IT Security and Risk Engineer
Cyber Security Analyst Job 7 miles from Independence
Encore Talent Solutions is looking for an IT Security, Risk and Compliance Engineer-
The ideal candidate will have experience in:
Creating and managing policies around HIPPA and PCI
Experience managing security awareness programs and managing security audits
Conduct reviews to measure compliance with NIST, PCI, and ISO standards, regulations and frameworks
Provides strategic risk guidance for IT projects, including evaluation and recommendation of technical controls
Cyber Security Analyst - Entry Level
Cyber Security Analyst Job 12 miles from Independence
Entry Level Cyber Security Analyst
Cincinnati, OH
READ BEFORE YOU APPLY!
Opportunity: Per Scholas is helping to source entry-level candidates for Cyber Security Analyst positions with our employer partners in the Cincinnati region and will offer free training to candidates in need of additional upskilling in order to qualify.
Requirements:
To be successful, candidates need to possess basic literacy, math, critical thinking, and self-teaching skills, do well in fast-paced environments, and be able to learn new technologies quickly.
What we are looking for:
Must have at least a High School diploma or GED
Must be authorized to work in the US
Previous tech work experience or education preferred
Must be able to commit a Monday - Friday, 9:00am - 4:00pm
Must live in the Atlanta area
We are not currently offering visa sponsorship or transfers, but we will accept applications from individuals with work authorization.
Industrial Security Analyst/Principal Industrial Security Analyst
Cyber Security Analyst Job 12 miles from Independence
** Education** ** Disabled Veteran Resources/Benefits** Industrial Security Analyst/Principal Industrial Security Analyst Cincinnati, OH * **Category:** Security * **Clearance Type:** Top Secret
* **Shift:** 1st Shift (United States of America)
* **Travel Required:** Yes, 10% of the Time
* **Relocation Assistance:** Relocation assistance may be available
* **Positions Available:** 1
**Requisition ID: R10173958**
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
**Northrop Grumman Mission Systems (NGMS) is looking for you to join our team as an Industrial Security Analyst/ Principal Industrial Security Analyst 3 in Cincinnati, OH.** We offer flexible work arrangements, phenomenal learning opportunities, exposure to a wide variety of projects and customers, and a very friendly inclusive environment! We are looking for self-motivated, proactive, and goal-oriented people to help us grow our services and become even better at what we do.
* Develops, and administers security programs and procedures for classified or proprietary materials, documents, and equipment.
* Studies and implements federal security regulations that apply to company operations.
* Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies.
* Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to restricted records and materials.
* Conducts security education classes and security audits. Investigates security violations and prepares reports specifying preventive action to be taken.
* The position will require COMSEC custodian work and prior knowledge is preferred but not required.
**This position may be filled at either a level 2 or Level 3.**
**Basic Qualifications for a level 2:**
* Active Top Secret Clearance.
* 2+ Years of Industrial Security or Contractor Program Security Officer or related experience with Bachelors; An additional 4 years of applicable work experience may be substituted for bachelor's degree.
**Basic Qualifications for a level 3:**
* Active Top Secret Clearance.
* 5+ Years of Industrial Security or Contractor Program Security Officer or related experience with Bachelors; OR 3+ years with Masters; An additional 4 years of applicable work experience may be substituted for bachelor's degree.
**Preferred Qualifications:**
* CPSO certification
* FSO certification
* Top Secret//SCI clearance
* The position will require COMSEC custodian work and prior knowledge is preferred but not required.
**Salary Range:** $65,500 - $98,300
**Salary Range 2:** $80,600 - $121,000
The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.
Employees may be eligible for a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.
The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.
Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit. U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
**Your Privacy**
**Privacy Preference Center**
** Manage Consent Preferences**
Always Active Always Active Always Active
T&T- Cyber- DPT- CyberArk - DM
Cyber Security Analyst Job 11 miles from Independence
Your potential, unleashed. India's impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond.
At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters.
