Cyber security analyst jobs in Flagstaff, AZ - 144 jobs
All
Cyber Security Analyst
Information Systems Security Officer
Information Security Analyst
Information Security Engineer
Senior Security Analyst
Security Engineer
Defense Analyst
Senior Cyber Security Analyst
Cyber Security Analyst - AZ
Vensure Employer Solutions 4.1
Cyber security analyst job in Chandler, AZ
We are seeking an experienced CyberSecurityAnalyst to join our cybersecurity team. In this critical role, the successful candidate will be tasked with the comprehensive monitoring, detection, analysis, and response to cybersecurity incidents, ensuring the integrity, confidentiality, and availability of information assets. Leveraging deep technical expertise and a strategic approach to cybersecurity, this position calls for a proactive and vigilant professional dedicated to identifying vulnerabilities, mitigating risks, and leading incident response efforts. The ideal candidate will possess deep technical knowledge, excellent communication skills, and the ability to coordinate incident response activities across the organization. This position requires a blend of analytical prowess, technical expertise, and a strategic mindset to protect the company's assets from internal and external threats
Essential Duties and Responsibilities
Continuously monitor and evaluate the organization's cybersecurity posture, using securitytools and techniques to detect potential threats and vulnerabilities across a wide range ofsystems and environments.
Respond to, investigate, and manage security incidents with precision and expertise, frominitial detection through to resolution, ensuring minimal impact to the organization.
Serve as a key contributor to the Security Operations team, enhancing its operationalcapabilities through the development and implementation of security measures and protocols.
Mentor and guide junior securityanalysts within the security operations team, fostering aculture of continuous learning and professional development. Share knowledge and insights onthe latest cybersecurity trends, tools, and practices to enhance team capabilities.
Develop, refine, and maintain incident response playbooks, procedures, and guidelines inalignment with industry best practices.
Engage in proactive threat hunting initiatives, leveraging threat intelligence and cybersecurityframeworks to identify and neutralize potential threats before they manifest into incidents.• Document and communicate detailed incident reports and analyses, ensuring transparency andclarity in the post-incident review process to improve future security measures and responses
Stay current with new threats, technologies, and trends in cybersecurity, contributing to thecompany's IT security strategy and roadmap.• Participate in continuous improvement activities that enhance operational efficiency throughthe implementation of automation.
Share knowledge and insights with team members and across the organization to foster aculture of security awareness and resilience
Knowledge, Skills, and Abilities
Bachelor's degree in CyberSecurity, Information Assurance, Computer Science, Engineering, ora related technical field is preferred or equivalent combination of experience, education(including other relevant degree or educational programs), and certifications.
Professional security certifications such as GCIH, GCFA, CISSP, or similar are highly desirable
Education & Experience
3-5 years of experience in cybersecurity, with a focus on security operations, incidentresponse, or related fields.
Proven experience in security systems administration, SIEM, threat intelligence platforms,vulnerability management, and forensic tools.
Strong understanding of cybersecurity principles, IT systems, and network security.
Demonstrated proficiency in Windows and Linux operating systems, with a solid understandingof cloud services Excellent communication skills, with the ability to convey complex security concepts to bothtechnical and non-technical stakeholders.
Demonstrated ability to act with integrity, professionalism, and confidentiality.
Organized, adaptable, and capable of managing multiple high-priority tasks in a fast-pacedenvironment
$80k-111k yearly est. 60d+ ago
Looking for a job?
Let Zippia find it for you.
Cyber Security Analyst - Vulnerability Management
Runbuggy Inc.
Cyber security analyst job in Tempe, AZ
Requirements
What You Will Be Doing::
Responsible primarily for day-to-day product vulnerability management services and supporting infrastructure.
Ensure product vulnerabilities are identified, prioritized, and remediated, particularly by reducing the backlog of existing product vulnerabilities.
Ensure that releases and product changes are reviewed and approved by the Security Team.
Collaborate with engineering teams to understand product vulnerability management needs and assist with remediation and mitigation strategies.
Build relationships with various teams and technology owners to decrease the likelihood of friction or roadblocks.
Schedule and assist with remediation efforts from external and internal penetration tests and assessments.
Perform analysis of scan results, assign risk ratings for product vulnerabilities, and help prioritize remediation efforts.
Help establish and operationalize key performance indicators, reporting, and metrics to track the maturity of the product vulnerability program.
Oversee and help execute manual code review of key product components for security improvements.
Help drive the security and privacy product requirements process across RunBuggy's product lines, implementing security early in the product roadmap.
Execute on an agreed-upon risk prioritization framework in conjunction with engineering, product, development, operations, and the Sr. Director of Security and Audit who outlines the highest risk items for action to improve RunBuggy's product security.
Collaborate with product and sales engineering teams for hardening applications, APIs, and micro services with security built into the services.
Help influence new deployment models, including containers, cloud platforms, SaaS, etc., with security built into the platform.
Help drive identification of software security findings throughout the lifecycle and the reduction of risk, working with relevant stakeholders.
Maintain current knowledge of the RunBuggy threat landscape, including attacker tactics, techniques, and procedures.
Other duties as assigned.
What You Bring to the Team by Way of Skills and Experience:
Demonstrated understanding of cybersecurity threats and vulnerability management and related IT domains.
3+ years' relevant experience as a Vulnerability Analyst required.
A degree in Computer Science, IT, Systems Engineering, or a cybersecurity-related qualification is preferred.
Experienced as a securityanalyst supporting product vulnerability management processes in a cloud environment, such as AWS, EKS, Docker, etc.
Hands-on experience with vulnerability management tools such as AWS Inspector, SonarCube, etc.
Knowledge of containerized web application architecture and related vulnerabilities and issues.
Deep understanding of vulnerability management, including risk assessment and remediation planning.
Knowledge of the latest trends and awareness of current hacking techniques and cybercrime.
Understanding of secure cloud network architectures, including CloudFormation, Kubernetes, and MongoDB.
Experience with software development and delivery for a SaaS company.
Familiarity with cybersecurity frameworks, such as NIST CSF.
Attention to detail, QA skills, the ability to “think forward,” adept at problem solving and addressing issues and complications before they expand.
Certificates, Licenses, and/or Registrations:
Professional certifications such as Certified Ethical Hacker (CEH), Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified Cloud Security Professional (CCSP) are preferred.
What is in it for You and Why you Should Apply:
Market-competitive pay based on education, experience, and location.
Highly competitive medical, dental, vision, Life w/ AD&D, Short-Term Disability insurance, Long-Term Disability insurance, pet insurance, identity theft protection, and a 401(k) retirement savings plan.
Employee wellness program.
Employee rewards, discounts, and recognition programs.
Generous company-paid holidays (12 per year), vacation, and sick time.
Paid paternity/maternity leave.
Monthly connectivity/home office stipend if working from home 5 days a week.
A supportive and positive space for you to grow and expand your career.
Pay Range Disclosure:
The advertised range represents the expected pay range for this position at the time of posting based on education, experience, skills, location, and other factors.
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
RunBuggy is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination, harassment, and retaliation on the basis of race, color, religion, sex (including gender identity and sexual orientation), pregnancy, parental status, national origin, age, disability, genetic information, or any other status protected under federal, state, or local law.
