Cyber security analyst jobs in Hermitage, PA - 495 jobs
All
Cyber Security Analyst
Information Security Analyst
Cyber Security Engineer
Cyber Security Specialist
Senior Security Analyst
Securities Analyst
Defense Analyst
Lead Security Engineer - Cyber Security
Relativity 4.7
Cyber security analyst job in Columbus, OH
Posting Type
Remote
As a Lead CyberSecurity Engineer, you will ensure the security of Relativity's network and infrastructure. In this role, the main responsibilities will be to investigate and analyze emerging threats against our assets, identities, and clients. You will also provide actionable remediation guidance to end users and collaborate with highly skilled cyber experts to anticipate and mitigate evolving threats using world-class toolsets and next generation capabilities.
Job Description and Requirements
Responsibilities:
Review, validation, and triage of alerts and technical analysis of log data from a diverse inventory of sensors, correlated signature logic, and threat intelligence sources.
Assess the impact of security events by leveraging host, cloud and network-based indicators and evidence to deliver actionable incident escalations.
Develop and deploy detection and prevention signatures with response actions as part of a layered defensive strategy leveraging multiple technologies and data types.
Build automation to search through collected telemetry to detect and isolate advanced threats that evade existing security solutions.
Create Standard Operating Procedures, SOC playbooks, configuration guides, and secure standards.
Automate incident handling processes.
Engage in the continuous research of emerging threats and apply appropriate countermeasures within the context of a rapidly changing environment.
Serve as a subject matter expert in the mechanism and analysis of observed malicious activity.
Clearly document and communicate investigation findings to both technical and executive stakeholders.
Identify and automate away technical burden.
Build automation to deploy, operate and connect multiple cybersecurity tools and applications.
Preferred Qualifications:
7+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team for Cloud applications and corporate networks
Exposure to threat detection development and tuning
Experience in software design and development
DevSecOps experience
Ability to perform threat hunting, threat emulation, and/or purple teaming exercises
Familiarity with industry standard security devices and their configuration
Experience in reverse engineering malicious code to explore infection and propagation mechanisms
Experience with threat intelligence tools and processes
Certifications: One or more of the following certifications are preferred (GCFA, GCIA, GCIH, GNFA, GREM, OSCP, OSEP, OSED, OSWE, OSDA, OSCE3, CompTIA Security+, CCNA CyberOps, or CEH)
5+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team
Strong cyber incident response skills (such as: Network forensics, memory forensics, and/or packet analysis)
Ability to read, write and analyze PowerShell, C#, and Python
Capability to independently manage the prioritization of complex security events
Advanced understanding of common SOC/CIRT operational processes and documentation
Advanced knowledge of TCP/IP, network services, cryptography, cloud, and web application attacks
Ability to collaborate within a global cross-functional team to execute on high-level objectives and drive the maturation of Relativity's security posture
Deep understanding of infection mechanisms, malicious behavior, exploitation techniques, and mitigating controls
Good understanding of tools, tactics, and procedures utilized by attackers to access private systems and data
Strong analytical and problem-solving skills
Minimum Qualifications:
5+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team
Strong cyber incident response skills (such as: Network forensics, memory forensics, and/or packet analysis)
Ability to read, write and analyze PowerShell, C#, and Python
Capability to independently manage the prioritization of complex security events
Advanced understanding of common SOC/CIRT operational processes and documentation
Advanced knowledge of TCP/IP, network services, cryptography, cloud, and web application attacks
Ability to collaborate within a global cross-functional team to execute on high-level objectives and drive the maturation of Relativity's security posture
Deep understanding of infection mechanisms, malicious behavior, exploitation techniques, and mitigating controls
Good understanding of tools, tactics, and procedures utilized by attackers to access private systems and data
Strong analytical and problem-solving skills
Ability to leverage programming and scripting languages to build automations and develop SOAR playbooks
Relativity is committed to competitive, fair, and equitable compensation practices.
This position is eligible for total compensation which includes a competitive base salary, an annual performance bonus, and long-term incentives.
The expected salary range for this role is between following values:
$150,000 and $226,000
The final offered salary will be based on several factors, including but not limited to the candidate's depth of experience, skill set, qualifications, and internal pay equity. Hiring at the top end of the range would not be typical, to allow for future meaningful salary growth in this position.
Suggested Skills:
Cybersecurity, Infrastructure Security, Network Security, Penetration Testing, Security Architecture Design, Security Audit, Security Information, Security Information and Event Management (SIEM), Security Operations, Vulnerability Management
$69k-89k yearly est. 4d ago
Looking for a job?
Let Zippia find it for you.
Cyber Security Specialist
First National Bank of Pennsylvania 3.7
Cyber security analyst job in Pittsburgh, PA
Primary Office Location:626 Washington Place. Pittsburgh, Pennsylvania. 15219.Join our team. Make a difference - for us and for your future.
CyberSecurity Specialist
Business Unit: Risk Management
Reports to: Manager of CyberSecurity
Position Overview:
This position is primarily responsible for performing all procedures necessary to ensure the safety of information systems assets and protecting systems from intentional or inadvertent access or destruction under the supervision of the Manager of CyberSecurity. The incumbent demonstrates the ability to develop IT security standards and procedures, has demonstrated knowledge and understanding of IT industry trends and emerging technologies and an ability to relate them to the corporation and it's objectives.
Primary Responsibilities:
Investigates, escalates and documents cybersecurity events or incidents according to standard operating procedures (SOP), as needed. Writes comprehensive reports of incident investigations.
Evaluates and improves Security Information and Event Management (SIEM) rule set based on threat and vulnerability indicators.
Analyzes information from variable threat sources and provide necessary awareness to management, IT and impact business areas.
Tracks remediation of identified issues based on incident investigations.
Utilizes forensic resources to understand event impacts and generates incident reports.
Assists management in preparation of reports of current threats.
Uses PowerShell scripting or other programming languages to automate tasks.
Leverages various toolsets to gain awareness of potentially suspicious activity and alerts to threats, intrusions and/or compromises.
Performs other related duties and projects as assigned.
All employees have the responsibility and the accountability to serve as risk managers for their businesses by understanding, reporting, responding to, managing and monitoring the risk they encounter daily as required by F.N.B. Corporation's risk management program.
F.N.B. Corporation is committed to achieving superior levels of compliance by adhering to regulatory laws and guidelines. Compliance with regulatory laws and company procedures is a required component of all position descriptions.
Minimum Level of Education Required to Perform the Primary Responsibilities of this Position:
BA or BS
Minimum # of Years of Job Related Experience Required to Perform the Primary Responsibilities of this Position:
3
Skills Required to Perform the Primary Responsibilities of this Position:
Excellent communication skills, both written and verbal
Excellent customer service skills
Excellent project management skills
Detail-oriented
Strong security background in network/systems/physical security, authentication, authorization and usability. Comprehensive knowledge of the OSI model. Working knowledge of packet collection and analysis tools.
Licensures/Certifications Required to Perform the Primary Responsibilities of this Position:
Valid Drivers License
CISSP, Security+, Network+, GCIA, GCIH, CEH, CISM, CSX
Physical Requirements or Work Conditions Beyond Traditional Office Work:
Heavy Lifting over 45 lbs.
Equal Employment Opportunity (EEO):
It is the policy of FNB not to discriminate against any employee or applicant for employment because of his or her race, color, religion, sex, sexual orientation, gender identity, national origin, disability status, or status as a protected veteran. FNB provides all applicants and employees a discrimination and harassment free workplace.
$86k-120k yearly est. 2d ago
Information Security Analyst
Belcan 4.6
Cyber security analyst job in Mason, OH
Job Title: Information SecurityAnalyst
Zip Code: 45040
Duration: 6 months
Pay Rate: $33.33/hr.
Keyword's: #Masonjobs; #InformationSecurityAnalystjobs;
The IS Application SecurityAnalyst will support the execution, planning, and administration of the Vulnerability Management function within Information Security (IS). The Vulnerability Management Analyst executes core processes in the vulnerability management program focused on vulnerability assessments, penetration testing and social engineering. Additionally, they will support the remediation of vulnerabilities resident within systems to minimize the organizations" potential attack surface for exploitation.
