as well as life and disability benefits. Position Overview The Cyber Security Analyst will contribute to the Cyber mission by conducting vulnerability scans, reviewing security alerts and incidents, and assessing technical compliance in accordance with DoD and Federal requirements. This position will utilize Cyber security tools, including ACAS, eMASS, HBSS, and Microsoft 365 Defender, to support vulnerability management, POA&M management, threat detection, and other Cyber tasks as required. Additionally, this position will collaborate with other Cyber analysts to develop programmatic actions and minimize security risks. Major Activities Conduct vulnerability scans of IT assets as requested from tickets or as directed by Cybersecurity Manager. Apply knowledge of monitoring, analyzing, detecting, and responding to Cyber events and incidents within information systems and networks. Advise on an integrated, dynamic Cyber defense and leverage Cybersecurity solutions to deliver Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, and data spillage, and incident response actions. Assess IT assets for cybersecurity compliance in accordance with DISA STIGs requirements. Develop POA&Ms to track any Overdue vulnerabilities or STIG deviations Review and investigate security alerts and incidents from Microsoft 365 Defender Utilize eMASS to maintain and update POA&M status Review device compliance status from HBSS Work with other NEC Operations team members to remediate and mitigate security vulnerabilities. Review the latest Cybersecurity intelligence information and provide recommendations to improve the Cybersecurity posture. Perform other duties as appropriate and as assigned. Knowledge/Skills/Abilities Experience analyzing log files, firewall logs, and IDS Logs to identify possible threats to network security, and to perform command and control functions in response to incidents. If not 8570 certified at contract start must be within six months. Experience in Host Based Security Systems (HBSS), ACAS vulnerability scanning software, knowledge of and experience with Security Information and Events Manager (SIEM) analysis and administration, as well as Information Assurance Vulnerability Alert (IAVA) management. Excellent verbal, written and interpersonal communication skills, excellent organizational and multi-tasking skills. Great analytical, critical thinking and problem-solving abilities. Superior presentation and negotiation skills. Strong management and organizational skills. Adaptable and capable of working in fast-paced environments. Proficient in Microsoft Word, Excel, PowerPoint, and SharePoint Required Qualifications Bachelor's degree in IT, Cyber Security or related field or seven years of IT work experience Demonstrated work experience as Cyber Security Analyst in DoD or Federal government environments Two or more years' experience performing vulnerability scans using Tenable SecurityCenter (Tenable.sc) or ACAS Must possess appropriate DISA ESS certifications and experience. Must be DoD 8570 certified at IAT Level 3 or higher (e.g., CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP) Must be US citizen Must possess active secret security clearance or higher Must be able to pass pre-employment background check Preferred Qualifications Bachelor's degree in IT, IM, or Cyber Security ACAS certification obtained within the last three (3) years, preferred HBSS Administrator certification obtained within the last three (3) years, preferred E-Verify: OSC EdgeTech participates in E-Verify. We will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization. Reasonable Accommodation: OSC EdgeTech, LLC will provide reasonable accommodations, according to applicable state and federal laws, to all qualified individuals with physical or mental disabilities. In compliance with the ADA Amendments Act (ADAAA), if you have a disability and would like to request an accommodation in order to apply for a position with OSC EdgeTech, LLC or any of its subsidiaries, please email *******************.
    $64k-88k yearly est. 12d ago
  • Cyber Security Analyst

    Mantech International Corporation 4.5company rating

    Cyber security analyst job in Crane, IN

    General information Requisition # R60267 Posting Date 05/06/2025 Security Clearance Required TS/SCI Remote Type Onsite Time Type Full time Description & Requirements Shape the future of defense with MANTECH! Join a team dedicated to safeguarding our nation through advanced tech and innovative solutions. Since 1968, we've been a trusted partner to the Department of Defense, delivering cutting-edge projects that make a real impact. Dive into exciting opportunities in Cybersecurity, IT, Data Analytics and more. Propel your career forward and be part of something extraordinary. Your journey starts now-protect and innovate with MANTECH! * This is for a future opportunity* ManTech seeks a motivated, career and customer-oriented Cyber Security Analyst to join our team in Crane, Indiana. This is an onsite position. As a core member, you will assist in the research & design, engineering, integration, testing, training, logistics, laboratory research, field engineering, and acquisition and operations analysis in support of a variety of Navy and Marine Corps programs and projects with a focus on defensive cyber technologies, mission assurance, and resilience capabilities for the tactical network environment. Your effort will go towards dramatically increasing the warfighter's effectiveness. If you enjoy working on a highly collaborative and dynamic team and want to make a difference for the warfighter, then we would love to have you on our team! Responsibilities include but are not limited to: * Review and evaluate System Security Plans (SSPs), System Security Authorization Agreements (SSAAs), systems and networks diagrams, Security Requirements Traceability Matrices (SRTMs), Risk Assessments, and associated Information Systems (IS) Certification and Accreditation (C&A) documents in accordance with Department of Defense (DoD), Intelligence Community (IC), National and Agency standards * Observe, evaluate, and document IS security certification testing and prepare Security Certification Test Reports (SCTRs) with findings and recommendations regarding systems; Approval To Operate (ATO) * Inspect systems, networks, sites for compliance to InfoSec standards and policies * Additional duties include producing periodic progress reports, preparing various forms of correspondence concerning deficiencies and statuses of SSPs/SSAAs, maintaining and reporting statistics on personal C&A efforts * Knowledge of DoD, IC, and National Security Policies, Regulations, Directives, and Instructions Minimum Qualifications: * High School Diploma * Knowledge of commonly used concepts, practices, and procedures within the particular field * 1+ years of experience in the field or in a related area * Hands-on experience with networking technologies such as routers, switches, firewalls, and VPNs Preferred Qualifications: * Bachelors Degree * Familiarity with network vulnerability scanners, web scanners, and database scanners is a plus * Knowledge of cloud computing concepts and technologies * CISSP, CISM, CCNA, CASP, or equivalent. Clearance Requirements: * Must have a current and active TS/SCI clearance Physical Requirements: * The person in this position must be able to remain in a stationary position 50% of the time. * Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation. If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
    $60k-77k yearly est. Auto-Apply 60d+ ago
  • Network Security Analyst / Network Engineer/ System Admin

