Cyber Security Engineer (W2 Contract only)
Cyber security analyst job in Atlanta, GA
Role: Cybersecurity Engineer III
Contract
Job Responsibilities / Typical Day in the Role
Implement design reviews to evaluate security controls
Identify and communicate opportunities to enhance the security posture of Client
Build and / or manage enterprise security platforms effectively
Communicate effectively across all levels of management to articulate Client security goals and vision.
Identify and communicate opportunities to enhance the security posture of Client
Build and / or manage enterprise security platforms effectively (SAAS, on premise or in Cloud)
Communicate effectively across all levels of management to articulate Client security goals and vision.
Have a team player mentality; strive to contribute to team cohesion however can work independently if the need arises
Plan, design, engineer and implement security-related technologies
Understanding technical security issues, their implications within Client business units and able to effectively communicate them to management and other business leaders.
Configure, troubleshoot, and maintain security infrastructure - including software and hardware in cloud environments, as well as on-premises.
Conduct security audits and assessments to regularly determine the effectiveness of security platforms and identify areas of improvement.
Host and operating systems hardening, auditing, monitoring and logging with appropriate security controls and best practices while meeting security best practices and business goals
Research and explore emerging security technologies and determine their appropriate use within the company.
Prepare, document, and create standard operating procedures and protocols.
Crosstrain and mentor other team members as needed
Must Have Skills / Requirements
Implementing advanced cyber security technology in a complex environment
5+ years of experience; Hands-on experience in security engineering, hands-on experience in building, designing, and maintaining enterprise security tools.
Scripting experience (using Python, Go, or other equivalent languages)
5+ years of experience.
Hands-on Experience with automation technologies
3+ Years of experience; Terraform, Ansible, CloudFormation, etc.
Linux Experience.
5+ years of experience; Ability to construct and maintain complex network infrastructures.
Technology requirements:
Engineer and administer security platforms including SIEM/SOAR systems, endpoint detection and response, vulnerability management, anomaly detection, and cloud analysis.
Experience in managing the Brinqa vulnerability management platform and experience with Groovy programming language
Must have 5+ years of scripting experience (using Python or other equivalent languages)
Hands-on Experience in public cloud infrastructures like AWS (Amazon Web Services)
Nice to Have Skills / Preferred Requirements
Security and Cloud certifications are a plus. (CISSP, Splunk Admin, AWS Solution architect).
Media/entertainment or distributed global network experience.
Soft Skills
Hands-on technical experience with networking and computing system architectures, specifically, the security aspects thereof.
Thorough understanding of information security principles, techniques, principles, policy frameworks, and best practices
Hands-on technical experience with compliance and regulatory frameworks and how they affect architecture designs and review
Senior Cyber Security Analyst -(ISSM)
Cyber security analyst job in Aiken, SC
DNI is on the lookout for a Senior Cyber Security Analyst - Information Systems Security Manager (ISSM) to deliver expert guidance in Information Systems Security and cybersecurity support for the Enterprise Information Services at the Department of Energy (DOE) Savannah River Operations Office (DOE-SR), located at the Savannah River Site (SRS) in Aiken, SC.
Requirements
Reports to the Chief Information Security Officer (CISO) and Program Manager.
Oversee the Authority to Operate (ATO) lifecycle, manage risk assessments, develop and monitor Plan of Action and Milestones (POAMs), ensuring compliance with security standards and timely mitigation of organizational boundary security risks.
Actively participate in the bi-weekly accreditation boundary meetings and keep the AODR informed of any changes/updates to eRAMS/POA&Ms/STAR items or any new VPM and CM issues that may arise.
Provide technical and procedural cyber security advice to DOE, associate contractor partners, and Industrial Control Systems (ICS) teams as necessary.
Oversee operational information systems security implementation programs.
Coordinate with Information System Security Officer (ISSO) or PSO on approval of External Information Systems (e.g. guest systems, interconnected system with another organization).
Oversee ISSOs to ensure they follow established policies and procedures and timelines.
Ensure CM policies and procedures for authorizing the use of hardware/software on an IT system are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the AODR prior to the addition, change or modification. ISSM shall have authority to veto any proposed change they feel is detrimental to security in boundaries under their purview. Appeals on an ISSM/ISSO veto may be taken to the AODR.
Ensure approved procedures are used for sanitizing and releasing system components and media as necessary.
Ensure proper measures are taken when cyber security incident or vulnerability is discovered.
Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures.
Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.
Manage, maintain, and execute the information security continuous monitoring plan.
Ensure a record is maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the AODR; and assess changes to the system, its environment, and operational needs that could affect the security authorization.
Other related tasks as assigned.
Support information technology (IT) security goals and objectives and reduce overall organizational risk; Advise senior management (e.g., Chief Information Security Officer [CISO] and Chief Information Officer [CIO] on risk levels and security posture.); Advise appropriate senior leadership of changes affecting the organization's cybersecurity posture; Communicate the value of information technology (IT) security.
Knowledge, Skills, and Abilities:
Highly organized individual with exceptional communication skills, ensuring all stakeholders are consistently informed and updated as required.
Excellent written and oral communication skills (writing samples may be requested).
Attention-to-detail is critical, proven ability to look closely at your work to identify and correct errors, spot and improve weaknesses and produce a near-perfect end-result.
Ability to identify problems, brainstorm and analyze answers, and implement the best solutions.
Ability to develop and review security related procedures or processes and reports.
Demonstrated ability to provide clear, precise, and factual information to senior leaders, team members, and external stakeholders.
Capable of attending all customer-required meetings and promptly providing responses as requested.
Familiarity with applicable regulations affecting Cyber Security NIST 800 Series Standards.
Clearance:
Must possess (or be able to obtain) a “Q” level security clearance.
Education:
A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for education on a year-for-year basis.
Experience:
7+ years in IT security or related field.
Authority to Operate Life Cycle (ATO), Risk Management, POAMS & Milestones
Certification:
Highly desired certifications:
Certified Information System Security Professional (CISSP)
Certified Information Security Manager (CISM)
Benefits
Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental
Matching 401K
Short- and Long-Term Disability
Pet Insurance
Professional Development/Education Reimbursement
Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
Information Security Analyst - Lead
Cyber security analyst job in Atlanta, GA
Immediate need for a talented Information Security Analyst - Lead . This is a 09+ months contract opportunity with long-term potential and is located in Atlanta,GA(Hybrid). Please review the job description below and contact me ASAP if you are interested.
