Post job

Cyber security analyst jobs in Goldsboro, NC

- 49 jobs
All
Cyber Security Analyst
Security Engineer
Senior Security Engineer
Cyber Security Engineer
Information Security Engineer
Senior Information Security Engineer
Information Security Analyst
Senior Cyber Security Analyst
Defense Analyst
  • Cyber Defense Forensics Analyst

    EY 4.7company rating

    Cyber security analyst job in Raleigh, NC

    At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all. The exceptional EY experience. It's yours to build. EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. Today's world is fuelled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. **The opportunity** Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the technical team responsible for security incident response for EY. The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process. **Your key responsibilities** + Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified + Forensically analyze end user systems and servers found to have possible indicators of compromise + Analysis of artifacts collected during a security incident/forensic analysis + Identify security incidents through 'Hunting' operations within a SIEM and other relevant tools + Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions + Provide consultation and assessment on perceived security threats + Maintain, manage, improve and update security incident process and protocol documentation + Regularly provide reporting and metrics on case work + Resolution of security incidents by identifying root cause and solutions + Analyze findings in investigative matters, and develop fact based reports + Be on-call to deliver global incident response **Skills and attributes for success** + Resolution of security incidents by identifying root cause and solutions + Analyze findings in investigative matters, and develop fact-based reports + Proven integrity and judgment within a professional environment + Ability to appropriately balance work/personal priorities **To qualify for the role you must have** + Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field + 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering; + Understanding of security threats, vulnerabilities, and incident response; + Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis; + Be familiar with legalities surrounding electronic discovery and analysis; + Experience with SIEM technologies (i.e. Splunk); + Deep understanding of both Windows and Unix/Linux based operating systems; **Ideally, you'll also have** + Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH + Background in security incident response in Cloud-based environments, such as Azure + Programming skills in PowerShell, Python and/or C/C++ Understanding of the best security practices for network architecture and server configuration **What we look for** + Demonstrated integrity in a professional environment + Ability to work independently + Have a global mind-set for working with different cultures and backgrounds + Knowledgeable in business industry standard security incident response process, procedures, and life cycle + Excellent teaming skills + Excellent social, communication, and writing skills **What we offer you** The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary range/s. At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more . We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being. **Are you ready to shape your future with confidence? Apply today.** EY accepts applications for this position on an on-going basis. For those living in California, please click here for additional information. EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. **EY | Building a better working world** EY is building a better working world by creating new value for clients, people, society, and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy, and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories. EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law. EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
    $105.2k-186.4k yearly 60d+ ago
  • Senior Cyber Security Analyst

    First Citizens Bank 4.8company rating

    Cyber security analyst job in Raleigh, NC

    This position supports the Bank's Information Security and Cyber Threat management programs at the highest level of complexity and expertise. Leads the analysis and mitigation of threats identified within the Bank's networks and systems. Ensures that team reporting is timely, accurate, and escalated as necessary to provide actionable intelligence for cyber defense efforts. Develops process improvements and technical solutions that address the identified gaps or deficiencies. Drives the defense of the organization's information security and technological architecture through expert consultation and threat mitigation. Serves as a resource to team members and management on security threats, industry trends, and other relevant intelligence. Leads projects within the work group and resolves escalated, high-risk issues. Responsibilities The role will focus on detection engineering, leveraging advanced security tools and frameworks to enhance their threat detection capabilities. The ideal candidate will have deep expertise in SIEM log analysis and detection development, in-depth knowledge of security controls, and strong communication skills to collaborate across IT and enterprise monitoring teams. Key Responsibilities: * Perform in-depth analysis of security events and detections from SIEM and EDR platforms. * Review and recommend improvements to security policies and detection strategies across security tools. * Assist with log analysis for critical applications, ensuring proper field capture and normalization. * Collaborate with IT teams and application owners to identify gaps and implement detection enhancements. * Apply MITRE ATT&CK framework to strengthen detection coverage and threat modeling. * Document findings, recommendations, and detection logic clearly and concisely. Remote eligible. Qualifications Bachelor's Degree and 8 years of experience in Information security OR High School Diploma or GED and 12 years of experience in Information security * Proven experience in detection engineering within cybersecurity operations. * Strong proficiency in Splunk (Power User level or higher); Splunk administration experience preferred. * Hands-on experience with security tools such as CrowdStrike, UEBA, and database monitoring solutions. * Familiarity with SIEM and EDR analysis methodologies. * Working knowledge of the MITRE ATT&CK framework. * Excellent communication and organizational skills; ability to guide application owners through technical requirements. The base pay for this position is generally between $120,000 and $180,000. Actual starting base pay will be determined based on skills, experience, location, and other non-discriminatory factors permitted by law. For some roles, total compensation may also include variable incentives, bonuses, benefits, and/or other awards as outlined in the offer of employment. This job posting is expected to remain active for 45 days from the initial posting date listed above. If it is necessary to extend this deadline, the posting will remain active as appropriate. Job postings may come down early due to business need or a high volume of applicants Benefits are an integral part of total rewards and First Citizens Bank is committed to providing a competitive, thoughtfully designed and quality benefits program to meet the needs of our associates. More information can be found at ****************************************
    $120k-180k yearly 2d ago
  • Senior Cyber Security Engineer

    Local Government Federal Credit Union 4.2company rating

    Cyber security analyst job in Raleigh, NC

    CIVIC CULTURE Our organization believes we can all do well by doing good. We value the contributions of diverse minds and prioritize the success and well-being of our employees. We also believe every person in our organization plays a role in supporting a healthy environment and helping to achieve our goal of prosperity for all. To this end, we recruit bright, energetic, and talented people to be members of our team. In return, we offer a dynamic workplace that presents opportunities for professional advancement and individual growth. We strive to always display integrity, self-awareness, courage, and respect for one another while continuing to seek opportunities to learn. We really believe that when our employees succeed, our community wins. ABOUT THE POSITION The individual who excels in this position will have demonstrated experience in multiple information security technologies, including, but not limited to: SIEM, SOAR, email security, vulnerability management, network, and endpoint security controls. The individual will also play a key role in deployment, troubleshooting, testing, risk rating, and maintaining cyber security tools, platforms, and programs within the credit union. The successful candidate will display a passion for developing new skills in the field of information security. The Senior Cyber Security Engineer will actively participate in incident response, security program and control implementation, administration, automation, and documentation. The individual will assist internal teams as well as external service providers on technical projects. NORMAL DAY-TO-DAY WORK Research, engineer, design, and implement security solutions to enhance the management of cyber security risks within the credit union. Support the day-to-day maintenance of all cyber security applications, including administration, deployment, troubleshooting and maintaining all cyber security tools. Create and maintain playbooks, standards, automation, processes, and procedures around security disciplines with a focus on administration of platforms. Identify, design and complete regular security audits related to administrative access and activities for security platforms as well as perform regular security audits as required. Research, recommend, implement changes and additions to security controls and business application solutions. Identify and track metrics related to performance and improvements to related cyber security tools. Develop, respond to and investigate alerts related to misuse of credit union technology. Create and edit scripts for integration and analysis of all cyber security controls for coverage and effectiveness. Serve as a backup for incident response, ensuring readiness to take immediate action in the event of security breaches or system incidents, providing support in containment, analysis, and remediation efforts. Stay informed of tools, techniques and components utilized in the industry through research and apply this knowledge to system(s) being secured. Work with end-users to identify and mitigate security threats. Understand and support team, department, applicable credit union regulations (NCUA), policies and procedures, strategic goals, and vision. Take ownership for actions, decisions, and results; openly accept feedback and demonstrate both the willingness and ability to improve. JOB QUALIFICATIONS Here are a few skills you MUST have to be qualified for this position. Minimum 7 - 9 years' experience in an information security, systems administration or IT engineering role. Solid experience and understanding of incident response, vulnerability management, security engineering, security automation, risk rating, network security, threat intelligence and systems administration concepts. Experience tuning rules that identify anomalous and/or suspicious behavior within SIEM, IDS/IPS, and similar platforms. Ability to work flexible hours and weekends as needed, as well as participate in a 24/7 rotation schedule. Ability to function in a Consumer business office environment and utilize standard office equipment including but not limited to: PC, copier, telephone, etc. Ability to lift a minimum of 25 lbs. (file boxes, computer). Travel required on occasion. Here are a few qualities we'd LIKE for you to have to make you more suited for this position. BA/BS in Information Technology, Information Security, Information Assurance or equivalent experience. Experience managing Active Directory, and ADFS. Experience with regular expressions and scripting (PowerShell, python, bash, etc.). Familiarity with network and systems administration and operations concepts. Comfortable with multiple operating systems, including Windows, mac OS, and Linux. Certifications in one or more Information Security Domains or on security platforms (Security+, GSEC, CISSP, GCIH, GCED, GDSA, etc.).
    $92k-117k yearly est. 22d ago
  • Product Security Engineer, AI

