Post job

Cyber security analyst jobs in Fayetteville, AR - 292 jobs

All
Cyber Security Analyst
Information Security Analyst
Cyber Security Engineer
Security Engineer
Network Security Analyst
Information Security Engineer
Data Security Analyst
Senior Security Analyst
Securities Analyst
  • CI Cyber Threat Analyst IV

    Techguard Security 3.6company rating

    Cyber security analyst job in Saint Louis, MO

    Job Description Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements: Duties: Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable): Threat data collected and reported by NGA Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTs). Imagery when available. Information that can be used to inform security decisions. Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decision makers. Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decisions. Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include: Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products. Raw and finished Intelligence reported by Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA. Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross referencing local information reporting with Intelligence Community reporting. Clear and concise writing to briefly convey threat. Responsiveness to Intelligence Community priority collections requirements. Timeliness. Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross). Provide Technical CI advise and expertise in support of CI inquiries, operations and issues. Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners. Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers. Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner. Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages. Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats). Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards. Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing. Display an ability to collaborate with internal NGA and external IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. Skills and Experience Required: Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations. Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level. Desired: Be a credentialed graduate of an accredited federal or DoD CI training academy. Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines. Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines. Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov. Experience translating Government vision into understandable and achievable measures. Experience in using supervisory skills to coach teammates to achieve objectives. Monitor and track progress toward achievable measures.
    $69k-91k yearly est. 22d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cyber Security Analyst Tier 3

    Freedom Technology Solutions Group

    Cyber security analyst job in Saint Louis, MO

    Freedom Technology Solutions Groups is looking to add a Tier 3 Cyber Security Analyst to the team. The candidate will provide CSOC Tier 3 services, which is 24x7x365 coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. When a CIRT is stood up, all contractors in support of CSOC Tier 3 services will be under the direct control of, and take direction from, the Government CIRT Commander. While not in a period of incident response, the Contractor shall conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber-incident. All Contractor personnel performing CSOC Tier 3 services shall have or obtain, within six months of start, a certification that is compliant with DoDD 8140.01 and DoD 8570.01-M IAT Level III and CSSP Incident Responder. Job Duties: Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cyber security incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government. Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter intelligence personnel as required to perform advanced investigation and triage of incidents; Collaborates with appropriate authorities in the production of security incident reports; Categorizes incidents and events; Coordinates with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated; Coordinates with other contracts, organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events; Coordinates with other contracts, organizations, activities, and services to ensure NGA recovers from an incident/event; Builds timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions. Documents actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken and analysis are capable of being systematically reconstructed. Develops and when approved by the Government generates and updates reports in the Joint Incident Management System (JIMS), Incident Case Management System (ICMS), and/or other authorized reporting systems as directed; Develops, maintains, sustains, and when properly authorized by the Government executes custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events; Performs digital media analysis on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis; Develops and identifies indicators of compromise to send to Cybersecurity stakeholders and other Contract Services; Provides adversary attribution; Performs malware analysis and signature development; Coordinate with CSOC Tier 1 and 2 services to remediate all discrepancies and provide recommendations to prevent reoccurrence. Job Requirements: Bachelors Degree and or 6 years' experience in Cyber Security (CSOS) Active security clearance. DoDD 8140.01 and DoD 8570.01-M IAT Level II and CSSP Incident Responder. Provides input to and coordinates with all applicable stakeholders to develop and deliver the daily CSOC Significant Activity Report, the daily CSOC Operations Update, and the Weekly CSOC Status Report; Serve as C-IRT members as required and serve under the direct control of, and take direction from, the Government C-IRT Commander; Develop and coordinate courses of action with various Government and contract stakeholders, and when properly authorized by the Government, execute Defensive Cyberspace Operations-Internal Defensive Measures on behalf of the NGA on NGA networks and systems; Performs digital media analysis and malware reverse engineering on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis. When properly authorized by the Government, execute custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events; Develops, documents, and provides to the Government incident investigation reports which include sufficient information to document the entire lifecycle of the incident and the response, including but not limited to adversary and friendly forces activity, host and network analysis, timelines, and recommendations for corrective actions, recommendations for new Tactics, Techniques, and Procedures (TTP) and other recommendations as appropriate, within 30 days of C-IRT stand-down; Conduct Quality Control reviews of a percentage closed CSOC Tier 2 tickets each week to ensure proper analysis, categorization, documentation, and notification Preferred Qualifications: Masters degree IAT III Qualifications that are nice to have: Juniper certification What's in It for You? Flexible work environment A team mentality - work with friendly, like-minded professionals Work with innovative, cutting edge technologies Enjoy extremely competitive compensation and benefits A work-life balance you can count on Opportunities to grow and advance your career on our dime The Benefits You Get with Freedom Amazing benefits including matching 401k, fully paid medical, and more Generous paid time off - including paid site closure days Competitive salary offerings Paid training and tuition reimbursement Referral bonuses Fully paid life and disability Annual logo wear allowance Company sponsored events (game nights, holiday party, summer party, happy hours) Interested in learning more about Freedom and our culture? Contact us today! We're constantly hosting hiring events in our office and elsewhere, to help you get a sense of what life is like at Freedom before joining the team. As an Equal Opportunity Employer, we do not discriminate on the basis of race, color, religion, sex, age, marital status, disability or veteran status Applicant Federal & E-Verify Postings VEVRAA Federal Contractor Accessibility: If you need an accommodation as part of the employment process, please contact Human Resources at Phone: ************ Email: ********************* Equal Opportunity Employer, including disabled and veterans. If you want to view the EEO Law poster, please choose your language: English - Spanish - Arabic - Chinese If you want to view the EEO Law Supplement poster, please choose your language: English - Spanish - Chinese If you want to view the Pay Transparency Policy Statement, please click the link: English
    $66k-89k yearly est. Auto-Apply 10d ago
  • Junior Cyber Security Analyst

    Flat Branch Home Loans Inc.

