Cyber GRC Analyst II
Cyber security analyst job in Pineville, LA
At Cleco, we're not just powering lives-we're powering a cleaner, smarter future for Louisiana. With bold investments in innovative energy solutions, we're transforming how we power our communities: smarter, cleaner, and more sustainable. This is a long-term commitment to our people and our communities because our future-and the future of generations to come-depends on it. If you're ready to make an impact where it matters most, join us at Cleco-where we're Energizing Your Tomorrow.
The Cyber GRC Analyst II is an experienced professional with some knowledge of and experience with IT General Control (ITGC) principles, practices, concepts, and theories. Tests adherence to Cleco's information security policies, standards, and procedures. Ensures Cleco's IT governance processes are properly designed and functioning effectively, and the organization maintains its compliance with all applicable legal, regulatory, and contractual requirements. Responsible for ensuring the effectiveness of all IT General Controls (ITGCs). Serve as a direct point of contact between IT and internal / external auditors to provide leadership in managing auditing activities, requests and developing responses to audit findings. Responsible for the completion of assigned processes or activities, requiring interpretation of ITGC practices. Contributes to identifying improvements to ITGC activities and procedures. Assists in the development and onboarding of entry-level employees with cyber security responsibilities through coaching, mentoring and knowledge sharing.
Key Responsibilities
Champions a corporate culture that emphasizes transparency, integrity, safety, environmental responsibility, employee development, diversity and inclusion, customer service, and operational excellence.
Provides technical execution of defined activities to support the delivery of project initiatives required to achieve efficiency, effectiveness, and innovation objectives.
Achieves results by autonomously owning and executing ITGC activities as defined by manager.
Supports agile projects through application of defined ITGC approaches.
Utilizes ITGC standards, procedures, and processes, providing recommendations for process improvements, as necessary.
Supports the escalation of any risk to delivery for ITGC, to help ensure business objectives are executed and met across responsible project areas.
Escalate issues to management, as necessary.
Assess IT compliance with Cleco's policies and standards and take action to remediate non-compliance.
Ensure that Cleco's practices satisfy the requirements of the Sarbanes-Oxley Act.
Ensure that Cleco is properly evaluating security risks through a risk assessment framework that assesses the potential impact of threats to the business and Cleco's vulnerability to these threats and recommended controls to reduce risks to levels that align with the organization's risk tolerances and appetite.
Work collaboratively with all Cleco departments to ensure that local practices are consistent with corporate information security policies and standards.
Identify compliance objectives and mapped program deliverables to the requirements.
Participate in Cleco's business continuity planning and disaster recovery planning programs as well as periodic exercises and tests.
Collect information for generating and communicating responses to customer due diligence requests and questionnaires.
Assist in Cleco's vendor management / third party service provider oversight program and conduct initial vendor due diligence as well as ongoing vendor reviews.
Conduct and document an annual enterprise risk assessment as well as ad hoc project risk assessments
Assist entry-level staff within assigned project teams, leveraging technical experience to help to onboard them and in support of meeting project milestones.
Provide communication to management to provide status updates on project activities, and identify risks in delivery or resourcing needs
Qualifications
Required Education, Skills & Experience
Bachelor's degree in Computer Science, Information Technology, or related field preferred
3-5+ years of related experience
Security Certification required (CISA, CRISC, applicable SANS certification, or equivalent/higher certification) or obtainment within one year of assuming position
Step progression levels based on skill proficiency and scope of job.
Strong business acumen pertaining to the Utility industry
Strong knowledge of leading GRC practices
Strong planning and project management skills
General understanding for IT profit and loss targets and operating budget.
Willingness and ability to learn new technologies on the job
Proficient at functioning effectively within a team environment, present ideas and opinions in a respective and collegial manner
Progression to this level is strictly restricted based on critical individual capabilities and business requirements; must be supported by market survey data.
Licenses and Certifications
Key Competencies
BEHAVIORAL
Balances stakeholders
Builds effective teams
Business insight
Communicates effectively
Courage
Demonstrates self-awareness
Drives Results
Drives vision and purpose
Ensures Accountability
Instills trust
Nimble learning
Plans and Aligns
Safety
Strategic mindset
TECHNICAL
Analytical skills
Compliance
Computer Skills
Business Partnering
Application Development
Architecture
Business Requirements Analysis
Database Administration
Hardware Management
IT Data Management
IT Implementation and integration
IT Support
IT Testing
Network/IT Security
May perform other duties as assigned.
Salary dependent on experience, skills, education, and training.
Auto-ApplyCyber GRC Analyst II
Cyber security analyst job in Pineville, LA
At Cleco, we're not just powering lives-we're powering a cleaner, smarter future for Louisiana. With bold investments in innovative energy solutions, we're transforming how we power our communities: smarter, cleaner, and more sustainable. This is a long-term commitment to our people and our communities because our future-and the future of generations to come-depends on it. If you're ready to make an impact where it matters most, join us at Cleco-where we're Energizing Your Tomorrow.