    Meta 4.8company rating

    Cyber security analyst job in Raleigh, NC

    Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys. **Required Skills:** Product Security Engineer, AI Responsibilities: 1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more 2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities 3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products **Minimum Qualifications:** Minimum Qualifications: 4. BS or MS in Computer Science or a related field, or equivalent experience 5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development 6. Experience with exploiting common security vulnerabilities 7. Knowledge of common exploit mitigations and how they work 8. Coding and scripting experience in one or more general purpose languages **Preferred Qualifications:** Preferred Qualifications: 9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software that enables security processes 12. 8+ years of experience finding vulnerabilities in C/C++ code 13. Contributions to the security community (public research, blogging, presentations, bug bounty) 14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 60d+ ago
  • Senior Cyber Security Engineer

    Civic Credit Union 3.7company rating

    Cyber security analyst job in Raleigh, NC

    Full-time Description CIVIC CULTURE Our organization believes we can all do well by doing good. We value the contributions of diverse minds and prioritize the success and well-being of our employees. We also believe every person in our organization plays a role in supporting a healthy environment and helping to achieve our goal of prosperity for all. To this end, we recruit bright, energetic, and talented people to be members of our team. In return, we offer a dynamic workplace that presents opportunities for professional advancement and individual growth. We strive to always display integrity, self-awareness, courage, and respect for one another while continuing to seek opportunities to learn. We really believe that when our employees succeed, our community wins. ABOUT THE POSITION The individual who excels in this position will have demonstrated experience in multiple information security technologies, including, but not limited to: SIEM, SOAR, email security, vulnerability management, network, and endpoint security controls. The individual will also play a key role in deployment, troubleshooting, testing, risk rating, and maintaining cyber security tools, platforms, and programs within the credit union. The successful candidate will display a passion for developing new skills in the field of information security. The Senior Cyber Security Engineer will actively participate in incident response, security program and control implementation, administration, automation, and documentation. The individual will assist internal teams as well as external service providers on technical projects. NORMAL DAY-TO-DAY WORK Research, engineer, design, and implement security solutions to enhance the management of cyber security risks within the credit union. Support the day-to-day maintenance of all cyber security applications, including administration, deployment, troubleshooting and maintaining all cyber security tools. Create and maintain playbooks, standards, automation, processes, and procedures around security disciplines with a focus on administration of platforms. Identify, design and complete regular security audits related to administrative access and activities for security platforms as well as perform regular security audits as required. Research, recommend, implement changes and additions to security controls and business application solutions. Identify and track metrics related to performance and improvements to related cyber security tools. Develop, respond to and investigate alerts related to misuse of credit union technology. Create and edit scripts for integration and analysis of all cyber security controls for coverage and effectiveness. Serve as a backup for incident response, ensuring readiness to take immediate action in the event of security breaches or system incidents, providing support in containment, analysis, and remediation efforts. Stay informed of tools, techniques and components utilized in the industry through research and apply this knowledge to system(s) being secured. Work with end-users to identify and mitigate security threats. Understand and support team, department, applicable credit union regulations (NCUA), policies and procedures, strategic goals, and vision. Take ownership for actions, decisions, and results; openly accept feedback and demonstrate both the willingness and ability to improve. JOB QUALIFICATIONS Here are a few skills you MUST have to be qualified for this position. Minimum 7 - 9 years' experience in an information security, systems administration or IT engineering role. Solid experience and understanding of incident response, vulnerability management, security engineering, security automation, risk rating, network security, threat intelligence and systems administration concepts. Experience tuning rules that identify anomalous and/or suspicious behavior within SIEM, IDS/IPS, and similar platforms. Ability to work flexible hours and weekends as needed, as well as participate in a 24/7 rotation schedule. Ability to function in a Consumer business office environment and utilize standard office equipment including but not limited to: PC, copier, telephone, etc. Ability to lift a minimum of 25 lbs. (file boxes, computer). Travel required on occasion. Here are a few qualities we'd LIKE for you to have to make you more suited for this position. BA/BS in Information Technology, Information Security, Information Assurance or equivalent experience. Experience managing Active Directory, and ADFS. Experience with regular expressions and scripting (PowerShell, python, bash, etc.). Familiarity with network and systems administration and operations concepts. Comfortable with multiple operating systems, including Windows, mac OS, and Linux. Certifications in one or more Information Security Domains or on security platforms (Security+, GSEC, CISSP, GCIH, GCED, GDSA, etc.).
    $81k-111k yearly est. 60d+ ago
  • Cyber Security Engineer (Splunk)

    ZP Group 4.0company rating

    Cyber security analyst job in Raleigh, NC

    Piper Companies is seeking a Cyber Security Engineer (Splunk) for a world leading technology firm in the Raleigh, NC area. The Cyber Security Engineer (Splunk) will join a world class security organization with a highly skilled team responsible for designing, developing, and managing the security services within the organization. An ideal candidate for the Cyber Security Engineer (Splunk) will be action oriented and a strong problem solver. Responsibilities for the Cyber Security Engineer (Splunk) include: * Manage multiple SPLUNK environments and create SPLUNK queries and dashboards as needed * Perform penetration testing, vulnerability scanning, IR, and network security configurations * Research, analyze, and help make decisions on new security tools and technologies * Develop tools and automation utilizing python scripts Requirements for the Senior Cyber Security Engineer (Splunk) include: * Active Secret Security Clearance * Over 5 years of cyber security engineering experience * Experience with Splunk - configuration, management, and querying skills * Prior experience migrating Splunk on prem to Splunk cloud * Experience in penetration testing, vulnerability scanning, IR, and overall network security * Python scripting experience * Strong verbal and written communication skills Compensation of the Senior Cyber Security Engineer (Splunk) includes: * $115,000 - $140,000 annually with a full comprehensive benefits including Medical, Dental, Vision, 401K, PTO, Sick Leave as required by law * Must be eligible to work in the United States This job opens for applications on July 30, 2025. Applications for this job will be accepted for at least 30 days from the posting date. Keywords: Splunk, Security Engineer #LI-JA1 #LI-HYBRID
    $81k-110k yearly est. 60d+ ago
  • Cybersecurity Analyst \u007C Information Security