    Cyber security analyst job in Columbia, MO

    Job DescriptionDescription: Basic Description: The Cyber Security Analyst is an entry-level position responsible for supporting Flat Branch's cybersecurity operations with a strong emphasis on customer service. This role serves as the first point of contact for security-related inquiries and plays a key role in protecting the organization from cyber threats. The Cyber Security Analyst works closely with senior security team members and IT staff, following established procedures to investigate alerts, analyze potentially malicious emails, and respond to security-related tickets. This role is designed for individuals beginning their cybersecurity careers and provides hands-on experience and training. Responsibilities: Manage and respond to security-related tickets and incidents using the company ticketing system. Investigate emails reported as phishing or suspicious and determine appropriate follow-up actions. Review quarantined emails and determine whether they can be safely released. Monitor and triage security alerts, documenting findings and escalating as needed. Provide security support to end users via phone, chat, and email. Participate in security awareness training and communications. Work with security tools including email security, vulnerability management, and monitoring platforms. Assist with security-related projects and continuous improvement efforts. Work with cross functional teams on security-related projects and implementation. Occasional travel is required. Requirements: Qualifications & Skills: Strong customer service focus while adhering to security policies. Strong communication, analytical, and organizational skills. Basic understanding of information security concepts. Basic understanding of IT Infrastructure and networking. Ability to manage workload and prioritize tasks. Willingness to take on additional tasks within cybersecurity as required. Preferred Qualifications & Skills Prior experience in IT support, help desk, or technical customer service. Relevant industry standard certification OR bachelors degree in relevant field (preferred, not required)
    $65k-88k yearly est. 2d ago
  • Cyber Security Training

    Learnkwik.com

    Cyber security analyst job in Kansas City, MO

    Kanshe Infotech is Consulting Firm Which Provides World online training. Online Training (Remote Training + Real-time exp) available. Our training is more than just hours of lecture, we believe in student engagement, motivation and knowledge sharing as tools for success and we do it with great dedication and precision. We offer online training that clearly stands out of the group, sign up for a demo session. Job Description Our Training Features: · You will receive top quality instruction that Kanshe Infotech is famous for Online IT training. · Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue. · Training sessions are conducted by real-time instructor with real-time examples. · Every training session is recorded and posted to the batch after each weekend class. · We are offering online training on Cyber Security. . Provide OPT Stem Ext.: Guidance and support for applying for the 24-month OPT STEM extension Help with OPT Employment letter: Help with drafting and obtaining OPT employment letters that meet USCIS requirements. · We provide training in technology of your choice. · Good online training virtual class room environment. · Highly qualified and experienced trainers. · Professional environment. · Special interview training · Training for skill enhancement. · Study material and Lab material provided. · E-Verified company. If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates. Thanks Additional Information All your information will be kept confidential according to EEO guidelines.
    $65k-87k yearly est. 2d ago
  • Cyber Threat Analyst

    Fortiphi

    Cyber security analyst job in Oklahoma City, OK

    **Job Opportunity is actually with a company called Western Farmers Electric Cooperative (WFEC)** Under the general supervision of the Supervisor, IT Infrastructure, the Cyber Threat Analyst performs monitoring and analysis of cyber threats to assist in the defense of WFEC cyber systems and operations. The incumbent will curate and triage intelligence from multiple cyber intelligence sources and will inform the security operations with timely and relevant TTPs, IOCs, and context. The incumbent will generate reports for upper management based on data, information, and intelligence. The incumbent must understand the MITRE ATT&CK framework and be able to integrate the framework in the reporting. The Cyber Threat Analyst will develop and document threat hunt activities based on intelligence, scenarios, and observations. The incumbent develops, maintains, and supports systems that provide collection capabilities and telemetry information to the organization. In addition, the incumbent performs troubleshooting, installation, and maintenance on equipment and software systems related to NERC CIP. The incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. The incumbent participates in in-house, regulatory, and industry teams, including working groups, committees, incident response teams, and business continuity teams as required. Also, the incumbent participates in exercises that test policies, procedures, and skills which are required by business and critical operations. The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
    $65k-88k yearly est. 60d+ ago
  • Information Security Specialist