The Cyber GRC Analyst II is an experienced professional with some knowledge of and experience with IT General Control (ITGC) principles, practices, concepts, and theories. Tests adherence to Cleco's information security policies, standards, and procedures. Ensures Cleco's IT governance processes are properly designed and functioning effectively, and the organization maintains its compliance with all applicable legal, regulatory, and contractual requirements. Responsible for ensuring the effectiveness of all IT General Controls (ITGCs). Serve as a direct point of contact between IT and internal / external auditors to provide leadership in managing auditing activities, requests and developing responses to audit findings. Responsible for the completion of assigned processes or activities, requiring interpretation of ITGC practices. Contributes to identifying improvements to ITGC activities and procedures. Assists in the development and onboarding of entry-level employees with cyber security responsibilities through coaching, mentoring and knowledge sharing.
Key Responsibilities
* Champions a corporate culture that emphasizes transparency, integrity, safety, environmental responsibility, employee development, diversity and inclusion, customer service, and operational excellence.
* Provides technical execution of defined activities to support the delivery of project initiatives required to achieve efficiency, effectiveness, and innovation objectives.
* Achieves results by autonomously owning and executing ITGC activities as defined by manager.
* Supports agile projects through application of defined ITGC approaches.
* Utilizes ITGC standards, procedures, and processes, providing recommendations for process improvements, as necessary.
* Supports the escalation of any risk to delivery for ITGC, to help ensure business objectives are executed and met across responsible project areas.
* Escalate issues to management, as necessary.
* Assess IT compliance with Cleco's policies and standards and take action to remediate non-compliance.
* Ensure that Cleco's practices satisfy the requirements of the Sarbanes-Oxley Act.
* Ensure that Cleco is properly evaluating security risks through a risk assessment framework that assesses the potential impact of threats to the business and Cleco's vulnerability to these threats and recommended controls to reduce risks to levels that align with the organization's risk tolerances and appetite.
* Work collaboratively with all Cleco departments to ensure that local practices are consistent with corporate information security policies and standards.
* Identify compliance objectives and mapped program deliverables to the requirements.
* Participate in Cleco's business continuity planning and disaster recovery planning programs as well as periodic exercises and tests.
* Collect information for generating and communicating responses to customer due diligence requests and questionnaires.
* Assist in Cleco's vendor management / third party service provider oversight program and conduct initial vendor due diligence as well as ongoing vendor reviews.
* Conduct and document an annual enterprise risk assessment as well as ad hoc project risk assessments
* Assist entry-level staff within assigned project teams, leveraging technical experience to help to onboard them and in support of meeting project milestones.
* Provide communication to management to provide status updates on project activities, and identify risks in delivery or resourcing needs
Qualifications
Required Education, Skills & Experience
* Bachelor's degree in Computer Science, Information Technology, or related field preferred
* 3-5+ years of related experience
* Security Certification required (CISA, CRISC, applicable SANS certification, or equivalent/higher certification) or obtainment within one year of assuming position
* Step progression levels based on skill proficiency and scope of job.
* Strong business acumen pertaining to the Utility industry
* Strong knowledge of leading GRC practices
* Strong planning and project management skills
* General understanding for IT profit and loss targets and operating budget.
* Willingness and ability to learn new technologies on the job
* Proficient at functioning effectively within a team environment, present ideas and opinions in a respective and collegial manner
* Progression to this level is strictly restricted based on critical individual capabilities and business requirements; must be supported by market survey data.
Licenses and Certifications
Key Competencies
BEHAVIORAL
* Balances stakeholders
* Builds effective teams
* Business insight
* Communicates effectively
* Courage
* Demonstrates self-awareness
* Drives Results
* Drives vision and purpose
* Ensures Accountability
* Instills trust
* Nimble learning
* Plans and Aligns
* Safety
* Strategic mindset
TECHNICAL
* Analytical skills
* Compliance
* Computer Skills
* Business Partnering
* Application Development
* Architecture
* Business Requirements Analysis
* Database Administration
* Hardware Management
* IT Data Management
* IT Implementation and integration
* IT Support
* IT Testing
* Network/IT Security
May perform other duties as assigned.
Salary dependent on experience, skills, education, and training.
Auto-ApplyInformation Security Analyst
Cyber security analyst job in Baton Rouge, LA
Baton Rouge, LA (On-Site)
The scope of the proposed services will include the following:
1. Managing InfoSec Identity Management requests through the OTS Ivanti ticketing system
2. Active Directory account creation/deletion
3. Active Directory group membership management
4. Active directory file share permission management
5. Privileged account management
Expertise and/or relevant experience in the following areas are mandatory:
1. Creating Active Directory users and groups.
2. Managing Active Directory users and groups
3. Understanding Active Directory enterprise-wide deployments with multiple forests.
4. Managing and reviewing Microsoft Group Policy
5. Reviewing and processing information security requests.
Expertise and/or relevant experience in the following areas are desirable but not mandatory:
1. Basic PowerShell Knowledge
2. Compliance, or audit experience
3. Experience managing Identity and Access Management (IAM) systems
4. Documenting, Testing, and Reviewing Information Security Controls.
5. Coordinating notifications, responses, and escalations for security events and incident
management activities
Cloud Security Analyst
Cyber security analyst job in New Orleans, LA
Saronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms. Saronic Technologies is seeking a Cloud Security Analyst to join our cybersecurity team and strengthen the security of our AWS GovCloud environments. This role directly supports the Cybersecurity Specialist in maintaining and improving DoD Impact Level 5 (IL5) and IL6 cloud readiness for Saronic systems.