The team
Technology & Transformation is about much more than just the numbers. It's about attesting to accomplishments and challenges and helping to assure strong foundations for future aspirations. Deloitte exemplifies what, how, and why of change so you're always ready to act ahead. Learn more about Technology & Transformation Practice
Your work profile
As a CyberArk Engineer in our Cyber: Identity Team, you'll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: -
* Solution Design: Collaborate with stakeholders to gather requirements and design CyberArk solutions that meet business needs, security requirements, and compliance standards.
* Implementation: Lead the implementation and configuration of CyberArk components, including the Privileged Access Security (PAS) Suite, Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and Central Policy Manager (CPM).
* Integration: Integrate CyberArk solutions with other security and IT systems, such as directory services, identity governance platforms, ticketing systems, and SIEM solutions.
* Policy Management: Define and enforce access control policies, password management policies, and session recording policies within CyberArk to ensure the secure management of privileged accounts and access sessions.
* Account Discovery: Perform account discovery and onboarding activities to identify and onboard privileged accounts and assets into CyberArk for centralized management and control.
* Incident Response: Respond to security incidents and access-related events by conducting forensic investigations, analyzing access logs, and implementing remediation measures to mitigate risks and prevent future occurrences.
* Security Hardening: Implement security hardening measures and best practices to secure CyberArk deployments against external threats, insider risks, and unauthorized access attempts.
* Documentation and Training: Create and maintain technical documentation, standard operating procedures (SOPs), and training materials for CyberArk administrators, operators, and end-users.
Desired qualifications
* Bachelor's degree in Computer Science, Information Technology, or related field.
* Proven experience working as a CyberArk Engineer, CyberArk Administrator, or similar role, with at least 2+ years of experience in designing, implementing, and supporting CyberArk solutions.
* Expertise in CyberArk PAS Suite components, including EPV, PSM, CPM, PVWA, and AIM, and proficiency in CyberArk REST API, PACLI, and scripting languages (PowerShell, Python, etc.).
* Strong understanding of privileged access management (PAM) concepts, principles, and best practices, including privileged account discovery, rotation, and monitoring.
* Experience with integrating CyberArk with identity governance, ticketing, SIEM, and other security and IT systems using APIs, connectors, and integration frameworks.
* Familiarity with regulatory compliance standards, such as NIST, PCI DSS, GDPR, HIPAA, and SOX, and experience with compliance assessments and audits.
* Excellent analytical, problem-solving, and communication skills.
Location and way of working
* Base location: Delhi
* This profile involves frequent / occasional travelling to client locations.
* Hybrid is our default way of working. Each domain has customized the hybrid approach to their unique needs.
Your role as a CyberArk Engineer
We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society.
In addition to living our purpose, Senior Executive across our organization must strive to be:
* Inspiring - Leading with integrity to build inclusion and motivation
* Committed to creating purpose - Creating a sense of vision and purpose
* Agile - Achieving high-quality results through collaboration and Team unity
* Skilled at building diverse capability - Developing diverse capabilities for the future
* Persuasive / Influencing - Persuading and influencing stakeholders
* Collaborating - Partnering to build new solutions
* Delivering value - Showing commercial acumen
* Committed to expanding business - Leveraging new business opportunities
* Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization
* Effective communication - Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities
* Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s)
* Managing change - Responding to changing environment with resilience
* Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision
* Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems
* Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte
* Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviours and attitudes to become more inclusive.
How you'll grow
Connect for impact
Our exceptional team of professionals across the globe are solving some of the world's most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report.
Empower to lead
You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership.
Inclusion for all
At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters.
Drive your career
At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte.
Everyone's welcome… entrust your happiness to us
Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here's a glimpse of things that are in store for you.
Interview tips
We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you're applying to. Check out recruiting tips from Deloitte professionals.
Cyber Security Analyst III / Senior
Cyber Security Analyst Job 12 miles from Independence
Company Federal Reserve Bank of Cleveland The Federal Reserve Bank of Cleveland is part of the nation's central bank, and we've provided many opportunities for professional growth during our history. For twenty-five years in a row, we've been named "One of Northeast Ohio's Best Places to Work" by North Coast 99. This prestigious award honors organizations with outstanding employment practices, including compensation, benefits, training, recruitment, retention, community services, and employee communications.