The Analyst will provide oversight, drive, facilitate and coordinate the management of vulnerabilities across the enterprise. The Analyst must understand underlying application code approaches in order to effectively review and respond to application security scans. While technical involvement is required, this role is not intended to perform direct remediation. The Analyst will support automated scans and may provide post-development testing assistance to validate that vulnerability remediation efforts are appropriately tested.
MAJOR DUTIES AND RESPONSIBILITIES
* Monitor and analyze vulnerability assessment data to identify and communicate technical risks to the organization
* Support the identification and impact classification for new vulnerabilities identified in the environment
* Execute and support vulnerability assessments, penetration testing and social engineering activities
* Provide the Information Security and IT Security team information on the emerging cyber threat landscape, including threat actor tactics, techniques, and procedures
* Review and interpret application security scan results with an understanding of underlying code structures to provide effective feedback
* Provide post-development testing support to ensure vulnerability remediation items are validated and tested appropriately
* Facilitate vulnerability management processes by tracking and coordinating remediation efforts across multiple teams
* Ensure timely closure of security gaps by working with application, infrastructure, and operations teams
* Support IS in achieving the vision and strategic objectives of the vulnerability program
* Conduct analysis, aggregate and report on vulnerability data from various scanning tools and platforms
* Manage and utilize IS tools such as DLP, Code scanner, external security profile, etc. to analyze gaps in security controls
* Participate in the IT SDLC program to ensure that security is included in project by default and by design
* Develop strong working relationships with other departments and potentially clients across the organization to ensure a high degree of security compliance client satisfaction
* Assist with regulatory and compliance requirements, contributing to security audits, assessments, attestations, certifications and client vulnerability inquires
* Brief IS leadership on vulnerability assessment results and potential risks
* Support leadership to identify capability gaps in vulnerability management services
* Collaborate with cross-functional teams to improve security posture and embed security into existing IT and operational workflows
* Continue self-development of knowledge, skills and abilities to better support execution of the Information Security (IS) function
BASIC QUALIFICATIONS
* Bachelor"s degree computer science, IT or equivalent
* 3+ years of experience in IT or IS or Compliance
* Experience with major standards such as: SOC 1-2, ISO 27001/2, PCI DSS, HITRUST, SANS, NIST
* Demonstrated experience in implementing compliance frameworks for financial services organization or organizations with similar information security needs and requirements
* Familiarity and understanding of broad range of IT hardware and software products
* Strong project management skills
* Excellent presentation, verbal communication, and written skills
* Excellent analytical and problem-solving skills
* Experience managing typical enterprise security and intrusion detection systems
* Ability to work in a collaborative environment across business and technology teams
* Ability to interpret application structures and code approaches at a high level in order to review and respond to scan results
PREFERRED QUALIFICATIONS
* Certified Information Systems Security Profession (CISSP), PCI DSS, Certified HIPAA Privacy Security Expert (CHPSE), Certified Information Security manager (CISM), Global Information Assurance Certification (GIAC), or related.
* Experience or knowledge with healthcare or health insurance
* Knowledge of CMS and HIPAA related vendor requirements
* Working knowledge of Security SDLC tools
Belcan is an equal opportunity employer. Your application and candidacy will not be considered based on race, colour, sex, religion, creed, sexual orientation, gender identity, national origin, disability, genetic information, pregnancy, veteran status or any other characteristic protected by federal, state or local laws.
$33.3 hourly 1d ago
Cyber Security
Forhyre
Cyber security analyst job in Philadelphia, PA
Job Description
Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
Responsibilities:
Engineer, implement and monitor security measures for the protection of computer systems, networks and information
Develop and implement security policies and controls to support the CyberSecurity framework
Manage the existing cybersecurity training program across global, multilingual business
Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
Continuous improvement in the areas of Information Security technologies, techniques and processes
Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
Ability to interpret penetration test results and describe issues and fixes to non-security expert
Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap
Skills & Experience
Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
Certified Information Systems Security Professional (CISSP)
8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
Vulnerability Assessment testing and/or Penetration Testing (preferred)
Robotic Process Automation/Intelligent Automation (preferred)
Business case development supporting security technology solutions (preferred)
Additional certifications demonstrating cybersecurity/technical mastery (preferred)
$73k-100k yearly est. 22d ago
Cyber Security & AI Risk Analyst
Insight Global
Cyber security analyst job in Worthington, OH
Conduct risk assessments for AI tools, GPTs, and automation use cases using NIST AI RMF-aligned evaluation frameworks. Review AI tool submissions for security, privacy, and compliance risks; escalate issues as needed. Support the development and maintenance of Worthington's AI Registry and related workflows.
Assist with OneTrust implementation, including configuring intake workflows, registry fields, risk scoring logic, and documentation capture.
Monitor open reviews and ensure timely follow-up with stakeholders (business leads, vendors, legal, cybersecurity, etc.).
Collaborate on creating and maintaining cybersecurity content within AI governance documentation, registry systems, playbooks, risk scoring models, and OneTrust survey templates.
Represent Cyber in AI governance meetings (e.g., Governance Group, Triage Team) as a contributing member (non-approving role).
Support importing and mapping third-party vendors in OneTrust and help manage third-party risk review processes.
Assist in building and maintaining the Third-Party Risk Management (TPRM) governance program, including policies, workflows, and response tracking.
Draft and maintain Cyber-owned components of AI risk assessments, playbooks, and frameworks in partnership with Cyber and Governance leads.
Pay Range: 55-70/hr
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
- 3-10 years of experience in cybersecurity, risk management, compliance, or privacy.
- Familiarity with AI-related risk domains
- Knowledge of NIST frameworks
- Experience with OneTrust
$72k-98k yearly est. 8d ago
Cyber Security Analyst/Implementation Specialist
Tectammina
Cyber security analyst job in Columbus, OH
Responsibility for information cybersecurity analysis & response with the mission of protecting the firm from internet attacks / threat actors.
Lead initiatives and the implementation of capabilities in order to advance the Cyber Threat program
Enhance and distribute security incident response and escalation procedures to ensure timely and effective handling of security events and alerts
Apply knowledge of technical, analytical skills to ensure the confidentiality, integrity, and availability of all information systems assets and ensure compliance with company policies, procedures, contractual, and regulatory requirements.
A solid understanding of Penetration Testing, Vulnerability Management, Threat Vector Analysis, Intrusion Detection and Prevention, Incident Management and Response, Web Application Security, Risk Assessment and Mitigation methodologies, and Counter Threat Operations.
Qualifications
CyberSecurityAnalyst/Implementation Specialist - need someone that has broad cybersecurity knowledge that can not only recommend solutions, but more importantly also has experience implementing/managing those solutions.
MUST HAVE JAVA DEVELOPMENT BACKGROUND
Need solid remediation experience - how to remediate vulnerabilities in a web application
CISSP certification is nice to have, not mandatory
Additional Information
Job Status: Contract to Hire
Eligibility: EAD Green Card/ Green Card/ US Citizens
Share the Profiles to *********************
Contact: ************
Keep the subject line with Job Title and Location
$72k-99k yearly est. Easy Apply 60d+ ago
Cyber Security Analyst
Ohiox, Inc.
Cyber security analyst job in Columbus, OH
The Columbus Regional Airport Authority manages and operates passenger-focused John Glenn Columbus International Airport (CMH), cargo-focused Rickenbacker International Airport (LCK), and general aviation airport Bolton Field (TZR).
We are a diverse group of committed and talented professionals who show up every day to take CRAA to new heights. Although our roles are as diverse as we are - from Custodial Services to Customer Service, from Accounting to Airport Police, from HVAC to Human Resources - we have one common goal: connect Ohio with the world.
Our organization is in constant motion, moving people and cargo 365 days a year. With our core values of Accountability, Innovation and Respect guiding us, we each do our part to contribute to our organization, the aviation industry, local businesses, and the economy. We create experiences for passengers, we create opportunities for businesses, and we create economic growth for Columbus.
Trust and respect are the foundation of our culture. We invite new ideas. We encourage innovation. We are inclusive and welcoming. We are empowered to enact positive change.
Your “Take Off” will be successful by doing the following with excellence:
Must be able to report in-person to the office daily, with one day from home.
Assists in monitoring and analyzing security events and incidents using various security tools and technologies.
Collaborates with the Security Operations Center in the assessment, triage, and response to potential cybersecurity incidents.
Partners with the Service Delivery team in the assessment and remediation of software patching and security configuration baseline deviations across the desktop and infrastructure estate.