Job ID:25-93807
Pay Range: $68 - $68.61/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).
Key Responsibilities:
Act as a liaison between cybersecurity metric owners, data engineers, and governance teams to ensure accurate and timely metric development.
Facilitate metric working sessions to define metric name, definition, calculation, system of record, and critical data elements (CDEs).
Support the documentation and validation of metric logic and data lineage.
Coordinate and lead standing meetings to provide updates, manage timelines, and escalate blockers or data challenges.
Review and validate data quality and completeness of metric inputs in coordination with data engineers.
Support the development of root cause commentary and trend analysis for metrics that breach established thresholds.
Partner with control and process owners to align metrics with applicable frameworks (e.g., NIST CSF, CIS, FFIEC).
Prepare clear, concise executive-level summaries and presentations on metric performance and risk trends.
Maintain oversight of multiple metrics in different stages of the build lifecycle, ensuring governance and consistency.
Contribute to continuous improvement of the metrics program, including standardization, automation, and data quality enhancements.
Key Requirements and Technology Experience:
Key Skills;Metrics governance/Risk Metrics/Performance Metrics .
Bachelor's degree or five years of related experience or an equivalent combination of education and experience
In-depth knowledge of principles, practices, theories, and/or methodologies associated with the professional discipline (e.g., information technology, project management, finance, risk management, etc.)
Understands foundational concepts of other related professional disciplines. Experience managing small projects
Ability to interpret and explain complex information to a range of audiences and build consensus among different stakeholders.
Ability to provide direction and mentor less experienced teammates
Strong organizational skills with the ability to manage multiple priorities simultaneously.
Excellent written and verbal communication skills, including experience drafting executive summaries.
Proficiency in Microsoft Excel, PowerPoint, and collaboration tools (e.g., Teams, SharePoint).
5-7 years of experience in cybersecurity, risk management, technology project coordination, or data analytics.
Familiarity with cybersecurity domains (e.g., vulnerability management, DLP, IAM, cloud security, incident management).
Working knowledge of risk and performance metric design, including KRIs, KPIs, and operational indicators.
Experience gathering and documenting business requirements and translating them into actionable data or metric logic.
Basic understanding of SQL or ability to read data dictionaries and data mappings.
Exposure to cyber control frameworks such as NIST CSF, ISO 27001, or CIS.
Exposure to Agile or iterative project delivery methods.
Cybersecurity/Risk management Vulnerability management
Stakeholder engagement .
Our client is a leading Financial Industry, and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration.
Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, colour, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
By applying to our jobs you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here.
Information Security Engineer
Cyber security analyst job in Atlanta, GA
Essential Duties and Responsibilities:
Working with security tools and API integration work including writing scripts and development of automation around detection and remediation activities.
Given the growing nature of the organization, you will work closely with other internal and external groups and may also assist in other security activities as necessary in response to assessments and/or audits.
Implementing and operating vulnerability management and security log collection and monitoring tools, analyzing data from those tools and providing recommendations for security improvements to existing processes and technology, and participating in and leading incident response efforts.
Identification and remediation of OS and network security weaknesses and vulnerabilities
Respond to internal and/or external reports, events, and incidents (e.g. scanning, hacking, phishing)
Qualifications:
Bachelor's in computer science (or equivalent) degrees
Minimum of 5+ years of documented information security work experience
At least 5+ years of system/network security experience, including threat modeling, threat assessments, risk identification techniques, penetration testing
Detailed knowledge of network and Web related protocols (e.g., TCP/IP, IPSec, HTTP, SSL, routing protocols)
Atalla HSM experience (knowledge of transaction encryption) and Imperva, SecureSphere, WAF, and DB experience.
Experience with planning, deployment, and operation of large enterprise security management tools such as IDS/IPS (network and host), advanced anti-malware (network and endpoint), DLP, encryption, anti-virus, firewalls, identity management, NAC, MDM etc.
Demonstrated experience with malware remediation.
Experience in one or more technical forensic tools
Experience with Splunk from systems deployment and endpoint configuration to log analysis and interpretation.
Ability to identify signs of intrusion or infection on a variety of systems.
Expertise in administration of enterprise OS's
Ability to move seamlessly between a hacker / attacker mindset and a security engineer / defender mindset
Hands on experience with Nmap, vulnerability scanners, ZAP, Kali, MetaSploit, Wireshark, Kismet, Aircrack-ng
Penetration testing experience
Application and database security experience, including code reviews
Network and security engineering experience, including log and network traffic capture analysis
IT security certifications (SANS GIAC, CISSP, CCNA Security, CCNP Security, RHCSA or RHCE, MCP or MCSE ) are a plus
Experience with advanced malware technologies is a plus.
MerchantE does not provide visa sponsorship for this position. Candidates must be legally authorized to work in the United States without current or future sponsorship.
Application Security Engineer
Cyber security analyst job in Atlanta, GA
Apex Systems is looking to hire a Application Security Engineer for our financial client we support.
Qualified candidates will have the following experience and skills:
Strong experience with application security tools: DAST (e.g., Burp Suite, OWASP ZAP), SAST (e.g., Checkmarx, Veracode), and SCA (e.g., Black Duck, Snyk).
Hands-on experience with container security and deployment of scanning tools (e.g., Wiz, Prisma, Aqua Security).
Proficiency in scripting languages (Python, Bash, or PowerShell) for automation and tool integration.
Deep understanding of secure software development lifecycle (SDLC) and common vulnerabilities (OWASP Top 10).
Ability to troubleshoot complex scanning issues and optimize configurations for accuracy and performance.
Strong analytical skills for vulnerability triage and risk prioritization.
Excellent communication skills for consulting with development teams and explaining technical findings.
Locations: MUST BE LOCATED IN ONE OF THE FOLLOWING STATES TO BE CONSIDERED - NC, SC or GA
Onsite expectation: REMOTE
Pay range: $80-$85/HR w2
Note: We are unable to consider C2C or third-party submissions.