    Collabera 4.5company rating

    Cyber security analyst job in Illinois

    Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs. Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Job Description Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064 Duration: 6+ months (could go beyond) Roles: • Network Directory and Infrastructure Services Administration. • Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required. Responsibilities: • Provide technical Level III problem isolation and resolution for a Global Active Directory Network. • Configures and performs advanced diagnostics on infrastructure components and cloud based applications. • Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync. • Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers. • Repair and recover from hardware or software failures. • Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment. • Initiate major outage communication technical bridges as requested. • Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies. Competencies: • Superior knowledge of Active Directory overall and its administrative components. • Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support. • Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions. • Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments. • Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services. • Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync. • Candidate must be able to correctly configure servers and clients for all services. • Can isolate and repair most DNS and IP service problems. • Understands and uses the appropriate tools in all instances during problem isolation and repair. • Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues. Qualifications • Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor • Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience. Additional Information To know more about this position, please contact: Himanshu Prajapat ************ **********************************
    $83k-112k yearly est. Easy Apply 17h ago
  • Malware Defense Malware Analyst

    Bank of America Corporation 4.7company rating

    Cyber security analyst job in Chicago, IL

    At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day. Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve. Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us! Bank of America is one of the world's leading financial institutions, serving over 66 million consumers and small businesses. Company success is only possible with a strong cyber defense, which enables Bank of America to safely conduct global operations across the United States and in approximately 35 countries. Our primary goal is to safeguard not only the company, but our clients and their trust. The Malware Defense Team is looking for top talent who would like to join one of the most advanced cybersecurity teams in the world. Responsibilities include, but are not limited to: * In-depth analysis of malware, including authoring analysis reports. * Tracking malware campaigns, malicious actors, and related infrastructure. * Creation of tools and scripts to assist in the analysis of malware analysis. * Field escalations of potentially malicious files and websites from teams within Malware Defense. Required Qualifications: * Strong direct experience of analyzing malware. * Intermediate to advanced malware analysis skills. * Experience creating innovative ways to track progression of malware families, infrastructure, and campaigns conducted by e-crime, and cyber espionage actors. * Experience creating tools and scripts to accelerate malware and threat analysis. * Background in network traffic analysis - WireShark, Fiddler, proxy logs, etc. * Experience analyzing malicious web content such as ClickFix, ClearFake, SocGholish, etc. * Experience authoring YARA, Suricata, and EKFiddle detection rules. * Experience with penetration testing and/or adversary emulation is a plus. * Able to work independently on tasks, but also work well within a team environment Desired Qualifications: * Experience analyzing malware targeting Linux, Android, and IOT platforms. Skills: * Cyber Security * Data Privacy and Protection * Problem Solving * Process Management * Threat Analysis * Business Acumen * Data and Trend Analysis * Interpret Relevant Laws, Rules, and Regulations * Risk Analytics * Stakeholder Management * Access and Identity Management * Data Governance * Encryption * Information Systems Management * Technology System Assessment Shift: 1st shift (United States of America) Hours Per Week: 40
    $76k-102k yearly est. 7d ago
  • Data Security Analyst

    Exeter Government Servi 4.1company rating

    Cyber security analyst job in Fort Knox, KY

    Provide support to the lead security Analyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of anomalies. Required Qualifications: Experience in administrative support & MS Office proficiency Bachelor's degree or 5 years of experience U.S. citizen and MUST possess a current active DoD Secret clearance Possess an understanding of cyber security principles and be able to obtain a security+ certification within 6 months Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. #clearancejobs
    $64k-88k yearly est. Auto-Apply 60d+ ago
  • Snr Info Security Analyst - M&R-DLP