Our People Make the Difference! The Federal Reserve Bank of Cleveland is seeking innovative thinkers with vision to build the framework that will carry the Bank into the future.
Follow us on LinkedIn, X, Instagram, and our YouTube channel - Cleveland Fed
The selected candidate will support the Cybersecurity Analytics Support Team (CAST) function by actively working with CAST personnel, supervisory staff and Board of Governors' staff concerning ongoing cyber incidents within supervised institutions as well as emerging threats potentially impacting the United States financial sector. This individual would have experience and/or expertise in multiple cybersecurity subject matter areas:
* Cybersecurity related frameworks such as NIST 800-53, NIST Cybersecurity Framework (CSF), IS 27001, MITRE ATT&CK, etc.
* Assessing cybersecurity threats, vulnerabilities, and related exploitation activity; recommending related mitigations to manage risk to computing environments.
* Tracking and reporting on threat actor groups that potentially pose a threat to the United States financial sector.
* Cloud services and providers such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
* Incident management and response activities related to cybersecurity events.
* Security architecture and design implementation to mitigate threats against confidentiality, integrity, and availability.
Essential Accountabilities
* Conducts analysis and interpreting of cybersecurity threats to identify trends and emerging risks.
* Provide input and insight into response activities during cyber incidents to include best practices from regulatory bodies, cybersecurity organizations, and NIST.
* Conducts formal assessments to determine the severity of reported cybersecurity incidents at financial institutions.
* Prepares in written form research, analysis, and assessments for key internal stakeholders as needed or requested. Analysis supports recommendations regarding cybersecurity threats, threat vectors, threat actors and threat trends.
* Demonstrates knowledge of cybersecurity threats within the broader financial sector and related industries.
* Assist bank supervision examination teams, the central point of contact teams, and examiners-in-charge during active cybersecurity incidents at regulated banking/financial institutions.
* Build and maintain relationships with central points of contact teams, examiners, and board staff across the Federal Reserve System.
* Communicate appropriate information to the Supervision & Regulation staff at the Federal Reserve Bank and Board levels to maintain a comprehensive understanding of ongoing incidents and ensure appropriate steps are taken to isolate any potential residual effects from a cyber incident.
* Participates in knowledge sharing forums related to key cybersecurity risks and emerging issues.
* Participates in efforts to advance Reserve Bank or System strategic initiatives.
* Provides leadership, coaching, and mentoring for less experienced analysts on processes and procedures related to internal matters and the supervisory process.
* Weekend on-call support is part of the position on a rotating basis (generally once every 12 weeks)
* Performs other duties as assigned or requested.
Education and Experience
Analyst III: Bachelor's degree in computer science, Management Information Systems or related field and 7+ years of related work experience required OR Master's Degree and 5+ years of professional work experience.
* Advanced ability to perform independent research and provide written reports summarizing findings and analysis.
* Intermediate knowledge of regulations, procedures, and practices of a specific discipline (e.g., bank examinations, information security, cyber intelligence).
* Advanced problem solving and analytical thinking.
* Advanced specialized operational/technical skills in cyber intelligence and information security.
* Intermediate knowledge of Microsoft Office; general proficiency in Word, PowerPoint and Excel.
* Intermediate knowledge of project management.
* Intermediate ability to analyze information and demonstrate findings with written reports, data visualizations, graphs/charts, or presentations.
Senior Analyst: Bachelor's degree in computer science, Management Information Systems or related field and 10+ years of related work experience required OR Master's Degree and 7+ years of professional work experience.
* Advanced ability to perform independent research and provide written reports summarizing findings and analysis.
* Intermediate knowledge of regulations, procedures, and practices of a specific discipline (e.g., bank examinations, information security, cyber intelligence).
* Advanced problem solving and analytical thinking.
* Advanced specialized operational/technical skills in cyber intelligence and information security.
* Intermediate knowledge of Microsoft Office; general proficiency in Word, PowerPoint and Excel.
* Intermediate knowledge of project management.
* Intermediate ability to analyze information and demonstrate findings with written reports, data visualizations, graphs/charts, or presentations.