If you are interested, please apply here or email an updated copy of your resume to ************************
Apex Benefits Overview: Apex offers a range of supplemental benefits, including medical, dental, vision, life, disability, and other insurance plans that offer an optional layer of financial protection. We offer an ESPP (employee stock purchase program) and a 401K program which allows you to contribute typically within 30 days of starting, with a company match after 12 months of tenure. Apex also offers a HSA (Health Savings Account on the HDHP plan), a SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions, a corporate discount savings program and other discounts. In terms of professional development, Apex hosts an on-demand training program, provides access to certification prep and a library of technical and leadership courses/books/seminars once you have 6+ months of tenure, and certification discounts and other perks to associations that include CompTIA and IIBA. Apex has a dedicated customer service team for our Consultants that can address questions around benefits and other resources, as well as a certified Career Coach. You can access a full list of our benefits, programs, support teams and resources within our ‘Welcome Packet' as well, which an Apex team member can provide.
EEO Employer
Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at ******************************** or ************.
Apex Systems is a world-class IT services company that serves thousands of clients across the globe. When you join Apex, you become part of a team that values innovation, collaboration, and continuous learning. We offer quality career resources, training, certifications, development opportunities, and a comprehensive benefits package. Our commitment to excellence is reflected in many awards, including ClearlyRated's Best of Staffing in Talent Satisfaction in the United States and Great Place to Work in the United Kingdom and Mexico.
Information Security Engineer
Cyber security analyst job in Atlanta, GA
Infosec Engineer - GRC Focus
Hybrid - Atlanta, GA
Contract - 6-month + extensions
We're looking for a hands-on Information Security Engineer with deep GRC expertise to join a leading financial organization. This role combines technical security engineering with governance, risk, and compliance, supporting enterprise-wide compliance initiatives and automation programs.
About the Role:
You'll work across security and compliance domains, implementing and automating controls, integrating GRC platforms, and embedding compliance into enterprise systems. You'll support ISO 27001, NIST, SOC 2, SOX, PCI DSS, GDPR, and HIPAA programs while collaborating with security, IT, and business teams.
Responsibilities:
Lead implementation and automation of GRC platforms (RSA Archer, ServiceNow GRC, BitSight, ProcessUnity, Vanta)
Develop and maintain integrations, scripts, and automation using Python, PowerShell, JavaScript, SQL, or other relevant tools
Support SIEM monitoring, incident response, and technical controls aligned with compliance frameworks
Embed risk and compliance controls into enterprise systems and IT processes
Assist with audits, regulatory assessments, and reporting to demonstrate governance effectiveness
Drive improvements in risk management processes through technology and automation
Requirements:
5+ years' experience in information security engineering or technical GRC roles
Hands-on experience with GRC platforms and automation (RSA Archer, ServiceNow, BitSight, etc.)
Coding/scripting experience (Python, PowerShell, JavaScript, SQL) for integrations and automation
Solid understanding of regulatory and compliance frameworks (ISO 27001, NIST, SOC 2, SOX, PCI DSS, GDPR, HIPAA)
CISSP or equivalent security certification preferred
Proven track record of embedding compliance into enterprise systems and leading automation initiatives
If you're an experienced Infosec Engineer with a GRC background, this is a unique opportunity to combine hands-on engineering with compliance and risk leadership.
Security Analyst
Cyber security analyst job in Columbia, SC
Title: Security Analyst - Project Lead (8780)
Work Mode: Hybrid (3 days onsite per week required)
Contract Duration: 12 months (Extension possible)
Interview Process: 1 round, virtual video interview required
Candidate Requirement: Candidate must be a current South Carolina resident. No relocation allowed.
Scope of Work
The resource will plan, coordinate, evaluate, document, and report on IRS Pub 1075 compliance activities, including security controls, corrective action plans (CAPs), artifacts, SCSEM requirements, and follow-up remediation.
Key Responsibilities
• Lead, coordinate, and support preparation efforts for an IRS Safeguard Review.
• Review Corrective Action Plans (CAPs) for effectiveness and determine compliance readiness.
• Review SSR, SSPs, and SSAs to ensure alignment with IRS Publication 1075.
• Identify relevant IRS Safeguard Computer Security Evaluation Matrix (SCSEM) controls and assess agency compliance.
• Provide technical advice for remediation of non-compliant SCSEM control areas.
• Assist and coordinate follow-up actions after the Safeguard Review, including CAP development for findings.
• Provide expert analysis of proposed technical solutions to ensure compliance with IRS Pub 1075.
• Conduct research and recommend security improvements for systems and infrastructure.
• Use the agency's established project management methods for planning, coordination, communication, and reporting.
• Communicate effectively with both technical and non-technical staff, including federal and state stakeholders and executive leadership.
Required Skills (Must Have)
• 5+ years of expert-level experience as a Security Analyst, including risk assessment, vulnerability management, and incident response.
• 3+ years of experience preparing for and actively supporting at least one IRS Safeguard Review at a state agency.
• 3+ years of experience working with and applying IRS SCSEM requirements including implementation, compliance assessment, and documentation.
• 3+ years of experience with IRS Publication 1075 (Rev. 11-2021) compliance.
• Strong proficiency with Microsoft Office, SharePoint, and Microsoft Teams.
• Excellent oral and written communication skills across multidisciplinary teams.
• Knowledge of applicable IT security standards (e.g., ISO, IEEE).
Preferred Skills
• Experience with Child Support Enforcement systems or knowledge of Child Support program operations and objectives.
• Experience with federal or state regulatory compliance frameworks such as FISMA, NIST, or IRS Publication 1075.
• Experience developing and maintaining technical documentation and audit support for safeguard reviews, security audits, and compliance assessments.
Cloud Security Engineer - SRE
Cyber security analyst job in Alpharetta, GA
Job Posting Title: Cloud Security Engineer - SRE
Job Profile: Technical Project Management - Advisor II
We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation.
Technical Skills
• Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling.
• Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations.
• Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure.
• Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions.
• Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift).
• Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs.
• Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs.
• Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI.
• A strong understanding of HashiCorp Vault and Terraform will make you stand out.
2. Problem-Solving and Troubleshooting
• Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews.
• Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error.
• Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications.
3. Collaboration and Communication
• Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams.
• Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports.
• Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences.
4. Reliability and Scalability
• Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability.
• Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands.
• Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime.
5. Security and Compliance
• Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices.
• Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry.