    Standard Chartered 4.8company rating

    Cyber security analyst job in Indiana

    Apply now Work Type: Office Working Employment Type: Permanent Job Description: Key Responsibilities Cyber Security Incident Management Operations: * Monitor, detect & respond to any potential security threats and risks to the organisation, using the available technology toolset * Correlate and consolidate the alerts, reports, anomalies and other intelligence sources, put the threat/risk in context, and determine event/incident urgency and priority, and initiate an appropriate response * Continuously improve the accuracy and relevance of the Bank's detection tools and capabilities to keep pace with changing environments and regulatory/compliance requirements * Adhere to the defined security monitoring processes and procedures, and initiate improvements to them, driving maturity and relevance * Track and report the remediation of cybersecurity threats and risks, and provide domain expertise during remediation to the appropriate support groups * Track and document cybersecurity incidents from initial detection through final resolution * Operate within established standard operating procedures to handle security incidents * Research trends and countermeasures in computer/network vulnerabilities, exploits, and malicious activity * Support senior incident handlers during cybersecurity incident response activities * Perform root cause analyses and present findings to relevant stakeholders for remediation * Work closely with the other support groups to assess risk and provide recommendations for improving the Bank's security posture Strategy * Monitor, detect & respond to any potential security threats across the Bank to ensure all events are acted on in a timely manner. Business * Support senior incident handlers during cybersecurity incident response activities. * Work closely with the other support groups to assess risk and provide recommendations for improving the Bank's security posture. * Identify opportunities to improve detection and response capabilities of the team * Work with content engineering team to monitor and tune alerts. * Conduct research on attack patterns, techniques, and develop creative solutions to detect/prevent adversarial tools, techniques and procedures. * Collaborate with key stakeholders to continuously enhance playbooks as new products, logs, and capabilities are introduced to the organization. * Collaborate with key stakeholders in improving the Bank's detection posture. Processes * Ensure adherence to all internal and external policies, procedures and regulations. Risk Management * Be aware of, identify and escalate all risk issues and concentrations in accordance to the firm's Group Information and Cyber Security Policy. Where appropriate, direct remedial action and/or ensure adequate reporting to Risk Committees. Governance * Promote an environment where compliance with internal control functions and the external regulatory framework is a central priority of the service. Regulatory & Business Conduct: * Display exemplary conduct and live by the Group's Values and Code of Conduct. * Take personal responsibility for embedding the highest standards of ethics, including regulatory and business conduct, across Standard Chartered Bank. This includes understanding and ensuring compliance with, in letter and spirit, all applicable laws, regulations, guidelines and the Group Code of Conduct. * Effectively and collaboratively identify, escalate, mitigate and resolve risk, conduct and compliance matters. Key stakeholders * Tech, Transform and Ops * Cyber Security * Cyber Defence & Ops Technology * Cyber Defence Centre * Security Monitoring & Analytics * Group Threat Management Other Responsibilities: * Work within a 24x7 shift model * Provide after-hours rotational coverage when required Skills and Experience * Well-versed in Cybersecurity Incident Analysis and Response and Cybersecurity Defensive Operations (Blue Team) * Strong understanding of core Enterprise Information Technology and Computer Networking concepts (Desktop/Laptop, Mobile Device, Server, Network Device, LAN and WAN) * Basic knowledge of selected IT Service Management (ITSM) processes (Event Management, Incident Management, Change Management, Service Assets and Configuration Management, Service Level Management) * Exposure to Security Information and Event Management solutions, preferably Splunk ES. User Behaviour Analytics (UBA) exposure is desirable * Exposure to Endpoint Security and/or Endpoint Detection and Response tools, preferably Symantec * Demonstrated ability to work with a diverse, geographically-dispersed team Qualifications * Diploma or higher educational qualification in Engineering, Computer Science/Information Technology or an equivalent qualification in a relevant discipline * The following certifications are desirable but not mandatory: EC Council Certified Ethical Hacker (CEH), EC Council Certified Security Analyst (ECSA), SANS GIAC Certified Incident Handler (GCIH), CERT Certified Computer Security Incident Handler (CSIH), Axelos Information Technology Infrastructure Library (ITIL) v3 Foundation About Standard Chartered We're an international bank, nimble enough to act, big enough for impact. For more than 170 years, we've worked to make a positive difference for our clients, communities, and each other. We question the status quo, love a challenge and enjoy finding new opportunities to grow and do better than before. If you're looking for a career with purpose and you want to work for a bank making a difference, we want to hear from you. You can count on us to celebrate your unique talents and we can't wait to see the talents you can bring us. Our purpose, to drive commerce and prosperity through our unique diversity, together with our brand promise, to be here for good are achieved by how we each live our valued behaviours. When you work with us, you'll see how we value difference and advocate inclusion. Together we: * Do the right thing and are assertive, challenge one another, and live with integrity, while putting the client at the heart of what we do * Never settle, continuously striving to improve and innovate, keeping things simple and learning from doing well, and not so well * Are better together, we can be ourselves, be inclusive, see more good in others, and work collectively to build for the long term What we offer In line with our Fair Pay Charter, we offer a competitive salary and benefits to support your mental, physical, financial and social wellbeing. * Core bank funding for retirement savings, medical and life insurance, with flexible and voluntary benefits available in some locations. * Time-off including annual leave, parental/maternity (20 weeks), sabbatical (12 months maximum) and volunteering leave (3 days), along with minimum global standards for annual and public holiday, which is combined to 30 days minimum. * Flexible working options based around home and office locations, with flexible working patterns. * Proactive wellbeing support through Unmind, a market-leading digital wellbeing platform, development courses for resilience and other human skills, global Employee Assistance Programme, sick leave, mental health first-aiders and all sorts of self-help toolkits * A continuous learning culture to support your growth, with opportunities to reskill and upskill and access to physical, virtual and digital learning. * Being part of an inclusive and values driven organisation, one that embraces and celebrates our unique diversity, across our teams, business functions and geographies - everyone feels respected and can realise their full potential. Apply now Information at a Glance * * * * *
    $68k-91k yearly est. 20d ago
  • Information Security Specialist