    Federal Reserve Bank of San Francisco 4.7company rating

    Cyber security analyst job in Kansas City, MO

    CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future. Important Information Open to US citizens, Green Card holders or Permanent Residents with at least 3 years of residency, with the intent to become a US citizen. No sponsorship is available. Candidates must have valid work authorization, without an end date, to be considered. This position requires working on-site, in Kansas City, Denver, Oklahoma City, or Omaha, with 5 days per month remote work flexibility. This position is not eligible to be remote and relocation assistance is not available. We are seeking cybersecurity professionals to join our Information Security team as a security specialist focused on operating our DevSecOps program according to standards and policies. This will be done through close partnership with peers in FRB Kansas City and other Reserve Banks across the System. It will also require healthy relationship building and tight integration with development teams. Additionally, you'll partner with business areas, vendors, and our diverse network of professionals to identify, implement, and support security across the organization. Candidates with strong understanding and experience in cloud environment deployments, information security, data management, low-code and no-code solutions, DevSecOps, and artificial intelligence will be ideal. Key Activities Interpret and evaluate policies in order to mature and implement the DevSecOps program. Assess maturity of development teams' DevSecOps practices against an existing framework. Proactively advocate for and drive enhancements into the program. Identify gaps/opportunities for enhancements to workflows and processes for enhancing the software development lifecycle (SDLC). Implement and consults on secure continuous integration and continuous delivery (CI/CD) pipelines, evaluating code and/or applications, or creating code to facilitate the process. Monitors information security policy compliance using security tooling. Evaluate and implement security products and/or processes to enhance productivity and effectiveness for various platforms and initiatives. Provide technical expertise and support to internal teams on security-related matters. Collaborate with cross-functional teams to integrate security measures into existing software applications and infrastructure. Stay current with emerging technologies, industry trends, and best practices in cybersecurity to enhance our security posture. Support leadership decision making through timely analysis and written communications. Qualifications Typically requires 3-6 years of relevant experience. Bachelor's Degree in Technology, Engineering, Computer Science, Information Systems, Cybersecurity or other related field or equivalent work experience. Strong competence in cloud technologies such as AWS, Azure, and other platforms. Expert understanding of DevSecOps practices, frameworks, and tools. Expertise with tool integration for the DevOps pipeline such as Git. Combines and organizes information into meaningful patterns; identifies underlying relationships, causes and effects; and combines pieces of information to form conclusions or general rules. Rapidly acquires new knowledge and learns new skills, and practices agile methodologies to planning and accomplishing work. Conveys complex and technical issues to diverse audiences. Demonstrated competencies with artificial intelligence are beneficial. Working knowledge of Terraform, Ansible, Cloud Formations, AWS Config, AWS Inspector, Guard Duty and others. Strong knowledge of software development languages, tools and techniques such as Python, JSON, YAML, and Java Technical expertise in security tools and knowledge of security practices and procedures. A learning mindset, proactiveness, collaboration, and strong attention to detail. Additional Information How We Work (HWW): On-site: 5 days per month remote work flexibility Locations: Kansas City, Denver, Oklahoma City, Omaha Remote Eligible: No Relocation Assistance: No Salary: $79,100 - $111,500 / Experienced Level $98,600 - $139,000 / Senior Level Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location. Screening: US citizens, permanent residents with the intent to become a US citizen with at least three or more years of United States residency from the date of legal entry to the United States is required for this position. This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and can take up to a couple of months to be completed. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks. Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future. About Us Total Rewards & Benefits Who We Are What We Do Follow us on LinkedIn , Instagram, X (formerly Twitter) , and YouTube #KCFedIT Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America) The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences. Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels. Privacy Notice
    $98.6k-139k yearly Auto-Apply 22d ago
  • (USA) Principal, Application Security Engineer