Applicants must be currently authorized to work in the United States.
Please, no agencies.
Salary Description $90k/yr.-$110k, DOE
$90k-110k yearly 2d ago
Cyber Security Analyst
Washington Elementary School District 6 4.6
Cyber security analyst job in Phoenix, AZ
Pay Grade: PP (Non-Exempt Support Staff Salary System)
Department: Management Information Systems (MIS)
Accountable To: Administrator of MIS
FLSA Status: Non-Exempt
Calendar: 261 Days
Summary:
Under general direction, incumbent is responsible for protecting the school district's
technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites.
Essential Functions:
Threat detection and analysis: Actively monitor security alerts from various sources, including Security Information and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc.
Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts.
Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls.
Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them.
Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them.
Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies.
User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures.
Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment.
Performs other job related duties as assigned.
Required Qualifications:
To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary.
High School diploma or equivalent (G.E.D.) prior to being hired;
Valid Arizona Department of Transportation Driver's License;
Minimum of one year of experience in information security, network security, or a related technology field.
Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services.
Experience with security tools, including SIEM, antivirus software, and intrusion detection systems.
Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card.
Preferred Qualifications:
It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position.
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise.
Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP.
Experience working in an educational or public sector environment.
Knowledge of emerging security technologies and trends.
Experience administering a Cisco Local and Wide area networking environment;
Experience with border network security devices such as Email filters and Firewalls;
Experience administering Windows Server and Active Directory.
Experience with VMWare and Veeam (or other backup and recovery platform)
Knowledge and Skills Required:
To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Skills required, but not limited to, for this position include:
Ability to work independently and collaboratively in a team environment.
Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions.
Familiarity with scripting languages like Python or PowerShell for automating security tasks.
Knowledge of common security frameworks, such as NIST.
Understanding of networking concepts, firewalls, and data encryption techniques.
Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences.
Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities.
Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack.
Physical Requirements:
The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus.
Working Conditions:
The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels.
The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
$48k-60k yearly est. 32d ago
Cyber Analyst (Senior)
Peraton 3.2
Cyber security analyst job in Tucson, AZ
Responsibilities
We are seeking a highly skilled and motivated CyberAnalyst to join our team at Davis-Monthan AFB supporting the Air Combat Command (ACC) Intelligence Directorate (A2). The CyberAnalyst will play a critical role in cryptologic support, cybersecurity operations, and system administration to protect mission-critical systems and networks. This position requires expertise in cyber threat analysis, cryptologic operations, and the ability to work in a fast-paced, mission-driven environment.
Key Responsibilities:
Perform cryptologic support and cybersecurity operations to safeguard sensitive information and mission-critical systems.
Conduct cyber threat analysis to identify vulnerabilities, assess risks, and recommend mitigation strategies.
Support the development and implementation of cyber defense measures to protect against emerging threats.
Monitor, analyze, and respond to cyber incidents, ensuring timely resolution and reporting.
Provide system administration support, including configuration, maintenance, and troubleshooting of enterprise and local network devices.
Collaborate with cross-functional teams to integrate cybersecurity measures into ISR operations.
Liaise with the Enterprise Service Desk (ESD) and Enterprise Service Center (ESC) to resolve technical issues and ensure system availability.
Maintain compliance with all security protocols, policies, and regulatory requirements.
Qualifications
Required Qualifications:
Required Experience: Minimum 10 years of experience related to the specific labor category with at least a portion of the experience within the last 2 years.
Required Education: Master's degree from a college or university accredited by an agency recognized by the U.S. Department of Education; or have bachelor's degree from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 5 years of related senior experience, for a total of 15 years, as a substitute to the master's degree.
Technical Expertise:
Proficiency in cryptologic support, cybersecurity operations, and system administration.
Completion of a commercial, military, or U.S. Government cybersecurity training course or specialized certification.
Familiarity with cyber defense tools, network security, and incident response methodologies.
Strong understanding of cyber threat analysis and mitigation strategies.
Skills:
Exceptional analytical and problem-solving skills.
Strong written and verbal communication skills for producing reports and collaborating with teams.
Ability to work effectively in a high-pressure, mission-critical environment.
Security Clearance: Active Top Secret/SCI clearance is .
Preferred Qualifications:
Experience at Air Force Major Command (MAJCOM) Intelligence Directorate or similar military organization.
Knowledge of cryptologic systems, tools, and methodologies.
Familiarity with Air Force cybersecurity policies and procedures.
Certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or equivalent.
Prior experience mentoring or training junior personnel.
Why Join Us?
Be part of a mission-critical team supporting the U.S. Air Force's ISR and cybersecurity operations.
Work in a dynamic and collaborative environment at Davis-Monthan AFB, a hub for Air Force intelligence and operational excellence.
Access to professional development opportunities and career growth within the intelligence and cybersecurity community.
#AFACC
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $112,000 - $179,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
$112k-179k yearly Auto-Apply 4d ago
F-35 Information System Security Officer - (Mid-Career)
Lockheed Martin 4.8
Cyber security analyst job in Yuma, AZ
What We're Doing: Lockheed Martin's, Rotary & Mission Systems (LM RMS), F-35 CyberSecurity invites you to step up to one of today's most daunting challenges: the protection of exquisite government capabilities leading to warfighter supremacy against our peer and near peer adversaries. As a cybersecurity professional at Lockheed Martin, you'll safeguard the sensitive information and warfighting capabilities that our citizens and the world depend upon to protect U.S. and ally interests. Here, you'll work alongside other cybersecurity experts, related departments, and military members to support the military operational objectives by providing them with a safe and secure operating environment. In this fast-paced, real-world environment, you'll draw on all your education and experience as well as the resources of Lockheed Martin to keep these exquisite capabilities protected.
The Work:
This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned classified and/or unclassified F-35 systems at MCAS Yuma. Typical ISSO responsibilities include but are not limited to:
Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems.
Supporting the development and maintenance of cybersecurity related plans and procedures.
Monitoring for non-compliance, anomalous activity (i.e., threats), and effectively reporting such activity and associated risks.
Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, corrective actions.
Creating, collecting and retaining data to meet reporting requirements.
Monitoring and correlating data (i.e., events) from a variety of sources (e.g., Splunk, ELA, ePO, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance.
Investigating, analyzing and responding to cyber events, incidents and non-compliance, including trend analysis, creating detailed written reports and briefing the appropriate parties.
Identifying, implementing and enforcing requirements for the proper handling and storage of Government data and electronic media.
Conducting self-inspections and preparing for customer inspections.
Interacting professionally during the enforcement of security policy and procedures.
Assigned systems may vary in classification, capabilities and complexity. Mission requirements may require other than first-shift work and additional responsibilities as assigned.
Who we are:
Lockheed Martin is a CyberSecurity pioneer, partner, innovator and builder. In support of our many customers, the amazing members of our team are responsible for providing all aspects of cybersecurity support in a complex environment. In a rapidly growing enterprise, this role offers the opportunity to grow and hone the unique skills and experiences required as a cybersecurity expert to create, design and build solutions to some of the world's hardest engineering problems.