    Beta Technologies 4.2company rating

    Cyber security analyst job in Raleigh, NC

    Job DescriptionAt BETA Technologies, we apply our intellectual curiosity, passion for aviation, and commitment to sustainability toward a shared mission of revolutionizing electric aviation. Regardless of the position one holds, each team member brings their talent and desire to positively impact the environment and lives of others in a refreshing, vibrant, and inclusive culture. The Cybersecurity Incident Analyst is the lifeblood of BETA's Information Security Operations program: pursuing findings from our Security Operations Center (SOC), tracking remediation, identifying opportunities for improvement to BETA's Information Security posture, and maximizing BETA's readiness to address information security incidents by resourcing, training, exercising, and continuously improving our incident response (IR) capabilities.How you will contribute to revolutionizing electric aviation: Own one or more functions of BETA's Information Security Operations program, support the others Triage findings from BETA's SOC and other sensors, owning resolution where possible and documenting/tracking resolution by others where needed Document and track remediation of vulnerabilities and security-relevant misconfigurations, leading periodic reviews with operators of affected assets to guide resolution Respond to information security incidents throughout BETA's information environment as a member of our Incident Response Team (IRT) Develop, maintain, and enhance the resources supporting training- and execution of BETA's Information Security Incident Response Protocol (IRP) Train and exercise the IRP with Team Members who will staff the IRT Collaborate closely with other Digital Infrastructure staff to maximize alignment between security- and operational incident response Contribute reporting to inform periodic (monthly, annual, etc.) enterprise security posture reviews Support audits throughout BETA's information environment by producing required artifacts Cross-train with other BETA's Cybersecurity Analysts and understand their workflows sufficiently to provide coverage in the event of their absence Minimum Qualifications: Strong understanding of information security/cybersecurity first principles Professional experience in an information security/cybersecurity role: continuous monitoring or incident response Strong teamwork orientation Aptitude for organizing information for others to access Aptitude for training others Excellent written and verbal communication Strong sense of initiative Above and Beyond Qualifications: Demonstrated ability to interpret security information for non-practitioners Experience developing- and delivering training in a professional setting, both in-person and online Experience with risk-based vulnerability management Experience with malware analysis and response Experience securing IoT/ICS assets Experience leading information security/cybersecurity incident response Experience developing incident response plans or emergency management plans Enthusiasm for training responders through exercises Experience collecting data in support of reporting via web services APIs Academic degree in information security/cybersecurity, SANS GIAC certification (DFIR track, Cyber Defense track) or equivalent, NIMS Incident Command System certification or similar Physical Demands and Work Environment: This role consists primarily of computer work and presentations to small groups in an office environment The wage listed here reflects our best faith estimate for this role. We pay competitively and base compensation on a variety of factors including skills, experience, industry background, and the evolving needs of the role. We remain committed to fair and equitable pay and we're happy to discuss during the interview process.Build electric airplanes with us! We encourage all driven candidates to apply, even if they do not meet every listed qualification. We are an equal opportunity employer. Employment decisions are based on merit, competence and qualifications and will not be influenced in any manner on race, color, religion, age, sex, sexual orientation, gender identity, national origin, ancestry, citizenship, disability, veteran or military status, genetic information, pregnancy, or any other protected characteristic under federal, state, or local law. BETA complies with all applicable federal, state and local non-discrimination laws and does not tolerate discrimination of any kind in our workplace. Employment offers are contingent upon the successful completion of a background check. BETA Technologies participates in E-Verify. We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $81k-111k yearly est. 12d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Raleigh, NC

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 34d ago
  • Senior Security Engineer

    Sysdig 4.1company rating

    Cyber security analyst job in Raleigh, NC

    At Sysdig, we believe cloud security isn't a compromise - it's a promise. From the start, our mission has been clear: to help organizations secure innovation in the cloud, the right way. We created Falco, the open standard for cloud threat detection, and continue to lead the cloud security market with runtime insights, open innovation, and agentic Al. Creators of technology trusted by over 60% of the Fortune 500, Sysdig gives teams the real-time clarity to move fast and defend what matters most. Culture matters here. We believe diversity fuels stronger ideas, and open dialogue drives sharper decisions. Recognized as a Best Place to Work and one of Deloitte's fastest-growing companies for the past 5 years, we're here to raise the standard for what cloud security and workplace culture should be. If you have the passion to dig deeper, the desire to challenge convention, and the curiosity to build something better, Sysdig is the right place for you.What you will do Lead the design, implementation, and maintenance of security systems, and tools. Collaborate with different teams to integrate security practices into the development lifecycle. Build automation scripts and security tools to improve security efficiency. Review code and architecture for security weaknesses and vulnerabilities, providing recommendations for improvement. Manage and improve security monitoring and incident response within a Security Operations Center (SOC) environment. Stay up-to-date with the latest security trends, tools, and best practices. Manage security for cloud-based infrastructures, ensuring best practices for AWS, GCP, and Azure are followed. What you will bring with you 5+ years of experience in cybersecurity, with a focus on security engineering and secure software development. Proficiency in at least one programming language (Python, Java, Go etc.) and experience writing secure code. Expertise in securing cloud platforms such as AWS, GCP, and Azure, including identity and access management (IAM), security groups, encryption, and network configuration. Experience with security event monitoring, log analysis, and using SIEM (Security Information and Event Management) tools. Knowledge of security protocols, encryption algorithms, and authentication/authorization mechanisms. What we look for Strong communication skills, with the ability to explain complex security concepts to all kinds of audiences. Experience with application security, network security, and cloud security. When you join Sysdig, you can expect: Extra days off to prioritize your well-being 401(k) Retirement Savings Plan with a 3% company match Maternity and Parental Leave Mental health support for you and your family through the Modern Health app Full health benefits package for you and your family The U.S. annual compensation range for this full-time position is between $ 143,000 and 179,000 USD/year. Actual offers may be higher or lower than this range based on a variety of factors, including your work location, job-related experience and education. We would love for you to join us! Please reach out even if your experience doesn't perfectly match the job description. We can always explore other options after starting the conversation. Your background and passion will set you apart, especially if your career path is different. Sysdig values a diverse workplace and encourages women, people of color, LGBTQIA+ individuals, people with disabilities, members of ethnic minorities, foreign-born residents, and veterans to apply. Sysdig is an equal-opportunity employer. Sysdig does not discriminate on the basis of race, color, religion, sex, national origin, age, disability, genetic information, sexual orientation, gender identity, or any other legally protected status. #LI- BA1 #LI-Hybrid
    $143k yearly Auto-Apply 60d+ ago
  • Field Security Engineer