    Walmart 4.6company rating

    Cyber security analyst job in Bentonville, AR

    The Principal, Application Security Engineer leads the design and implementation of advanced security practices to safeguard applications across multiple platforms. This role involves identifying vulnerabilities, guiding secure coding standards, and integrating security controls within development lifecycles. The position requires collaboration with cross-functional teams to align security solutions with business objectives while mentoring associates and promoting continuous improvement. The ideal candidate demonstrates expertise in risk assessment, threat modeling, and secure architecture, driving innovation to enhance organizational resilience against evolving cyber threats. This leadership role supports the delivery of secure, scalable, and compliant software solutions. About the team: The AI Security Team within Information Security integrates cybersecurity, data science, and governance to enhance organizational protection and secure AI systems. The team designs and implements advanced security architectures, ensuring robust infrastructure and application security aligned with industry standards. Collaborating across domains, they develop scalable, resilient solutions addressing evolving security challenges. Combining expertise in systems engineering, security technology, and infrastructure management, the team drives innovation and maintains the integrity of critical systems that support Walmart's business objectives.What you'll do... Develop and promote repeatable secure development practices aligned with security frameworks and standards. Identify vulnerability trends and systemic issues to enhance application security controls. Provide guidance and mentorship to team members on secure coding and security testing techniques. Analyze requirements and prioritize product features to align with business objectives and risk assessments. Collaborate with cross-functional teams to integrate advanced secure software capabilities into existing systems. Design and validate architecture blueprints ensuring scalability, performance, and security compliance. Lead cyber risk assessment activities and recommend mitigation strategies for emerging threats. Monitor applications in production and oversee development of security patches and updates. What you'll bring: Extensive knowledge of application security principles, including confidentiality, integrity, identity management, and availability. Proficiency in secure coding frameworks, security testing techniques, and vulnerability assessments. Experience with risk frameworks, threat modeling, and implementation of security controls. Strong understanding of data security, cloud services, and Generative AI systems security. Ability to analyze requirements, perform risk analysis, and align security solutions with business objectives. Proven skills in mentoring teams and integrating advanced secure software capabilities. Familiarity with architectural principles and designing scalable, secure system architectures. Expertise in coding languages (Python) and security testing methodologies to ensure robust application security. At Walmart, we offer competitive pay as well as performance-based bonus awards and other great benefits for a happier mind, body, and wallet. Health benefits include medical, vision and dental coverage. Financial benefits include 401(k), stock purchase and company-paid life insurance. Paid time off benefits include PTO (including sick leave), parental leave, family care leave, bereavement, jury duty, and voting. Other benefits include short-term and long-term disability, company discounts, Military Leave Pay, adoption and surrogacy expense reimbursement, and more. You will also receive PTO and/or PPTO that can be used for vacation, sick leave, holidays, or other purposes. The amount you receive depends on your job classification and length of employment. It will meet or exceed the requirements of paid sick leave laws, where applicable. For information about PTO, see ******************************** Live Better U is a Walmart-paid education benefit program for full-time and part-time associates in Walmart and Sam's Club facilities. Programs range from high school completion to bachelor's degrees, including English Language Learning and short-form certificates. Tuition, books, and fees are completely paid for by Walmart. Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to a specific plan or program terms. For information about benefits and eligibility, see One.Walmart. The annual salary range for this position is $110,000.00 - $220,000.00 Additional compensation includes annual or quarterly performance bonuses. Additional compensation for certain positions may also include : - Stock ㅤ ㅤ ㅤ ㅤ Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 5 years' experience in application security, or related area at a technology, retail, or data-driven company. Option 2: 7 years' experience in application security, or related area at a technology, retail, or data-driven company.Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, GISF, CISSP, CSSP, CASE, or GWEB, Master's degree in Computer Science, Information Technology, Engineering, Information Systems, Cybersecurity, or related area and 3 years' Exposure of leading/ working on Information Security / Cyber Security Projects, We value candidates with a background in creating inclusive digital experiences, demonstrating knowledge in implementing Web Content Accessibility Guidelines (WCAG) 2.2 AA standards, assistive technologies, and integrating digital accessibility seamlessly. The ideal candidate would have knowledge of accessibility best practices and join us as we continue to create accessible products and services following Walmart's accessibility standards and guidelines for supporting an inclusive culture.Primary Location...805 Se Moberly Ln, Bentonville, AR 72712, United States of AmericaWalmart and its subsidiaries are committed to maintaining a drug-free workplace and has a no tolerance policy regarding the use of illegal drugs and alcohol on the job. This policy applies to all employees and aims to create a safe and productive work environment.
    $110k-220k yearly Auto-Apply 10d ago
  • Network Security Analyst

    Sa Technologies Inc. 4.6company rating

    Cyber security analyst job in Wichita, KS

    SA Technologies Inc. (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise. We guarantee you the best rate for your skills and performance. Job Description Position: Network Security Analyst( Citizens and Authorised to work in the US only) Location: Wichita, KS (Locals preferred) Employment: Contract to hire/Full time Salary - DOE Job Functions Resolve trouble tickets and respond to alerts generated by monitoring systems Design and implement network and security solutions Participate in cross-discipline troubleshooting for high visibility or complex issues Manage legacy WAN environment, and participate in the design and implementation of new customer-facing applications hosted via the internet Create and maintain documentation including: network diagrams, incident reports, audit remediation and runbooks Job Requirements Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background. At least 5 years' experience in information services, with demonstrated knowledge in complex multi-site LAN/WAN environment. 2 or more years of experience with: Switching and Routing, Firewall Support and Troubleshooting, Wireless Networking, Intrusion prevention. Relevant certifications are beneficial including: CISSP, CCSA, CCSE, CCNA, and CCNP Location: Local to Wichita, KS is preferred. Work on-site in Wichita, KS with minimum travel requirements Must have excellent communication skills. ***NO REMOTE WORK*** Qualifications Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background. Additional Information Shibu ************
    $61k-81k yearly est. 2d ago
  • Cyber Security Engineer