Why Join Us:
Your Health, Your Wealth, Your Life
With our employees as our top priority, we provide diverse career opportunities designed to propel development and boost agility. Our flexible schedules, competitive pay and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. At Lockheed Martin, we place an emphasis on empowering our employees by fostering innovation. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future!
Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five (5) years or enrollment in Continuous Vetting program.
Ability to obtain and maintain Special Access Program (SAP) access.
Possess a valid certification that meets or exceeds DoD 8570.01-M IAT II requirements.
Meets: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP
Exceeds: CASP+ CE, CCNP Security, CISA, CISSP (or Assc), GCED, GCIH, CCSP
Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks.
Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information systems.
Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs (e.g., DoDI 8510.01, JSIG, DoDM 5205.07, NIST SP 800 series).
Prior experience with the system authorization process, associated artifacts and their requirements (e.g., SSP, SCTM, Security CONOPs, SOPs).
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
*
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Other Important Information
By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to work remotely
Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedule Information
Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Security Clearance Information
This position requires a government security clearance, you must be a US Citizen for consideration.
Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $93,200 - $164,450. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
(Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year.
This position is incentive plan eligible.
Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $107,300 - $185,840. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
This position is incentive plan eligible.
Senior Defense Assessment Analyst (Penetration Tester) Ft. Huachuca, AZ Are you ready to enhance your skills and build your career in a rapidly evolving business climate? Are you looking for a career where professional development is embedded in your employer's core culture? If so, Chenega Military, Intelligence & Operations Support (MIOS) could be the place for you! Join our team of professionals who support large-scale government operations by leveraging cutting-edge technology and take your career to the next level!
Chenega IT Enterprise Services (CITES) offers forward-thinking technology solutions to federal agencies and the DoD. Formed in 2016 to serve federal customers CONUS, CITES has grown quickly into a best practices leader for the modern federal enterprise.
The Senior Defense Assessment Analyst (Penetration Tester) shall plan for and conduct OT&E cyber survivability assessments on operationally representative system configurations, operated within operationally representative environments that include the coordinated involvement of NSA-certified Red Teams. In accordance with DOT&E cyber policies, the Contractor shall perform T&E planning, execution, data collection, analysis, and reporting for the conduct of cyber survivability assessment activities. This position is 100% on-site in a government facility.
Responsibilities
Cooperative Vulnerability and Penetration Assessment (CVPA) performed with the objective of identifying and providing a comprehensive characterization of the cybersecurity status of the SUT in an operational context for purposes of helping to mitigate the cybersecurity risks associated with that system. The Contractor shall review applicable system RMF information to identify the residual risks to be verified through the CVPA process.
Adversarial Assessment (AA) performed following a CVPA that utilize a NSA-certified Red Team to validate the operational significance of remaining system vulnerabilities for purposes of arriving at a system cyber survivability determination.
Cyber Economic Vulnerability Assessment performed as part of or following an AA to address DOT&E cybersecurity requirements for the OT&E of DoD financial and business systems.
Develop and present TCBs
Perform OTRR Reporting
Develop Cybersecurity T&E Plans
Develop Cybersecurity Quick Look Reports
Develop Cybersecurity Operational Assessments
Develop Cybersecurity T&E Reports
Qualifications
BA/BS from an accredited university required
Minimum of 12+ years of related IT experience
Substitution Allowance (MA/MS with 10+ years' experience can be substituted for the above requirements)
Must meet DoD 8140 DCWF 511 requirements (B.S., CySA+ or CBROPS or CFR or FITSP-O or GCIA or GDSA or GICSP or GCFA)
GIAC Certified Penetration Tester (GPEN)
EC Council Licensed Penetration Tester (LPT)
Certified Ethical Hacker (CEH)
An IAT II certification (CCNA-Security, CND, CySA+, GICSP, GSEC, Security+ CE, or SSCP)
TS/SCI clearance required
Knowledge, Skills and Abilities:
Excellent written and verbal communication and customer service skills.
Ability to work independently and as a team member.
Ability to handle large, complex workloads, effectively coordinate multiple resources, and multi-task in a fast-paced environment.
Knowledge and skill in applying analytical and evaluation methods and techniques.
Ability to handle controversial situations with tact and diplomacy.
Knowledge of cybersecurity and privacy principles.
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
How you'll grow
At Chenega MIOS, our professional development plan focuses on helping our team members at every level of their careers to identify and use their strengths to do their best work every day. From entry-level employees to senior leaders, we believe there's always room to learn.
We offer opportunities to help sharpen skills in addition to hands-on experience in the global, fast-changing business world. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their careers.
Benefits
At Chenega MIOS, we know that great people make a great organization. We value our team members and offer them a broad range of benefits.
Learn more about what working at Chenega MIOS can mean for you.
Chenega MIOS's culture
Our positive and supportive culture encourages our team members to do their best work every day. We celebrate individuals by recognizing their uniqueness and offering them the flexibility to make daily choices that can help them be healthy, centered, confident, and aware. We offer well-being programs and continuously look for new ways to maintain a culture where we excel and lead healthy, happy lives.
Corporate citizenship
Chenega MIOS is led by a purpose to make an impact that matters. This purpose defines who we are and extends to relationships with our clients, our team members, and our communities. We believe that business has the power to inspire and transform. We focus on education, giving, skill-based volunteerism, and leadership to help drive positive social impact in our communities.
Learn more about Chenega's impact on the world.
Chenega MIOS News- *****************************
Tips from your Talent Acquisition Team
We want job seekers exploring opportunities at Chenega MIOS to feel prepared and confident. To help you with your research, we suggest you review the following links:
Chenega MIOS web site - *******************
Glassdoor - ********************************************************************************
LinkedIn - *****************************************
Facebook - *************************************
#Chenega IT Enterprise Services, LLC
Our wide range of benefit options is designed to support and protect employees and their families. Based on eligibility, benefits include medical, dental, vision, prescription plans, wellness programs, income protection, paid leave, and retirement. Positions covered by the McNamara-O'Hara Service Contract Act, Davis-Bacon Act, or a Collective Bargaining Agreement (CBA) will comply with the statute or CBA requirements.
Chenega Corporation and family of companies is an EOE.
Equal Opportunity Employer/Veterans/Disabled
Native preference under PL 93-638.
We participate in the E-Verify Employment Verification Program
$75k-104k yearly est. 60d+ ago
Principal Security Information Analyst
Gen Mobile 3.9
Cyber security analyst job in Tempe, AZ
Principal Information SecurityAnalyst (Tier 2)
As a Principal Information SecurityAnalyst within Gen Digital's global Security Operations Center (SOC), you will play a key role in strengthening threat detection and response across the organization.
The role focuses on improving SOC monitoring and detection processes through technical expertise, continuous development, and close collaboration with other security teams.
In this position, you will serve as a senior specialist, leading automation and detection engineering efforts, mentoring junior analysts and contributing to projects that enhance security visibility and overall SOC performance.
Operating in a follow-the-sun model, the SOC ensures 24/7 global coverage, with regional teams working during their respective business hours and sharing on-call responsibilities for weekend.