    Starplus Energy

    Cyber security analyst job in Kokomo, IN

    The Information Security Specialist supports the planning, implementation, and operation of StarPlus Energy's global and local security management systems. This position ensures compliance with international and Korean security regulations, establishes physical and IT infrastructure security systems, and coordinates with both corporate headquarters and Korean government authorities to prevent information leaks and respond to potential security threats. This position reports to the Information Security Manager. Roles & Responsibilities: Plan, develop, and operate corporate information security systems for facility and IT infrastructure protection Establish incident response procedures and maintain readiness against internal and external security threats Develop and operate the site's physical security management system, including access control, CCTV, and intrusion detection system Manage and oversee external security service providers (e.g., physical security guards, monitoring services, and system maintenance vendors) to sure proper performance and contract compliance Support vendor performance evaluations, documentation, and corrective actions when service issues arise Define and enforce information protection policies and procedures to ensure consistent implementation across the organization Establish and operate a security management framework for Korean National Core Technology (KNCT) compliance Assign protection grades, define and manage secure communication systems, and safeguard all data and documentation related to KNCT Coordinate and conduct security education and training for employees Develop and maintain incident response systems to address potential data or technology leakage Support internal and external security audits and inspections from Korean government and SDI Headquarters Perform security infrastructure vulnerability assessments and implement corrective actions as needed Prepare technical report, standard operating procedures (SOPs), and other documentation required for compliance and audit response Perform other position related duties as assigned
    $65k-92k yearly est. 2d ago
  • Information Security Analyst

    Jjc

    Cyber security analyst job in Joliet, IL

    Information Security Analyst STATUS: Full time DEPARTMENT: Information Security Office DIVISION: Information Technology CLASSIFICATION: Exempt UNION: Non-Union REPORTS TO: Senior Director Information Security PLACEMENT: Professional staff, S11 HIRING RANGE: $70,689 - 79,526 Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The student population at the college is diverse in ethnicity, gender, language, age and background. Joliet Junior College is an AA/EO employer and strongly encourages applications from candidates who would enhance the diversity of its staff. POSITION SUMMARY The Information Security Analyst is responsible for protecting the college's information systems and data by monitoring, analyzing, and responding to security incidents and threats. This role supports compliance with regulatory requirements (e.g., CIRCIA, HIPAA, GLBA), enhances operational efficiency, and contributes to the continual improvement of security processes and documentation. The analyst will also detect opportunities to develop and maintain security documentation, including knowledgebase articles, and manage security-related tickets from stakeholders. ESSENTIAL JOB DUTIES AND KEY RESPONSIBILITIES 1. Incident Management: Monitor, triage, and respond to cybersecurity threats and incidents across network, application, identity, and cloud layers. 2. Vulnerability Management: Participate in vulnerability assessments and penetration testing to identify and remediate security weaknesses. 3. Security Operations: Manage and maintain security tools (e.g., SIEM, IDS/IPS, vulnerability scanners), ensuring daily monitoring and compliance. 4. Facilitate the integration of SOC/Managed Security Services activities with the broader Information Security team, ensuring consistent application of ITIL processes such as Incident Management, Problem Management, and Event Management. 5. Identity Management: Support Office 365 email account management tasks, including user permissions, credential hand-offs, mailbox access provisioning, and coordination with identity and access management processes." 6. Compliance & Risk Management: Assist in legal and regulatory compliance efforts; conduct risk assessments and support audit activities. 7. Service Request Management: Handle, triage, and manage tier 2 level and up security-related tickets and requests from stakeholders, ensuring timely resolution and escalation as needed. 8. Knowledge Management: Detect opportunities to develop, improve, and maintain security documentation, including knowledgebase articles and process guides. 9. Process Improvement: Assist with the development and continual improvement of security-related processes, automation initiatives, and reporting tools. 10. Cloud Support: Support secure cloud infrastructure through systems auditing and account lifecycle management. 11. Collaboration & Training: Collaborate with IT and academic departments to ensure secure deployment of new technologies; provide security awareness training to staff and students. 12. Reporting: Prepare and present reports on security incidents, vulnerabilities, compliance status, and process improvements to leadership. 13. Professional Development: Stay current with emerging security threats, trends, best practices, and ITIL service management principles. 14. Perform related duties as assigned. MINIMUM QUALIFICATIONS 1. Bachelor's degree in Computer Science or a closely related field, OR an Associate's degree combined with 2-4 years of experience in information security or IT operations. 2. Ability to establish and maintain cooperative and effective working relationships with other members of the college and community, displaying cultural competence as well as emotional intelligence. 3. Demonstrated commitment to the college's core values of respect and inclusion, sustainability, integrity, collaboration, humor and well-being, innovation and quality. Bachelor's degree in information technology, Cybersecurity, Computer Science, or related field.. 4. Understanding of cybersecurity principles, tools, and compliance frameworks. 5. Experience with Microsoft Azure, Active Directory, and security monitoring tools. 6. Experience in information security and/or IT risk management with a focus on security performance and reliability 7. Familiarity multiple risk management concepts, frameworks, and standards (CSC, NIST, ISO, COBIT) 8. Excellent analytical, communication, documentation, and collaboration skills. 9. Possesses relevant industry certifications such as CEH, CISA, CCET, Network+, Security+, CySa+, or Microsoft SC-900, demonstrating foundational and specialized knowledge in cybersecurity. 10. Demonstrated understanding of the NIST Cybersecurity framework and auditing security controls identified in NIST800-171 and NIST SP800-53A. 11. Knowledgeable on ITIL process management. PREFERRED QUALIFICATIONS 1. Experience in higher education or public sector environments. 2. English and Spanish verbal and written communication proficiency. 3. Demonstrated multicultural competence. PHYSICAL DEMANDS 1. Normal office physical demands. 2. Ability to travel between campus locations and to and from community events. 3. Ability to travel in state and nationally. WORKING CONDITIONS 1. Duties are performed indoors in the usual office and/or outdoor environment. BENEFITS Click on the link for information about JJC's Benefits: Non-Union Support Staff, Professional, Administrative Full Time/Part Time: Full time Union (If Applicable): Scheduled Hours: 40
    $70.7k-79.5k yearly Auto-Apply 5d ago
  • IT Security Analyst - IT Solutions - Indianapolis, IN