The Cloud Security Analyst will focus on analyzing, monitoring, and hardening AWS configurations, managing access and permissions, and ensuring the protection of Controlled Unclassified Information (CUI) across projects that interact with cloud services.Key Responsibilities:
Cloud Security Oversight
Evaluate and continuously monitor AWS GovCloud environments for compliance with FedRAMP High, DoD IL5/IL6, and CUI handling requirements.
Review and validate IAM roles, permissions, and resource configurations to ensure adherence to least privilege principles.
Assess cloud service configurations (e.g., S3, EC2, RDS, CloudTrail, KMS, Config) and recommend security improvements.
Support implementation of baseline configurations and guardrails aligned with DoD and AWS best practices.
Track, report, and follow up on identified security issues or misconfigurations to closure.
Monitoring and Incident Response Support
Monitor cloud environments using AWS Security Hub, GuardDuty,
CloudTrail, and related tools for anomalies or policy violations.
Assist in vulnerability management efforts, including scanning, prioritization, and remediation verification.
Support cloud-related incident response activities by gathering and analyzing logs, indicators, and events.
Maintain situational awareness of evolving cloud security threats and recommend mitigation strategies.
Governance and Continuous Improvement
Assist in preparing and maintaining security documentation, such as policies, procedures, and compliance evidence.
Support audit preparation and control validation for IL5/IL6 accreditation and RMF-related activities.
Identify opportunities to improve processes and automate compliance or monitoring tasks.
Collaborate on initiatives that strengthen AWS security posture and operational efficiency.
Cross-Team Collaboration
Work closely within the Cybersecurity team to execute security initiatives and ensure unified cloud defense.
Collaborate with internal teams including Security, Software and IT to guide and validate secure implementations.
Provide day-to-day support for AWS-related security issues, IAM management, and secure project deployments.
Communicate findings and recommendations effectively to both technical and non-technical stakeholders.
Required Qualifications
1-2 years of relevant experience in Cybersecurity (internships included).
Bachelor's degree or relevant education in Cybersecurity, Computer Science, or related field. Industry experience may substitute educational requirements.
Familiarity with FedRAMP High, DoD IL4+, and CUI data protection frameworks.
Understanding of AWS security resources and security monitoring.
Strong analytical and problem-solving skills for cloud environments.
This role requires the ability to obtain and maintain a security clearance.
Preferred Qualifications:
AWS Certifications: Cloud Practitioner, Security, Solutions Architect, SysOps Administrator and Developer.
Experience working in or securing AWS or AWS GovCloud environments.
SANS GIAC GSEC or similar Cybersecurity certification.
Familiarity with Terraform and reviewing Infrastructure-as-Code (IaC) configurations for security compliance.
Prior IT systems administration or DevOps experience a plus.
Experience in DoD-accredited (IL5/IL6) or FedRAMP High environments.
Knowledge of NIST 800-171, NIST 800-53, and CMMC 2.0 controls.
Knowledge of autonomous, maritime, or defense-related technologies.
Experience supporting security architecture or accreditation efforts for DoD or government cloud systems.
Ability to work cross-functionally and influence secure practices across diverse technical teams.
Physical Demands:
Prolonged periods of sitting and computer work.
Occasional standing and walking within the office.
Manual dexterity to operate computers and office equipment.
Visual acuity to read screens and documents.
Occasional reaching or lifting up to 20 pounds (e.g., equipment or supplies).
Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in
8 U.S.C. 1324b(a)(3)
.
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
Auto-ApplyEngineer, Information Security and Risk
Cyber security analyst job in Baton Rouge, LA
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Analyst
Cyber security analyst job in Baton Rouge, LA
Role : Information Security Analyst Duration: Longterm The scope of the proposed services will include the following: 1. Managing InfoSec Identity Management requests through the OTS Ivanti ticketing system 2. Active Directory account creation/deletion
3. Active Directory group membership management
4. Active directory file share permission management
5. Privileged account management
Expertise and/or relevant experience in the following areas are mandatory:
1. Creating Active Directory users and groups.
2. Managing Active Directory users and groups
3. Understanding Active Directory enterprise wide deployments with multiple forests.
4. Managing and reviewing Microsoft Group Policy
5. Reviewing and processing information security requests.
Expertise and/or relevant experience in the following areas are desirable but not mandatory:
1. Basic PowerShell Knowledge
2. Compliance, or audit experience
3. Experience managing Identity and Access Management (IAM) systems
4. Documenting, Testing, and Reviewing Information Security Controls.
5. Coordinating notifications, responses, and escalations for security events and incident management activities
Auto-ApplyOffensive Security Engineer, Assessments (Web3)
Cyber security analyst job in Baton Rouge, LA
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services.