Assists in the performance of regular security audits and assessments. This may involve evaluating technical controls, processes, and documentation.
Conducts initial investigations and assessments of potential security threats to critical infrastructure assets and systems. Utilizes frameworks such as NIST Risk Management Framework (RMF) to assess risk posture.
Assists in the implementation and configuration of security controls to meet regulatory requirements and industry best practices. This may include network segmentation, encryption, access controls, and intrusion detection/prevention systems.
Participates in the development and delivery of cybersecurity awareness training programs to educate employees about their roles and responsibilities in protecting critical infrastructure assets and sensitive information.
Participates in projects and identifies solutions to support improvement and growth.
Performs related work as required.
Your “Landing” will be smooth if you meet the following requirements:
Bachelor's Degree in CyberSecurity or Forensic Analyst, or a related field, preferred,
Minimum of three (3) years of experience in a cybersecurity role. Or equivalent education and years of experience
Strong knowledge of security principles and technologies
Knowledge of security incident response procedures and tools such as SIEM's, VMS, Endpoint Security Management
Must possess and maintain a valid Ohio driver's license, in good standing
Salary range for this position is $80,000.00 - $90,000.00. The offered salary is evaluated using internal equity, job knowledge, skills, experience, and other key factors.
Able to pass a pre-employment drug test, which includes testing for marijuana (medical marijuana cards are not acceptable)
The Columbus Regional Airport Authority is an equal opportunity employer and does not discriminate in hiring or terms and conditions of employment because of an individual's race, color, religion, gender, age, national origin, veteran status, disability, and all other groups or classes protected by applicable federal, state or local laws. The Authority does not tolerate violence or drug use in the workplace.
$80k-90k yearly Auto-Apply 9d ago
Cyber Incident Response Tier III Analyst
Pingwind
Cyber security analyst job in Martinsburg, WV
Job DescriptionDescription PingWind is seeking a Cyber Incident Response Tier III Analyst to support our VA customer at Hines, IL Martinsburg, WV, or Austin, TX. Required Clearance: Ability to obtain Tier 4 / High Risk Background Investigation
Certifications: Must currently have or be willing to obtain one of the following certifications (or equivalent):• GIAC Certified Incident Handler• EC-Council's Certified Incident Handler (ECIH)• GIAC Certified Incident Handler (GCIH)• Incident Handling & Response Professional (IHRP)• Certified Computer Security Incident Handler (CSIH)• Certified Incident Handling Engineer (CIHE)• EC-Council's Certified Ethical Hacker
Required Education
• Bachelor's degree in computer science, Cybersecurity, Information Technology, or a related field (or equivalent work experience)
Required Experience:
• 5+ years of experience supporting incident response in an enterprise-level Security Operations Center (SOC) Responsibilities
• In-depth forensics and root cause analysis for alerts and incidents• Handling Tier 2 ticket escalations by performing forensic root cause analysis and delivering actionable remediation recommendations and or appropriate next steps.• Perform post incident analysis to ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned.• Work with Watch Officers and Team Leads on a bridge to function as SME for major incidents.• Updating playbooks based on findings of the incident trends and outcomes of auditing tasks.• Develop and operationalize advanced security analytic use cases to detect and respond to sophisticated cyber threats in real-time• Create dashboards/reports based on these trends or searches to provide clarity of information being defined.• Interface with the Cyber Detection Analytics (CDA) Team to recommend tuning based on findings.• Support mentoring and training of junior analysts on alerts, playbooks, and tools.• Stay informed of latest cybersecurity threats and best practices.• Perform real-time monitoring and triage of security alerts in Cybersecurity toolsets including SIEM, and EDR• Make accurate determination of what alerts are false positives or require further investigation and prioritization • Lead and actively participate in the investigation, analysis, and resolution of cybersecurity incidents. Analyze attack patterns, determine the root cause, and recommend appropriate remediation measures to prevent future occurrences• Ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned. Collaborate with knowledge management teams to maintain up-to-date incident response playbooks• Collaborate effectively with cross-functional teams, including forensics, threat intelligence, IT, and network administrators. Clearly communicate technical information and incident-related updates to management and stakeholders• Identify and action opportunities for tuning alerts to make the incident response team more efficient • Monitor the performance of security analytics and automation processes regularly, identifying areas for improvement and taking proactive measures to enhance their efficacy• Leverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate incident response processes, including enrichment, containment, and remediation actions• Support the mentoring and training of more junior IR staff• Stay informed about the latest cybersecurity threats, trends, and best practices. Actively participate in cybersecurity exercises, drills, and simulations to improve incident response capabilities
Requirements
• Work 100% on-site Tuesday through Saturday from 3:00 PM to 11:00 PM• A deep understanding of cybersecurity principles, incident response methodologies, and a proactive mindset to ensure our SOC operates effectively in a high-pressure environment• Strong experience with security technologies, including SIEM, IDS/IPS, EDR, and network monitoring tools• Experience with enterprise ticketing systems like ServiceNow• Excellent analytical and problem-solving skills• Ability to work independently and in a team environment to identify errors, pinpoint root causes, and devise solutions with minimal oversight• Ability to learn and function in multiple capacities and learn quickly• Strong verbal and written communication skills
Preferred Qualifications
• Ability to investigate Indicators of Compromise (IOCs) using Splunk by correlating logs from multiple sources to detect, trace, and assess threat activity across the enterprise• Experience leveraging Microsoft Defender for Endpoint (MDE) to perform endpoint investigations, analyze process trees, and validate IOCs during active threat scenarios• Ability to remediate phishing incidents, including analysis of email headers, links, and attachments, identifying impacted users, and executing containment actions such as user lockouts, email quarantine, and domain blacklisting• Experience performing root cause analysis of malware leveraging PowerShell, using tools such as MDE advanced hunting (KQL) and Splunk to identify infection paths, attacker behavior, and persistence mechanisms
About PingWind
PingWind is focused on delivering outstanding services to the federal government. We have extensive experience in the fields of cybersecurity, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement. PingWind is a VA CVE certified Service-Disabled Veteran Owned Small Business (SDVOSB) and SBA HUBZone Certified with offices in Washington DC and Northern Virginia. ****************
Our benefits include:
· Eleven Federal Holidays· Paid Time Off accrued each pay period· Parental Leave· Three medical plan choices with generous employer contribution· Dental and Vision Insurance· Company paid Short-Term and Long-Term Disability· Company paid Life and AD&D Insurance· 401k with competitive matching and vesting schedule · Continuing education assistance· Short Term / Long Term Disability & Life Insurance· Medical, Dependent Care and Commuter Flexible Spending Accounts· Employee Assistance Program · Wellness benefits include Calm Health app and WellHub gym subsidy (formerly GymPass)· 529 College Savings Plan· Legal Insurance · Pet Insurance
Veterans are encouraged to apply
PingWind, Inc. does not discriminate in employment opportunities, terms and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
$68k-92k yearly est. 8d ago
Computer Network Defense(CND)Analyst
Apotheosis
Cyber security analyst job in Columbus, OH
Overall Assignment Description:
The CND Analyst will perform actions to protect, monitor, detect, analyze and respond to unauthorized activity within assigned information systems and computer networks. Duties include: Employs Cybersecurity capabilities and
deliberate actions to respond to a CND alert or emerging situational awareness/threat.
Serves as an expert on CND requirements and compliance to such requirements by using IA
tools and techniques to perform compliance analysis and correlation, tracking and remediation,
coordination and escalating CND non-compliance.