    American Structurepoint Engineering Traffic Project Manager In Indianapolis, Indiana 4.6company rating

    Cyber security analyst job in Indianapolis, IN

    Join American Structurepoint and become part of a team that goes the extra mile for our clients and communities. We live by our values - respect, staff development, results and family. Our team is encouraged to explore new ideas and turn our clients' dreams into reality. With exceptional benefits, training, and mentorship, we pave the way for a rewarding career. Ready for more than just a job? Explore opportunities with us and help improve the quality of life in the communities we serve. Group: Information Technology Position: IT Security Analyst Location: Indianapolis, IN Are you passionate about cybersecurity and ready to protect the digital backbone of an innovative engineering firm? We're looking for a skilled IT Security Analyst to join our team and help secure mission-critical systems, proprietary data, and infrastructure. Join a team where your cybersecurity expertise directly supports groundbreaking engineering projects. Apply now or message us to learn more! Responsibilities • Monitor and analyze network traffic for threats and vulnerabilities • Conduct regular security assessments and penetration testing • Work collaboratively with Infrastructure team to learn and review firewalls, antivirus, and intrusion detection/prevention systems - Maintain Secure by Design Approach • Investigate and respond to security incidents • Continually develop (update) and implement cybersecurity policies and procedures • Collaborate with engineering and IT teams to secure sensitive project data • Stay ahead of emerging threats and technologies • Be passionate about: o Learning new technologies o Working collaboratively in a team atmosphere Qualifications Must-Haves: • Bachelor's degree in Computer Science, Cybersecurity, or related field • 3+ years of experience in IT security roles • Strong knowledge of network protocols, firewalls, and endpoint protection • Experience with SIEM tools - Understand and develop queries and expressions • Basic Understanding of NIST, SOC2, CMMC or similar frameworks • Excellent communication and problem-solving skills • Excellent written and documentation skills Nice-to-Haves: • Certifications: CISSP, CISM, CEH, or Security+ • Experience with cloud security (AWS, Azure) • Scripting knowledge (Python, PowerShell) • Exposure to engineering software platforms (AutoCAD, SolidWorks) • Familiarity with Zero Trust architecture
    $69k-98k yearly est. Auto-Apply 60d+ ago
  • Information Security Analyst

    Novalink Solutions 3.1company rating

    Cyber security analyst job in Indianapolis, IN

    Resource will work as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases. This position will also participate in all federal and state audits against DCS technology systems. Employee works in an Information Technology Division of a State Agency, the Department of Child Services (DCS -IT) under the guidance of the Security Manager. The essential functions of this role are as follows: • Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement; • Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment. • Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits. • Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800 -53). • Develops Standard Operating Procedures (SOP) for implementing security polices; • Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems; • Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data; • Develops and implements procedures for use of information security management software; • Proposes information security software enhancements; • Performs periodic audits to assure security policies and standards are being followed and are effective. • Develops recommendations for enhancements and generates reports where necessary; • Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security; • Mentors and provides guidance to new or other staff as needed; • Performs related duties as assigned. • Assist on other task as assigned. Thorough knowledge of information security management tools, policies, and standards of information security procedures; • Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy; • Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation; • Familiarity with domain structures, user authentication, and digital signatures; • Ability to develop and maintain information security standards; • Ability to understand and apply complex computer logic to work; • Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management; • Experience in assessing security needs of teams and assist in their security training. • Ability to communicate effectively both orally and in writing; • Ability to be a team member as well as a team leader depending on the situation; • Degree in information security or technology preferred; • Security certification preferred (e.g. CISSP). • Network Admin experience preferred. Supervisory Responsibilities/Direct Reports: This role does not provide direct supervision to direct reports. Required / Desired Skills Skill Required / Desired Amount of Experience To be effectively with wide range of information technologists, including systems administrators, technical support, application development, end users Required 3 Years Network Admin experience Required 3 Years Security certification (e.g. CISSP, CRISC) Required 3 Years Ability to develop and maintain information security standards; Required 1 Years Ability to understand and apply complex computer logic to work Required 1 Years Degree in information security or technology Required 1 Years Familiar with cybersecurity security framework (e.g. NIST, ISO, SOC 2, CIS, Cobit, etc.) Required Computer security compliance and auditing experience Required IRS, SSA computer security compliance and audit experience Required HIPAA experience Required
    $68k-98k yearly est. 17d ago
  • Information Security Analyst