    CSA Global 4.3company rating

    Cyber security analyst job in Leavenworth, KS

    Full-time Description Client Solution Architects (CSA) is currently seeking a Cyber Security Engineer to support our program at Fort Leavenworth, KS. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. How Role will make an impact: Maintains the appropriate operational security posture and documentation for MCTSP information systems Implementing DoD, Army, ARNG, and MCTSP information security policies Creating and implementing POA&M in response to vulnerabilities identified during risk assessments, audits, and inspections RMF document and artifact management Managing and tracking the IAVM system Physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and assistance in the development of security policies and procedures. Requirements What you'll need to have to join our award-winning team: Clearance: Must possess and maintain an active Secret Clearance. Bachelor's degree in Cyber Security or related field or associate degree and 5 years of specialized experience. IAT II Certification 3 years' experience in assessing and mitigating risk for networks and systems utilized in LVC and integrated training environments that include simulations that stimulate Army C2 Systems. 3 years' experience planning architectures for LVC and integrated training environments and for stimulation of Army Mission Command Systems in support of Division and Above training events and distributed exercises; 5 years' experience with military training and training support; experience designing and supporting distributed, simulation-supported exercises Why You'll Love this Job: Purpose filled roles that contribute to impactful solutions to advance our federal clients' mission. You may examine doctrine, plans, policies and procedures that will enhance and enrich the training environment, ensuring our warfighters are fully prepared for any challenge. Daily opportunities to develop new skills Team environment What We Can Offer You: Compensation Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division. Diversity, Inclusion & Belonging We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Benefits Healthcare (medical, dental, vision, prescription drugs) Pet Insurance 401(k) savings plan Paid Time Off (PTO) Holiday pay opportunities Basic life insurance AD&D insurance Company-paid Short-Term and Long-Term Disability Employee Assistance Program Tuition Support Options Identity Theft Program
    $77k-105k yearly est. 60d+ ago
  • SME Engineer/Cyber Security Architect/Engineer - C

    Telos 4.6company rating

    Cyber security analyst job in Kansas

    The most security-conscious organizations trust Telos Corporation to protect their vital IT assets. The reputation of our company rests on the quality of our solutions and the integrity of our people. Explore what you can bring to our solutions in the areas of cyber, cloud and enterprise security. Be a part of the Telos culture and see what sets us apart! Telos offers an excellent compensation package with benefits that include generous paid time off, medical, dental, vision, tuition reimbursement, and 401k. Our employees enjoy more than just a great work environment! This position will be based at McConnell AFB, KS. Responsibilities: We are seeking a Subject Matter Expert (SME) to support the Air Force Information Network (AFIN), a multibillion-dollar global initiative ensuring secure, high-speed communications infrastructure for the Department of the Air Force (DAF). The SME will serve as the technical lead for the integration and deployment of Illumio solutions within the Air Force Network (AFNET) to support the Department of Defense (DoD) Zero Trust Architecture (ZTA). This role will focus on micro-segmentation, network mapping, and maintaining a secure environment through the Illumio Policy Compute Engine (PCE) and Virtual Enforcement Node (VEN) on NIPR and SIPR networks. The SME will provide subject matter expertise, assist with installation, provide tiered support, and ensure the system's cybersecurity posture is maintained and updated with the latest patches, upgrades, and security rules. Key Tasks & Responsibilities: • Install, reinstall, upgrade, or advise on configuring the Illumio Policy Compute Engine (PCE) and Virtual Enforcement Node (VEN) across NIPR and SIPR networks. • Provide guidance on traffic analysis, micro-segmentation, and write security rules to prevent adversary lateral movement and optimize application/workload security. • Oversee project management, providing advice to the Air Force management team on best practices for Illumio deployments. • Build and deploy Open Virtualization Appliances (OVA) and assist in maintaining the ITF (Integration Test Facility) environment to ensure system stability. • Maintain and sustain the cyber security posture of Illumio deployments. • Test and validate patches, upgrades, and security controls in lab environments prior to fielding. • Ensure the Authority to Operate (ATO) is continuously updated in accordance with STIG (Security Technical Implementation Guides) requirements and remediate vulnerabilities. • Provide in-person Type 1, over-the-shoulder training and hands-on experience for Air Force personnel using Illumio. • Offer local Tier 3 and Tier 4 support for ongoing operations, troubleshooting, monitoring, and management of Illumio installations. • Develop best practice operational procedures and runbooks for ongoing Illumio maintenance, including backup/restore, cold standby PCE, and system rebuilds. • Work on system integrations, including Syslog/SIEM and Single Sign-On (SSO). • Develop a labeling schema and deployment methodology using Air Force automation frameworks and Illumio best practices. • Provide Tier 3 support for the Illumio suite, ensuring rapid response and resolution of system issues. • Prepare and maintain detailed project documentation, reports, and metrics. • Author Illumio policy frameworks for core data center services, administrative access, and traffic management (egress, IP lists, multi-tenant workloads). • Develop Illumio-specific API scripts to optimize operational services. • Assist with technical reviews, change preparations, and customer framework integration. Requirements Desired Education & Experience: • Bachelor's degree in Systems Engineering, Computer Science, or a related field • 4+ years of hands-on experience in network engineering and firewall management • 4+ years of experience with cloud networking and virtualization technologies (e.g., VMware) • Expert skills to install/reinstall/upgrade or advise on the tasks required to place the Illumio Policy Compute Engine and Virtual Enforcement Nodes • Subject matter expertise on Illumio micro segmentation to provide consulting to customer throughout integration into its service set. • Expert skills in required to develop Illumio labeling and policy design Minimum Certification Requirements: • Information Assurance (IA) Technician (IAT) Level II (DODM 8140) Potentially Required Certification(s): • Illumio Core Expert, Certification • CompTIA Network+ Certification Security Clearance: • Valid DoD Secret clearance is required. Additionally, NATO Secret and/or DoD Top Secret/SSBI clearances, favorably adjudicated for SCI eligibility, are required at certain locations The successful candidate must meet eligibility requirements to access sensitive information, which requires US citizenship. Telos maintains a drug-free workplace and will conduct drug testing on all applicants who have accepted an offer of employment. Telos Corporation participates in the E-Verify program. Therefore, any employment with Telos will also be contingent upon confirmation from the Social Security Administration ("SSA") and/or the Department of Homeland Security ("DHS") of your authorization to work in the United States. Telos offers excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future. Telos Corporation and its subsidiaries are committed to equal opportunity for all, without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, age, veteran status, disability, genetic information, or any other protected characteristic. Telos Corporation will make reasonable accommodations for known physical or mental limitations of otherwise qualified employees and applicants with disabilities unless the accommodation would impose an undue hardship on the operation of our business. If you are interested in applying for an employment opportunity and feel you need a reasonable accommodation pursuant to the ADA, please contact us at **************. If you require relay service assistance, please click on the following link to review information on your state's relay service: ********************************** Telos Corporation is an EEO/AA employer.
    $76k-99k yearly est. 26d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Little Rock, AR