Minimum Job Qualifications:
• Bachelor degree in business or equivalent work experience
• 10 years of previous program leadership and/or relevant consulting experience
• Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle
• 5+ years' experience in driving large scale data center consolidation efforts
• Minimum 5 years' experience with matrix management of cross-functional processes and teams
• Proficient with Project Management tools
Cyber Security Analyst
Cyber security analyst job in Atlanta, GA
Orange Business is here! About us
Orange Business is a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business. Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities.
About the role
Orange Cyberdefense specializes in the design, implementation and support of the most reliable and innovative security solutions and services - we are seeking a SOC Analyst to join our global team for a major account.
As a SOC Analyst you are responsible for the detection, investigation and defense against cyber-attacks. In our SOC, you will work with security experts and use the latest technologies to analyze potential security incidents.
As the team is working based on FTS (follow-the-sun) model involving Brazil, France & Malaysia teams, shift work is required for this role.
Your key responsibilities as a SOC Analyst will include to:
Ensure that customer environments are always protected against cyber-attacks
Triage and investigate alarms generated by SIEM tools, endpoint protection tools, network anomaly detection tools, etc. by performing in-depth analysis
Undertake threat hunting investigations and campaigns
Escalate relevant threats to customers and providing advice based on these threats
Detect anomalies and attack patterns along the entire cyber-kill chain as described by MITRE ATT&CK
Support our customers during a security incident and ensure effective defense against attacks
Continuously develop improvements and detection methods to optimize detections
Report monthly on the status of customer environments
Advice customers on cyber trends.
About you
What you bring to the table
Cybersecurity needs to be your passion, securing the customers assets your mission. As security is often a tradeoff between different aspects, you need to be pragmatic and result driven to get your message delivered while reducing the risk for the customer.
Excellent English written/verbal and communication skills.
Minimum of 2 years of experience in a similar role
Experience using SIEM and/or EDR/XDR security tools - Knowledge in SPLUNK technology is a plus.
A degree in Computer Science, Cyber Security, Digital Forensics or Engineering - or equivalent industry recognized certification/experience
Ideally have experience with penetration testing, incident detection, incident response and malware analysis
Broad knowledge on threat analysis and experience in intelligence reporting.
Ideally have experience with penetration testing, incident detection, incident response and malware analysis.
Ideally have certifications such as CySA+, CEH, OSCP, OSDA, Splunk Power
Ideally have experience working within a SOC, if not then any experience within an IT Department providing customer support
Experience in reversing malware is a plus
Industry certifications like CISA, CISM, CISSP is a plus
What we offer
Our Competitive Benefits Package Includes:
Comprehensive health coverage (medical, dental, vision) for you and your family
Financial protection: life, disability, AD&D, and business travel insurance
401(k) plan with company match
Pre-tax savings through HSA and FSA accounts
Employee assistance program, tuition reimbursement, and adoption support
Healthy living and wellness reimbursements
Group-rate insurance options: home, auto, pet, and more
Generous PTO and paid volunteer days
Legal assistance, critical illness, hospital indemnity, and ID theft protection plans
Only your skills matter
Regardless of your age, gender identity, race, ethnic origin, religion/belief, sexual orientation, marital status, neuroatypia, disability, veteran status or appearance, we encourage diversity within our teams because it is a strength for the collective and a vector of innovation. Orange Group is a disabled-friendly company and equal opportunity employer: don't hesitate to tell us about your specific needs.
Auto-ApplyCyber Security Analyst
Cyber security analyst job in Atlanta, GA
Role Value Proposition:
The Incident Response Analyst will be a member of UpTime365's Global Cyber Incident Response Team. In this role, an analyst will use cutting edge tools and solutions, and collaborate with global team members across the organization to perform cyber incident response and protect UpTime365's partners against cyber threats.
Key Responsibilities:
Response to cyber security events and incidents by analyzing forensic data, logs, and threat intel to validate security threats, assess impact, determine root cause, and help coordinate remediation actions.
Maintain awareness of emerging threats.
Willingness and self -motiviation to learn and take advantage of all training opportunities provided.
Perform proactive threat hunting to identify potential threats to UpTime365 and its partners.
Partner with global incident response teams to coordinate global incident response.
Eventual participation on a rotating on -call roster for off hour escalations.
Requirements
Essential Business Experience and Technical Skills:
A bachelor's degree in cyber security or computer science, or 2 -4 years of combined IT and Cyber Security related work experience.
1 -3 years of experience analyzing logs (e.g. endpoint, network, identity), performing data correlation, and using SIEM or log management tools.
Basic understanding of the Windows operating system and command line tools, network fundamentals, and cyber security concepts and frameworks.
Scripting experience for analysis and automation of repeatable processes.
Security specific certifications from SANS and other industry recognized organizations are desirable.
Benefits
Dental insurance
Medical insurance
Vision insurance
401K
Paid vacation and sick leave
Tuition fee reimbursement
Students loan assistance
Cyber Security Analyst
Cyber security analyst job in Atlanta, GA
A Southern Company Security Analyst participates in monitoring, hunting and responding to cyber security events. He or She, provides a front-line role during cyber security incidents, identifying the extent of the threat, business impacts and advising or sometimes performing the most suitable course of action to contain, eradicate and remediate an incident. A Southern Company Security Analyst maintains a good knowledge of the threat landscape, helps enhance visibility and response capabilities by identifying new methods of detecting threats. A Southern Company Security Analyst is proactive and seeks out adversaries determined to negatively impact Southern Companies reputation, financial interest or threatens the safety of our employees and customers.
Candidates are expected to discuss and demonstrate they meet required qualifications for applicable roles.
Responsibilities
Take action on security events presented to Analyst via SIEM, user submissions, dashboards, etc.
Self-initiate hunting initiatives to discover potential breaches or undiscovered cyber threats
Remain abreast of emerging threat patterns and provide recommendations to detect threats
Assists with patching recommendations and workarounds for zero-day threats.
Coordinate mitigation or remediations task with stakeholders or supporting teams
Communicates with management on incident updates.
Monitors SIEM and analyzes security events to determine appropriate actions
Monitors emails containing links/attachments associated with potential phishing attempts to determine appropriate actions
Identify and tune false positives associated with current security events
Document analytical steps and findings associated with security event investigations
Qualifications Required for Cyber Security Analyst
2 years IT security experience
Minimum 2 years of experience in performing analysis on Windows and LINUX/UNIX systems
Minimum 2 years of experience and/or familiarity in the following areas:
Network/Endpoint: analysis tools
Scripting languages
Windows/Unix command line utilities
Reputation analysis associated with IP's, Domains, Email Addresses
Ticketing Systems
Required to submit to a background examination.