Provides technical analysis and sustainment support for the enterprise for IA tools and
applications, and assists with the application of Defense-In-Depth signatures and perimeter
defense controls to diminish network threats
Skills and Experience:
Required:
Must possess a current DOD Top Secret Clearance and be eligible for SCI and IT-1 access at
time of proposal submission
Five (5) years of relevant experience or related formal education
Two (2) years of experience performing root cause analysis of cybersecurity events and incidents
Two (2) years of experience analyzing network traffic and/or system logs
DOD Approved 8570/8140 Baseline Certification : Category IAT Level II
DOD Approved 8570/8140 CSSP Certification : CSSP-IR
Must possess written and verbal skills to appropriately document and brief Cybersecurity
Incidents
Working knowledge of at least two cybersecurity areas:
Firewall
IDS/IPS
Host based antivirus
Vulnerability Management
JETS RFQ SP4709-24-Q-0002
DLA Cyber Emergency Response Team (CERT) CyberSecurity Service Provider (CSSP)
Support
Forensics
Malware Analysis
Device Hardening
Understanding of Defense-in-Depth
Ability to build and read scripts in languages such as Perl, Bash, Powershell, Ruby, Python
$61k-85k yearly est. 60d+ ago
Cyber Security Engineer
Microbac 4.0
Cyber security analyst job in Cranberry, PA
Come join our family! Microbac Laboratories is an essential business offering competitive pay and benefits including medical, dental, vision, life insurance, disability, generous paid time off including vacation, holidays and flex-time, a wellness program, referral bonus, tuition reimbursement and more!
Whether you are just starting your career in science or looking to further it, Microbac will put you on the path of an exciting career with room to grow. Quality, safety, giving back to our communities, diversity and inclusion, customer success and employee wellbeing are part of our core culture. We are looking for motivated individuals to join our family as a Cybersecurity Engineer.
ABOUT MICROBAC
Microbac Laboratories, Inc. is a premier commercial laboratory testing firm that partners with clients worldwide, offering laboratory solutions to the life science, food and nutrition, and environmental industries and serves our clients with the utmost expertise and respect for their market requirements, constraints, and challenges. We embody a company-wide commitment to exceptional customer experience, which has been refined over nearly 50 years of trusted, analytical and measurement experience.
Through our network of laboratories, offices, and field services, we have the flexibility to meet the unique requirements for each client, project, and scope.
As a privately held third-party testing company, Microbac operates with a commitment to safety, quality, and compliance. Our diverse work portfolio includes broad accreditation offerings and tested insights across the environmental, food and nutrition and life science markets.
JOB SUMMARY
We are seeking a hands-on Cybersecurity Engineer to own day-to-day security operations and incident response across our network of 30+ laboratories. This role is execution-focused and ideal for a candidate who enjoys working in lean environments, partnering closely with Infrastructure and Quality teams, and directly configuring and operating security controls.
You will serve as the primary escalation point for security incidents while helping mature the organization's security posture as the business grows.
Essential Functions:
Own daily cybersecurity operations, monitoring alerts and responding to incidents
Act as the primary escalation point for security events
Lead incident response from detection through remediation and root cause analysis
Configure and maintain security controls across business platforms
Manage identity, access controls, MFA, Conditional Access, and privileged access models
Perform hands-on investigations
Develop, test, and maintain incident response playbooks and escalation paths
Create security policies and translate them into enforceable technical controls
Partner closely with Infrastructure on architecture, network changes, cloud services, and new tools
Continuously assess risk, identify gaps, and implement practical security improvements
Partner with Quality to ensure compliance with industry standard regulations
Set a positive example through high standards and professional conduct.
Continuously monitor emerging cybersecurity threats, regulatory changes, and industry best practices to keep organizational security strategies current and effective.
Other duties as assigned.
Minimum Requirements:
Bachelor's degree in Computer Science, Information Systems or related field.
3+ years of experience in cybersecurity related positions
Willingness to travel to lab locations as needed to provide on-site IT support.
Preferred Qualifications:
Certifications: CompTIA Security+, CompTIA CySA+, GSEC, CompTIA PenTest+, CCSP, CISSP, CISM
Knowledge of advanced persistent threats (APTs) and their tactics, techniques, and procedures (TTPs)
Fundamental understanding of Windows, Mac OSX, and Linux operating systems
Fundamental understanding of OSI model, basic networking and troubleshooting concepts
Experience with programming or scripting, including PowerShell, Bash, Python, Yara, and Perl
Experience in managing SSO/IAM, email security, phishing and user awareness training
Experience in EDR platforms
Experience with cloud deployments such as Azure, AWS or similar platforms
Experience working with distributed teams and other cross functional stakeholders
Familiarity with commercial solutions for logging and security event management, including SIEM or SOAR platforms
Familiarity with vulnerability management and IDS/IPS
Demonstrated intermediate experience with security incident detection, response frameworks, and established incident handling procedures Understanding and knowledge of various log formats from a variety of network and computer devices
Knowledge of Cyber risks and threats related to Cyber attackers
Knowledge of recent Cyber events and interpreting kill chain process and threat impacts
Presentation, analytical, and critical-thinking skills
Ability to manage competing priorities and workload
WORKING CONDITIONS AND PHYSICAL REQUIREMENTS
The physical demands and working conditions described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Physical Requirements:
While performing the duties of this job, the employee is regularly required to use hands to finger, handle, or feel objects, tools; talk or hear. The employee is occasionally required to stand, walk, and sit.
The employee must occassionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include color vision and depth perception.
Working Conditions:
Home internet acceptable for remote computer work.
The noise level in the work environment is usually moderate.
This job may require travel less than 20%
As a privately held third-party testing company, Microbac operates with a commitment to safety, quality, and compliance. Our diverse work portfolio includes broad accreditation offerings and tested insights across the environmental, food and life science markets.
OTHER:
This is not an exhaustive list of all duties an employee may be required to perform. Microbac reserves the right to revise the job description at any time.
Employment is at-will. Microbac, promotes a drug-free, alcohol-free workplace. Applicants considered for hire must pass a drug test before beginning work. Refusal to submit to testing will result in disqualification of further employment consideration.
Microbac is an Equal Opportunity Employer - We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. All qualified applicants will receive consideration for employment.
$81k-111k yearly est. 10d ago
Information Security Compliance Analyst
Reynolds and Reynolds Company 4.3
Cyber security analyst job in Dayton, OH
":"As an Information Security Compliance Analyst, you will learn about the regulatory, contractual, and legislative requirements that affect technology used by our Company . You will be responsible for coordinating with internal and external parties to complete a variety of cybersecurity assessments, help raise security awareness of associates, provide guidance on industry standard cybersecurity requirements, and track on-going activities that help meet our security and compliance goals.
If you thrive on solving complex problems, embrace continuous learning, and approach challenges with curiosity and critical thinking, apply today! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Information Security Compliance Analyst","date":"2026-01-03","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Strong critical thinking skills required~^~Basic computer skills required~^~Strong written and verbal communication~^~Strong ability to drive task and organizing\/maintaining records~^~Ability to think creatively and strategically~^~Passion for learning new and emerging technology~^~Technology education or certifications, experience with enterprise IT environments, experience working with security regulatory requirements, and knowledge of security frameworks such as NIST CFS, NIST 800-53, ISO, PCI-DSS a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
$80k-108k yearly est. 60d+ ago
Security Analyst/Engineer
Limbach Facility Services LLC 4.4
Cyber security analyst job in Fernway, PA
Who We Are…
Since our founding in 1901, Limbach's primary core value has always been simple: We Care. That commitment extends to our people, our customers, and the communities we serve-driving a culture of belonging across our industry.
Limbach Facility Services LLC, a subsidiary of Limbach Holdings, Inc., (NASDAQ: LMB), is a leading building systems solutions firm delivering mission-critical systems that support life's most important moments. We specialize in revitalizing and maintaining HVAC, mechanical, electrical, plumbing, and control systems within existing facilities-ensuring buildings are always ready to perform when it matters most.
Learn more about Limbach by checking out our YouTube channel: We Are Limbach - YouTube
From healthcare and education to government and commercial facilities, we partner with building owners and operators to safeguard reliability, efficiency, and comfort where it's needed most.
Our vision is to create value for building owners targeting opportunities for long term relationships.
Our purpose is to create great opportunities for people.
Learn more about Limbach's commitment to our people and career opportunities, straight from our employees via the Limbach Unlocked podcast: Limbach Unlocked - Why We Chose Limbach
We carry out our vision and purpose through a commitment to our four core values…
We Care
We Act with Integrity
We Are Innovative
We Are Accountable
The Benefits & Perks…
Base salary range of $130K - $140K
Full portfolio of medical, dental, and vision benefits, along with 401K plan and company match.
HSA, FSA, and life insurance offerings.
Maximize your professional development with our award-winning Learning & Engagement team.
Engage in our “We Care” culture through our ERGs, brought to you by EMBRACE.
Career pathing flexibility and mobility.