    Collibra 4.2company rating

    Cyber security analyst job in Raleigh, NC

    Joining Collibra's Field Security team This is an opportunity to work in the Field Security team within the growing Information Security Team at Collibra. Field Security blends technical acuity, security evangelism, and promotes open communication to close out prospect and customer concerns, queries, and deals, quickly. We engage externally with small, large, and enterprise customers on promoting Collibra's Information and Cybersecurity posture. We are the champion for our customer's voice in driving innovation and improved security in Collibra's products or services. This is a hybrid role based in our Raleigh office. Our hybrid model means you'll work from the office at least two days each week. This setup helps us stay connected, work more closely together, and keep making progress as a team. Field Security Engineers at Collibra are responsible for Collaborating with customer security teams to build trust and manage concerns and objections. Directly contributing to and completing customer questionnaires and questions as needed. Engage directly with customers on calls, workshops, or in-person meetings. Collaborating with and supporting other internal Collibra teams in customer matters relating to Information or Cybersecurity. Working with Collibra Legal colleagues to ensure from an Information or Cybersecurity perspective, Collibra is protected in regards to onerous or unreasonable customer contract terms. Partnering with Collibra Product Management to support customer Product Security requests. Identifying and developing initiatives to improve Collibra's messaging and transparency on Information and Cybersecurity topics and concerns. Assisting in the buildout, management and enhancement of the Collibra Trust site and other knowledge and enablement resources. You Have 3 or more years of experience in Information and Cybersecurity. 3 or more years of experience in pre-sales support, preferably in an Information and Cybersecurity context. The ability to speak to technical and non-technical audiences. Experience in contract reviews and redlining, in relation to Information and Cybersecurity terms and conditions. Experience with a SaaS vendor and familiarity with cloud deployment models and patterns. Experience or familiarity with cloud infrastructure providers including AWS, GCP, or Azure. Familiarity with common technologies and concepts e.g. Docker, Kubernetes, Microservices, Java, web application implementation patterns. Familiarity with Jira, Github, and Agile practices. Understanding of industry security and compliance standards, and frameworks e.g. ISO 27000 series, NIST 800-53, FedRAMP, OWASP, CIS, CSA, SOC (ISAE 3402). Familiar with basic knowledge management practices. Previously worked with online SaaS productivity applications such as Google docs, Sheets, and Slides. A bachelor's degree or equivalent related working experience is required. You must have work authorization to work in Raleigh (US). You are Fluent in spoken and written English. Adaptable and ready to learn new security and related technologies. Able to articulate security concepts well both verbally and in writing. A great communicator and have the skills to enable external client communication. Measures of success are Within your first month, you will be able to speak to Collibra's product and services and the security controls applicable. By your third month, you will be able to complete customer queries and questionnaires, interact with clients and have detailed sessions around Collibra's security program in relation to Collibra products and services. By your sixth month, you will: Be able to identify and develop relevant initiatives, contents and collateral as needed that enhance Collibra's messaging with customers. Liaise and collaborate effectively with internal Collibra teams to drive and resolve customer security asks, challenges and concerns. Compensation for this role The standard base salary range for this position is $116,000.00 - $145,000.00 per year. This position is not eligible for additional commission-based compensation. Salary offers are based on a combination of factors, including, but not limited to, experience, skills, and location. In addition to base salary, we offer equity ownership at every level, bonus potential, a Flex Fund monthly stipend, pension/401k plans, and more.
    $116k-145k yearly Auto-Apply 60d+ ago
  • Security Engineer - IAM

    State Employees' Credit Union 3.3company rating

    Cyber security analyst job in Raleigh, NC

    If you are motivated and believe in the credit union philosophy of "People Helping People," join our team! The Security Engineer - IAM is a mid-level role responsible for enhancing and evolving SECU's IAM practices, processes, and solutions. This individual will serve as a key technical resource, providing operational support, management, implementation, and strategic development of IAM solutions, including Privileged Access Management (PAM), Single Sign-On (SSO), Identity Governance and Administration (IGA), Multi-Factor Authentication (MFA), Active Directory (AD), Customer Identity and Access Management (CIAM), and other IAM technologies. The engineer will provide input and have some responsibility with designing and optimizing IAM frameworks, driving automation, and ensuring alignment with security best practices and compliance requirements. Additionally, they will actively collaborate with cross-functional teams, mentor junior engineers, and work closely with key stakeholders to strengthen the adoption of IAM controls and solutions while contributing to the overall cybersecurity strategy. Responsibilities: (30%) Perform operational support and maintenance of technical security solutions to enhance SECU's security posture. (20%) Assist in the configuration and tuning of security tools and integrations with enterprise controls and tools. (20%) Participate in identification of service quality, documentation, and operational efficiency and improvement opportunities. (10%) Participate in on-call rotation and serve as a resource for technical support of information security technologies. (10%) Mentor and collaborate with junior engineers. (10%) Pursue and maintain additional skills and certifications commensurate with the role to remain current on advancing cyber security trends. Responsibilities will include participation in special assignments and cross-functional initiatives as required. Required Education & Experience (Knowledge, Skills, & Abilities): Candidate must live in North Carolina or contiguous state. Bachelors degree in Computer Science, Information Technology, Cyber Security, or related field. Additional 2 years of relevant experience can be considered in lieu of degree. Minimum 2 year of experience in related field. General IAM Solutions Experience supporting one or more IAM solutions such as PAM, SSO, Directory Services, IGA, CIAM, and MFA Understanding of IAM Concepts Demonstrated experience and understanding of core IAM principles, such as authentication, authorization, provisioning, and access control. Demonstrated experience and understanding of identity lifecycle management (creation, modification, and deletion of user accounts). Basic Programming/Scripting Skills Ability to leverage and understand scripting languages such as Python, PowerShell, or Bash for automating tasks. User and Role Management Experience in managing user accounts, groups, roles, and permissions within an IAM system. Security Awareness Understanding of security principles, including least privilege, segregation of duties, and access reviews. Incident Response and Troubleshooting Ability to investigate and resolve access-related issues and incidents. Experience with IAM-related logs and monitoring tools for diagnosing and fixing issues. Ability to identify discrepancies or potential security risks in access control settings. Communication Skills Ability to document processes, policies, and procedures clearly and concisely. Skills in communicating technical concepts to non-technical stakeholders. Preferred Education & Experience (Knowledge, Skills, & Abilities): Bachelors degree in Computer Science, Information Technology, Cyber Security, or related field. Preferred 2-5 direct years of experience. Ability to manage role-based access control (RBAC) policies. Experience working in cross-functional teams, including IT, security, and compliance. Ability to collaborate with stakeholders to understand access requirements and implement them effectively. Experience working within a DevOps environment. Professional certifications such as: CISSP, CISA, CISM, GIAC, CGEIT, CRISC, OSCE, or other relevant industry certification and/or desire to obtain such certifications. Work Environment & Physical Requirements: *Note: “Working Conditions” or “ADA” - open to other language Computer for prolonged periods SECU provides equal employment opportunity to all qualified persons regardless of race, color, religion, age, sex, sexual orientation, gender identity, national origin, genetic information, disability, veteran status, or other classification protected by law. Disclaimer State Employees' Credit Union reserves the right to fill this role at a higher/lower level based on business need.
    $96k-131k yearly est. Auto-Apply 53d ago
  • AWS Infrastructure and Security Engineer