*What you'll be doing (ie. job duties):*
* Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure.
* Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities.
* Stay informed on emerging security trends, advisories, and academic research in the Web3 space.
* Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities.
* Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community.
* Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements.
* Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement.
* Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program.
* Mentor and train junior security engineers in Web3 bug bounty triage and analysis.
* Provide on-call support for critical Web3 bug bounty-related incidents.
* Document and report on Web3 bug bounty metrics and program effectiveness.
*What we look for in you (ie. job requirements):*
* Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field.
* 3+ years of experience in Web3 application security and penetration testing.
* Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components.
* Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms.
* Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25).
* Strong analytical skills to identify trends and patterns in vulnerabilities.
* Excellent communication skills for engaging with internal teams.
* Passion for security and a drive to improve Web3 security posture.
* Ability to work independently and take ownership of penetration testing initiatives.
* Energy and self-drive for continuous learning in the rapidly evolving crypto space.
* Excellence in clear, direct, and kind communication with technical and non-technical stakeholders.
* Experience building relationships with product, engineering, and security teams.
*Nice to haves:*
* Participation in CTFs, bug bounty programs, or open-source security research.
* Expertise in Application Security, Network Security, or Cloud Security.
* Relevant security certifications (e.g., OSCP, GPEN).
* Experience developing and implementing security tooling to support bug bounty triage and analysis.
* Experience with bug bounty programs and platforms, including triage, validation, and researcher communication.
* Strong analytical skills to identify trends and patterns in bug bounty submissions.
* Excellent communication skills to effectively engage with bug bounty researchers.
Position ID: P69494
\#LI-remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$152,405-$179,300 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
Information Security Specialist I
Cyber security analyst job in Louisiana
Maintain ACAS scanning solutions on unclassified (5000+ systems) and classified networks.
Generate reports from ACAS scanning data to assist in securing both networks.
Use PowerShell scripting to automate tasks and create tools for the cyber security team improving efficiency.
Work within eMASS to support RMF auditing.
Work using ACAS scanning data to help identify systems with vulnerabilities and work to remediate vulnerabilities.
Write supporting documentation logging and reporting vulnerabilities on both networks.
Requirements
Minimum Requirements:
Must possess an active DOD Secret Security Clearance.
Minimum experience of five years performing Information Systems Analysis, preferably as part of a government branch.
MCSA
IAT Level II Certification (Security+)
CompTIA CYSA+ or CASP+ certified
Specialized Experience:
Experience in vulnerability assessments, RMF, CORA, eMASS, ACAS, HBSS, DISA STIGS, ACAS, AESS, Tychon Endpoint, WIDS, etc.
Senior Security Engineer
Cyber security analyst job in New Orleans, LA
Our client, a leading financial institution, is seeking a Senior Security Engineer to join their security engineering operations team. This role involves managing critical security infrastructure including cloud VPNs, user VPNs, business-to-business VPNs, firewalls, and distributed cloud application firewalling as the organization continues its cloud transformation journey. The ideal candidate will possess strong technical expertise, excellent verbal and written communication skills, and the ability to thrive in a corporate financial environment.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
- 8+ years of experience in information security engineering and operations
- F5 LTM
- Palo Alto
- FortiNet
- Juniper Firewalls - Experience with cloud security platforms (AWS, Azure, or GCP)
Certifications:
- CSSP
- SANS
Security Engineer II
Cyber security analyst job in Baton Rouge, LA
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Application Security Engineer
Cyber security analyst job in DeRidder, LA
AMERISAFE is seeking a detail-oriented, productivity driven professional to add to our “Excellence Team." The Application Security Engineer will have responsibility within the IS and IT department for securely analyzing, planning, coding and documenting software systems and technology solutions in support of business objectives. This position will work under the leadership of the Vice President of Information Security and will be remote.
Upon an offer and acceptance of employment with AMERISAFE, you will be required to complete our pre-employment screening, which includes a criminal background check, a 10-panel drug test and, if applicable, a review of your motor vehicle report. A 10-panel drug test includes amphetamine/methamphetamine, barbiturates, benzodiazepines, cocaine metabolite (BZE), marijuana metabolite (THCA), methadone, methaqualone, codeine/morphine, phencyclidine, propoxyphene.