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 60d+ ago
  • Security Operations Senior Analyst

    AFA American Fidelity Assurance Company

    Cyber security analyst job in Oklahoma City, OK

    The Sr Security Operations Analyst is a vital member of the team, addressing daily information security requests or matters or requests using a wide variety of security tools and disciplines. They will primarily lead investigations and analyzing response activities related to security incidents or events with minimal guidance as part of existing identity, governance, vulnerability management, threat intelligence, application security, incident detection and response processes. Report unresolved security exposures, misuse of resources, and noncompliance situations using defined playbooks and escalation processes. Periodically engage in threat hunting using manual and automated tools. This position will also have the opportunity to work on security and technology initiatives with company-wide reach. They support and maintain tool-driven and highly automated solutions to deliver key security management processes using existing tool sets and/or identify new tools as innovations in security are realized. They assist in ensuring that the software development lifecycle (SDLC) follows security best practices and adhering to secure coding principles by facilitating the scanning and testing of software applications against security risks/vulnerabilities before release. Utilizes security utilities and tools for internal use that enables high speed and wide scale security monitoring and coverage. They develop corporate governance in support of MAR, FINRA and other compliance/governance policies/procedures following NIST/Hi-Trust best practices. #AFC
    $74k-101k yearly est. Auto-Apply 2d ago
  • Information Security Specialist

    Collabera 4.5company rating

    Cyber security analyst job in Saint Louis, MO

    Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers. Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations. For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US. Job Description Responsibilities: Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios. Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization Qualifications Required Skills/Experience • 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role • Knowledge of quantitative and qualitative risk evaluation methods • An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one • An ability to effectively influence others to modify their opinions, plans, or behaviors • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business • Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part • An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization • Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement Additional Information To set up an inerview for this position, feel free to contact: Imran Malek ************ *******************************
    $71k-97k yearly est. Easy Apply 2d ago
  • Information Security Risk & Compliance Analyst

    Midfirst Bank 4.8company rating

    Cyber security analyst job in Oklahoma City, OK

    The Security Risk and Compliance Analyst is a member of the information security team and works closely with the other members of the team, the business, and other IT staff to develop and manage security for one or more IT functional area (e.g., data, systems, network, and physical) across the enterprise. The candidate will be able to effectively understand standard risk methodologies and the implementation of security controls in an enterprise environment. Key Result Areas: Work as part of a team to maintain security and integrity of corporate data and IT systems through activities including: Develop and maintain enterprise security policies and procedures Assist in the coordination and completion of information security risk assessments and documentation Work with information security management to develop strategies and plans to enforce security requirements and address identified risks Report to management concerning residual risk, vulnerabilities, and other security exposures including misuse of information assets and noncompliance Work with IT department and members of the information security team to identify, select and implement technical controls Provide direct support to the business and IT staff for security related Maintain an awareness of security and control issues in emerging technologies Perform other duties as assigned Knowledge, skills, and experience required: Bachelor's degree in Computer Science, Information Systems, or other equivalent degree or experience Preferred Certifications (CISSP, CISA, CRISC, CRM, GSEC, etc.) Strong analytical and problem-solving skills to enable effective security incident and problem resolution Proven ability to work under stress with the flexibility to handle multiple high-pressure tasks simultaneously Ability to work well under minimal supervision Strong team-oriented skills with the ability to interface effectively with a broad range of people and roles, including vendors and enterprise personnel Strong written and verbal communication skills and attention to detail for board level committee and regulatory reporting Strong customer/client focus with the ability to manage expectations appropriately General understanding of risk management Knowledge of security methodology frameworks and regulatory requirements such as NIST, CIS, HIPAA, PCI, and FFIEC Microsoft Excel, Word, and Visio skillset for the creation, tracking and reporting of security metrics (e. graphs, formatting, basic formulas) Preferred Qualifications: Understanding of enterprise risk management systems and automation platforms Experience with Data Loss Prevention (DLP) and Vulnerability Management solutions *This position is on-site located in Oklahoma City, must reside within the area to be considered. *Position requires a minimum of 3 years of relevant US based experience. #LI-Onsite #LI-DNI
    $77k-104k yearly est. 60d+ ago
  • Information Security Analyst