Who You Are…
As SecurityAnalyst / Engineer, you will serve as the organization's primary, hands-on security operations lead. Reporting directly to the CIO, the candidate will triage SOC outputs, tune detection logic, drive automated response through SOAR playbooks, own the vulnerability management lifecycle, and lead incident response from detection through remediation and post-incident lessons learned. They act as a trusted partner to our outsourced SOC, the quarterback for IR, and the technical voice to the CIO and Board on operational security posture working closely with our IT Operations leader.
This Position…
Some examples of the work you might do includes:
Security Operations & Monitoring: Serves as the primary liaison to our outsourced SOC and vCISO. Triage, validate, and prioritize alerts from SIEM (e.g., Google Chronicle, GrayMatter, or equivalent). Ensures log integrity, enrichment, and actionable alerting.
SOAR & Automation: Builds, maintains, and iterates SOAR playbooks (Google SOAR or comparable) to automate containment, enrichment, and evidence collection; lowers MTTR by automating low-risk actions while preserving human judgment for high-impact events.
Incident Response: Lead detection → containment → eradication → recovery workflows. Owns post-incident reviews, creates remediation roadmaps, and tracks closure of corrective actions. Conducts regular tabletop exercises and maintains IR runbooks and escalation paths.
EDR/MDR/XDR Management: Administers and tunes EDR/MDR/XDR platforms (deployment health, telemetry, detection rules, containment capabilities). Investigates endpoint events, performs root cause analysis, and coordinates remediation with IT operations.
Vulnerability Management: Operates the vulnerability management program (Rapid7, Tenable.io, or equivalent): schedules scans, triages findings, prioritizes by risk and asset criticality, and shepherds remediation with engineering teams. Proposes and verifies system hardening measures and baselines.
Detection Engineering: Authors correlation rules, analytic searches, and detection content; reduces false positives while increasing meaningful detections. Builds dashboards and KPIs that communicate detection coverage and efficacy.
M&A & Integration Security: Leads security due diligence and integration activities for acquisitions: identities & accesses reviews, vulnerability scans, endpoint posture checks, and integration playbooks to onboard new entities into Limbach's security baselines.
Training & Knowledge Transfer: Develops and delivers IR and detection training for IT and business teams. Produces clear operational documentation, SOPs, and playbooks. Coaches SOC engineers and champions continuous improvement.
Reporting & Executive Communication: Produces monthly operational and executive risk reports (incidents, vulnerability trends, MTTR, coverage gaps). Briefs the CIO and Board with concise risk-based recommendations.
Third-Party Coordination: Manages relationships and SLAs with MDR/MSSP/MDR providers, forensic firms, and other security partners.
What You Need…
5+ years of progressive, hands-on cybersecurity experience, with significant time spent in SOC and incident response environments.
Demonstrated experience in incident response, threat hunting, and digital forensics.
Demonstrated expertise with SIEM and SOAR platforms (Google Chronicle, GrayMatter, Chronicle SOAR, or comparable).
Proven track record managing EDR/MDR/XDR solutions and performing endpoint investigations.
Hands-on experience owning vulnerability programs with Rapid7, Tenable.io, or similar tooling.
Experience writing detection logic, playbooks, and incident runbooks; demonstrable success in alert tuning and automation.
Real-world experience coordinating cross-functional incident response activities and driving remediation to completion.
Scripting and automation skills (PowerShell, Python, Bash) to automate enrichment, containment, and evidence collection.
Strong Windows and Linux administration/forensics fundamentals; network fundamentals and packet-level troubleshooting.
Familiarity with cloud security (Azure, Microsoft 365, Intune, Conditional Access) and endpoint management tools.
Knowledge of security controls, hardening standards, and configuration baselines.
Ability to read and interpret logs and telemetry across endpoints, network devices, and cloud services.
Superior written and verbal communication; able to explain technical findings to non-technical and executive audiences.
Decisive under pressure, methodical in evidence collection, and disciplined in documentation.
Collaborative, tactful, and experienced at working with cross-functional teams (IT ops, HR, Legal, vendor partners).
Strong project management and organizational skills with an eye for measurable outcomes.
Ability to travel up to 15% of the time.
Preferred Qualifications:
Relevant industry certifications, including advanced training from SANS in incident handling, threat hunting, and digital forensics (e.g., SEC504, FOR508, FOR572, or equivalent).
Certifications: CISSP, GCIH, GCFA, ECIH, or Security+ (or equivalent).
Prior role as a dedicated incident responder or IR team lead.
Experience with Microsoft Defender for Endpoint, Azure Security Center, and native cloud telemetry.
Familiarity with compliance frameworks (SOC 2, NIST CSF/800-171, ISO 27001) and how detection/IR maps to them.
Experience in multi-site enterprise environments and with M&A integration security.
Conduct Standards:
Maintains appropriate Company confidentiality at all times.
Protects the assets of the Company and ethically upholds the Code of Conduct & Ethics in all situations.
Cultivates and promotes the “Hearts & Minds” safety culture.
Consistently exemplifies the Core Values of the Company (we CARE, we act with INTEGRITY, we are INNOVATIVE, and we are ACCOUNTABLE).
Work Environment:
This position operates primarily in an office environment and routinely utilizes standard office equipment, such as computers, phones, copiers, and filing cabinets.
The Company's Remote Work Policy is applicable to this position.
Physical Demands:
In performing the duties of this job, the incumbent is regularly required to talk, hear, perform repetitive motion, and possess an appropriate degree of both visual acuity and manual dexterity.
This is considered a sedentary position, which means possible exertion up to ten (10) pounds of force occasionally, and/or negligible amount of force frequently or constantly to lift, carry, push, pull, or otherwise move objects.
This job description is intended to describe the general nature of work being performed by the individual who assumes this role, not an exhaustive list of responsibilities. Duties, responsibilities, and activities may change at any time, with or without notice, as business needs dictate. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this position. Limbach Facility Services LLC is an Equal Opportunity Employer.
#LFS
$130k-140k yearly 27d ago
Information Security Specialist: Governance & Compliance Engineer
United States Court of Appeals for The Sixth Circuit 4.3
Cyber security analyst job in Cincinnati, OH
The Information Security Specialist works with the IT security team to ensure the security of court systems and serve as a security resource to courts within the Sixth Circuit for their governance and compliance program. The major responsibilities and duties include the following:
In coordination with the Circuit IT Security Officer (ITSO), respond to emergent threats, assist court units in the circuit, and track and report progress. Assist in identifying, prioritizing, and coordinating the protection of critical cyber infrastructure and key resources.
Provide guidance and assistance in implementing and maintaining business objectives (i.e. security scorecard, CIS controls, assessments, internal audit controls, security data calls).
Manage information security projects (or security-related aspects of other IT projects). Coordinate and lead IT staff and court users to identify, plan, and implement initiatives and projects. Prepare and present reports and training.
Develop and maintain a documentation template repository; modernize and maintain the circuit's data repository. Review and advise courts on documentation requirements.
Assist the Circuit ITSO in performing, analyzing, and archiving SWOT and other gap analyses to ensure compliance with required frameworks, controls, and assessment.
Manage CIS controls self-assessment too; provide guidance and assistance to courts on documentation, program management, etc.
Assist the Circuit ITSO in creating, tracking, and maintaining KPIs. Prepare scheduled data points and KPIs for use in reports to circuit-wide executives and other Judiciary stakeholders.
Research custom solutions for courts as needed.
Qualifications
Required: Four years of experience in information security systems. Experience with cybersecurity compliance programs. Strong communication and interpersonal skills; excellent customer service skills. Detailed, organized, and self-driven. Ability to work under pressure and within the constraints of conflicting deadlines. Proactive, problem-solving approach. Ability to respond effectively in critical situations. Ability to work independently and in a team environment. Ability to travel (25% - 50%).
Preferred: Bachelor's degree in computer science or related field. Related cybersecurity or IT project management certifications. Related experience in a court, government agency, or equivalent environment.
Total Rewards & Work/Life Balance
Compensation*: $87,791 - $142,732 (CL 29) (*Salary commensurate with qualifications)
Benefits: Employer subsidized health and life insurance plans. Dental and vision insurance plans. Flexible spending accounts for health care, dependent care, and commuter expenses. Eligibility for Public Service Loan Forgiveness Program and mass transit subsidies. On-site fitness center. Federal retirement entails a pension plan (FERS-FRAE) and employer-matching Thrift Savings Plan (similar to a 401K). Retirees may carry insurance plans into retirement while paying the same premiums as employees. Visit ********************************* to learn more about the Judiciary's competitive benefits.