Experience operating within a security application such as Kali, Metasploit, and etc.
Familiar with and have worked within Cyber Security Frameworks such as:
NIST 800 - 61
Attack Life Cycle
SANS Security Controls
MITRE
SANS Security 500 Series or other industry standard equivalent
Experience with PCAP analysis
Experience investigating endpoint and network security events
Experience investigating user reported Phishing events (specifically investigating suspicious links and attachments)
Experience analyzing security events utilizing sandbox technology
Experience operating within a security application such as Kali, Metasploit, and etc.
Oral and written communication skills
Experience taking ownership of incidents from acknowledgement to resolution
Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies
Experience initiating security event investigations
Preferred capabilities:
Oral and written communication skills
Ability to take ownership of incidents from acknowledgement to resolution
Ability to initiate security event investigations
Ability to comprehend and articulate business impact associated with security events
Interacting with vendors to support proof of concepts
Proficient in Microsoft Office products: Excel, Word, Outlook and etc.
Exposure, experience and/or knowledge of cloud technology
Familiar with NIST 800-61 and SANS Critical Security Controls
Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies
Desired certifications:
GIAC Security Essentials (GCIH)
GIAC Certified Intrusion Analyst (GCIA)
Security+
Other certifications within IT Security
Characteristics of an Southern Company Cyber Analyst
Self-Motivated - Cyber Analysts do not only act when security tools trigger alerts, we are suspicious by nature and can generate security events based on self-initiated task.
Perseverance - Cyber Analysts identify resources that allow us to move through or around barriers as we analyze cyber security events.
Dependable - Cyber Analysts work within a team environment and thus, we rely on one another for knowledge-sharing and dependence.
Integrity - As Cyber Analysts, our reputation is our code of ethics. We are not perfect. We admit our mistakes. We do the right thing.
Sense of Humor - Although this may vary, just have one; I promise we can work with it. We have a lot of fun in what we do, so you will need a sense of humor to keep up.
This position falls under the company's Insider Threat Program and will have access to, and control over sensitive data, systems or assets. Enhanced personnel screening, which includes a background review, drug screen and psychological assessment, will be required if you are selected for this position
Auto-ApplyCyber Security Analyst
Cyber security analyst job in North Charleston, SC
PRIMARY DUTIES & RESPONSIBILITIES:
Conducts regular risk assessments to identify potential vulnerabilities and threats within the AWS IL5 environment
Develops strategies for risk mitigation and implements necessary controls to address identified risks
Maintains a risk register documenting identified risks and corresponding mitigation actions
Ensures AWS configurations align with IL5 security requirements, including encryption, access controls, and network segmentation
Implements and enforces compliance with relevant security standards and regulations, such as NIST SP 800-53 and DoD IL5 requirements
Monitors AWS configurations for deviations from security baselines and promptly remediates any non-compliant settings
Implements strong IAM policies to enforce least privilege access across AWS resources
Regularly reviews IAM roles and permissions to ensure alignment with the principle of least privilege
Enables multi-factor authentication (MFA) for privileged accounts and sensitive operations
Deploys robust monitoring tools to detect unauthorized access attempts, suspicious activities, and security breaches
Establishes incident response procedures to promptly respond to security incidents and minimize their impact
Conducts post-incident reviews to identify lessons learned and improves incident response processes
Implements encryption mechanisms to protect data at rest and in transit within the AWS IL5 environment
Regularly reviews encryption policies and key management practices to ensure effectiveness
Provides regular security training and awareness programs to AWS IL5 users and administrators
Educates users about common cyber threats, phishing attacks, and best practices for secure usage of AWS resources
Encourages a culture of security awareness and proactive risk mitigation among all stakeholders
Conducts periodic security assessments and audits to evaluate the effectiveness of cyber security controls
Identifies areas for improvement and implement enhancements to strengthen the security posture of the AWS IL5 Cloud SCCA
Stays abreast of emerging cyber threats, vulnerabilities, and industry best practices to adapt security measures accordingly
Travels approximately 3-4 days a quarter, as required
DESIRED SKILLS & REQUIREMENTS:
RMF experience
USMC Cyber experience
SAFe (Scaled Agile Framework) experience
Working Place: North Charleston, South Carolina, United States Company : Scientific Research Corporation
Cyber Security Analyst, Intermediate
Cyber security analyst job in Aiken, SC
Savannah River National Laboratory (SRNL) is seeking a Cyber Security Analyst to join the Cyber Engineering team! The selected individual will work with other team members to ensure robust security controls are selected, implemented, and maintained for a NIST RMF accredited boundaries within unclassified environments.
Minimum Qualifications:
Bachelor's degree in relevant field of study and 4-6 years of work experience
At least 1 general cybersecurity certification and 1 technical certification
Technical skills include: understanding security architectures, encryption, firewalls, IDS/IPS, Network security protocols, and applying STIGs.
Experience and proficient with cyber tools for vulnerability assessments, SEIM, Endpoint protection and security frameworks.
Strong understanding of risk management and experience with familiarity with cloud security principles
Soft skills include excellent communication and interpersonal skills, strong attention to detail, ability to multi-task and to collaborate in a team environment
For ability to obtain and maintain a security clearance, US Citizenship is Legally Required
Preferred Qualifications:
Understanding of NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53)
Current of former experience with DOE cybersecurity or a federal-contractor cybersecurity technical position
Experience with zero-trust architecture
Ability to learn new technologies, concepts, and processes quickly
Splunk or Tenable Certifications
Active DOE clearance
Team in designing, implementing, and maintaining secure environments applying the NIST RMF framework.
Develop strategies for complex security strategies unique to their operating environment.
Implement enforceable technical security controls for protection of networks and systems using authorized sources such as STIGs and SRGs
Support the ISSO with the technical aspects of the development and ongoing maintenance of security controls and authorization activities
Perform and review technical assessments and security reports
Work effectively in a team environment to resolve issues and contribute to continuous process improvement efforts
Interact with customers and peers in a professional and responsive manner to ensure secure practices.