    Community Care of North Carolina Inc. 4.0company rating

    Cyber security analyst job in Raleigh, NC

    This position serves as an AWS Infrastructure and Security Engineer. This position is responsible for building and securing a multi account secure landing zones using Infrastructure as Code. This role will include the understanding of all foundational infrastructure elements within the AWS stack to support data processing and analytics. This role will require an in-depth understanding of AWS Infrastructure pieces including IAM, CloudTrail, CloudWatch, AWS Config, SNS, GuardDuty, KMS, Macie, AWS Firewall, Amazon Inspector, EC2, VPN and AWS Managed Microsoft Active Directory. The AWS Infrastructure and Security Engineer will have a strong understanding of zero trust security best practices in relation to setting up the AWS environment utilizing NIST framework to support a health care data processing environment adhering to all applicable federal, state and customer rules and regulations pertaining to processing PHI/PII data. Essential Functions Work collaboratively with senior leadership and other team members to design, build and maintain an optimized infrastructure. Must be experienced in the AWS Infrastructure stack utilizing the tools stated above in the Position Summary. Professionally effective within a fast paced and business objective driven environment, self-managing deliverables and maintaining accountability to self and the team. Work collaboratively with stakeholders like Project Management, Vendor/Customer partners, other business function representatives and end users in an Agile/Waterfall hybrid delivery environment Work with the Infrastructure team members as required to meet deliverables Monitor and remediate any security findings within AWS accounts Respond to security incidents and make the security officer aware if it is something high or critical Adhere to all applicable CCNC policies and procedures including IT Service Management and Security policies. Excellent organizational skills and attention to detail. Excellent interpersonal and customer service skills. Proficient with or able to quickly learn the software and applications used in the organization and industry. Ability to effectively present complex technical information to end users, coworkers, and management. Qualifications Education and Experience Bachelor's degree or equivalent work experience 3 years + of enterprise experience working within the AWS Infrastructure stack specifically in the security area. 5+ years' experience in Infrastructure management and security role with some experience utilizing AWS tools and components Certifications AWS Certified Solutions Architect is a plus but not required Security Certifications a plus but not required Skills Required Experience with Vulnerability management Experience with HIPAA and NIST security guidelines Knowledge of security tools in AWS Solid understanding of networking concepts such as IP routing, LAN, WAN, DMZ, VPN, etc. Solid understanding of security encryption technologies Experience with pen-testing and gathering SOC2 evidence Solid understanding of AWS tools for alerting and being able to respond in a timely manner Working Conditions This job is virtual (person can be located anywhere within the continental US) but the candidate will be required to work during US EST times with meetings starting as early as 7AM EST in some cases. Responsibilities may require working evenings and weekends with little advanced notice.
    $87k-118k yearly est. Auto-Apply 39d ago
  • Sr. Information Security Engineer

    Bandwidth 4.5company rating

    Cyber security analyst job in Raleigh, NC

    Job Description Who We Are: Bandwidth, a prior "Best of EC" award winner, is a global software company that helps enterprises deliver exceptional experiences through voice, messaging, and emergency services. Reaching 65+ countries and over 90 percent of the global economy, we're the only provider offering an owned communications cloud that delivers advanced automation, AI integrations, global reach, and premium human support. Bandwidth is trusted for mission-critical communications by the Global 2000, hyperscalers, and SaaS builders! At Bandwidth, your music matters when you are part of the BAND. We celebrate differences and encourage BANDmates to be their authentic selves. #jointheband What We Are Looking For: The mission of the Security Operations team is to build, deploy, and operate information security systems, infrastructure, and tools. The Senior Security Engineer will act as a leader in monitoring, administration, ticketing and support. In addition, mentoring other security team members in operations functions, as well as assisting management in growing and maturing security detection, monitoring and response. As a Senior Security Engineer, you will work closely with not only other Information Security teams but also partner with the IT, development and architecture organizations. You will be part of a talented team of security professionals who demonstrate superb technical competency, delivering mission critical infrastructure and ensuring the highest levels of availability, performance and security across the enterprise. What You'll Do: Provide technical and operational leadership for aspects of security operations, security architecture and security tools administration. Serve as an escalation point in incident response scenarios; acting as the incident lead and conducting investigations and forensics as needed. Actively engages in the performance of Incident Response activities, including but not limited to, triage, escalation, conducting post-mortem and lessons learned, as well as remediation tracking. Displays a strong knowledge and understanding of the utilization of various security tools include SIEM, SOAR, vulnerability scanners, CSPM, and EDR Advanced understanding of securing both cloud-based (AWS, GCP) and on-prem workloads including traditional architecture design and containerized environments. Identify gaps in current monitoring or operational processes and workflows, and recommend changes or enhancements to improve efficiency through security best practices.. Provide security consulting on medium to large scale projects for internal clients to ensure conformity with corporate information, security policy and standards Drive vulnerability management and remediation efforts - prioritizing issues, implementing mitigations, and designing strategic preventative and compensating controls Drives process improvement and control implementation projects in coordination with the other Enterprise teams Engages with neighboring Bandwidth technology teams to drive awareness and compliance to security policies and standards Participate in security on-call rotation, supporting off-hours general security incidents and production systems. Maintain working relationships with business partners to understand business processes, and the impact of implementing security controls in their ability to do business Train and mentor team members for security operations, support, and/or administration tasks What You Need: Education: Degree in an IT or Information Security discipline or other equivalent combination of education and/or experience that is focused on IT Security and Technology Operations. One or more of the following certifications: GIAC Information Security Professional (GISP) Certified Information Systems Security Professional (CISSP) AWS Certified Security Specialty Experience: 5 or more years of specific Security Operations experience required. 5 or more years SIEM, SOAR and vulnerability management experience, including integrating endpoints 3 or more years of incident response experience across a variety of environments and resource types: on-prem, cloud, endpoints, servers, containers, etc. Knowledge: Familiarity with cutting-edge security technologies such as Zero-Trust Network Access, SSO, Endpoint Detection and Response (EDR), and Security Incident and Event Management required (SIEM). Experience working in multi-cloud organizations utilizing cloud security posture management (CSPM) and cloud-native security tools with a "shift-left" DevSecOps mentality Experience working with a third-party Managed Security Service Provider (MSSP) Skills: Proficient in Windows and Linux operating systems. Ability to analyze a complex technical environment and quickly build a conceptual understanding of how the pieces all fit together Proficient in automation and scripting languages (Python, Bash, etc) Ability to analyze and correlate information from multiple sources to determine and articulate potential risk to the business in non-technical terms. Team player with strong communication skills, ability to collaborate with highly technical colleagues and non-technical end-users at a level they can understand. Bonus Points: Experience: Hands-on experience with Wiz and CrowdStrike - cloud security and container security . Hands-on experience with AWS / cloud security tools (Guard Duty, Amazon Inspector, AWS Shield,Wiz, Lacework, etc.) Strong knowledge of SIEM tools and logging (Splunk, Sumo Logic, Data Dog, Qualys) Understanding of maintaining and administering endpoint detection response tools (CrowdStrike, FireEye, etc) Foundational knowledge of Ai - LLMs (language learning models), MCP (model context protocol) and the impacts of these on securing organizational resources. Knowledge: Understanding of authentication and authorization mechanisms. Familiar with data classification, data protection, and secure data handling practices. Understanding of regulatory requirements (SOX, GDPR, HIPAA … ) The Whole Person Promise: At Bandwidth, we're pretty proud of our corporate culture, which is rooted in our "Whole Person Promise." We promise all employees that they can have meaningful work AND a full life, and we provide a work environment geared toward enriching your body, mind, and spirit. How do we do that? Well… 100% company-paid Medical, Vision, & Dental coverage for you and your family with low deductibles and low out-of-pocket expenses. All new hires receive four weeks of PTO. PTO Embargo. When you take time off (of any kind!) you're embargoed from working. Bandmates and managers are not allowed to interrupt your PTO - not even with email. Additional PTO can be earned throughout the year through volunteer hours and Bandwidth challenges. "Mahalo moments" program grants additional time off for life's most important moments like graduations, buying a first home, getting married, wedding anniversaries (every five years), and the birth of a grandchild. 90-Minute Workout Lunches and unlimited meetings with our very own nutritionist. Are you excited about the position and its responsibilities, but not sure if you're 100% qualified? Do you feel you can work to help us crush the mission? If you answered 'yes' to both of these questions, we encourage you to apply! You won't want to miss the opportunity to be a part of the BAND. Applicant Privacy Notice
    $93k-119k yearly est. 5d ago
  • Security Engineer II