Work/Life: Annual time off - 13 vacation days, 13 sick leave days, and 11 paid holidays. Vacation days increase to 20 days after three years and to 26 days after fifteen years. Hybrid telework schedule may be available.
Conditions of Employment
Travel for this position is required. The selected candidate is provisionally hired pending results of background investigation/check and fingerprinting. This position is subject to updated background investigations every five years. Applicants selected for an interview must complete the Optional Background Information section on the Judiciary's application. Employees are required to adhere to the
Judicial Code of Conduct for Judicial Employees
.
Electronic Fund Transfer for payroll direct deposit is required. Positions with the U.S. Courts are at-will, excepted service appointments, and may be terminated with or without cause by the Court. For citizenship requirements and additional information about careers in the Judiciary, visit ************************* The Court reserves the right to modify the conditions of this announcement, or to withdraw the announcement for any reason without notice.
How To Apply
Please submit a single PDF application packet, including (1) a cover letter addressing your qualifications and experience in relation to the job duties and how you learned of the position, (2) a current resume, to the Director of Human Resources via the Resume button on our online application system. Position is open until filled; preference given to applications received by January 5, 2026. Virtual interviews available.
The United States Court of Appeals for the Sixth Circuit is an equal opportunity employer. For a reasonable accommodation during the recruitment process, contact Human Resources at **************.
$87.8k-142.7k yearly Auto-Apply 44d ago
IT Security Specialist 4/ITSS2 (39604)
Idealforce
Cyber security analyst job in Columbus, OH
IDEALFORCE has a CONTRACT position available immediately for a IT Security Specialist(ITSS2) to join our customer in Columbus, OH. This is an ONSITE position and require in person interview. Please find below additional details about this job.
Job Description
Security Consultant to help IT Augment the security staff until OIT can take over all Security related needs for the agency. This position will function as a highly skilled Security Consultant with specific responsibilities that include:
-Monitor network and information system activity.
-Respond to alerts (analyze, interpret, investigate, resolve) based on monitoring activity, for security (malware, malicious actor), and other purposes (malicious activity, misuse, etc.) Uses creativity and innovation to automate and streamline processes and procedures.
-Understands customer support, likes to work with people and can ensure that the customer is satisfied.
-Manage, update, modify alerts, adjust/fine tune event correlation rules, etc. (e.g. filter false positives, increase accuracy/relevance/effectiveness), create new rules based on threat changes/evolving risk, etc.
-Understanding of basic Networking principles, including network troubleshooting for connectivity issues, DHCP, DNS, use of tools like PING, NSLOOKUP and NETSTAT
-Perform specialized security functions (e.g. forensics for incident response).
-Perform event correlation, analysis of malicious activity indicators, and appropriate response, based on review and access to multiple security tools and services.
-Provide routine security and general support (tickets, ad-hoc requests, etc.) to all DPS departments/users, IT groups/resources, external (other state agencies, public), etc.
SPECIAL NOTE: Client is running a 24/7 operation. Consultant may need to come in during incident or emergency situations.
During the interview process with the ODPS staff, the resource consultant must demonstrate competence/experience in their specific area(s) of project assignment. The resource's experience must also be documented for review and verification. Offered resources not showing technical or functional competence/experience will be sufficient reason to reject the Offeror's proposal. It is the responsibility of the Offeror to pre-screen their candidates to ensure compliance. Resource will have a background check conducted by ODPS.
Qualifications
-1-2 Years SIEM (Q-Radar preferred)
-8 years customer service experience
-8 Years Troubleshooting experience
-8+ years knowledge of Networking to including PING, NETSTAT, DHCP, DNS, and NSLOOKUP.
-8 years' experience with Active Directory.
-4 Years experience with Web and Email Filtering and Security (Ironport)
-5+ Years experience with Imperva (DAM/WAF)
-1 years of Vulnerability scanning experience (Qualys)
-3 years A/V suite experience McAfee
-3 years IPS (IBM)
-Contributes to continuous process improvements to increase the efficiency of section.
-Excellent communication skills both written and oral.
-Strong communication/ leadership skills.
-Strong influence, collaboration and negotiation experience.
-Ability to collaborate with supporting resources across business and/or functional lines.
-Have excellent oral and written skills/possess strong meeting and work session facilitation skills.
-Have the ability to work independently and as part of a team, the ability to manage time and resources to meet assigned deadlines.
-Have strong understanding of prioritization stemming from the elicitation of system and/or user requirements.
-Have excellent organizational skills, proven analytical, planning, problem solving, and decision-making skills.
-Must be knowledgeable in the English language/speak clearly and understandably use the English language.
Desired Skills
-Q-Radar
-Ironport Web and Email Security
-Imperva
-Certifications in Microsoft
-Powershell 3.0 scripting background.
-Qualys
-McAfee Enterprise solutions
-IPS
-Splunk
-Other security related tools.
-ITIL Knowledge and ITSM Tools.
Additional Information
Additional Information :
- "All your information will be kept confidential according to EEO guidelines".
- All candidates who are authorized to work in US are encouraged to apply.
- Candidates must clear the Background check prior to commencing the assignment.
THIRD PARTY CANDIDATES:
Email your candidate/s resume to joseph dot shelton at idealforce.com along with the following details: Rate, Current location and Availability.
Disclaimer :
The above statements are intended to describe the general nature and level of work being performed by people assigned to this classification. They are not to be construed as an exhaustive list of all responsibilities, duties, and skills required of personnel so classified. All personnel may be required to perform duties outside of their normal responsibilities from time to time, as needed.
$71k-100k yearly est. 60d+ ago
Information Security Analyst (On-Site Position)
Danis Construction
Cyber security analyst job in Cincinnati, OH
IS ON-SITE AT OUR CINCINNATI, OHIO OFFICE **
At Danis, we don't just build projects-we build trust. Since 1916, our reputation has been defined by integrity, innovation, and a relentless commitment to delivering exceptional results. We approach every challenge with a problem-solving mindset, combining precision, creativity, and collaboration to bring our clients' visions to life.
We know that our people are the foundation of our success. That's why we invest heavily in their growth. Through Danis University, employees have access to more than 45 specialized training programs designed to support continuous learning and career advancement. Join us and become part of a team that values your expertise, supports work-life balance, and empowers you to thrive professionally.
One of the ways we protect that success is through a strong cybersecurity foundation-led by dedicated professionals who stay ahead of emerging threats. As an Information SecurityAnalyst, you'll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You'll monitor, investigate, and respond to security events while shaping our company's cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience. This position reports to the CIO.
Why Join Danis?
Make an Impact: Lead healthcare projects that support medical professionals and improve patient care. Your work will have a lasting, positive effect on communities.
Competitive Compensation: Enjoy annual merit increases and bonuses.
Comprehensive Benefits: Health and dental insurance for you and your family, as well as life insurance, disability coverage, and supplemental insurance options.
Secure Your Future: 401K plan and profit-sharing opportunities.
Work-Life Balance: Generous PTO and vacation time, because we value your time outside of work.
Give Back: Participate in our “Constructing Hope” program to contribute to meaningful community outreach projects.
Career Development: Access 45+ training programs through Danis University to enhance your skills and grow your career.
What You'll Bring
Bachelor's degree in Cybersecurity, Information Technology, or a related field.
3+ years of hands-on experience in cybersecurity or a related discipline.
Working knowledge of security frameworks (e.g., NIST, ISO 27001).
Proficiency with security tools (e.g., SIEM, EDR, vulnerability scanners).
Strong analytical and investigative mindset.
Clear, confident communication and collaboration skills.
Experience managing cross-functional projects and navigating complex security challenges.
Responsibilities
Your Impact:
Strategic Leadership
Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices.
Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives.
Governance, Risk, & Compliance
Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps.
Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act).
Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics.
Training & Awareness
Drive cybersecurity awareness through engaging education initiatives.
Oversee new hire onboarding for required cyber training.
Facilitate tabletop exercises to simulate and prepare for real-world scenarios.
Threat Detection & Response
Continuously monitor systems for suspicious activity or breaches.
Respond swiftly to security incidents and ensure thorough documentation.