Key Responsibilities:
Monitor, analyze, and correlate security alerts and events across multiple platforms (SIEM, WAF, EDR, email, cloud, network, and threat intelligence tools) to identify and validate suspicious or malicious activity
Continuously develop and fine-tune detection rules, correlation searches, security policies, and dashboards to improve visibility, reduce false positives, and increase alert accuracy across security platforms
Support and mentor Tier 1 analysts in alert triage, escalation quality, and use of tools
Collaborate with security engineers on automation and enrichment initiatives to streamline operational workflows and improve detection efficiency
Maintain complete and up-to-date documentation for all detection use cases, workflows and process improvements
Participate in security projects and collaborate with internal stakeholders (e.g., Incident Response, Security Engineering, Application Security, and IT) to enhance detection coverage, visibility, and response capabilities
Support the execution of incident response playbooks
Qualification and Work Experience:
3-5 years of hands-on experience in SOC operations, cybersecurity monitoring, or related areas such as detection engineering or threat analysis
Solid understanding of networking concepts (TCP/IP, DNS, HTTP/S) and how they apply to security monitoring and threat analysis
Strong knowledge of cybersecurity principles, common attack techniques, and threat types (e.g., phishing, malware, brute force, web application attacks)
Proven experience working with security logs, alerts, and structured data across multiple platforms (SIEM, EDR, WAF, cloud, and network telemetry)
Hands-on experience with SIEM platforms - Splunk preferred - including detection content development, rule tuning, and dashboard creation
Familiarity with Web Application Firewall (WAF) technologies and the ability to analyze or tune related alerts and policies
Understanding of cloud security concepts and experience with monitoring tools for major providers (AWS, Azure, GCP)
Working knowledge of scripting or automation (e.g., Python, PowerShell, or API-based integrations) to support analysis and enrichment workflows
Experience using AI-based tools to support daily SOC operations, including data analysis, investigation, documentation, and collaboration
Strong analytical and problem-solving skills with attention to detail and curiosity for continuous learning
Effective communication and documentation skills in English, both written and verbal
Experience collaborating across teams (e.g., Security Engineering, Incident Response, Application Security) on detection improvements or automation projects
Prior experience in a Security Operations Center (SOC) or similar environment is highly preferred
Familiarity with the fintech environment or experience supporting financial services infrastructure is considered a strong advantage
#LI-AS1
Gen is proud to be an equal-opportunity employer, committed to diversity and inclusivity. We base employment decisions on merit, experience, and business needs, without considering race, color, national origin, age, religion, sex, pregnancy, genetic information, disability, medical condition, marital status, sexual orientation, gender identity or expression, military or veteran status, or other unlawful factors. Gen prohibits discrimination based on these protected characteristics and recruits talented candidates from diverse backgrounds.
We consider individuals with arrest and conviction records and do not discriminate against employees for discussing their own pay or that of other employees or applicants. Learn more about pay transparency.
To conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.
$81k-118k yearly est. Auto-Apply 54d ago
Senior Information System Security Officer (ISSO) - Tucson, AZ
RTX
Cyber security analyst job in Tucson, AZ
Country:
United States of America Onsite
U.S. Citizen, U.S. Person, or Immigration Status Requirements:
Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
Security Clearance:
DoD Clearance: SecretAt Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Our cybersecurity team is seeking a Senior Information Systems Security Officer (ISSO) to support our team 100% onsite at our facility in Tucson, Arizona. The successful candidate will interface with the Information Systems Security Manager (ISSM) to ensure adherence with NIST Special Publications, customer directives, and company policies as applicable all NISPOM Chapter 8, DAAPM, JSIG policies.
What You Will Do
Assessing and monitoring system compliance, auditing, security plan development and delivering information systems security education and awareness.
Investigating information system security violations and help prepare reports specifying corrective and preventative actions.
Reviewing and approving (within authority) configuration management requests.
Conducting technical and administrative assessments.
Integrating new cybersecurity processes, procedures, and tools.
Support the creation, review and update of cybersecurity documentation and other technical writing.
Qualifications You Must Have
Typically requires a University Degree or equivalent experience and minimum 5 years prior relevant experience, or an Advanced Degree in a related field and minimum 3 years' experience.
Current IAM Level I certification (Security+ or other).
Relevant Experience Considered in any combination:
Cybersecurity, systems security or hardening
Information Technology
Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), Joint SAP Implementation Guide (JSIG), National Industrial Security Program Operating Manual (NISPOM), and/or non-defense regulations such as FAA, Payment Card Industry (PCI), ISO 9001 Quality Management standards, or HIPPA
Experience working with and/or supporting computer technologies (such as: databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics)
Physical security/security, policework/criminal justice, investigations, or Border Patrol
Project or program management, office management, senior administration, or account management
Qualifications We Prefer
Experience working in DoD classified operating and/or laboratory environments.
Experience with various information system security tools that address vulnerability analysis and mitigation. These may include Splunk, Forcepoint, Ivanti, Tenable, ACAS, HBSS, etc.
Familiarity with implementation of Government directives and policies derived from NIST, CNSSI, DoD, or other Government Regulatory compliance standards within a professional industry.
Experience in the execution of the Assessment & Authorization processes, as defined within the Risk Managed Framework (RMF).
Experience providing technical security consultation for complex, cross-domain, heterogeneous classified networked environments in collaboration with internal/external Customers, Information Technology (IT).
Familiarity with large multi-facility networks including various complex components, including Windows and Linux environments.
Experience interpreting, implementing, and assessing DISA STIGs.
Familiarity with the execution and management of cyber incident response; preservation, containment, and eradication.
What We Offer
Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation.
Relocation Non-Eligible - Relocation assistance not available
Learn More & Apply Now!
Please consider the following role type definition as you apply for this role:
Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintenance employees, as they are essential to the development of our products
We are RTX
#LI-Onsite
As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote.
The salary range for this role is 86,800 USD - 165,200 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
$76k-106k yearly est. Auto-Apply 4d ago
Senior Information System Security Officer (ISSO) - Tucson, AZ
RTX Corporation
Cyber security analyst job in Tucson, AZ
Country: United States of America Onsite U.S. Citizen, U.S. Person, or Immigration Status Requirements: Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
Security Clearance:
DoD Clearance: Secret
At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Our cybersecurity team is seeking a Senior Information Systems Security Officer (ISSO) to support our team 100% onsite at our facility in Tucson, Arizona. The successful candidate will interface with the Information Systems Security Manager (ISSM) to ensure adherence with NIST Special Publications, customer directives, and company policies as applicable all NISPOM Chapter 8, DAAPM, JSIG policies.
What You Will Do
* Assessing and monitoring system compliance, auditing, security plan development and delivering information systems security education and awareness.
* Investigating information system security violations and help prepare reports specifying corrective and preventative actions.
* Reviewing and approving (within authority) configuration management requests.
* Conducting technical and administrative assessments.
* Integrating new cybersecurity processes, procedures, and tools.
* Support the creation, review and update of cybersecurity documentation and other technical writing.
Qualifications You Must Have
* Typically requires a University Degree or equivalent experience and minimum 5 years prior relevant experience, or an Advanced Degree in a related field and minimum 3 years' experience.
* Current IAM Level I certification (Security+ or other).