    Trustmark 4.6company rating

    Cyber security analyst job in Raleigh, NC

    Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities. We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information. You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs. **Responsibilities:** + Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data. + Conduct vulnerability assessments and penetration testing to identify and mitigate risks. + Develop and implement security policies, standards, and procedures. + Monitor security systems and respond to incidents promptly and effectively. + Stay up-to-date with the latest cybersecurity threats and trends. + Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business. + Provide technical guidance and support to internal stakeholders. **Qualifications:** + Bachelor's degree in Computer Science, Information Technology, or a related field or + 3-5 Years of network engineering or cyber engineering experience + Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001). + Proficiency in network security, systems security, application security, and data security. + Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM). + Excellent problem-solving and analytical skills. + Strong communication and interpersonal skills. + Ability to work independently and as part of a team. **Preferred Qualifications:** + Certifications such as CISSP, CISA, or CEH. + Experience with cloud security (e.g., AWS, Azure, GCP). + Knowledge of scripting and programming languages (e.g., Python, PowerShell). Brand: Trustmark Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums. **For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability. Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match. When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives. At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
    $82k-105k yearly est. 60d+ ago
  • Detection & Response Security Engineer, Threat Intelligence

    Meta 4.8company rating

    Cyber security analyst job in Raleigh, NC

    Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements. **Required Skills:** Detection & Response Security Engineer, Threat Intelligence Responsibilities: 1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects 2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work 3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services 4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions 5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network 6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences 7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations 8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems **Minimum Qualifications:** Minimum Qualifications: 9. 8+ years threat intelligence experience 10. B.S. or M.S. in Computer Science or related field, or equivalent experience 11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services 12. Experience developing and delivering information on threats, incidents and program status for leadership 13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures 14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework 15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks 16. Proven track record of managing and executing on short term and long term projects 17. Ability to work with a team spanning multiple locations/time zones 18. Ability to prioritize and execute tasks with minimal direction or oversight 19. Ability to think critically and qualify assessments with solid communications skills 20. Coding or scripting experience in one or more scripting languages such as Python or PHP **Preferred Qualifications:** Preferred Qualifications: 21. Experience recruiting, building, and leading technical teams, including performance management 22. Experience close collaborating with incident responders on incident investigations 23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems 24. Familiarity with malware analysis or network traffic analysis 25. Familiarity with nation-state, sophisticated criminal, or supply chain threats 26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort 27. Experience in one or more query languages such as SQL 28. Experience authoring production code for threat intelligence tooling 29. Experience conducting large scale data analysis 30. Experience working across the broader security community **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 55d ago
  • Cybersecurity Analyst | Information Security

    Beta 4.2company rating

    Cyber security analyst job in Raleigh, NC

    At BETA Technologies, we apply our intellectual curiosity, passion for aviation, and commitment to sustainability toward a shared mission of revolutionizing electric aviation. Regardless of the position one holds, each team member brings their talent and desire to positively impact the environment and lives of others in a refreshing, vibrant, and inclusive culture. The Cybersecurity Incident Analyst is the lifeblood of BETA's Information Security Operations program: pursuing findings from our Security Operations Center (SOC), tracking remediation, identifying opportunities for improvement to BETA's Information Security posture, and maximizing BETA's readiness to address information security incidents by resourcing, training, exercising, and continuously improving our incident response (IR) capabilities.How you will contribute to revolutionizing electric aviation: Own one or more functions of BETA's Information Security Operations program, support the others Triage findings from BETA's SOC and other sensors, owning resolution where possible and documenting/tracking resolution by others where needed Document and track remediation of vulnerabilities and security-relevant misconfigurations, leading periodic reviews with operators of affected assets to guide resolution Respond to information security incidents throughout BETA's information environment as a member of our Incident Response Team (IRT) Develop, maintain, and enhance the resources supporting training- and execution of BETA's Information Security Incident Response Protocol (IRP) Train and exercise the IRP with Team Members who will staff the IRT Collaborate closely with other Digital Infrastructure staff to maximize alignment between security- and operational incident response Contribute reporting to inform periodic (monthly, annual, etc.) enterprise security posture reviews Support audits throughout BETA's information environment by producing required artifacts Cross-train with other BETA's Cybersecurity Analysts and understand their workflows sufficiently to provide coverage in the event of their absence Minimum Qualifications: Strong understanding of information security/cybersecurity first principles Professional experience in an information security/cybersecurity role: continuous monitoring or incident response Strong teamwork orientation Aptitude for organizing information for others to access Aptitude for training others Excellent written and verbal communication Strong sense of initiative Above and Beyond Qualifications: Demonstrated ability to interpret security information for non-practitioners Experience developing- and delivering training in a professional setting, both in-person and online Experience with risk-based vulnerability management Experience with malware analysis and response Experience securing IoT/ICS assets Experience leading information security/cybersecurity incident response Experience developing incident response plans or emergency management plans Enthusiasm for training responders through exercises Experience collecting data in support of reporting via web services APIs Academic degree in information security/cybersecurity, SANS GIAC certification (DFIR track, Cyber Defense track) or equivalent, NIMS Incident Command System certification or similar Physical Demands and Work Environment: This role consists primarily of computer work and presentations to small groups in an office environment Build electric airplanes with us! We encourage all driven candidates to apply, even if they do not meet every listed qualification. We are an equal opportunity employer. Employment decisions are based on merit, competence and qualifications and will not be influenced in any manner on race, color, religion, age, sex, sexual orientation, gender identity, national origin, ancestry, citizenship, disability, veteran or military status, genetic information, pregnancy, or any other protected characteristic under federal, state, or local law. BETA complies with all applicable federal, state and local non-discrimination laws and does not tolerate discrimination of any kind in our workplace. Employment offers are contingent upon the successful completion of a background check. BETA Technologies participates in E-Verify.
    $81k-111k yearly est. Auto-Apply 42d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Raleigh, NC

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 34d ago
  • Senior Security Engineer