Qualifications:
Relevant BS/BA degree and/or equivalent education/work experience in software system analysis and development
Proven ability to work collaboratively and constructively with IT teams, including development, quality, support, and infrastructure, to produce high-quality software products
Experience in understanding, capturing, and documenting technical and functional system requirements to meet business needs and expectations
Experience with multiple application and database development toolsets and methodologies, especially Microsoft technologies
Experience with software development life cycle concepts, practices, techniques, and procedures
Excellent written and verbal communication skills and demonstrated ability to effectively communicate with staff, co-workers, management, and external personnel
Excellent analytical, interpretive, problem-solving, and evaluative skills for decision making
Excellent organizational, reporting, and time management skills
Demonstrated customer-service orientation and attitude
Demonstrated ability in creative thinking, self-direction, and initiative
Demonstrated ability to thrive in a dynamic and high-pressure environment
Willing to work extended hours and weekends and travel occasionally
Foster the AMERISAFE culture by embracing the pillars of consistency, focus, frugality, ownership and service
Duties and Responsibilities:
Participate in and support a highly collaborative development environment
Collaborate with cross-functional teams to design, develop, and implement application security and delivery solutions that ensure the confidentiality, integrity, and availability of critical applications and services
Develop automation to streamline network and application deployment, configuration, and maintenance tasks
Implement and manage Web Application API Protection and Web Application Firewall solutions to safeguard web applications and APIs from threats and vulnerabilities
Conduct requirements gathering and documentation through investigation of existing software systems, observation of current business processes, and interviews with company staff
Analyze, plan, design, develop, code, and debug new software systems as well as enhancements to legacy systems according to specified requirements
Evolve and standardize cybersecurity reference architectures for new systems and applications covering on-prem, SaaS, IaaS, and PaaS
Create performance metrics to measure the effectiveness of new and existing cybersecurity capabilities, tools, and services
Identify and report risks and evaluate opportunities associated with software systems and other technology solutions
Support and adhere to established IT and Company policies, procedures, standards, and controls
The position may require additional duties to be assigned.
Auto-ApplyInformation Systems Security Officer (ISSO) I
Cyber security analyst job in Bossier City, LA
Job Description
gTANGIBLE Corporation (gTC), ****************** is an S corporation and a registered Government contractor that provides services and solutions in:
National Security Programs
Professional, Administrative, and Management Support
Mission and Warfighter Support
We are a Service-Disabled Veteran Owned Small Business (SDVOSB) and the founder has years of successful experience in the Government contracting arena. Our leadership team is an exceptional group of Government contracting professionals. gTANGIBLE is in the process of identifying candidates for the following position.
Requisition Type: Non-Contingent (Open)
Position Status: Full Time
Position Title: Information Systems Security Officer (ISSO) I
Location: Bossier City, LA
Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for Counterintelligence polygraph
Duties and Responsibilities
The Air Force (AF) Special Access Program (SAP) Security Support Services (SSS) assists the AF cognizant security authority in oversight of enhanced National Security Objectives supporting AF SAP interests through active and integrated security operations, processes, mechanisms, and management. This support provides multi- disciplinary security support, including specialized analytical/program protection support, while being responsive and flexible to dynamic SAP security situations.
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Duties include the following:
Develop physical or logical topologies for a system.
Assist the ISSM in meeting their duties and responsibilities.
Prepare, review, and update authorization packages.
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans.
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.
Prepare reports on the status of security safeguards applied to computer systems.
Perform ISSO duties in support of in-house and external customers.
Knowledge and Qualifications
Bachelor's degree and 1-2 years of related experience or Associates degree and 3-5 years of related experience or 5-7 years of related experience without a degree.
Related experience especially in developing RMF packages or body of evidence.
Prior performance in roles such as System or Network Administrator.
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I or Information Assurance Manager I within 6 months of the date of hire.
Must be able to regularly lift up to 50 lbs.
SAP experience desired.
Prior active duty in the U.S. Air Force a plus.
Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other protected category under applicable federal, state, and local laws.
Security Analyst
Cyber security analyst job in New Orleans, LA
Saronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms. Saronic is seeking a Security Analyst to monitor, investigate, and respond to security threats across hybrid environments. This role supports incident response, threat hunting, and continuous improvement of detection, response, and operational effectiveness.Responsibilities:
Monitor, triage, and investigate security alerts and incidents across hybrid environments.
Correlate and assess security, identity, and behavioral data to detect high-risk activity and support insider threat and external threat investigations.
Conduct proactive threat hunts leveraging current intelligence, MITRE ATT&CK techniques, and establishing baselines to identify undetected threats or weaknesses.
Contribute to operational runbooks, detection playbooks, and case documentation.
Participate in an on-call rotation responding to security events and supporting incident response investigations.
Collaborate with internal teams to enhance detection logic, improve workflows and automations.
Stay current with evolving threat landscape and maintain situational awareness across organizational assets and environments.
Required Qualifications:
3+ years of hands-on experience in a security operations center or part of a cybersecurity incident response team.
Proficient with SOC and incident response platforms, including SIEM, EDR, threat intelligence, and SOAR solutions, with experience in endpoint and network forensics, root-cause analysis, and incident reporting.
Demonstrated ability to use scripting and automation languages for data analysis and investigation, and familiarity with infrastructure-as-code frameworks used in production environments.
This role requires the ability to obtain and maintain a security clearance
Preferred Qualifications:
Familiarity with Department of Defense (DoD) or military industry events.
Industry recognized certifications (GCIH, GCIA, GNFA, GREM, CEH, etc.).
Physical Demands:
Prolonged periods of sitting at a desk and working on a computer.
Occasional standing and walking within the office.
Manual dexterity to operate a computer keyboard, mouse, and other office equipment.
Visual acuity to read screens, documents, and reports.
Occasional reaching, bending, or stooping to access file drawers, cabinets, or office supplies.