    Taylorville Memorial Hospital

    Cyber security analyst job in Springfield, IL

    Min USD $31.51/Hr. Max USD $48.83/Hr. Under the direction of the Manager, Security Operations, the Security Operations Analyst protects organizational assets by ensuring an effective information security control environment for Memorial Health System. This role is a combination of project management and incident response through identification, analysis, prioritization, communication and mitigation of incidents as they occur. Please note this is a hybrid position and is required to be onsite in Springfield, IL several days per week. On call rotation is for 1 week approximately every 5 weeks. Qualifications Minimum Qualifications:Education:• Bachelor's degree in health information management, Computer Science, Business, Cybersecurity, Health Care, or related discipline required. Four or more years of relevant prior work experience may be considered in lieu of degree.Licensure/Certification/Registry:• Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), or similar security related certification preferred.Experience:• Minimum 2 years of security experience required.• Minimum 2 years of compliance experience preferred.• Minimum 2 years of project management experience preferred. • Demonstrated experience with healthcare clinical and financial applications required.• Experience with audit methodologies and control frameworks (such as ISO27001 or NIST) required.• Experience with MS365 Office suite and collaboration tools required. Other Knowledge/Skills/Abilities:• Demonstrated strong communication skills and diplomacy to work between technical and administrative teams at all organizational levels, as well as to write and update concise and accurate documentation.• Demonstrated knowledge of Microsoft Windows systems, administrator and client/server communications protocol, UNIX, Oracle, LDAP, XML and directory administration. Demonstrated knowledge of computer systems, architecture and process flow. • Evidence of leadership, creativity, integrity, and initiative. Evidence of ability to achieve results and inspire others to do the same, personal accountability, and dedication to continue learning and investigating relevant technology required.• Demonstrated planning, problem-solving, decision-making, analytical and change management skills. • Demonstrated ability to maintain confidentiality, professionalism, and trustworthiness.• Demonstrated ability to drive projects forward and achieve objectives aligned with strategic direction, even in the face of stakeholder resistance or ambiguity.• Must be personally motivated to achieve results alone and through others particularly related to providing exceptional customer service. Must be results oriented and be able to manage time appropriately in order to meet assigned goals. Responsibilities Principle Duties & Responsibilities:1. Performs various daily operational tasks as assigned by Security Operations Manager to ensure the continued security and protection of MH data. 2. Provides ongoing consulting on industry best practices regarding the securing of information assets.3. Analyzes department processes and identifies security gaps between teams.4. Documents control gaps; proactively develop plans to address identified gaps with subject matter expert and stakeholder input. 5. Investigate security incidents and breaches6. Responds to computer security incidents according to the incident response policy and procedures.7. Coordinate containment, eradication, and recovery efforts8. Works with business areas to develop, document, and update policies, plans, processes, procedures, and guidance to ensure a safe, effective control environment. 9. Maintains the organizational security control baseline for security-related compliance. 10. Collaborate with vulnerability management teams to assess and remediate risks11. Embodies the Memorial Health System Performance Excellence Standards of Safety, Courtesy, Quality, and Efficiency that support our mission, vision and values:• SAFETY: We put safety first. We speak up and take action to create an environment of zero harm. We build an inclusive culture where everyone can fully engage.• INTEGRITY: We are accountable for our attitude, actions and health. We honor diverse abilities, beliefs and identities. We respect others by being honest and showing compassion.• QUALITY: We listen to learn and partner for success. We seek continuous improvement while advancing our knowledge. We deliver evidence-based care to achieve excellent outcomes.• STEWARDSHIP: We use resources wisely. We are responsible for delivering equitable care. We work together to coordinate care.12. Develops, maintains, and tests incident response plans to ensure organizational compliance with required laws and regulations. 13. Supports the Security Operations Manager in continued development and refinement of Disaster Recovery plans14. Supports security awareness training, working to expose all departments to new and improved processes.15. Perform triage on incoming alerts to determine severity and relevance, working with system, application, and network owners to explain, remediate, and document as needed The intent of this job description is to provide a representative summary of the major duties and responsibilities performed by incumbents of this job. Incumbents may be requested to perform tasks other than those specifically presented in this description.
    $31.5-48.8 hourly Auto-Apply 39d ago
  • Information Security Analyst