Knowledge Areas
* Expert knowledge of regulations, procedures and practices of a specific discipline (e.g. information security, cyber intelligence).
* Advanced ability to perform independent research.
* Advanced knowledge of project management.
* Intermediate knowledge of Microsoft Office.
* Advanced knowledge of intelligence concepts; intelligence lifecycle, diamond method, structured analytic techniques (red team, devil's advocate, analysis of competing hypothesis).
* Advanced knowledge in: NIST, ITIL, COBIT, guidelines, security analytics, network architecture / perimeter security, network monitoring and analysis, threat intelligence and advanced threats, authentication, secure coding / application development, penetration testing, cyber incident response, web based attacks and mitigations, cyber risk assessment and strategic analysis, vulnerability detection and assessment, mobile device management, and digital forensics and advanced security tools (e.g. DDoS, malware, DLP, MFA, SIEM, vulnerability scanning and patching).
* Advanced knowledge in areas of technology governance, technology risk management/GRC, internal audit, vendor/third-party management, business resiliency and fraud.
* Security operations concepts; perimeter defense, BYOD, data loss protection, insider threat, kill chain, risk assessment, etc.
* Relevant IT certifications (CISA, CISSP, CGEIT, CRISC, CRMA).
Skill Areas
* Expert problem solving and analytical
* Expert specialized operational/technical skills in cyber intelligence and information security
* Advanced written and verbal communication
* Advanced presentation
* Advanced public speaking
* Advanced strategic thinking/planning
Citizenship requirements
This position requires access to confidential supervisory information and/or FOMC information, which is limited to "Protected Individuals" as defined in the U.S. federal immigration law. Protected Individuals include, but are not limited to, U.S. citizens, U.S. nationals, and U.S. permanent residents who either are not yet eligible to apply for naturalization or who have applied for naturalization within the requisite timeframe. Candidates who are not U.S. citizens or U.S. permanent residents may be eligible for the information access required for this position and sponsorship for a work visa, and subsequently for permanent residence, if they sign a declaration of intent to become a U.S. citizen and meet other eligibility requirements.
In addition, all candidates must undergo an enhanced background check and comply with all applicable information handling rules, and all non-U.S. citizens must sign a declaration of intent to become a U.S. citizen and pursue a path to citizenship.
Physical Demands and General Working Conditions
This is not necessarily an exhaustive list of all responsibilities, duties, performance standards or requirements, efforts, skills or working conditions associated with the job. While this is intended to be an accurate reflection of the current job, the Federal Reserve Bank of Cleveland reserves the right to revise this or any job description at any time.
Reasonable Accommodation Statement - The Federal Reserve Bank of Cleveland is committed to ensuring that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, perform essential job functions, and receive other benefits and privileges of employment. To request a reasonable accommodation for any part of the employment process, please send an email to ****************************************.
Location/in office requirements
This position is hybrid with 2-3 days in office at our Cleveland office
Bank's Ethics Rules and Drug Testing
As a condition of employment, Federal Reserve Bank of Cleveland employees must comply with the Bank's ethics rules which generally prohibit employees, their spouses/domestic partners, and minor children from owning or controlling, directly or indirectly, any debt or equity interest in a depository institution or an affiliate of a depository institution. A "depository institution" means a bank, a trust company, or any institution that accepts deposits, including a bank chartered under the laws of a foreign country. In addition, employees (and their spouses/domestic partners, and minor children) may not own shares of mutual funds, unit investment trusts or ETFs that have a policy, as stated in the prospectus, of concentrating in the financial services industry and that have underlying investments in banks or other depository institutions. If you or your spouse/domestic partner or minor child own such securities and would not be willing or able to divest them if you accepted an offer of Bank employment, you should raise this issue with the recruiter for this posting.
In addition, as a condition of employment, candidates must undergo a background check and will be tested for all controlled substances prohibited by federal law, to include marijuana, prior to hire and for certain safety sensitive positions during employment.