Provide expert support and communicate effectively on security matters
Auto-ApplyCyber Security Analyst
Cyber security analyst job in Georgia
Founded over 35 years ago, First Quality is a family-owned company that has grown from a small business in McElhattan, Pennsylvania into a group of companies, employing over 5,000 team members, while maintaining our family values and entrepreneurial spirit. With corporate offices in New York and Pennsylvania and 8 manufacturing campuses across the U.S. and Canada, the companies within the First Quality group produce high-quality personal care and household products for large retailers and healthcare organizations. Our personal care and household product portfolio includes baby diapers, wipes, feminine pads, paper towels, bath tissue, adult incontinence products, laundry detergents, fabric finishers, and dishwash solutions. In addition, we manufacture certain raw materials and components used in the manufacturing of these products, including flexible print and packaging solutions.
Guided by our values of humility, unity, and integrity, we leverage advanced technology and innovation to drive growth and create new opportunities. At First Quality, you'll find a collaborative environment focused on continuous learning, professional development, and our mission to Make Things Better.
We are actively seeking an experienced Cyber Security Analyst to join our Security Operations Center in Great Neck, New York, or work in a hybrid capacity from CT, GA, NY, NJ, PA, or SC. In this role, you will be responsible for incident detection, investigation and response, rules development tuning and improvement, defining and developing automations, and incorporating Threat Intelligence and Threat Hunting activities to enhance detection and mitigation strategies.
Primary responsibilities include:
* Incident Detection and Response - Monitor and analyze alerts generated by SIEM/SOAR platforms and user reports, investigate security incidents, and execute containment and eradication procedures to minimize impact and restore normal operations.
* Tuning & Optimization - Continuously refine detection rules and SOC processes to reduce false positives, enhance detection accuracy, and improve overall operational efficiency.
* Research & Development - Explore emerging threats and attack techniques to develop and implement new detection rules to expand visibility and strengthen the organization's security posture.
* Threat Hunting - Proactively hunt for hidden threats by analyzing logs and identifying gaps missed by existing security tools and improve security posture.
* Threat Intelligence - Review threat intelligence feeds, channels and articles to identify potential risks and proactively strengthen defenses.
* Automation Development - Design, implement, and maintain automation solutions to streamline SOC workflows, reduce manual effort, and accelerate incident response times.
* Reporting - Prepare and present comprehensive reports on key SOC activities, metrics, and security trends to stakeholders and management.
* Penetration Testing - Participate in Red and Purple Team exercises to assess and improve the effectiveness of security controls and incident response capabilities.
The ideal candidate should possess the following:
* Bachelor's degree in Computer Security, Cybersecurity, Information Security, or a related field preferred. Additional relevant experience may be considered in lieu of a degree.
* Experience with advanced SIEM content development, including custom correlation rules, dashboards, and reporting.
* Minimum of 1 year of experience working in a Security Operations Center (SOC) environment, either in-house or with a Managed Security Service Provider (MSSP).
* Proficiency in scripting languages such as Python, PowerShell, or Bash for automating security tasks and processes.
* Direct involvement in end-to-end incident response, including root cause determination and post-incident reporting.
* Experience monitoring and securing cloud environments (e.g., Microsoft Azure, AWS, Google Cloud Platform).
* Hands-on experience working with SIEM (e.g. Splunk, Microsoft Sentinel, Qradar)
* Familiarity with EDR solutions like CrowdStrike, SentinelOne, Microsoft Defender for Endpoint or Cortex XDR.
* Understanding and familiarity with interpreting common log sources for monitoring and investigation (e.g. Firewall, Azure AD, Windows Security Log, Email, Proxy\URL Filtering etc.)
* Solid grasp of prevalent attack types, including phishing, brute-force attacks, malware, and data exfiltration techniques.
* Excellent verbal and written communication skills, with the ability to collaborate effectively with team members both within and outside the SOC.
* High level of situational awareness and problem sensitivity, with the ability to proactively identify issues and escalate concerns as appropriate.
* Demonstrated proactive mindset, strong sense of responsibility, and urgency in addressing security incidents and tasks.
* Ability to work independently, manage multiple priorities, and succeed in a fast-paced, dynamic environment.
* Strong motivation and willingness to continually learn and grow, adapting to new tools and evolving threat landscapes.
What We Offer You
We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive:
* Competitive base salary and bonus opportunities
* Paid time off (three-week minimum)
* Medical, dental and vision starting day one
* 401(k) with employer match
* Paid parental leave
* Child and family care assistance (dependent care FSA with employer match up to $2500)
* Bundle of joy benefit (year's worth of free diapers to all team members with a new baby)
* Tuition assistance
* Wellness program with savings of up to $4,000 per year on insurance premiums
* ...and more!
The estimated annual base salary range for this position is $110,000 - $140,000.
Base pay is only part of our total compensation package, which also includes an attractive annual discretionary bonus and robust suite of employee benefits for which you are eligible to participate in starting on your first day of employment.
Base pay offered will be determined on an individualized basis and we will consider your location, experience, and other job-related factors.
First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data.
First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status.
Auto-ApplyInformation Security Analyst
Cyber security analyst job in Conway, SC
Posting Details Classification Title IT Security Specialist/ Analyst I Classification Code AM80 Pay Band 6 Subject to Drug/Alcohol Testing Guidelines No Subject to Credit Check No Internal Title Information Security Analyst Department Information Technology Services Position Type PCLS - Slotted Classified Full or Part Time Full-Time Basis 12 mo. Hours per week 37.5 hours per week Normal Work Schedule Mon-Thu: 8-5 ; Fri: 8-12:30 Job Details
Coastal Carolina University is currently accepting applications for the following full-time position: Information Security Analyst in the Office of Information Technology Services.
Coastal Carolina University's Information Technology Services is looking for an information security analyst who is responsible for monitoring, analyzing, and mitigating cybersecurity and compliance risks. The analyst will also aid in the development of solutions, research new technologies, assist in policy changes, and recommend content for security awareness programs.
How to Apply: Interested candidates may apply online at ***************************************** Applicants must submit a cover letter, resume and list of three (3) professional references. Review of applications will begin immediately and continue until position is filled.
Required Qualifications: A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for bachelor's degree on a year-for-year basis.
Preferred Qualifications: Experience with incident response, security monitoring, data loss prevention, implementing security controls, administering vendor supplied security software, risk assessment, security and privacy compliance, and/or participating on disaster recovery planning team.