    Vergence 3.3company rating

    Cyber security analyst job in Indianapolis, IN

    . Must live in the Indianapolis area. Pay: $42.70/hour In this role you will: • Monitor and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement • Interface with user customers to understand their security needs and implement procedures to accommodate them including training and assessment • Assist with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assist with creating and submitting reports relevant to security audits • Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53) • Develop Standard Operating Procedures (SOP) for implementing security polices • Recommend appropriate security safeguards to be included during development of new information technology systems and legacy systems • Ensure maximum utilization of computer hardware and software features to secure automated systems and associated data • Develop and implement procedures for use of information security management software • Propose information security software enhancements • Perform periodic audits to assure security policies and standards are being followed and are effective • Develop recommendations for enhancements and generates reports where necessary • Keep abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security
    $42.7 hourly 18d ago
  • Security Operations Center (SOC) - Information Security Analyst

    Top Talent

    Cyber security analyst job in Schaumburg, IL

    Title: Security Operations Center (SOC) - Information Security Analyst Company: Award-Winning, $50B Publicly Traded Company Type: Full-Time Location: Hybrid - Chicagoland Area (Onsite 3-4 Days/Week) Travel: None Job Overview Join an award-winning, publicly traded company and be part of a fast-paced, cutting-edge security team! This newly developed SOC Analyst role offers an exciting and dynamic environment where no two days are the same. You'll have the opportunity to work with leading security tools like Splunk, CrowdStrike, Digital Shadows, and Proofpoint, while collaborating with a skilled and supportive security engineering team. You'll be part of a tight-knit, communicative team that values collaboration, knowledge-sharing, and professional growth. If you thrive in fast-paced security operations and enjoy hands-on problem-solving, this is an excellent opportunity to make an impact. Key Responsibilities: Manage the Phish Alert mailbox. Perform QA on tickets for a service provider. Handle tier 2 escalated inquiries. Support security operations through log aggregation and analysis. Leadership & Team Culture The leadership team is known for holistically supporting its team members, ensuring that growth, learning, and well-being remain top priorities. They provide ongoing career development opportunities, mentorship, and hands-on training to help employees expand their expertise and advance their careers. Beyond technical growth, leadership fosters a culture of inclusivity and collaboration, ensuring that every team member is heard, valued, and supported. Open communication, continuous learning, and a strong sense of community define the workplace, empowering individuals to contribute, innovate, and succeed. Requirements 3+ years of experience in cybersecurity or a related field. Proficiency with at least some of the following tools: CrowdStrike, Proofpoint, Digital Shadows, or Splunk Experience working in a Security Operations Center (SOC) environment is a plus, but not required. Compensation & Benefits Base Salary: $70,000 - $90,000 (dependent on qualifications, skills, and experience). Bonus Eligible. Comprehensive Benefits Package Includes: Medical, Dental, Vision, and Life Insurance Traditional and Roth 401(k) with company match Employee Stock Purchase Plan (ESPP) And much more! Apply Today!
    $70k-90k yearly 60d+ ago
  • Information Security Compliance Analyst

    Alliant Credit Union 4.8company rating

    Cyber security analyst job in Chicago, IL

    Job Description Support the Information security governance, risk management and compliance program, focusing on compliance and assurance. Facilitate the compliance and assurance program, by performing assurance assessments to ensure Alliant Credit Union (ACU) is compliant with regulatory and legal obligations. Help maintain the technical control library ensure assessments align securing ACU. Facilitate IT issue management by working with employees on scheduling calls and going over the issue and resolution. Essential Responsibilities Responsible to facilitate the compliance and assurance assessments and issue management via a GRC tool Conduct assurance assessment, including control test of design (ToD) and test of operating effectiveness (TOE) activities Provide recommendations on improving compliance-related processes and/or procedures and identify opportunities for ITGC/security compliance control automation Facilitate group and individual meetings, ensure that each meeting is organized and aligned and schedule walkthrough agenda addressing any issue that arise and and guiding towards actionable outcomes Assist internal and external audit teams to address inquiries Participate in InfoSec projects as assigned by management such as the review of documents Education Minimum- 4 Year Bachelors Degree in Computer Science, Information Security or Related Years of Experience Minimum - 2 Years Governance, Risk Management, Compliance within a financial institution or Security Compliance or Related In Lieu of Education 5 Years Governance, Risk Management, Compliance within a financial institution License/Certifications/Training Preferred: Compliance, Risk Management, or Governance certifications: CRISC, CISM or CISA Compensation & Benefits: Typical hiring range: $57,500 - $89,500 Annually. Actual compensation will be determined using factors such as experience, skills & knowledge. Additional Compensation: Annual performance bonus Benefits: Alliant provides a benefits package including health care, vision, dental, and 401k with employer match. Additional Benefits: Work from home up to 3 days a week Paid parental leave Employee discount programs Time off including paid personal and sick days 11 paid holidays Education reimbursement *Note that eligibility and cost of benefits can vary depending on the number of regularly scheduled hours, and job status such as regular full-time, regular part-time, or temporary employment. Adhere to and ensure compliance of all business transactions with policy and process of the Bank Secrecy Act. Ensures compliance with all applicable state and federal laws, company procedures and policies. Maintains integrity and ethics in all actions and conversations with or regarding credit union members and their accounts; complies with Privacy Act directives. The responsibilities listed do not contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this position. Duties, responsibilities and activities may change at any time with or without notice.
    $57.5k-89.5k yearly 3d ago
  • Information Security Analyst