* Relevant Experience Considered in any combination:
* Cybersecurity, systems security or hardening
* Information Technology
* Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), Joint SAP Implementation Guide (JSIG), National Industrial Security Program Operating Manual (NISPOM), and/or non-defense regulations such as FAA, Payment Card Industry (PCI), ISO 9001 Quality Management standards, or HIPPA
* Experience working with and/or supporting computer technologies (such as: databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics)
* Physical security/security, policework/criminal justice, investigations, or Border Patrol
* Project or program management, office management, senior administration, or account management
Qualifications We Prefer
* Experience working in DoD classified operating and/or laboratory environments.
* Experience with various information system security tools that address vulnerability analysis and mitigation. These may include Splunk, Forcepoint, Ivanti, Tenable, ACAS, HBSS, etc.
* Familiarity with implementation of Government directives and policies derived from NIST, CNSSI, DoD, or other Government Regulatory compliance standards within a professional industry.
* Experience in the execution of the Assessment & Authorization processes, as defined within the Risk Managed Framework (RMF).
* Experience providing technical security consultation for complex, cross-domain, heterogeneous classified networked environments in collaboration with internal/external Customers, Information Technology (IT).
* Familiarity with large multi-facility networks including various complex components, including Windows and Linux environments.
* Experience interpreting, implementing, and assessing DISA STIGs.
* Familiarity with the execution and management of cyber incident response; preservation, containment, and eradication.
What We Offer
Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation.
Relocation Non-Eligible - Relocation assistance not available
Learn More & Apply Now!
Please consider the following role type definition as you apply for this role:
* Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintenance employees, as they are essential to the development of our products
We are RTX
#LI-Onsite
As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote.
The salary range for this role is 86,800 USD - 165,200 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.
Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.
Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.
This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.
RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
$76k-106k yearly est. Auto-Apply 4d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Phoenix, AZ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 51d ago
Information Security Analyst
Deem 4.7
Cyber security analyst job in Arizona
Our mission is simple. We make business travel less complicated for travelers, less costly for employers and more profitable for service providers. Using our industry-leading software solutions, employees book travel and car service and report those expenses faster and more easily than ever before. Corporations control costs more effectively. Travel management companies deliver more engaging customer experiences. Car service operators benefit from new efficiencies and widen their customer reach. In other words, everybody wins. We've helped thousands of forward-thinking companies modernize their systems, improve travel management and save money. Deem is backed by leading venture capital funds as well as corporate and private equity investors. The company is headquartered in San Francisco, CA and has an office in Bangalore, India.
We are seeking an experienced, talented, energetic, hands-on, and proactive Information SecurityAnalyst to maintain and operate Deem's Information Security programs. You will be responsible for developing policies and driving processes based on a combination of threat intelligence and regulatory compliance.
Responsibilities
Advise senior management in the development, implementation and maintenance of a company-wide information security infrastructure, and ensure appropriate control objectives for system integrity, confidentiality, accountability and assurance within the context of the company's risk tolerance.
Ensure conformance with enterprise policy standards, which include monitoring metrics, response integration and escalation, and various risk analysis.
Maintain internal governance and recommend adjustments as threats and practices evolve.
Operate the information protection effort to comply with industry standard audits including (SSAE-18, SOC , PCI 3.2).
Determine security violations and inefficiencies by conducting periodic internal audits.
Develop a prioritized plan to close security gaps. Work with engineering teams (product & operations) to implement solutions.
Be hands-on where/when appropriate, in installing and evaluating security tools.
Install and maintain security management and monitoring tools in corporate and production environments, including vulnerability scanning, SEIM, IDS, etc.
Make sound, well-reasoned recommendations on vendor and tool selection.
Provide security consultation as needed for product development and industry marketing solutions.
Manage Internal Penetration Testing & Vulnerability Assessment Tools and Programs.
Investigate security incidents and recommend actions needed to resolve situations.
Work with product engineering to test for and fix vulnerabilities in the product code.
Develop content for and administer Employee Security Training Programs.
Qualifications
3+ years in the technology industry, 3+ in an information security role
Expert knowledge of identity management, IDS, SEM/SIEM, WAF
Industry-standard certifications: CISSP, or equivalent
Expertise in compliance standards, most notably PCI and SSAE16
Experience leading security and compliance audits
Thorough understanding and up-to-date knowledge of the web security threats (XSS, code injection, etc.)
Strong troubleshooting and forensic skills and ability to effectively work in cross functional teams as needed to resolve issues
Strong written, oral, and interpersonal communications skills
Capable of performing penetration tests and collaborating with Engineering on the static security analysis and remediation
Coding experience with Ruby, Java, Python, Javascript, Bash, or C# are nice to have
$81k-117k yearly est. 60d+ ago
Security Engineer - Secure Software Development
Sedgwick 4.4
Cyber security analyst job in Flagstaff, AZ
By joining Sedgwick, you'll be part of something truly meaningful. It's what our 33,000 colleagues do every day for people around the world who are facing the unexpected. We invite you to grow your career with us, experience our caring culture, and enjoy work-life balance. Here, there's no limit to what you can achieve.
Newsweek Recognizes Sedgwick as America's Greatest Workplaces National Top Companies
Certified as a Great Place to Work
Fortune Best Workplaces in Financial Services & Insurance
Security Engineer - Secure Software Development
Security Engineer - Secure Software Development
**PRIMARY PURPOSE OF THE ROLE:** To manage the implementation of security measures to protect company data, networks, and computer systems. To focus on executing security fundamentals for threat detection, investigation, and response efforts.
**ARE YOU AN IDEAL CANDIDATE?** We are looking for enthusiastic candidates who thrive in a collaborative environment, who are driven to deliver great work, are customer-oriented and are naturally empathetic.
**ESSENTIAL RESPONSIBLITIES MAY INCLUDE**
+ Engineers, implements and monitors security measures for the protection of computer systems, networks and information.
+ Identifies and defines system security requirements.
+ Designs computer security architecture and develops detailed cybersecurity designs.
+ Prepares and documents standard operating procedures and protocols.
+ Configures and troubleshoots security infrastructure devices.
+ Develops technical solutions and new security tools to assist in mitigating security vulnerabilities and automating repeatable tasks.
+ Leads IT groups and business units as necessary in troubleshooting compatibility issues between security tools and business or productivity programs.
+ Performs analysis of suspected malicious code and other software or programs and provides written or verbal analysis to management.
+ Analyzes client and customer needs as required and provides clear and concise reports to leadership.
+ Works closely with management on assigned projects from inception through implementation ensuring adequate internal communication and user involvement is maintained.
**QUALIFICATIONS**
Eight (8) years of encryption technologies/algorithms, digital forensics, network topologies, and access controls experience or equivalent combination of educated and experience required.
**Skills & Knowledge**
+ Knowledge of TCP/IP services
+ Knowledge of audit and compliance
+ Knowledge of vulnerability management
+ Knowledge of penetration testing
+ Knowledge of various operating systems
+ Knowledge of desktop productivity software
+ Knowledge of Carbon Black Protection
+ Knowledge of Symantec Endpoint Protection and host data loss prevention
+ Knowledge of information technology security frameworks
+ Excellent oral and written communication skills, including presentation skills
+ PC literate, including Microsoft Office products
+ Analytical and interpretive skills
+ Strong organizational skills
+ Excellent interpersonal skills
+ Ability to create and complete comprehensive, accurate and constructive written reports
+ Ability to work in a team environment
+ Ability to meet or exceed Performance Competencies
**Proficient in Snyk for Application Security:** Demonstrated expertise in integrating Snyk into CI/CD pipelines to proactively identify and remediate vulnerabilities in open-source dependencies, container images, and infrastructure as code. Skilled in leveraging Snyk's developer-first tools to maintain secure codebases, enforce security policies, and ensure compliance with industry standards. Experienced in configuring automated scans, interpreting results, and collaborating with development teams to implement effective remediation strategies, contributing to a robust DevSecOps culture.