Lifting and carrying items up to 20 pounds occasionally (e.g., office supplies, packages).
Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in
8 U.S.C. 1324b(a)(3)
.
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
Auto-ApplyEngineer, Information Security and Risk
Cyber security analyst job in Baton Rouge, LA
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Analyst
Cyber security analyst job in Baton Rouge, LA
Job DescriptionRole : Information Security Analyst Duration: Longterm The scope of the proposed services will include the following: 1. Managing InfoSec Identity Management requests through the OTS Ivanti ticketing system
2. Active Directory account creation/deletion
3. Active Directory group membership management
4. Active directory file share permission management
5. Privileged account management
Expertise and/or relevant experience in the following areas are mandatory:
1. Creating Active Directory users and groups.
2. Managing Active Directory users and groups
3. Understanding Active Directory enterprise wide deployments with multiple forests.
4. Managing and reviewing Microsoft Group Policy
5. Reviewing and processing information security requests.
Expertise and/or relevant experience in the following areas are desirable but not mandatory:
1. Basic PowerShell Knowledge
2. Compliance, or audit experience
3. Experience managing Identity and Access Management (IAM) systems
4. Documenting, Testing, and Reviewing Information Security Controls.
5. Coordinating notifications, responses, and escalations for security events and incident management activities
Powered by JazzHR
Z42nr2UGjw
Cloud Security Analyst
Cyber security analyst job in New Orleans, LA
Job DescriptionSaronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms.
Saronic Technologies is seeking a Cloud Security Analyst to join our cybersecurity team and strengthen the security of our AWS GovCloud environments. This role directly supports the Cybersecurity Specialist in maintaining and improving DoD Impact Level 5 (IL5) and IL6 cloud readiness for Saronic systems.
The Cloud Security Analyst will focus on analyzing, monitoring, and hardening AWS configurations, managing access and permissions, and ensuring the protection of Controlled Unclassified Information (CUI) across projects that interact with cloud services.Key Responsibilities:
Cloud Security Oversight
Evaluate and continuously monitor AWS GovCloud environments for compliance with FedRAMP High, DoD IL5/IL6, and CUI handling requirements.
Review and validate IAM roles, permissions, and resource configurations to ensure adherence to least privilege principles.
Assess cloud service configurations (e.g., S3, EC2, RDS, CloudTrail, KMS, Config) and recommend security improvements.
Support implementation of baseline configurations and guardrails aligned with DoD and AWS best practices.
Track, report, and follow up on identified security issues or misconfigurations to closure.
Monitoring and Incident Response Support
Monitor cloud environments using AWS Security Hub, GuardDuty,
CloudTrail, and related tools for anomalies or policy violations.
Assist in vulnerability management efforts, including scanning, prioritization, and remediation verification.
Support cloud-related incident response activities by gathering and analyzing logs, indicators, and events.
Maintain situational awareness of evolving cloud security threats and recommend mitigation strategies.
Governance and Continuous Improvement
Assist in preparing and maintaining security documentation, such as policies, procedures, and compliance evidence.
Support audit preparation and control validation for IL5/IL6 accreditation and RMF-related activities.
Identify opportunities to improve processes and automate compliance or monitoring tasks.
Collaborate on initiatives that strengthen AWS security posture and operational efficiency.
Cross-Team Collaboration
Work closely within the Cybersecurity team to execute security initiatives and ensure unified cloud defense.
Collaborate with internal teams including Security, Software and IT to guide and validate secure implementations.
Provide day-to-day support for AWS-related security issues, IAM management, and secure project deployments.
Communicate findings and recommendations effectively to both technical and non-technical stakeholders.
Required Qualifications
1-2 years of relevant experience in Cybersecurity (internships included).
Bachelor's degree or relevant education in Cybersecurity, Computer Science, or related field. Industry experience may substitute educational requirements.
Familiarity with FedRAMP High, DoD IL4+, and CUI data protection frameworks.
Understanding of AWS security resources and security monitoring.
Strong analytical and problem-solving skills for cloud environments.
This role requires the ability to obtain and maintain a security clearance.
Preferred Qualifications:
AWS Certifications: Cloud Practitioner, Security, Solutions Architect, SysOps Administrator and Developer.
Experience working in or securing AWS or AWS GovCloud environments.
SANS GIAC GSEC or similar Cybersecurity certification.
Familiarity with Terraform and reviewing Infrastructure-as-Code (IaC) configurations for security compliance.
Prior IT systems administration or DevOps experience a plus.
Experience in DoD-accredited (IL5/IL6) or FedRAMP High environments.
Knowledge of NIST 800-171, NIST 800-53, and CMMC 2.0 controls.
Knowledge of autonomous, maritime, or defense-related technologies.
Experience supporting security architecture or accreditation efforts for DoD or government cloud systems.
Ability to work cross-functionally and influence secure practices across diverse technical teams.
Physical Demands:
Prolonged periods of sitting and computer work.
Occasional standing and walking within the office.
Manual dexterity to operate computers and office equipment.
Visual acuity to read screens and documents.