    Java Developer In Pune

    Cyber security analyst job in Indiana

    What you will do: Respond to security incidents as part of the Incident Response Team. Research attempted or successful efforts to compromise systems security, determines causes of security violations, and designs countermeasures. Analyse network access requests and make recommendations to management around risks posed by proposed changes Utilize analytical and investigative processes to perform threat hunting activities across the organization. Analyse existing SIEM correlation rules and make tuning recommendations. Contribute to align to security best practice, mitigate known risks and align with business compliance objectives Assist other security operational teams with daily tasks such as account management/role assignments, access reviews, patch management operations, audit/testing remediation. Create and update documentation and train peers. Requirement: You're curious, passionate, authentic, and accountable. These are our values and influence everything we do. Open-minded and self-motivated to proactively contribute to the SAS Information Security program. 2-3 years of information security experience. Demonstrated experience of various IT platforms (i.e. networking, system admin, scripting etc.). Demonstrate experience with some of the following systems/methodologies or be interested in expanding domain expertise to include: Networking Enterprise ticketing systems (e.g. ServiceNow) Cloud technologies (e.g. Azure, AWS, O365, GCP) Scripting languages (Python, Shell, PowerShell) Log management/SIEMs (e.g. Azure Sentinel , Splunk) IDS/IPS Web content filtering DLP EDR EPM Active Directory/Azure AD Identity Management & Governance Container Security Application Security (SCA, DAST, SAST) Threat & Vulnerability Management Email Security Bug Bounty Program Public Key Infrastructure (PKI) and TLS Certificate Strong verbal and written communication and interpersonal skills as you will be interfacing with many internal customers. Ability to juggle multiple projects and priorities. Willing to work in shifts
    $65k-92k yearly est. Auto-Apply 25d ago
  • Cyber Security Analyst

    Mantech 4.5company rating

    Cyber security analyst job in Crane, IN

    ManTech seeks a motivated, career and customer-oriented **Cyber Security Analyst** to join our team in **Crane, Indiana.** This is an onsite position. As a core member, you will assist in the research & design, engineering, integration, testing, training, logistics, laboratory research, field engineering, and acquisition and operations analysis in support of a variety of Navy and Marine Corps programs and projects with a focus on defensive cyber technologies, mission assurance, and resilience capabilities for the tactical network environment. Your effort will go towards dramatically increasing the warfighter's effectiveness. If you enjoy working on a highly collaborative and dynamic team and want to make a difference for the warfighter, then we would love to have you on our team! **Responsibilities include but are not limited to:** + Review and evaluate System Security Plans (SSPs), System Security Authorization Agreements (SSAAs), systems and networks diagrams, Security Requirements Traceability Matrices (SRTMs), Risk Assessments, and associated Information Systems (IS) Certification and Accreditation (C&A) documents in accordance with Department of Defense (DoD), Intelligence Community (IC), National and Agency standards + Observe, evaluate, and document IS security certification testing and prepare Security Certification Test Reports (SCTRs) with findings and recommendations regarding systems; Approval To Operate (ATO) + Inspect systems, networks, sites for compliance to InfoSec standards and policies + Additional duties include producing periodic progress reports, preparing various forms of correspondence concerning deficiencies and statuses of SSPs/SSAAs, maintaining and reporting statistics on personal C&A efforts + Knowledge of DoD, IC, and National Security Policies, Regulations, Directives, and Instructions **Minimum Qualifications:** + High School Diploma + Knowledge of commonly used concepts, practices, and procedures within the particular field + 1+ years of experience in the field or in a related area + Hands-on experience with networking technologies such as routers, switches, firewalls, and VPNs **Preferred Qualifications:** + Bachelors Degree + Familiarity with network vulnerability scanners, web scanners, and database scanners is a plus + Knowledge of cloud computing concepts and technologies + CISSP, CISM, CCNA, CASP, or equivalent. **Clearance Requirements:** + Must have a current and active TS/SCI clearance **Physical Requirements:** + The person in this position must be able to remain in a stationary position 50% of the time. + Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation. If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
    $60k-77k yearly est. 60d+ ago
  • Network Security Analyst / Network Engineer/ System Admin

    Collabera 4.5company rating

    Cyber security analyst job in Illinois

    Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs. Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Job Description Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064 Duration: 6+ months (could go beyond) Roles: • Network Directory and Infrastructure Services Administration. • Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required. Responsibilities: • Provide technical Level III problem isolation and resolution for a Global Active Directory Network. • Configures and performs advanced diagnostics on infrastructure components and cloud based applications. • Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync. • Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers. • Repair and recover from hardware or software failures. • Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment. • Initiate major outage communication technical bridges as requested. • Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies. Competencies: • Superior knowledge of Active Directory overall and its administrative components. • Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support. • Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions. • Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments. • Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services. • Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync. • Candidate must be able to correctly configure servers and clients for all services. • Can isolate and repair most DNS and IP service problems. • Understands and uses the appropriate tools in all instances during problem isolation and repair. • Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues. Qualifications • Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor • Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience. Additional Information To know more about this position, please contact: Himanshu Prajapat ************ **********************************
    $83k-112k yearly est. Easy Apply 60d+ ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Evansville, IN?

The average cyber security analyst in Evansville, IN earns between $55,000 and $98,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Evansville, IN

$73,000
Job type you want
Full Time
Part Time
Internship
Temporary