**TAKING CARE OF YOU**
+ Career development and promotional growth opportunities
+ A diverse and comprehensive benefits offering including medical, dental vision, 401K, PTO and more
\#LI-TS1
Work environment requirements for entry-level opportunities include -
Physical: Computer keyboarding
Auditory/visual: Hearing, vision and talking
Mental: Clear and conceptual thinking ability; excellent judgement and discretion; ability to meet deadlines
Travels as required
The statements contained in this document are intended to describe the general nature and level of work being performed by a colleague assigned to this description. They are not intended to constitute a comprehensive list of functions, duties, or local variances. Management retains the discretion to add or to change the duties of the position at any time.
Sedgwick is an Equal Opportunity Employer and a Drug-Free Workplace.
**If you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, consider applying for it anyway! Sedgwick is building a diverse, equitable, and inclusive workplace and recognizes that each person possesses a unique combination of skills, knowledge, and experience. You may be just the right candidate for this or other roles.**
**Sedgwick is the world's leading risk and claims administration partner, which helps clients thrive by navigating the unexpected. The company's expertise, combined with the most advanced AI-enabled technology available, sets the standard for solutions in claims administration, loss adjusting, benefits administration, and product recall. With over 33,000 colleagues and 10,000 clients across 80 countries, Sedgwick provides unmatched perspective, caring that counts, and solutions for the rapidly changing and complex risk landscape. For more, see** **sedgwick.com**
$94k-122k yearly est. 60d+ ago
Senior Security Analyst (L2)
Lumifi Cyber
Cyber security analyst job in Scottsdale, AZ
L2 SecurityAnalyst
Full-Time, Exempt
We are looking for a Senior SecurityAnalyst (L2) to join the Lumifi Cyber SOC team. Senior SecurityAnalysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ.
Primary Duties
Triage alerts and determine if further investigation or action is required by the customer
Assist customers with the investigation and response of incidents throughout the incident response process
Perform investigations of customer requests and be able to provide further contextual information along with recommended actions
Proactively threat hunt using network and host data within customer environments
Mentor junior analysts
Required Qualifications
Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks
Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors
Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.)
Strong understanding of incident response methodologies and reporting
Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.)
Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers
Preferred Qualifications
Minimum of 3+ years of experience performing triage/incident response in enterprise environments
Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts
Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP)
Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis
A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving
Ability to manage projects to completion both individually and in a group
Benefits Include:
Health Insurance 80% paid by employer
Dental Insurance 80% paid by employer
Vision Insurance 80% paid by employer
Self- Managed vacation leave
Paid sick leave
Paid holiday leave
All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer.
Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
$87k-119k yearly est. Auto-Apply 60d+ ago
F-16 MTT Information Systems Security Officer (ISSO)
Trident Military Systems
Cyber security analyst job in Mesa, AZ
Job Description
Trident Military Systems is seeking an Information Systems Security Officer (ISSO) to support Air National Guard (ANG) F-16 Mission Tactics Trainer (MTT) simulators in Mesa, AZ. The successful individual will have an excellent knowledge of the Risk Management Framework (RMF), the documentation, roles and responsibilities, and how to work on a team pursuing cybersecurity practices compliant with policy, regulation, and best practices. Work will be assigned based on available resources among the teammates, prioritization from the Air Force customer, and recurring deliverables based on contractual obligations and clearly assigned with deadlines.
Location: Mesa, AZ
Required Travel: 0 - 10%
What you will do
Participate as a cyber team member as they plan, manage and execute all RMF requirements at the Mesa, AZ site to include:
Risk management strategy, policies, awareness/trainings, assessments, continuous monitoring, authorizations, implementations, and remediation
Manage life-cycle cybersecurity risk to Air Force information systems Ensure F-16 MTT IT assets are assessed for cybersecurity risk to the USAF, subsequent residual risk associated with security controls implementation is assessed and mitigated with Plans of Actions and Milestones (POA&M), aligns with DODI 8510.01, and as documented in the RMF security authorization package for USAF IT
Ensure compliance of internal policies and procedures; and develop, review and complete interconnectivity requirement documents
Perform the primary duties and responsibilities of an Information System Security Officer (ISSO) for F-16 MTT simulators
Knowledge of RMF process, DoDI 8500.01, eMASS and/or other governing documentation
Work directly with the ISSM/FSO to ensure program and overall security needs are met
Assist in security configuration/STIG validation of all operating systems and network devices
Collaborate to ensure all systems are compliant and in scope of current accreditation
Perform audits against approved HW/SW lists to ensure system compliance with approved baseline
Review ACAS/Nessus vulnerability scans
Ensure data backups are occurring in accordance with the continuous monitoring policy
Review audit logs in Splunk to detect suspicious or unauthorized activity
Assist in authoring and editing Cybersecurity related documents (e.g., ISA, SLA, CIE)
Other duties as assigned
What you must have
9 years relevant experience with Bachelors in related field; 7 years relevant experience with Masters in related field; 4 years relevant experience with PhD or Juris Doctorate in related field; or High School Diploma or equivalent and 13 years relevant experience
Certified Information Assurance Technical (IAT) Level II
Knowledge of NIST, RMF, and DoD security requirements and guidelines
Proven experience in risk assessment, security incident management, and security awareness training
Excellent written and verbal communication skills
Operating knowledge of Windows/Linux operating systems
Ability to work in a team environment and independently
Must be a US citizen, currently hold and able to maintain a Secret Security Clearance
Preferred Requirements
Experience with software/tools:
Nessus/ACAS
Splunk
ePolicy Orchestrator
SCAP Compliance Checker (SCC)
STIG Viewer
Prior experience working on DoD contracts
Physical Requirements
The physical requirements listed here are representative of those that are needed by an employee to successfully perform essential job duties. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential duties.
Must be able to lift and/or move up to 40 pounds
Must be able to walk and/or climb stairs and/or ladders into a simulator or airplane cockpit
Must be able to stoop, bend, and crawl on top or under simulators
Must be able to distinguish colors
Must have ACTIVE DoD SECRET CLEARANCE with the ability to upgarde to SAP/SAR. Must be a US CITIZEN.
$76k-107k yearly est. 20d ago
Information Security Analyst 2
Rogers Corporation 4.8
Cyber security analyst job in Chandler, AZ
This role will provide information security direction, configuration, and operational support of key security tools, as well as broader interactions with enterprise staff to help mitigate security risks and advise the organization on security best practices.
Essential Functions:
- Defend against and/or mitigate system vulnerabilities related to network infrastructure devices and boundary defense through network and endpoint solution configuration.
- Support data and asset risk.
- Use data collected from a variety of cyber defense tools (e.g., Intrusion Detection System (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within specific environments for the purposes of mitigating threats.