Occasional reaching or lifting up to 20 pounds (e.g., equipment or supplies).
Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in
8 U.S.C. 1324b(a)(3)
.
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
Engineer, Information Security and Risk
Cyber security analyst job in Baton Rouge, LA
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Security Analyst
Cyber security analyst job in New Orleans, LA
Job DescriptionSaronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms.
Saronic is seeking a Security Analyst to monitor, investigate, and respond to security threats across hybrid environments. This role supports incident response, threat hunting, and continuous improvement of detection, response, and operational effectiveness.Responsibilities:
Monitor, triage, and investigate security alerts and incidents across hybrid environments.
Correlate and assess security, identity, and behavioral data to detect high-risk activity and support insider threat and external threat investigations.
Conduct proactive threat hunts leveraging current intelligence, MITRE ATT&CK techniques, and establishing baselines to identify undetected threats or weaknesses.
Contribute to operational runbooks, detection playbooks, and case documentation.
Participate in an on-call rotation responding to security events and supporting incident response investigations.
Collaborate with internal teams to enhance detection logic, improve workflows and automations.
Stay current with evolving threat landscape and maintain situational awareness across organizational assets and environments.
Required Qualifications:
3+ years of hands-on experience in a security operations center or part of a cybersecurity incident response team.
Proficient with SOC and incident response platforms, including SIEM, EDR, threat intelligence, and SOAR solutions, with experience in endpoint and network forensics, root-cause analysis, and incident reporting.
Demonstrated ability to use scripting and automation languages for data analysis and investigation, and familiarity with infrastructure-as-code frameworks used in production environments.
This role requires the ability to obtain and maintain a security clearance
Preferred Qualifications:
Familiarity with Department of Defense (DoD) or military industry events.
Industry recognized certifications (GCIH, GCIA, GNFA, GREM, CEH, etc.).
Physical Demands:
Prolonged periods of sitting at a desk and working on a computer.
Occasional standing and walking within the office.
Manual dexterity to operate a computer keyboard, mouse, and other office equipment.
Visual acuity to read screens, documents, and reports.
Occasional reaching, bending, or stooping to access file drawers, cabinets, or office supplies.
Lifting and carrying items up to 20 pounds occasionally (e.g., office supplies, packages).
Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in
8 U.S.C. 1324b(a)(3)
.
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
Platform Security Engineer
Cyber security analyst job in New Orleans, LA
Saronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms. Saronic Technologies is a leader in defense autonomy at sea. We're seeking a Platform Security Engineer to secure the cloud/edge where vessels, operators, and customers meet. You'll own identity and access patterns, secrets and key management, secure network posture, and policy-as-code guardrails-working across AWS (including GovCloud), Terraform infrastructure, and service code to deliver trustworthy, auditable systems.
Senior Engineers: 3+ years securing production cloud platforms (identity, secrets/KMS, network posture), preferably in autonomy, robotics, aerospace, or defense.
Staff Engineers: 8+ years including technical leadership across secure-by-default platform modules, short-lived credential issuance, and cross-account policy design; demonstrated ownership from design through operational rollout.Key Responsibilities
Design, develop, and maintain secure-by-default infrastructure on
AWS using Terraform (ALB/OIDC, IAM, KMS, Secrets Manager, Route53, VPC/SGs).
Standardize OIDC at the edge (ALB/ingress) for internal and external applications; define scopes, claims, and token lifecycles.
Own secrets and key management: KMS key policies, rotation schedules, cross-account access, and automated issuance for services and tools.
Enforce IMDSv2 required, least-privilege IAM roles, and tight security groups across modules; add CI/policy checks to prevent regressions.
Design secure protocols/APIs for service↔service and boat↔cloud communication (mTLS/TLS, certificate issuance/rotation, revocation).
Manage short-lived credentials used by fleet/overlay services; implement rotation, auditing, and incident response runbooks.
Prefer service-mediated S3 access over broad pre-signed URLs; codify bucket policies, logging, and access boundaries.
Build centralized, tamper-evident logging and audit trails; integrate detections and metrics to validate control effectiveness.
Perform threat modeling and security reviews; document patterns and drive adoption via reusable modules and guides.
Troubleshoot complex security issues in production; lead post-incident reviews and drive remediation to closure.
Stay current on cloud security best practices, especially for defense/government environments.
Required Qualifications:
Bachelor's or Master's degree in Computer Science, Software/Computer/Electrical Engineering, or a related field.
3+ years building on AWS with Terraform (ALB/ELB, IAM, KMS, Secrets Manager, Route53, VPC/SGs).
Strong knowledge of cryptographic and IAM fundamentals (key policies, rotation, certificates, OIDC/OAuth2).
Demonstrated experience enforcing IMDSv2, least-privilege roles, and network controls at scale.
Experience designing secure protocols/APIs and integrating auth into service code (e.g., Go/Rust/TypeScript).
Proven ability to perform threat modeling and conduct design/code security reviews.
Excellent problem-solving and communication skills; effective collaboration across platform, embedded, and field teams.