Always verify and apply to jobs on Federal Reserve System Careers or through verified Federal Reserve Bank social media channels
Full Time / Part Time
Full time
Regular / Temporary
Regular
Job Exempt (Yes / No)
Yes
Job Category
Information Technology
Work Shift
First (United States of America)
The Federal Reserve Banks believe that diversity and inclusion among our employees is critical to our success as an organization, and we seek to recruit, develop and retain the most talented people from a diverse candidate pool. The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels.
Privacy Notice
Cyber Security Analyst III / Senior
Cyber Security Analyst Job 12 miles from Independence
CompanyFederal Reserve Bank of ClevelandThe Federal Reserve Bank of Cleveland is part of the nation's central bank, and we've provided many opportunities for professional growth during our history. For twenty-five years in a row, we've been named “One of Northeast Ohio's Best Places to Work” by North Coast 99. This prestigious award honors organizations with outstanding employment practices, including compensation, benefits, training, recruitment, retention, community services, and employee communications.
Our People Make the Difference! The Federal Reserve Bank of Cleveland is seeking innovative thinkers with vision to build the framework that will carry the Bank into the future.
Follow us on LinkedIn, X, Instagram, and our YouTube channel - Cleveland Fed
The selected candidate will support the Cybersecurity Analytics Support Team (CAST) function by actively working with CAST personnel, supervisory staff and Board of Governors' staff concerning ongoing cyber incidents within supervised institutions as well as emerging threats potentially impacting the United States financial sector. This individual would have experience and/or expertise in multiple cybersecurity subject matter areas:
Cybersecurity related frameworks such as NIST 800-53, NIST Cybersecurity Framework (CSF), IS 27001, MITRE ATT&CK, etc.
Assessing cybersecurity threats, vulnerabilities, and related exploitation activity; recommending related mitigations to manage risk to computing environments.
Tracking and reporting on threat actor groups that potentially pose a threat to the United States financial sector.
Cloud services and providers such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
Incident management and response activities related to cybersecurity events.
Security architecture and design implementation to mitigate threats against confidentiality, integrity, and availability.
Essential Accountabilities
Conducts analysis and interpreting of cybersecurity threats to identify trends and emerging risks.
Provide input and insight into response activities during cyber incidents to include best practices from regulatory bodies, cybersecurity organizations, and NIST.
Conducts formal assessments to determine the severity of reported cybersecurity incidents at financial institutions.
Prepares in written form research, analysis, and assessments for key internal stakeholders as needed or requested. Analysis supports recommendations regarding cybersecurity threats, threat vectors, threat actors and threat trends.
Demonstrates knowledge of cybersecurity threats within the broader financial sector and related industries.
Assist bank supervision examination teams, the central point of contact teams, and examiners-in-charge during active cybersecurity incidents at regulated banking/financial institutions.
Build and maintain relationships with central points of contact teams, examiners, and board staff across the Federal Reserve System.
Communicate appropriate information to the Supervision & Regulation staff at the Federal Reserve Bank and Board levels to maintain a comprehensive understanding of ongoing incidents and ensure appropriate steps are taken to isolate any potential residual effects from a cyber incident.
Participates in knowledge sharing forums related to key cybersecurity risks and emerging issues.
Participates in efforts to advance Reserve Bank or System strategic initiatives.
Provides leadership, coaching, and mentoring for less experienced analysts on processes and procedures related to internal matters and the supervisory process.
Weekend on-call support is part of the position on a rotating basis (generally once every 12 weeks)
Performs other duties as assigned or requested.
Education and Experience
Analyst III: Bachelor's degree in computer science, Management Information Systems or related field and 7+ years of related work experience required OR Master's Degree and 5+ years of professional work experience.
Advanced ability to perform independent research and provide written reports summarizing findings and analysis.
Intermediate knowledge of regulations, procedures, and practices of a specific discipline (e.g., bank examinations, information security, cyber intelligence).
Advanced problem solving and analytical thinking.
Advanced specialized operational/technical skills in cyber intelligence and information security.
Intermediate knowledge of Microsoft Office; general proficiency in Word, PowerPoint and Excel.
Intermediate knowledge of project management.
Intermediate ability to analyze information and demonstrate findings with written reports, data visualizations, graphs/charts, or presentations.