- Address various security problems across a disperse set of assets.
- Other duties as assigned.
Qualifications:
- Bachelor's Degree in Computer Science, Computer Information Systems or related field. May consider equivalent work experience in lieu of degree
- 2+ years of progressive cybersecurity experience
- Sound comprehension of Information Security practices, concepts, and theories for traditional Information Technology (IT) assets
Full-Time
$81k-124k yearly est. 24d ago
IT Security Engineer (Tempe)
Arizona Department of Education 4.3
Cyber security analyst job in Tempe, AZ
IT Security Engineer (Tempe) Type: Charter Job ID: 131811 County: East Maricopa Contact Information: ASU Preparatory Academy 1130 E University Dr. #230 Tempe, Arizona 85044 District Website Contact: Kathy Piippo Phone: ************ Fax: District Email
:
Salary Range:
$60,000.00 - $69,500.00 USD annually.
As part of Arizona State University's charter to provide access and excellence, ASU Preparatory Academy (ASU Prep) shares this commitment by demonstrating all students can achieve at the highest levels, regardless of their background. To scale our current impact, ASU Prep is advancing a major expansion program taking fundamental responsibility for the communities we serve.
The IT Security Engineer provides technical support for the school network infrastructure, ensuring reliable connectivity, server operations, and user access across all campuses. This position plays a key role in maintaining stable, secure, and efficient network systems to support teaching, learning, and administrative operations.
QUALIFICATIONS:
* Bachelor's degree in Computer Science, Information Technology or a related field, or an Associate's Degree, preferred.
* Certifications such as Security+, Cysa+, CISSP or equivalent are strongly preferred.
* 3+ years of progressive IT experience, including networking and infrastructure support.
* 3+ years of experience delivering excellent customer service.
* Knowledge of basic networking principles and troubleshooting.
* Understanding of cybersecurity best practices, CIPA/FERPA compliance, and basic IAM principles.
* Active AZ Department of Public Safety (DPS) IVP Fingerprint Clearance Card.
* Any equivalent combination of experience, training and/or education from which comparable knowledge, skills and abilities may be considered.
DUTIES AND RESPONSIBILITIES:
* Work closely with IT teams, developers, and management to embed security into all aspects of technology operations.
* Implement a user awareness program to reduce phish prone behavior among staff and students.
* Conduct risk assessments and develop mitigation strategies to reduce exposure.
* Manage and maintain security tools like antivirus software, SIEM (Security Information and Event Management) systems, and endpoint protection platforms.
* Identify, design and implement security solutions like IDS, EDR, OS hardening, patch management, etc.
* Proactively monitor network/software security events and assist teams to troubleshoot and mitigate.
* Lead efforts to detect and manage vulnerabilities across the organization.
* Conduct security audits to uncover weaknesses.
* Collaborate with teams and leadership to develop and disseminate security policies, standards, and procedures.
* Support content filtering tools and ensure compliance with CIPA, FERPA, and cybersecurity policies.
* Maintain detailed documentation for security related activities.
* Participate in IT planning sessions to align infrastructure decisions with instructional and organizational needs.
* Coordinate with service providers and vendors including Arizona State University Enterprise Technology for security related advanced troubleshooting of network issues.
* Additional duties will be assigned as needed.
KNOWLEDGE, SKILLS AND ABILITIES:
* Strong diagnostic and troubleshooting skills.
* Effective communication and interpersonal skills, especially in high-stakes or customer-facing scenarios.
* Strong organizational skills and a solution-focused attitude.
* Knowledge of common information systems, connectivity, integrations from a security perspective.
* Effective organizational skills.
* Effective written and oral communication.
* Demonstrated knowledge in Edtech is a plus.
* Demonstrated knowledge with common e-learning tools and platforms is a plus.
PHYSICAL DEMANDS:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is frequently required to stand and talk or hear and sometimes walk and sit. The employee must use hands, arms and fingers to input data, handle, feel or reach. While performing the duties of this job, the employee may occasionally push or lift up to 30 lbs. such as boxes, supplies, etc. Specific vision abilities required by this job include close vision such as to read handwritten or typed material, and the ability to adjust focus, close vision, distance vision, color vision, peripheral vision and depth perception.
LOCATION:
UCENT - Hybrid
TRAVEL:
Travel required to all sites, meetings, trainings and/or conferences and occasional overnight travel may be required.
This job description is subject to change at any time.
Other:
What about learning drives us to do more than deliver the lesson? Maybe we're overachievers. Or maybe we just know what real impact looks like. Each one of us has seen passion win over fear, vision become relentless focus and belief in human potential make it all the way to the finish line.
Our mission is to design new models for educational success and raise academic achievement for all learners. Are you ready to find a career with a company whose mission, vision, and values align with yours? Can you see yourself fitting into this mission with us?
For more information please visit: ********************************
$60k-69.5k yearly 15d ago
Cyber Security Analyst - Vulnerability Management
Runbuggy OMI, Inc.
Cyber security analyst job in Tempe, AZ
About Us: RunBuggy is the most technically advanced automotive logistics platform on the market. Period. Backed by Porsche Ventures and Hearst Ventures, RunBuggy is transforming the way cars move. Our cutting-edge technology is trusted by some of the largest OEMs, captive finance companies, and automotive lenders in the world to streamline vehicle transportation at scale.
RunBuggy's end-to-end platform connects car shippers and haulers in real time - eliminating the friction of traditional load boards and costly custom software. For shippers, RunBuggy integrates directly into existing management systems, reducing transportation costs and accelerating delivery timelines. For transporters, we offer a smarter, more profitable way to find, accept, and manage loads - all from a single app.
Since launching in 2019, RunBuggy has grown to over 150 team members, facilitated the movement of hundreds of thousands of vehicles, and attracted tens of thousands of transporters across the U.S.
We're not just building a better logistics platform - we're redefining the future of automotive transportation.
About the Role:
The CybersecurityAnalyst - Vulnerability Management plays a critical role in safeguarding our products and supporting infrastructure. This position is responsible for identifying and mitigating emerging threats, managing product-related security issues, and leading the vulnerability management program across the product lifecycle.
Candidates must be authorized to work in the US for any employer and must be within a commutable distance of Tempe, AZ. Please do not apply if you do not meet these requirements.
Candidates who include a cover letter explaining how their experience aligns with the position will receive priority in the review and interview process.
Requirements
What You Will Be Doing::
* Responsible primarily for day-to-day product vulnerability management services and supporting infrastructure.
* Ensure product vulnerabilities are identified, prioritized, and remediated, particularly by reducing the backlog of existing product vulnerabilities.
* Ensure that releases and product changes are reviewed and approved by the Security Team.
* Collaborate with engineering teams to understand product vulnerability management needs and assist with remediation and mitigation strategies.
* Build relationships with various teams and technology owners to decrease the likelihood of friction or roadblocks.
* Schedule and assist with remediation efforts from external and internal penetration tests and assessments.
* Perform analysis of scan results, assign risk ratings for product vulnerabilities, and help prioritize remediation efforts.
* Help establish and operationalize key performance indicators, reporting, and metrics to track the maturity of the product vulnerability program.
* Oversee and help execute manual code review of key product components for security improvements.