Engage in proactive threat hunting and analysis to detect emerging risks.
Vulnerability & Risk Management
Lead regular system assessments and vulnerability scans.
Ensure robust network segmentation, firewall health, and secure backups.
Security Architecture & Tools
Oversee the deployment and management of critical security tools.
Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT.
Evaluate and enhance our security technology stack.
Collaboration & Communication
Build trusted partnerships across IT and the broader organization to strengthen security culture.
Support business continuity and disaster recovery planning with department leads.
Manage vendor risk and ensure third-party compliance with internal standards.
Preferred Skills
Familiarity with enterprise systems and platforms (e.g., ERP, CRM).
Deep expertise in endpoint protection, network monitoring, and DLP tools.
Calm, strategic approach to crisis management.
Qualifications Working Environment:
Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure.
Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement.
Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments.
Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively.
Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity.
Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack.
EEO Statement
Danis is an Equal Opportunity Employer. Danis does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit and business need.
Please, no agency calls. Unsolicited resumes from agencies will be considered property of Danis, with no obligation for fees.
#LI-ONSITE
$70k-99k yearly est. Auto-Apply 60d+ ago
Senior Security Analyst
Layerzero Power Systems, Inc.
Cyber security analyst job in Aurora, OH
About Us:
LayerZero Power Systems Inc. is a globally recognized leader in providing state-of-the-art power distribution solutions for critical industries. With a strong focus on reliability, innovation, and customer satisfaction, we deliver advanced power systems products that ensure uninterrupted and dependable power supply in mission-critical environments. Our customer base is comprised of companies in the transaction processing, financial, computer service provision and semiconductor manufacturing sectors. LayerZero Power Systems is on a trajectory of sustained growth, with a loyal customer base of existing Fortune 100 customers and an expanding portfolio of new customers.
Position Description: Senior SecurityAnalyst
Responsible for monitoring, analyzing, and responding to security events across LayerZero's IT environment. This role requires a proactive professional with strong technical skills who can identify risks, investigate incidents, and support the implementation of security controls and best practices.
Primary Duties:
• Monitoring & Incident Response
• Monitor security alerts, logs, and dashboards for potential threats.
• Investigate and respond to security incidents, escalating as needed.
• Perform root cause analysis and recommend corrective actions.
• Risk Management & Compliance
• Assist with vulnerability assessments, penetration testing, and remediation efforts.
• Support compliance initiatives and audits (e.g., ISO, NIST, SOC).
• Maintain documentation of policies, procedures, and incident reports.
• Security Operations
• Manage endpoint protection, firewalls, intrusion detection/prevention systems, and SIEM tools.
• Ensure timely patching and updates across systems.
• Collaborate with IT teams to enforce access controls and data protection practices.
• Continuous Improvement
• Stay current on emerging threats, tools, and best practices.
• Recommend improvements to security architecture and processes.
• Provide training and awareness to employees on cybersecurity practices.
Requirements
Skills & Experience
• Familiarity with SIEM platforms, firewalls, IDS/IPS, and endpoint protection tools.
• Knowledge of security frameworks (NIST, ISO, CIS).
• Strong analytical and problem-solving skills.
• Excellent communication and documentation abilities.
Education:
• Bachelor's degree in Information Security, Computer Science, or related field (preferred).
• 2-4 years of experience in IT security or systems administration.
What We Offer:
Competitive pay with performance incentives
100% company-paid medical, dental, and vision
401(k) with company match
3 weeks PTO, 8 paid holidays, and 2 floating holidays
Why You Will Love Working with Us:
Impact: Develop your skills and expertise in a rapidly growing industry, with your work directly influencing the success of mission-critical projects.
Innovation: Immerse yourself in an environment that celebrates forward-thinking and continuous improvement.
Collaborative spirit: Work closely with engineers, marketers, and other professionals to bring ideas to life.
Grow with us: We are committed to your personal and professional development, offering endless opportunities to improve your skills and advance your career.
At LayerZero, we are proud to be an Equal Opportunity Employer. We welcome and celebrate diversity, and we are committed to creating an inclusive environment for all employees.
Salary Description $85k-115k Annually based on Skills & Experience
$85k-115k yearly 4d ago
Specialist, Information System Security III (SISS3)
Armada Ltd. 3.9
Cyber security analyst job in Philadelphia, PA
Job Description
Type: Full Time
Overtime Exempt: Exempt
Reports To: ARMADA HQ
Travel Required: Yes
Security Clearance Required: Active Secret Security Clearance
************CONTINGENT UPON AWARD***************
Duties & Responsibilities:
Specialist, Information System Security III (SISS3) will conduct risk and vulnerability assessments of planned and installed systems to identify vulnerabilities, risks and protection needs; conduct systems security evaluation, audits, and reviews; determine the residual risk of a package based on package content and assessment results and documenting for the Security Controls Assessor's (SCA) and higher level review.
Execute Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities.
Specialist, Information System Security III (SISS3) will conduct systems security reviews, audits, or evaluations, as appropriate, to ensure accreditation documents are accurate and represent the current risk posture of the system.
Perform analysis of logs, events, and reporting of various data collections tools including: vulnerability monitoring via Assured Compliance Assessment System (ACAS) and related tools, Host Based Security Systems (HBSS), web content filters, Security Information and event management (SIEM), firewall systems, network devices, server devices, workstations, and intrusion detection and prevention systems (ID/PS).
Specialist, Information System Security III (SISS3) will assess impacts from observed risks and report via the Cybersecurity Program chain of command.
Executing Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities.
Perform the evaluation of system administrator, security engineer, and/or system owner proposed corrections to ensure compliance and best-fit solution.
Specialist, Information System Security III (SISS3) will present and submit data to management, develop reports, and produce procedural documentation in a comprehensive and cohesive manner.
Perform risk management and security engineering for Research, Development, Testing, and Evaluation (RDT&E) RMF Afloat systems include Information Assurance Vulnerability Management (IAVM) support, remediation, patching, scanning and associated boundary maintenance.
Specialist, Information System Security III (SISS3) will document residual risks in a plan of actions and milestones formatted in compliance with the current package system, currently eMASS.
Specialist, Information System Security III (SISS3) will maintain current vulnerability scan data and residual risk plan of actions and milestones in Vulnerability Remediation Asset Manager (VRAM).
Manage, attend, and support configuration control board practices.
Create and verify the accuracy of POA&Ms/RARs as identified by vulnerability actual test results.
Specialist, Information System Security III (SISS3) shall write technical documentation such as user manuals, reports, documentation, policies, presentations, Plan of Action and Milestones (POA&Ms), risk assessments, proposals, outlines, and summaries in support of both ashore and afloat systems across multiple platforms. Support developing of technical documents across multiple platforms including configuration management, milestone, issue tracking, web site content management and RMF documentation.
Specialist, Information System Security III (SISS3) may be required to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe). The estimated number of trips is 14 per year (estimated 25%-30% travel).
Other duties as assigned.
Knowledge, Skills, and Abilities (KSAs):
Ability to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe).
Proficient in Microsoft Windows Operating System Administration, including Windows 11, Windows 10, Windows 7, and Windows XP (at a minimum).
Ability to work as a team member, communicate, perform office functions and use office tools, customer focused and deliver exceptional performance.
Possess excellent organizational and file management skills and the ability to plan and execute administrative work with little supervision.
Possess excellent oral and written communication skills.
Required Certifications:
Minimum of one (1) IAT Level II listed certificate required:
CompTIA Security+ (CE)
CompTIA CySA+
GIAC Security Essentials (GSEC)
ISC² SSCP (Systems Security Certified Practitioner)
Minimum/General Experience:
Five (5) years of experience in the following:
Cybersecurity, Engineering, Test and Evaluation (T&E) or Authorization and Assessment (A&A) (formerly C&A) related field.
Information Assurance tools such as Defense Information Systems Agency (DISA) Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS).
Command line interface, PowerShell, and performing automated tasking through use of code.
Minimum Education:
College degree in any technical discipline from an accredited college or university.
Disclaimer:
The above information has been designed to indicate the general nature and level of work to be performed. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of the contractor assigned to this position. Applying: If you feel you have the knowledge, skills and abilities for this position visit our careers page at ******************
Special Notes: Relocation is not available for these jobs
ARMADA provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. ARMADA complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Must be able to successfully pass a background check, and pre-employment drug testing. Job offers are contingent upon results of background check and drug testing.