    Tenex.Ai

    Cyber security analyst job in Overland Park, KS

    TENEX is an AI-native, automation-first, built-for-scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is composed of industry experts with deep experience in cybersecurity, automation, and AI-driven solutions. Backed by leading investors, we are rapidly growing and seeking top talent to join our mission of revolutionizing the MDR landscape. We're a fast growing startup backed by industry experts and top tier investor Andreessen Horowitz. As an early employee, you'll play a meaningful role in defining and building our culture. Get in on the ground floor. We're a small but well-funded team that just raised a substantial round - joining now comes with limited risk and unlimited upside. Culture is one of the most important things at TENEX.AI-explore our culture deck at culture.tenex.ai to witness how we embody it, prioritizing the irreplaceable collaboration and community of in-person work. We are looking for a detail-oriented Information Security Analyst to spearhead our internal compliance efforts and manage our Third-Party Risk Management (TPRM) program. In this role, you won't just be checking boxes; you will be the architect of the controls that protect our customers' data involving AI and other cutting edge technologies. You will bridge the gap between technical security operations and formal audit requirements, ensuring we remain a gold standard in the industry. Location: This role will require onsite in our Overland Park, KS or Sarasota, FL location. Key Responsibilities 1. Internal SOC 1 & SOC 2 Compliance Audit Readiness: Lead the preparation for annual SOC 1 Type II and SOC 2 Type II audits. Control Monitoring: Perform continuous testing of technical and administrative controls (e.g., access reviews, change management, encryption standards). Evidence Collection: Coordinate with Engineering, HR, and DevOps teams to gather and organize audit evidence throughout the year. Remediation: Identify gaps in current processes and work with department heads to implement corrective actions. 2. Third-Party Risk Management (TPRM) Vendor Assessments: Conduct security assessments of new and existing vendors, reviewing their SOC reports, ISO certifications, and SIG questionnaires. Risk Scoring: Evaluate the risk profile of third-party tools and services, providing recommendations to leadership on whether to approve or mitigate risks. Contract Review: Partner with Legal to ensure security addendums (DSAs/BAsAs) meet our internal compliance requirements. 3. Policy & Governance Maintain and update the Information Security Management System (ISMS) documentation. Develop and deliver security awareness training tailored to compliance requirements. Act as the primary point of contact for client inquiries regarding our security posture. Required Qualifications & Skills: Experience: At least 2 years in Information Security, IT Audit, or Compliance (GRC). Frameworks: Deep understanding of AICPA Trust Services Criteria (SOC 2) and SSAE 18 (SOC 1) along with ISO 27001, NIST-800. Technical Knowledge: Familiarity with cloud environments (GCP/AWS/Azure), IAM, and vulnerability management. TPRM Tools: Experience with risk assessment platforms (e.g., OneTrust, Vanta, or Drata). Certifications: CISA, CRISC, or Security+ preferred (CPA-tracked experience is a plus). Ideal Candidate Profile: The "Translator": You can explain complex frameworks like ISO27001, NIST 800, and map them to internal controls in policy documentation to support compliance requirements. Meticulous: You audit the environment and policies for consistency and enforcement. Proactive: You don't wait for the audit window to open; you are constantly looking for ways to automate evidence collection. Education & Certifications: Bachelor's degree in Computer Science, Cybersecurity, Engineering, or a related field (or equivalent experience). Why Join Us? Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions. Collaborate with a talented and innovative team focused on continuously improving security operations. Competitive salary and benefits package. A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.
    $68k-95k yearly est. Auto-Apply 23d ago
  • Data Security Analyst

    The Timberline Group

    Cyber security analyst job in Saint Louis, MO

    Join our dynamic and thriving company as a Data Security Analyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning. What You'll Be Doing Monitor security service performance and availability: Provide recommendations on security equipment, software, and services On-going investigation: Inspect information security alarms and events to determine vulnerability and impact Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk Participate in architecture reviews: Ensure adherence to information security architecture Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to information security incidents Design and deliver programs: Create education and training programs on information security and privacy matters The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* ************************* "Delivering quality solutions through quality people"
    $64k-89k yearly est. Easy Apply 60d+ ago
  • Information Security Analyst

    Capitol Federal Savings Bank 4.4company rating

    Cyber security analyst job in Lawrence, KS

    Make a direct impact on protecting the Bank's people, systems, and customers! As an Information Security Analyst, you'll play a hands-on role in strengthening the Bank's security posture while working closely with Compliance, Risk Management, and IT Security. This position offers visibility across the organization, meaningful responsibility, and the opportunity to influence how security awareness and risk management are practiced every day. You'll be trusted to monitor critical system access, investigate and respond to real-world phishing threats, and lead the Bank's security awareness and social engineering programs. From training employees to advising leadership on security risks, your work will directly reduce risk and improve the organization's security culture. What You'll Do * Protect critical systems by monitoring access changes and advising on best practices * Investigate suspicious emails and manage phishing response and testing programs * Lead engaging security awareness training and new-hire education * Plan and report on phishing and social engineering exercises * Support key information security risk assessments and control reviews * Partner with IT and business leaders to identify and mitigate security risks What You Bring * 5+ years of experience in IT security, risk management, audit, or compliance CapFed is an equal opportunity employer.
    $82k-111k yearly est. Auto-Apply 21d ago
  • Security Analyst I