* Help drive the security and privacy product requirements process across RunBuggy's product lines, implementing security early in the product roadmap.
* Execute on an agreed-upon risk prioritization framework in conjunction with engineering, product, development, operations, and the Sr. Director of Security and Audit who outlines the highest risk items for action to improve RunBuggy's product security.
* Collaborate with product and sales engineering teams for hardening applications, APIs, and micro services with security built into the services.
* Help influence new deployment models, including containers, cloud platforms, SaaS, etc., with security built into the platform.
* Help drive identification of software security findings throughout the lifecycle and the reduction of risk, working with relevant stakeholders.
* Maintain current knowledge of the RunBuggy threat landscape, including attacker tactics, techniques, and procedures.
* Other duties as assigned.
What You Bring to the Team by Way of Skills and Experience:
* Demonstrated understanding of cybersecurity threats and vulnerability management and related IT domains.
* 3+ years' relevant experience as a Vulnerability Analyst required.
* A degree in Computer Science, IT, Systems Engineering, or a cybersecurity-related qualification is preferred.
* Experienced as a securityanalyst supporting product vulnerability management processes in a cloud environment, such as AWS, EKS, Docker, etc.
* Hands-on experience with vulnerability management tools such as AWS Inspector, SonarCube, etc.
* Knowledge of containerized web application architecture and related vulnerabilities and issues.
* Deep understanding of vulnerability management, including risk assessment and remediation planning.
* Knowledge of the latest trends and awareness of current hacking techniques and cybercrime.
* Understanding of secure cloud network architectures, including CloudFormation, Kubernetes, and MongoDB.
* Experience with software development and delivery for a SaaS company.
* Familiarity with cybersecurity frameworks, such as NIST CSF.
* Attention to detail, QA skills, the ability to "think forward," adept at problem solving and addressing issues and complications before they expand.
Certificates, Licenses, and/or Registrations:
* Professional certifications such as Certified Ethical Hacker (CEH), Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified Cloud Security Professional (CCSP) are preferred.
What is in it for You and Why you Should Apply:
* Market-competitive pay based on education, experience, and location.
* Highly competitive medical, dental, vision, Life w/ AD&D, Short-Term Disability insurance, Long-Term Disability insurance, pet insurance, identity theft protection, and a 401(k) retirement savings plan.
* Employee wellness program.
* Employee rewards, discounts, and recognition programs.
* Generous company-paid holidays (12 per year), vacation, and sick time.
* Paid paternity/maternity leave.
* Monthly connectivity/home office stipend if working from home 5 days a week.
* A supportive and positive space for you to grow and expand your career.
Pay Range Disclosure:
The advertised range represents the expected pay range for this position at the time of posting based on education, experience, skills, location, and other factors.
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
RunBuggy is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination, harassment, and retaliation on the basis of race, color, religion, sex (including gender identity and sexual orientation), pregnancy, parental status, national origin, age, disability, genetic information, or any other status protected under federal, state, or local law.
Applicants must be currently authorized to work in the United States.
Please, no agencies.
Salary Description
$90k/yr.-$110k, DOE
$90k-110k yearly 21d ago
Cyber Security Analyst
Washington Elementary School District 4.6
Cyber security analyst job in Phoenix, AZ
Pay Grade: PP (Non-Exempt Support Staff Salary System) Department: Management Information Systems (MIS) Accountable To: Administrator of MIS FLSA Status: Non-Exempt Calendar: 261 Days Under general direction, incumbent is responsible for protecting the school district's
technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites.
Essential Functions:
* Threat detection and analysis: Actively monitor security alerts from various sources, including Security Information and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc.
* Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts.
* Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls.
* Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them.
* Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them.
* Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies.
* User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures.
* Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment.
* Performs other job related duties as assigned.
Required Qualifications:
To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary.
* High School diploma or equivalent (G.E.D.) prior to being hired;
* Valid Arizona Department of Transportation Driver's License;
* Minimum of one year of experience in information security, network security, or a related technology field.
* Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services.
* Experience with security tools, including SIEM, antivirus software, and intrusion detection systems.
* Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card.
Preferred Qualifications:
It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position.
* Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise.
* Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP.
* Experience working in an educational or public sector environment.
* Knowledge of emerging security technologies and trends.
* Experience administering a Cisco Local and Wide area networking environment;
* Experience with border network security devices such as Email filters and Firewalls;
* Experience administering Windows Server and Active Directory.
* Experience with VMWare and Veeam (or other backup and recovery platform)
Knowledge and Skills Required:
To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Skills required, but not limited to, for this position include:
* Ability to work independently and collaboratively in a team environment.
* Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions.
* Familiarity with scripting languages like Python or PowerShell for automating security tasks.
* Knowledge of common security frameworks, such as NIST.
* Understanding of networking concepts, firewalls, and data encryption techniques.
* Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences.
* Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities.
* Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack.
Physical Requirements:
The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus.
Working Conditions:
The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels.
The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
$48k-60k yearly est. 33d ago
Senior Security Analyst (L2)
Lumifi Cyber
Cyber security analyst job in Scottsdale, AZ
Job Description
L2 SecurityAnalyst
Full-Time, Exempt
We are looking for a Senior SecurityAnalyst (L2) to join the Lumifi Cyber SOC team. Senior SecurityAnalysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ.
Primary Duties
Triage alerts and determine if further investigation or action is required by the customer
Assist customers with the investigation and response of incidents throughout the incident response process
Perform investigations of customer requests and be able to provide further contextual information along with recommended actions
Proactively threat hunt using network and host data within customer environments
Mentor junior analysts
Required Qualifications
Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks
Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors
Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.)
Strong understanding of incident response methodologies and reporting
Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.)
Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers
Preferred Qualifications
Minimum of 3+ years of experience performing triage/incident response in enterprise environments
Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts
Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP)
Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis
A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving
Ability to manage projects to completion both individually and in a group
Benefits Include:
Health Insurance 80% paid by employer
Dental Insurance 80% paid by employer
Vision Insurance 80% paid by employer
Self- Managed vacation leave
Paid sick leave
Paid holiday leave
All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer.
Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
Powered by JazzHR
6oXedfgOJk
$87k-119k yearly est. 31d ago
Information Security Analyst 2
Rogers Corporation 4.8
Cyber security analyst job in Chandler, AZ
This role will provide information security direction, configuration, and operational support of key security tools, as well as broader interactions with enterprise staff to help mitigate security risks and advise the organization on security best practices.
Essential Functions:
* Defend against and/or mitigate system vulnerabilities related to network infrastructure devices and boundary defense through network and endpoint solution configuration.
* Support data and asset risk.
* Use data collected from a variety of cyber defense tools (e.g., Intrusion Detection System (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within specific environments for the purposes of mitigating threats.
* Address various security problems across a disperse set of assets.
* Other duties as assigned.
Qualifications:
* Bachelor's Degree in Computer Science, Computer Information Systems or related field. May consider equivalent work experience in lieu of degree
* 2+ years of progressive cybersecurity experience
* Sound comprehension of Information Security practices, concepts, and theories for traditional Information Technology (IT) assets
How much does a cyber security analyst earn in Flagstaff, AZ?
The average cyber security analyst in Flagstaff, AZ earns between $65,000 and $121,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Flagstaff, AZ