Senior Analyst: Bachelor's degree in computer science, Management Information Systems or related field and 10+ years of related work experience required OR Master's Degree and 7+ years of professional work experience.
Advanced ability to perform independent research and provide written reports summarizing findings and analysis.
Intermediate knowledge of regulations, procedures, and practices of a specific discipline (e.g., bank examinations, information security, cyber intelligence).
Advanced problem solving and analytical thinking.
Advanced specialized operational/technical skills in cyber intelligence and information security.
Intermediate knowledge of Microsoft Office; general proficiency in Word, PowerPoint and Excel.
Intermediate knowledge of project management.
Intermediate ability to analyze information and demonstrate findings with written reports, data visualizations, graphs/charts, or presentations.
Knowledge Areas
Expert knowledge of regulations, procedures and practices of a specific discipline (e.g. information security, cyber intelligence).
Advanced ability to perform independent research.
Advanced knowledge of project management.
Intermediate knowledge of Microsoft Office.
Advanced knowledge of intelligence concepts; intelligence lifecycle, diamond method, structured analytic techniques (red team, devil's advocate, analysis of competing hypothesis).
Advanced knowledge in: NIST, ITIL, COBIT, guidelines, security analytics, network architecture / perimeter security, network monitoring and analysis, threat intelligence and advanced threats, authentication, secure coding / application development, penetration testing, cyber incident response, web based attacks and mitigations, cyber risk assessment and strategic analysis, vulnerability detection and assessment, mobile device management, and digital forensics and advanced security tools (e.g. DDoS, malware, DLP, MFA, SIEM, vulnerability scanning and patching).
Advanced knowledge in areas of technology governance, technology risk management/GRC, internal audit, vendor/third-party management, business resiliency and fraud.
Security operations concepts; perimeter defense, BYOD, data loss protection, insider threat, kill chain, risk assessment, etc.
Relevant IT certifications (CISA, CISSP, CGEIT, CRISC, CRMA).
Skill Areas
Expert problem solving and analytical
Expert specialized operational/technical skills in cyber intelligence and information security
Advanced written and verbal communication
Advanced presentation
Advanced public speaking
Advanced strategic thinking/planning
Citizenship requirements
This position requires access to confidential supervisory information and/or FOMC information, which is limited to "Protected Individuals" as defined in the U.S. federal immigration law. Protected Individuals include, but are not limited to, U.S. citizens, U.S. nationals, and U.S. permanent residents who either are not yet eligible to apply for naturalization or who have applied for naturalization within the requisite timeframe. Candidates who are not U.S. citizens or U.S. permanent residents may be eligible for the information access required for this position and sponsorship for a work visa, and subsequently for permanent residence, if they sign a declaration of intent to become a U.S. citizen and meet other eligibility requirements.
In addition, all candidates must undergo an enhanced background check and comply with all applicable information handling rules, and all non-U.S. citizens must sign a declaration of intent to become a U.S. citizen and pursue a path to citizenship.
Physical Demands and General Working Conditions
This is not necessarily an exhaustive list of all responsibilities, duties, performance standards or requirements, efforts, skills or working conditions associated with the job. While this is intended to be an accurate reflection of the current job, the Federal Reserve Bank of Cleveland reserves the right to revise this or any job description at any time.
Reasonable Accommodation Statement
-
The Federal Reserve Bank of Cleveland is committed to ensuring that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, perform essential job functions, and receive other benefits and privileges of employment. To request a reasonable accommodation for any part of the employment process, please send an email to ****************************************.
Location/in office requirements
This position is hybrid with 2-3 days in office at our Cleveland office
Bank's Ethics Rules and Drug Testing
As a condition of employment, Federal Reserve Bank of Cleveland employees must comply with the Bank's ethics rules which generally prohibit employees, their spouses/domestic partners, and minor children from owning or controlling, directly or indirectly, any debt or equity interest in a depository institution or an affiliate of a depository institution. A "depository institution" means a bank, a trust company, or any institution that accepts deposits, including a bank chartered under the laws of a foreign country. In addition, employees (and their spouses/domestic partners, and minor children) may not own shares of mutual funds, unit investment trusts or ETFs that have a policy, as stated in the prospectus, of concentrating in the financial services industry and that have underlying investments in banks or other depository institutions. If you or your spouse/domestic partner or minor child own such securities and would not be willing or able to divest them if you accepted an offer of Bank employment, you should raise this issue with the recruiter for this posting.