Duties include, but are not limited to:
* Research information security events, incidents, and issues to isolate and identify root or systemic causes. Responds according to policy and best practices.
* Assists business units and operational teams with information security risk assessments and audits.
* Gathers, compiles, and synthesizes information for security processes and systems around vulnerabilities and risk.
* Aids in the development of solutions through security partnerships and research on new technologies, required policy changes, and vendor offerings.
* Recommends content for information security training and awareness programs.
IT Security Specialist/Analyst I (AM80/61122728/FTE-S01096P), full-time position with benefits. SC State Pay Band: 06. Salary range: $47,588.00 (minimum) - $67,817.00 (midpoint). Normal work hours are Monday through Thursday, 8:00 a.m. to 5:00 p.m. and Friday, 8:00 a.m. to 12:30 p.m. Must be flexible to meet the special scheduling needs of the university.
Coastal Carolina University is a public comprehensive liberal arts institution located in Conway, South Carolina, just nine miles from the Atlantic coastal resort city of Myrtle Beach. Coastal
Carolina University enrolls over 10,000 students from 49 states and 55 nations. The University is accredited by the Southern Association of Colleges and Schools Commission on Colleges to award the baccalaureate and master's degrees of national and/or regional significance in the arts and sciences, business, humanities, education, and health and human services, a specialist degree in instructional technology, and PhD degrees in marine science: coastal and marine systems science and education sciences.
The University provides equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, citizenship status, national origin, or because an employee or applicant for employment is an individual with a disability or a disabled veteran, an Armed Forces service medal veteran, a recently separated veteran, or an active-duty wartime or campaign badge veteran, or other "protected veteran," as defined by law. Coastal Carolina University is an EO/AA employer.
Required Qualifications
A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for bachelor's degree on a year-for-year basis.
Preferred Qualifications
Experience with incident response, security monitoring, data loss prevention, implementing security controls, administering vendor supplied security software, risk assessment, security and privacy compliance, and/or participating on disaster recovery planning team.
Knowledge, Skills & Abilities
Possess knowledge of system and network security for various operating systems and local area networks. Experience with security tools and technologies for deploying, managing, measuring, and auditing system and network security. Has a foundational understanding of application, hosted service, and cloud security principles. Capable of contributing to the creation of detailed technical documentation on security processes and procedures. Demonstrates basic analytical and problem-solving skills. Understands risk concepts and principles. Communicates effectively with audiences of varying technical knowledge levels.
Posting Detail Information
Posting Number FTE-S01096P Number of Vacancies 1 Desired Start Date 01/12/2026 Position End Date (if temporary) Job Open Date 12/11/2025 Job Close Date Open Until Filled Yes Special Instructions to Applicants Quicklink for Posting ****************************************
Job Duties
Network Security Analyst
Cyber security analyst job in Augusta, GA
Network Security AnalystLOCATIONFort Eisenhower, GA 30905CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyInformation Security Analyst
Cyber security analyst job in Atlanta, GA
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and JQuery mobile.
Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us.
We make sure that we deliver performance driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change.
Job Description
The candidate will be a member of the Application Security Assessment (ASA) Team enforcing Global Cyber Security & Fraud at First Data. This includes automated vulnerability scanning mixed with manual penetration testing against web-based applications, web services, and thick client applications.
Job Specific Responsibilities Utilize dynamic and static application security testing tools effectively, including IBM AppScan Standard, Fortify SCA, Burp Suite Pro, and Qualys.
Host developer-focused appsec training workshops on topics including secure coding and vulnerability remediation.
Coordinate testing objectives, reporting deliverables, and remediation efforts as the liaison between the financial institution(s), First Data, and third-party assessors.
Provide documented guidance to development teams that define effective remediation solutions for vulnerabilities.
Contribute to maintaining First Data Corporation's PCI-DSS certifications through addressing regulatory requirements.
Availability to work occasional off-hours to complete assessments tied to meeting critical business objectives.
Interview Required: Yes
Information Technology-Info Security Analyst - Information Technology-Info Security Analyst
Qualifications
Bachelors Degree in Information Security, Computer Science, I.T., I.S., Engineering, Analytics or equivalent.
Hands on technical experience with dynamic and static security testing tools, including source code assessments.
Deep analytical skills, strong out-of-the-box thinking.
Ability to effectively perform detailed-oriented technical information security work on a full-time basis.
Excel independently in a fast-paced environment.
Effective oral and written communication skills.
Preferred Qualifications Masters Degree in Information Security, Computer Science, I.T., I.S., Engineering, Analytics or equivalent.
Proficient web-application developer with demonstrable knowledge of HTML, C/C++, Java, VB, Ruby, etc.
CEH, Security+, GWAPT
Additional Information
Regards,
Vikas Kumar
vikas.kumar(@)360itpro.com
Information Security Associate or Specialist
Cyber security analyst job in Alpharetta, GA
The use of IT (Information Technology) infrastructure in the company is vital for daily operation. The IS (Information Security) Specialist should Provide secure Information Technology infrastructure service to the company as well as companywide employees and staff.
Role Description.
Define and implement Macro (Servers, Groups and Shared resource) and Micro (Personal and Single) IT infrastructure. Analyze, Plan, Design, Develop and Implement IT Infrastructure and IT Security solutions to support company IT requirements. Analyze and prevent any Information risk ensuring the companys information integrity. Define, maintain and monitor the execution of IS and IT policies. Execute and monitor company IT/IS Compliance.
Essential Duties and Responsibilities
-Monitoring and maintaining computer systems and networks
-Responding in a timely manner to service issues and requests
-Providing technical support across the company
-Support equipment repair and replacement service
-Testing Benchmarking new technology
-Maintain and execute IT Training program for new employs
-Monitor IT/IS Infrastructure (including servers and network devices) to ensure data integrity
-Reporting of daily system issues.
-Analyze and propose system improvements.
-Documentation related to IT/IS policies, issues, and procedures.
-Participation and active analyst, designer, and developer in IT projects.
-Monitoring of IT/IS infrastructure-related expenses.
-Other duties as assigned.
Requirements
Qualifications: Listed below are the minimum and/or desired qualifications of the position including education, work experience, and knowledge & skills that are required to perform satisfactorily in the position:
Education and Work Experience:
-Vocational or undergraduate degree in information systems and computer science or related field.