$84k-127k yearly est. 27d ago
Information Security Expert
Cyberthink 4.2
Cyber security analyst job in Columbus, OH
Title: Information Security SME/Developer with .NET development Duration : 5 Months contract (High possibility of Extension) Interview Type: Both iLinc Web Cam and In Person Interview Skills Required Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
.NET development experience Required 5 Years
Thanks
Naimesh Solanki
Sr. Technical Recruiter
Phone: ************ x 6578
Qualifications
Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
Additional Information
All your information will be kept confidential according to EEO guidelines.
$62k-80k yearly est. 13h ago
Information Security Analyst I - Cincinnati, OH
Whitedog Cyber
Cyber security analyst job in Cincinnati, OH
WhiteDog is seeking an Information SecurityAnalyst to join our Security Operations Center team. The Analyst will help coordinate and report on cyber incidents impacting SOC-as-a-Service customers. This position involves critical duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.
Onsite Location: Cincinnati, OH (no remote available)
Employment Type: Full-Time, hourly
Compensation: $22-$28/hour
Key Responsibilities:
Responsible for working in a 24x7 Security Operation Center (SOC) in person. (Hours - 7:00pm-7:00am PST)
Provide analysis and trending of security log data from a large number of heterogeneous security devices.
Provide Incident Response (IR) support when analysis confirms actionable incident.
Provide threat and vulnerability analysis as well as security advisory services.
Analyze and respond to previously undisclosed software and hardware vulnerabilities.
Investigate, document, and report on information security issues and emerging trends.
Integrate and share information with other analysts and other teams.
Ability to work and be available for on-call activities
Other duties as assigned.
Experience and Skills:
Experience in security device management and SIEM.
Knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix.
Knowledge of applications, databases, middleware to address security threats against the same.
Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusion detection systems).
Knowledge of TCP/IP Protocols, network analysis, and network/security applications.
Knowledge of common Internet protocols and applications.
Ability to multi-task, prioritize, and manage time effectively.
Strong attention to detail.
Excellent interpersonal skills and professional demeanor.
Excellent verbal and written communication skills.
Excellent customer service skills.
Proficient in Microsoft Office Applications.
Qualifications:
The successful candidate will possess the personality traits, work habits, communication, and social skills necessary to work effectively within a dynamic and highly operational environment. This person will have exemplary personal and professional integrity and demonstrate strong interpersonal skills. In addition, the qualified candidate will have a strong desire to succeed in a nationally and internationally recognized operational environment.
Bachelor's or Master's degree in a related field or equivalent demonstrated experience and knowledge.
You must be a US Citizen
1-3 years' experience as a Security/Network Administrator or equivalent knowledge.
Security Essentials Certification (GSEC)
Certified Intrusion Analyst (GCIA)
Certified Incident Handler (GCIH)
Certified Ethical Hacker (CEH)
Certified Penetration Tester (CWAPT)
CompTIA Network+
CompTIA Security+
Benefits:
WhiteDog offers a competitive compensation plan with great earning potential. Our benefits include medical coverage, dental coverage, disability, life insurance, 401K and an amazing work environment!
We are an Equal Opportunity Employer. All qualified applicants receive consideration for employment without regard to race, ethnicity, religious affiliation, gender, gender identity or expression, sexual orientation, national origin, or disability status. EOE AA M/ F/Vet/Disabled
$22-28 hourly Auto-Apply 60d+ ago
Information Security & Systems Analyst
Friendship Village of Dublin 3.2
Cyber security analyst job in Dublin, OH
Join a team dedicated to making a real difference in the lives of our community. Our Mission at Friendship Village of Dublin is
“To care for, engage, and inspire our community to reimagine and maximize quality of life at every age”
.
At Friendship Village our Values Drive us to RISE to any Occasion
Values:
Respect
Integrity and Innovation
Stewardship
Excellence
We are seeking a Information Security & Systems Analyst to contribute to our mission by:
The Entry to Mid-Level System Analyst performs security, compliance and administration of systems and is responsible for the design, installation and management, configuration and reliable operation of security/compliance mechanisms, systems and policies that protect the computer network and information systems against cyber events. Participate in research and development to continuously improve and keep up with the IT business needs of the organization. Actively resolve problems and issues with computer and server systems to limit work disruptions within the company.
Essential Duties:
Design, install and manage security mechanisms that protect the computer network and information systems against threats including but not limited to hackers, breaches, viruses and spyware.
Educate and provide awareness to users regarding security policies and procedures as well as threats.
Develop and maintain security policies and guidelines around information classification, system integrity, incident response and user access.
Monitor, audit and review systems for and identify violations or attempted violations of security procedures, processes and access.
Plan and implement appropriate measures to safeguard data from accidental or unauthorized modification, destruction or disclosure.
Respond to incidents, investigate potential incidents and recommend enhancements to close potential security gaps and serve as a backup to other members of the Technology department.
Responsible for post breach/data loss activities including but not limited preservation of evidence, review of data to determine scope and support of legal and other processes.
Participate in supporting efforts, making sure all networks, systems, applications, servers, technology tools and related equipment problems are resolved in a timely manner with limited disruptions.
Monitor performance and maintain systems according to requirements.
Ensure security through access controls, backups and firewalls.
Recommend when to upgrade systems with new releases and models.
Timely completion of IT Projects.
All other duties as assigned.
Information Security & Systems Analyst Responsibilities:
Safeguard and help prevent cyber-attacks:
Implement industry best practices for cybersecurity.
Be up to date about the latest security trends and newest security technology.
Assist other technical support staff in identifying and implementing appropriate security safeguards, including patch applications and anti-malware strategies.
Operate, administer and monitor network and host-based intrusion detection/prevention systems.
Ensure ongoing compliance with industry standards for information security:
Participating in risk assessments to identify potential security threats
Conducting employee training on security policies and responsibilities
Auditing IT systems to ensure compliance with regulations.
Reporting security breaches to management for prompt resolution.
Collaborating with vendors to ensure proper data handling security measures.
Monitoring compliance with state and federal data privacy and security regulations.
Developing policies and procedures for maintaining data security.
Monitor and report on devices and networks including:
Maintain, configure, secure and provide reliable operation of computers systems, network servers, and virtualization.
Network switch and firewall health
Internet traffic and usage metrics
Design and install network devices and systems (including maintaining current software versions on all network equipment) Demonstrates ability to independently troubleshoot and diagnose network, telephone, Internet, Wi-Fi, network.
Assists with work order requests:
Helps the IT Team meet service levels of quality and responsiveness:
Satisfaction goal of 90%
2-business-day response time (resolution time dependent on issue SLA)
Creates, updates and closes tickets in incident management system.
Qualifications:
• Bachelor's degree in computer science, programming, or a related field or equivalent industry experience.
• 2-4 Years of Security or Systems Analyst experience
REQUIRED NON TECHNICAL QUALIFICATIONS
• Must have the ability to work under pressure, without constant direction and to react in a positive and spontaneous manner to the needs of residents, staff, visitors, and vendors.
• Must be able to independently handle multiple simultaneous tasks, following specific instructions carefully and general instructions completely.
• Excellent communication skills
• Resourcefulness and problem-solving aptitude
• Self-starter mentality willing to make constant improvements in the technical support process.
• Takes pride and ownership of the support role.
• Excellent customer service and communication skills
• Ability to assess resident and staff complaints and resolve disputes in a friendly professional manner.
REQUIRED TECHNICAL QULAIFICATION
• Strong understanding of cybersecurity tools, concepts and best practices.
• Knowledge of information security frameworks (e.g.,HIPAA, NIST) and relevant regulations.
• Knowledge of Windows Operating Systems - Desktop (10 and 11) and Server (2016+)
• Windows desktop device configuration, management, and operation.
• IOS Device configuration, management, and operation.
• Networking Concepts and basic troubleshooting (DNS, DHCP, IP Addressing).
• Switching and Routing Concepts (basic troubleshooting and configuration).
• Meraki Network and Camera Equipment
• VOIP/PBX
• Demonstrated working in a helpdesk ticketing environment.
How much does a cyber security analyst earn in Hermitage, PA?
The average cyber security analyst in Hermitage, PA earns between $63,000 and $114,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Hermitage, PA