    Sysdig Cloud 4.1company rating

    Cyber security analyst job in Raleigh, NC

    At Sysdig, we believe cloud security isn't a compromise - it's a promise. From the start, our mission has been clear: to help organizations secure innovation in the cloud, the right way. We created Falco, the open standard for cloud threat detection, and continue to lead the cloud security market with runtime insights, open innovation, and agentic Al. Creators of technology trusted by over 60% of the Fortune 500, Sysdig gives teams the real-time clarity to move fast and defend what matters most. Culture matters here. We believe diversity fuels stronger ideas, and open dialogue drives sharper decisions. Recognized as a Best Place to Work and one of Deloitte's fastest-growing companies for the past 5 years, we're here to raise the standard for what cloud security and workplace culture should be. If you have the passion to dig deeper, the desire to challenge convention, and the curiosity to build something better, Sysdig is the right place for you. What you will do * Lead the design, implementation, and maintenance of security systems, and tools. * Collaborate with different teams to integrate security practices into the development lifecycle. * Build automation scripts and security tools to improve security efficiency. * Review code and architecture for security weaknesses and vulnerabilities, providing recommendations for improvement. * Manage and improve security monitoring and incident response within a Security Operations Center (SOC) environment. * Stay up-to-date with the latest security trends, tools, and best practices. * Manage security for cloud-based infrastructures, ensuring best practices for AWS, GCP, and Azure are followed. What you will bring with you * 5+ years of experience in cybersecurity, with a focus on security engineering and secure software development. * Proficiency in at least one programming language (Python, Java, Go etc.) and experience writing secure code. * Expertise in securing cloud platforms such as AWS, GCP, and Azure, including identity and access management (IAM), security groups, encryption, and network configuration. * Experience with security event monitoring, log analysis, and using SIEM (Security Information and Event Management) tools. * Knowledge of security protocols, encryption algorithms, and authentication/authorization mechanisms. What we look for * Strong communication skills, with the ability to explain complex security concepts to all kinds of audiences. * Experience with application security, network security, and cloud security. When you join Sysdig, you can expect: * Extra days off to prioritize your well-being * 401(k) Retirement Savings Plan with a 3% company match * Maternity and Parental Leave * Mental health support for you and your family through the Modern Health app * Full health benefits package for you and your family The U.S. annual compensation range for this full-time position is between $ 143,000 and 179,000 USD/year. Actual offers may be higher or lower than this range based on a variety of factors, including your work location, job-related experience and education. We would love for you to join us! Please reach out even if your experience doesn't perfectly match the job description. We can always explore other options after starting the conversation. Your background and passion will set you apart, especially if your career path is different. Sysdig values a diverse workplace and encourages women, people of color, LGBTQIA+ individuals, people with disabilities, members of ethnic minorities, foreign-born residents, and veterans to apply. Sysdig is an equal-opportunity employer. Sysdig does not discriminate on the basis of race, color, religion, sex, national origin, age, disability, genetic information, sexual orientation, gender identity, or any other legally protected status. #LI- BA1 #LI-Hybrid We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $143k yearly 60d+ ago
  • Sr. Information Security Engineer

    Bandwidth 4.5company rating

    Cyber security analyst job in Raleigh, NC

    Who We Are: Bandwidth, a prior “Best of EC” award winner, is a global software company that helps enterprises deliver exceptional experiences through voice, messaging, and emergency services. Reaching 65+ countries and over 90 percent of the global economy, we're the only provider offering an owned communications cloud that delivers advanced automation, AI integrations, global reach, and premium human support. Bandwidth is trusted for mission-critical communications by the Global 2000, hyperscalers, and SaaS builders! At Bandwidth, your music matters when you are part of the BAND. We celebrate differences and encourage BANDmates to be their authentic selves. #jointheband What We Are Looking For: The mission of the Security Operations team is to build, deploy, and operate information security systems, infrastructure, and tools. The Senior Security Engineer will act as a leader in monitoring, administration, ticketing and support. In addition, mentoring other security team members in operations functions, as well as assisting management in growing and maturing security detection, monitoring and response. As a Senior Security Engineer, you will work closely with not only other Information Security teams but also partner with the IT, development and architecture organizations. You will be part of a talented team of security professionals who demonstrate superb technical competency, delivering mission critical infrastructure and ensuring the highest levels of availability, performance and security across the enterprise. What You'll Do: Provide technical and operational leadership for aspects of security operations, security architecture and security tools administration. Serve as an escalation point in incident response scenarios; acting as the incident lead and conducting investigations and forensics as needed. Actively engages in the performance of Incident Response activities, including but not limited to, triage, escalation, conducting post-mortem and lessons learned, as well as remediation tracking. Displays a strong knowledge and understanding of the utilization of various security tools include SIEM, SOAR, vulnerability scanners, CSPM, and EDR Advanced understanding of securing both cloud-based (AWS, GCP) and on-prem workloads including traditional architecture design and containerized environments. Identify gaps in current monitoring or operational processes and workflows, and recommend changes or enhancements to improve efficiency through security best practices.. Provide security consulting on medium to large scale projects for internal clients to ensure conformity with corporate information, security policy and standards Drive vulnerability management and remediation efforts - prioritizing issues, implementing mitigations, and designing strategic preventative and compensating controls Drives process improvement and control implementation projects in coordination with the other Enterprise teams Engages with neighboring Bandwidth technology teams to drive awareness and compliance to security policies and standards Participate in security on-call rotation, supporting off-hours general security incidents and production systems. Maintain working relationships with business partners to understand business processes, and the impact of implementing security controls in their ability to do business Train and mentor team members for security operations, support, and/or administration tasks What You Need: Education: Degree in an IT or Information Security discipline or other equivalent combination of education and/or experience that is focused on IT Security and Technology Operations. One or more of the following certifications: GIAC Information Security Professional (GISP) Certified Information Systems Security Professional (CISSP) AWS Certified Security Specialty Experience: 5 or more years of specific Security Operations experience required. 5 or more years SIEM, SOAR and vulnerability management experience, including integrating endpoints 3 or more years of incident response experience across a variety of environments and resource types: on-prem, cloud, endpoints, servers, containers, etc. Knowledge: Familiarity with cutting-edge security technologies such as Zero-Trust Network Access, SSO, Endpoint Detection and Response (EDR), and Security Incident and Event Management required (SIEM). Experience working in multi-cloud organizations utilizing cloud security posture management (CSPM) and cloud-native security tools with a “shift-left” DevSecOps mentality Experience working with a third-party Managed Security Service Provider (MSSP) Skills: Proficient in Windows and Linux operating systems. Ability to analyze a complex technical environment and quickly build a conceptual understanding of how the pieces all fit together Proficient in automation and scripting languages (Python, Bash, etc) Ability to analyze and correlate information from multiple sources to determine and articulate potential risk to the business in non-technical terms. Team player with strong communication skills, ability to collaborate with highly technical colleagues and non-technical end-users at a level they can understand. Bonus Points: Experience: Hands-on experience with Wiz and CrowdStrike - cloud security and container security . Hands-on experience with AWS / cloud security tools (Guard Duty, Amazon Inspector, AWS Shield,Wiz, Lacework, etc.) Strong knowledge of SIEM tools and logging (Splunk, Sumo Logic, Data Dog, Qualys) Understanding of maintaining and administering endpoint detection response tools (CrowdStrike, FireEye, etc) Foundational knowledge of Ai - LLMs (language learning models), MCP (model context protocol) and the impacts of these on securing organizational resources. Knowledge: Understanding of authentication and authorization mechanisms. Familiar with data classification, data protection, and secure data handling practices. Understanding of regulatory requirements (SOX, GDPR, HIPAA … ) The Whole Person Promise: At Bandwidth, we're pretty proud of our corporate culture, which is rooted in our “Whole Person Promise.” We promise all employees that they can have meaningful work AND a full life, and we provide a work environment geared toward enriching your body, mind, and spirit. How do we do that? Well… 100% company-paid Medical, Vision, & Dental coverage for you and your family with low deductibles and low out-of-pocket expenses. All new hires receive four weeks of PTO. PTO Embargo. When you take time off (of any kind!) you're embargoed from working. Bandmates and managers are not allowed to interrupt your PTO - not even with email. Additional PTO can be earned throughout the year through volunteer hours and Bandwidth challenges. “Mahalo moments” program grants additional time off for life's most important moments like graduations, buying a first home, getting married, wedding anniversaries (every five years), and the birth of a grandchild. 90-Minute Workout Lunches and unlimited meetings with our very own nutritionist. Are you excited about the position and its responsibilities, but not sure if you're 100% qualified? Do you feel you can work to help us crush the mission? If you answered ‘yes' to both of these questions, we encourage you to apply! You won't want to miss the opportunity to be a part of the BAND. Applicant Privacy Notice
    $93k-119k yearly est. Auto-Apply 5d ago
  • Sr. Security Engineer - IAM