In addition, as a condition of employment, candidates must undergo a background check and will be tested for all controlled substances prohibited by federal law, to include marijuana, prior to hire and for certain safety sensitive positions during employment.
Always verify and apply to jobs on
Federal Reserve System Careers
or through verified Federal Reserve Bank social media channels
Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation TechnologyWork ShiftFirst (United States of America)
The Federal Reserve Banks believe that diversity and inclusion among our employees is critical to our success as an organization, and we seek to recruit, develop and retain the most talented people from a diverse candidate pool. The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels.
Privacy Notice
Cyber Security Incident Responder
Cyber Security Analyst Job 23 miles from Independence
We are looking for an enthusiastic and experienced Cyber Security Incident Responder (IR) to join our dynamic and growing team. The role holder will play a critical role in maintaining the security and resilience of Element's digital infrastructure by effectively handling cyber incidents. This is an opportunity to join an emerging team and become a key contributor on day one. You will work closely with peers to develop what you see as a great 24/7 operational cyber defense capability. We encourage applications from those with direct experience in Digital Forensics and Incident Response (DFIR).
This position requires paid on call and overtime if there are serious cyber-attacks. This position is hybrid.
Responsibilities
Help build Element's IR capability. Implement best practice in line with NIST, SANS and other industry frameworks
Govern and coordinate cyber incidents. Act as the lead incident manager and technical authority for Cyber Defense. Conduct thorough investigations to reduce risk. Determine the root cause, impact, and identify remediation actions
Collaborate with cross-functional teams including IT, Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date
Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement
Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis
Work closely with the Senior Manager Incident Response to Input into the development of cyber defense metrics
Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities
Skills / Qualifications
A minimum of two years' experience working in cyber security. Technical experience as a Cyber Incident Responder e.g., Digital Forensics Incident Response (DFIR). Experience in managing complex cyber incidents would be great
Experience of in working within a complex highly federated organization. A comprehensive understanding of cyber defense operations in both the public and private sectors
A bachelor's degree in Computer Science, Information Technology, or a related field is desirable but not essential, as are other relevant certifications (e.g., CISSP, CISM, GIAC)
Attention to detail, strong analytical skills and efficient problem solving. The ability to think critically and make sound decisions in high-pressure situations
Cultural sensitivity and social flexibility in a global corporate environment
Experience in proactive communication to, and direct interaction with senior staff. The ability to convey complex information to a non-technical audience
A highly self-motivated individual with positive mindset and can-do attitude. A strong believer of security as an enabler to support business growth
This position requires on call and overtime if there are very serious cyber attacks
Knowledge of SIEM tooling, including experience in writing and developing advanced hunting and correlation search queries for alerts
Must be a US Citizen or Green Card holder
#LI-SL1
#LI-SL1
Company Overview
Element is one of the fastest growing testing, inspection and certification businesses in the world. Globally we have more than 9,000 brilliant minds operating from 270 sites across 30 countries. Together we share an ambitious purpose to ‘Make tomorrow safer than today'.
When failure in use is not an option, we help customers make certain that their products, materials, processes and services are safe, compliant and fit for purpose. From early R&D, through complex regulatory approvals and into production, our global laboratory network of scientists, engineers, and technologists support customers to achieve assurance over product quality, sustainable outcomes, and market access.
While we are proud of our global reach, working at Element feels like being part of a smaller company. We empower you to take charge of your career, and reward excellence and integrity with growth and development.
Industries across the world depend on our care, attention to detail and the absolute accuracy of our work. The role we have to play in creating a safer world is much bigger than our organization.
Diversity Statement
At Element, we always take pride in putting our people first. We are an equal opportunity employer that recognizes diversity and inclusion as fundamental to our Vision of becoming “the world's most trusted testing partner”.