This role requires the ability to obtain and maintain a security clearance
Preferred Qualifications:
Experience in AWS GovCloud, multi-account landing zones, and cross-account KMS/Secrets patterns
Familiarity with fleet/overlay VPN access control and short-lived credential issuance
Policy-as-code guardrails (e.g., OPA/Conftest, Terraform validations), drift detection, and CI integration
Centralized logging/SIEM and cloud threat detection (e.g., CloudTrail, GuardDuty) with audit readiness
PKI/CA management and, ideally, hardware roots of trust (TPM/secure elements) at the edge
DoD/defense domain familiarity and prior work under export-controlled constraints
Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in
8 U.S.C. 1324b(a)(3)
.
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
Auto-ApplyCorporate Security Engineer
Cyber security analyst job in New Orleans, LA
Saronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms. As a Corporate Security Engineer, you'll safeguard the systems that power Saronic's mission. You'll engineer, harden, and operate Microsoft 365 and AWS environments to meet defense-grade security requirements while protecting our people, data, and operations. You'll own the protection of every employee, system, and credential. Your work will secure the full user lifecycle by automating onboarding/offboarding, protecting remote and traveling employees, and minimizing human-targeted risks like phishing and social engineering.
You will design secure-by-default platforms, automate compliance and monitoring through cloud solutions, and ensure our environments remain resilient, frictionless, and compliant. At Saronic, security is a force multiplier; security is not a blocker. You will have the autonomy to build and the mandate to innovate, working side-by-side with engineers who are developing technology that directly supports national defense. This role is ideal for someone who wants to own security at scale, shape a defense-grade security program, and see their impact every day. You'll thrive here if you're driven by mission, biased toward action, and enjoy working in a high-trust, low-ego team that values resilience, integrity, and creativity. Key Responsibilities:
Cloud and Identity Security
Administer and secure multiple Microsoft 365 GCC High and Microsoft 365 commercial tenants and AWS GovCloud and commercial accounts to align with NIST SP 800-171, NIST CSF, and ISO 27001 standards
Configure and harden identity and access management (Entra ID, AWS IAM), data loss prevention (Purview), and conditional access policies to enforce multi-factor authentication, single sign-on, and least privilege
Implement security guardrails and automation in partnership with IT and DevOps teams using Infrastructure as Code (Terraform, Ansible, CloudFormation)
Continuously drive security automation and visibility improvements across people, process, and technology
User and Endpoint Security
Engineer and enforce secure device baselines and policies via Intune and Jamf for unified endpoint management
Configure and maintain endpoint protection platforms (Defender, CrowdStrike)
Secure the user lifecycle through automated identity and device provisioning/de-provisioning, least-privilege enforcement, remote and traveling employee protection, and anomalous behavior monitoring
Reduce phishing and user-targeted threats through identity hardening, email protections, and user awareness feedback loops
Network Security
Engineer and maintain secure network architectures across global offices, remote, and cloud environments through VPNs, network segmentation, DNS filtering, secure network connectivity, and firewall configurations
Lead vulnerability, configuration, and asset management to maintain secure baselines and visibility across all enterprise systems
Support incident response through automation, playbooks, and forensic readiness
Application Security
Harden and monitor SaaS applications through secure SaaS controls, SSO/SAML enforcement, SCIM provisioning, and least privilege
Manage shadow IT detection, vendor risk reviews, and data protection
Required Qualifications:
3+ years proven experience administering and securing Microsoft 365 through Intune + Jamf, Entra ID, Defender, Purview, and Sentinel
Hands-on experience securing AWS environments, including secure configurations of IAM, GuardDuty, CloudTrail, Config, Security Hub, and encryption/key management controls
Proven proficiency in scripting and automation (i.e., Python, PowerShell, Bash)
Familiarity with cloud and identity ecosystems (i.e., Azure, AWS, Okta, Entra ID, Active Directory)
This role requires the ability to obtain and maintain a security clearance
Preferred Qualifications:
Experience with highly regulated frameworks such as NIST SP 800-171, NIST SP 800-53, ISO 27001, or FedRAMP
Familiarity with cloud and endpoint observability and EDR tools (i.e., Defender, CrowdStrike, Sentinel, Splunk)
Demonstrated experience automating compliance and audit processes
Experience implementing and managing secure cloud architecture and controls using Infrastructure as Code tools (i.e., Terraform, CloudFormation, Ansible)
Proven ability to design and operate Zero Trust Network Access
Experience implementing network intrusion detection and response tools
Demonstrated ability to evaluate SaaS vendor security posture and integrate approved applications securely into the environment
Background in defense, aerospace, or high-assurance manufacturing
Relevant security certifications (SC-100, MS-500, MD-102, AWS Certified Security - Specialty, GCSA, GCIA, CISSP, CCSP)
Physical Demands
Prolonged periods of sitting and computer work
Occasional standing and walking within the office
Manual dexterity to operate computers and office equipment
Visual acuity to read screens and documents
Occasional reaching or lifting up to 20 pounds (e.g., equipment or supplies)
Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in
8 U.S.C. 1324b(a)(3)
.
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
Auto-Apply