    State Employees' Credit Union 3.8company rating

    Cyber security analyst job in Raleigh, NC

    If you are motivated and believe in the credit union philosophy of "People Helping People," join our team! The Sr. Security Engineer - IAM is a mid to senior-level role responsible for driving the design, development, and advancement of SECU's IAM program. This individual will serve as a subject matter expert (SME) and technical lead, providing support as well as participating in the strategic direction, implementation, and continuous improvement of IAM solutions, including Privileged Access Management (PAM), Single Sign-On (SSO), Identity Governance and Administration (IGA), Multi-Factor Authentication (MFA), Active Directory (AD), Customer Identity and Access Management (CIAM), and other IAM technologies. This role will be instrumental in designing and optimizing IAM frameworks, automating identity processes, and ensuring compliance with security policies and regulatory requirements. The engineer will collaborate with cybersecurity, IT, and business stakeholders to enhance security posture, mitigate identity-related risks, and drive IAM adoption. Additionally, they will mentor junior engineers, lead complex IAM projects, and provide technical guidance to strengthen the overall cybersecurity strategy. Essential Responsibilities: (30%) Assist with implementation and maintenance of technical security solutions including planning, deployment coordination, change management, documentation, and training to enhance SECU's security posture. (20%) Configure and tune security tools, integrate them with enterprise controls, and evaluate vendor offerings and new tools to improve security responsiveness. (20%) Identify and recommend opportunities for documentation enhancements, cost savings, service quality improvements, and operational efficiency. * (10%) Support governance and compliance efforts by participating in assessments and remediation activities to ensure adherence to security standards and regulations. (10%) Participate in on-call rotation and serve as a resource for technical support of information security technologies and mentor junior engineers. (10%) Pursue and maintain skills and certifications to stay current with advancing cybersecurity trends and best practices. Responsibilities will include participation in special assignments and cross-functional initiatives as required. Required Education & Experience (Knowledge, Skills, & Abilities): * Candidate MUST live in North Carolina or contiguous state. * Bachelors degree in Computer Science, Information Technology, Cyber Security, or related field. o Additional 3 years of relevant experience can be considered in lieu of degree. * Minimum 5 year of experience in related field. * Primary IAM Solution Experience o Proficient with SailPoint IdentityNow (IDN) architecture, administration, and configurations. o Knowledge of Identity Profiles and Source configurations o Hands-on experience with Access Profiles, Roles, Policies, and Certifications o Experience configuring SaaS-based Identity Governance (IG) solutions. o Expertise in Joiner-Mover-Leaver (JML) workflows o Experience implementing access request, approval workflows, and certification campaigns. o Experience with Segregation of Duties (SoD) and compliance enforcement o Demonstrated experience with most common IGA and SailPoint connectors including Active Directory (AD), EntraID, JDBC, exchange, mainframe, web service, and authoritative sources integration (such as Workday). * General IAM Solutions o Proficient in implementing or supporting two or more IAM solutions such as PAM, SSO, Directory Services, IGA, CIAM, and MFA o Experience in implementing integrations between multiple IAM solutions. o Knowledge of cloud directories such as Entra ID, AWS Directory Service, and Google Cloud Identity. o Knowledge of hybrid IAM environments and cloud-to-cloud identity integration. o Understanding of APIs how they are used to integrate IAM systems with other applications. * Authentication and Authorization Protocols o Understanding of authentication and authorization protocols such as OAuth2.0, OIDC (OpenID Connect), SAML (Security Assertion Markup Language), LDAP (Lightweight Directory Access Protocol), Kerberos, and XACML (eXtensible Access Control Markup Language). * IAM Governance and Compliance o Familiarity with IAM governance frameworks and standards such as NIST, ISO 27001, SOX, and GDPR. o Experience with audit and compliance reporting. * User Lifecycle Management o Experience in provisioning and de-provisioning user accounts, including Joiner-Mover-Leaver (JML) processes. o Experience with automation of user lifecycle management using tools such as PowerShell, Python, or IAM orchestration tools. o Experience in implementation or support of Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). * Security and Risk Management o Understanding of IAM's role in broader security frameworks and risk management. o Understanding of threat modeling and risk assessment related to identity and access. * Incident Response and Forensics o Ability to support IAM-related incident response efforts, including identifying and mitigating identity-based security incidents. o Understanding of forensic analysis related to identity breaches. o Ability to leverage and understand scripting languages such as Python, PowerShell, or Bash for automating tasks. * Collaboration and Leadership o Experience in participating in cross-functional teams in IAM initiatives. o Ability to collaborate with security, IT operations, developers, and business stakeholders to align IAM solutions with organizational goals. * Problem-Solving and Analytical Skills o Strong problem-solving skills for troubleshooting and resolving IAM issues. o Analytical skills for identifying patterns and improving IAM processes. Preferred Education & Experience (Knowledge, Skills, & Abilities): * Bachelors degree in Computer Science, Information Technology, Cyber Security, or related field. * Preferred 5+ direct years of experience. * Professional certifications such as: CISSP, CISA, CISM, GIAC, CGEIT, CRISC, OSCE, or other relevant industry certification and/or desire to obtain such certifications. * Experience working within a DevOps environment * Experience in managing IAM projects from inception to delivery. * Understanding of FFIEC audit guidelines for banking regulators Job Environment & Physical Requirements: * Computer for prolonged periods SECU provides equal employment opportunity to all qualified persons regardless of race, color, religion, age, sex, sexual orientation, gender identity, national origin, genetic information, disability, veteran status, or other classification protected by law. Disclaimer State Employees' Credit Union reserves the right to fill this role at a higher/lower level based on business need.
    $104k-129k yearly est. Auto-Apply 60d+ ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Goldsboro, NC?

The average cyber security analyst in Goldsboro, NC earns between $64,000 and $115,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Goldsboro, NC

$86,000
Job type you want
Full Time
Part Time
Internship
Temporary