    Propio 4.1company rating

    Cyber security analyst job in Overland Park, KS

    Full-time Description Propio Language Services is a provider of the highest quality interpretation, translation, and localization services. Our people take pride in every resource we offer, and our users always have access to the best technology, support, and experience. We are driven by our passion for innovation, growth, and connecting people. If you believe in the transformative power of technology-driven solutions and meaningful communication, Propio could be the ideal place for you. This role is located in our Overland Park, KS office. The Security Analyst is a member of the IT Security and Compliance department and reports to the Director of Security and Compliance. This position is focused on performing cybersecurity risk mitigation activities, including facilitating information security training and awareness, conducting risk based and user access assessments, and performing cybersecurity controls. Duties include a wide variety of assignments, such as developing and implementing holistic security awareness and phishing campaigns, conducting user access reviews, and creating third party product vulnerability reports. The Analyst will also utilize an assortment of cybersecurity applications to monitor the security of Propio LS, LLC. Most importantly, the Analyst position will require excellent interpersonal skills, to foster collaboration and cybersecurity learning throughout the organization. We require someone with great organizational skills and a passion for being at the forefront of cybersecurity. Responsibilities: Leverage industry leading technologies to help identify and respond to the ever-evolving threat landscape. Perform analysis of logs from various security controls, including, but not limited to, firewall, proxy, host intrusion prevention systems, endpoint security, application, email, and system logs, to identify possible threats to network security. Provide analysis and investigation of security related data from a wide range of security devices. Safely acquire and preserve the integrity of data required for cyber incident analysis to help determine the technical/operational impact, root cause(s), scope, and nature of the cyber event or incident. Provide Incident Response (IR) support as needed. Provide analysis based on alerts from our security stack. Create and maintain documentation for processes and incidents. Interpret and act on results from various security technologies including SIEM, Firewall, Endpoint Solutions, DLP, etc. Ability to pivot between data sources during an investigation for deeper understanding of the event and exploration of other possible kill chains. Collaborates with Security Team to identify security threats and violations and to identify and recommend needed programming or process changes. Communicate and liaise with IT team during processing and triaging alerts. Communicate with outside stakeholders during IR or remediation scenarios. Communicate with staff at all levels and work to educate staff on cybersecurity. Maintain confidentiality and an understanding of the evolving security threat landscape. Requirements Completion of security-specific training program or Bachelors degree in Information Security, Information Assurance, Cybersecurity, Computer Science or related field Familiarity with Microsoft environment is highly preferred Awareness of various security methodologies and processes, and technical security solutions (SIEM, IDS/IPS, Firewall Solutions, Offensive Security tools) Knowledge and experience analyzing security alerts is preferred but not required. Familiarity with HIPAA specific security requirements a plus. Basic understanding of network concepts is required (DHCP, DNS, VLANS, etc). Knowledge of common Internet protocols and applications. Ability to think critically and logically under pressure, and work in a fast-paced environment. Strong technical experience with proven history of troubleshooting complex, cross segment, cross office, and cross team problems #LI-RA1
    $62k-78k yearly est. 9d ago
  • Information Security Specialist

    Collabera 4.5company rating

    Cyber security analyst job in Saint Louis, MO

    Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers. Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations. For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US. Job Description Responsibilities: Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios. Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization Qualifications Required Skills/Experience • 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role • Knowledge of quantitative and qualitative risk evaluation methods • An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one • An ability to effectively influence others to modify their opinions, plans, or behaviors • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business • Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part • An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization • Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement Additional Information To set up an inerview for this position, feel free to contact: Imran Malek ************ *******************************
    $71k-97k yearly est. Easy Apply 60d+ ago
  • Information Security Analyst

    Capitol Federal Savings Bank 4.4company rating

    Cyber security analyst job in Topeka, KS

    Make a direct impact on protecting the Bank's people, systems, and customers! As an Information Security Analyst, you'll play a hands-on role in strengthening the Bank's security posture while working closely with Compliance, Risk Management, and IT Security. This position offers visibility across the organization, meaningful responsibility, and the opportunity to influence how security awareness and risk management are practiced every day. You'll be trusted to monitor critical system access, investigate and respond to real-world phishing threats, and lead the Bank's security awareness and social engineering programs. From training employees to advising leadership on security risks, your work will directly reduce risk and improve the organization's security culture. What You'll Do * Protect critical systems by monitoring access changes and advising on best practices * Investigate suspicious emails and manage phishing response and testing programs * Lead engaging security awareness training and new-hire education * Plan and report on phishing and social engineering exercises * Support key information security risk assessments and control reviews * Partner with IT and business leaders to identify and mitigate security risks What You Bring * 5+ years of experience in IT security, risk management, audit, or compliance CapFed is an equal opportunity employer.
    $82k-111k yearly est. Auto-Apply 21d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Fayetteville, AR?

The average cyber security analyst in Fayetteville, AR earns between $58,000 and $103,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Fayetteville, AR

$77,000
Job type you want
Full Time
Part Time
Internship
Temporary