-One (1) to three (3) years of information systems, computer science and/or IT-related experience.
Knowledge and Skills:
-PC and Server management
-IT Hardware and Software installation
-Initiative skills
-Problem-solving skills
-Understanding of IT infrastructure and application architectures
-Great Social and Communication Skills
-Great Oral and Written Communication Skills
-System process analysis and design capabilities/experience
-Server Operating systems (Windows Server, Linux, HP-UX, Unix, Sun Solaris)
-Antivirus, NAC, DLP, MDM and other IS Solutions
-IS Related definition and policies (ex. ISO 27001)
-Networking (Cisco/HP) and network devices (Routers and Switch)
-VPN
-TCP/IP, UDP, Network standards
-LDAP, Active Directory and Exchange
-Access Control
-Security Cameras
-Firewall, Web Filter and other network security appliance solutions
-Database systems (SQL Server/MySQL/Oracle) and programming skill (is a plus)
-MS Office skills (especially Excel skills)
Physical Demands:
-Position requires sitting at a desk working on a computer for at least 2/3 of time.
-Position requires regular and reliable attendance.
-Position requires local travel up to 10% of the time.
Information Security Analyst 2
Cyber security analyst job in Duluth, GA
Join Our Team In 2025, USA Today recognized Primerica as a Top Workplace USA for the fifth year in a row, and Newsweek named Primerica one of America's Greatest Workplaces for Diversity for the second consecutive year. In 2024, the Atlanta Journal-Constitution named Primerica as a Top Workplace for the eleventh consecutive year, and Forbes recognized Primerica as one of America's Best Employers for Women for the fifth year in a row. In addition, for the tenth time Primerica has been voted a Best Employer by Gwinnett Magazine. Primerica is a great place to work! Join our team to experience what it's like to work at "one of the best places to work in the metro Atlanta".
About this Position
The Information Security Engineering Analyst is an integral part of the IS Engineering team. This position will lead security efforts to design, implement, administer, and support information security technologies and processes that will ensure data and systems are adequately protected. It requires performing a broad range of security duties requiring a working knowledge of cyber security and several supporting technologies. The Analyst will work with project teams to define security requirements for programs, applications, processes, and new platform systems in line with the enterprise information security architecture.
Responsibilities & Qualifications
* Support and manage security infrastructure, including but not limited to; Proxies, NextGen Firewalls, IDS/IPS, SIEM, Sandboxing technologies, APT solution, etc.
* Participate in Vulnerability and Threat Management program
* Perform root cause analysis on security incidents
* Apply effective communication to translate complex technical security deficiencies into business risks that are understood by business stakeholders when making decisions for future security investments
* Use an information security architecture framework and methodology to enable reuse of information security components across the enterprise
* Assist proof-of-concept activities for innovation initiatives to ensure coverage of information security requirements
* Perform additional security-related duties as requested
* Bachelor's degree in Computer Science, Information Systems, CyberSecurity, or 2-3 years related experience
* CISSP or other Security Certifications are preferred, or willing to obtain
* Experience with SIEM technologies, including development
* Experience with Host based Security controls
* Experience in the vulnerability assessment lifecycle from the point of identification to remediation including penetration testing and source code analysis tools
* Ability to research, analyze and resolve complex problems with minimal supervision and escalate issues as appropriate
* Able to work independently and be a self-starter; managing multiple tasks according to priorities; results oriented and proven ability to meet deadlines
Hybrid role
Location: Atlanta, GA
FLSA status:
This position is exempt (not eligible for overtime pay):
Yes
Our Benefits:
* Day one health, dental, and vision insurance
* 401(k) Plan with competitive employer match
* Vacation, sick, holiday and volunteer time off
* Life and disability insurance
* Flexible Spending Account & Health Savings Account
* Professional development
* Tuition reimbursement
* Company-sponsored social and philanthropy events
It has been and will continue to be the policy of Primerica, Inc., and its subsidiaries to be an Equal Opportunity Employer. We provide equal opportunity to all qualified individuals regardless of race, sex, color, religious creed, religion, national origin, citizenship status, age, disability, pregnancy, ancestry, military service or veteran status, genetic or carrier status, marital status, sexual orientation, or any classification protected by applicable federal, state or local laws.
At Primerica, we believe that diversity and inclusion are critical to our future and our mission - creating a foundation for a creative workplace that leads to innovation, growth, and profitability. Through a variety of programs and initiatives, we invest in each employee, seeking to ensure that our people are not only respected as individuals, but also truly valued for their unique perspectives.
Auto-ApplySecurity Architect - Consultant
Cyber security analyst job in Columbia, SC
Duration: 12 Months (Possible Extension)
Interview Type: Initial Microsoft Teams (on camera); final in-person
Candidate must be a CURRENT resident in the Columbia, SC area. Candidates local to Columbia are highly preferred however the manager is open to accepting resources within 125 miles from the zip code 29118 that will relocate to Columbia at the start of the role at their own expense. (Candidates outside of this area will not be considered). No relocation allowed.
Key Responsibilities
Implement and manage Identity and Access Management (IAM) solutions including Single Sign-On, Multi-Factor Authentication, and Active Directory integration.
Develop automation for security and IT tools using scripting languages such as Python and Bash.
Plan, design, and deploy enterprise-level security solutions and countermeasures for emerging cyber threats.
Ensure consistent application of security controls across infrastructure and business systems.
Collaborate with IT and operations teams to improve and maintain overall enterprise security posture.
Provide architectural guidance for securing new and existing systems and applications.
Required Skills
5+ years of experience and expert understanding of identity and access control, logging, and reporting systems.
5+ years of experience developing automation using tools such as Python and Bash.
5+ years of experience with Linux, Windows, network security protocols, and procedures.
5+ years of experience supporting large IT environments and/or system deployments.
Preferred Skills
Knowledge of SIEM analysis and reporting.
Familiarity with security frameworks such as NIST, CSF, CJIS, IRS 1075, and CMS MARS-E.
Knowledge of Application Security (AppSec).
Education Requirements
Bachelor's degree in Information Technology, Information Security, or a related field.
Eight years of relevant work experience may be substituted in lieu of education.
Certifications (Preferred)
CISSP, CISA, CISO, CEH, OSCP, GPEN, or equivalent certifications.
Vendor certifications in SIEM or logging technologies are a plus.