All suitably qualified candidates will receive consideration for employment on the basis of objective work related criteria and without regard for the following: age, disability, ethnic origin, gender, marital status, race, religion, responsibility of dependents, sexual orientation, or gender identity or other characteristics in accordance with the applicable governing laws or other characteristics in accordance with the applicable governing laws.
Cyber Security Senior DLP Engineer
Cyber Security Analyst Job 12 miles from Independence
Make your mark at one of the biggest names in payments. With proven technology, we process the largest volume of payments in the world, driving the global economy every day. When you join Worldpay, you join a global community of experts and changemakers, working to reinvent an industry by constantly evolving how we work and making the way millions of people pay easier, every day.
**About the role:**
We are seeking a talented Senior Security Engineer to join a new dynamic team. As a Senior Security DLP Engineer, you will play a crucial role in safeguarding our organization's technology from cyber threats and ensuring the overall security posture of our systems. You will be responsible for designing, implementing, and maintaining security solutions, as well as reviewing and recommending new technologies, identifying areas for improvement, and contributing to the overall security program.
**What you will be doing:**
* Design, implement/deploy, and manage various DLP solutions, strategies, and tools across enterprise-wide environment.
* Develop, test and implement DLP security policies and procedures to ensure compliance with company policy, industry standards and regulatory requirements.
* Provide analysis and review of current security solutions, make recommendations for any changes to environment. Demonstrate a strong working knowledge of product offerings and make recommendations based on past experiences.
* Tune, configure and optimize security tools to defend against new tactics, techniques, and procedures as well as lead initiatives to develop processes for any existing process deficiencies.
* Work closely and frictionlessly with insider risk team, threat management team, security operations team, and more.
* Expand scope of work into additional engineering disciplines as organizational needs and requirements change.
* Collaborate with cross-functional teams to integrate security solutions into existing infrastructure and workflows.
* Stay up-to-date with the latest cybersecurity threats, trends, and technologies, and recommend appropriate security controls and countermeasures.
* Provide expertise and guidance on security best practices to internal stakeholders and support teams. Create and deliver technical presentations to peers, other teams and leadership.
* Act as subject matter expert within team and provide mentoring and guidance to team members and peers within other organizations. Advocate for security best practices within other teams and organizations.
* Work with minimal supervision and drive projects through to completion. Provide visibility and reporting to project activities, present to senior staff and escalate needs as a means to ensure completion against deadlines.
**What you need:**
* Bachelor's degree in computer science, Information Security, or a related field, or the combination of demonstrable relevant experience and skills.
* In-depth knowledge of various security technologies, including antivirus, EDR/XDR, DLP, application whitelisting, privilege management, endpoint encryption, WAF, firewalls, web content filtering, CI/CD pipeline inspection tools, CASB, CSPM, SIEM, forensic network collection, DDoS mitigation tools, and vulnerability management.
* Advanced level knowledge and experience with market leading security management platforms and deployment tools such as Tanium, InTune, SCCM, etc.
* Proven experience in designing, implementing, and managing security solutions in enterprise environments as a project lead or subject matter expert.
* Strong understanding of data as it flows from detection and prevention tools to SIEM and how incident handling teams will leverage this data for casework.
* Understanding of cybersecurity principles, best practices, and industry requirements and frameworks (e.g. NIST CSF, ISO 27001, PCI DSS Mitre Attack and Defend).
* Strong familiarity with network security concepts and technologies (firewalls, intrusion detection/prevention systems, web application firewalls etc.).
* Deep understanding of operating system technology, including Microsoft Windows, MacOS and various Linux distributions.
* Knowledge of virtualization platforms both centrally managed as well as locally managed as well as the means to provide visibility and control to guest systems.
* Working knowledge of cloud-based security solutions and experience with public cloud platforms such as AWS, Azure, or Google Cloud Platform. Ability to deploy tools in these environments as well as provide critical feedback for requirements in a security capacity.
* Knowledge of scripting languages (Python, PowerShell, etc.) for automation and customization of various security solutions.
* Excellent analytical and problem-solving skills, with the ability to troubleshoot complex security issues. Experience with writing detailed root-cause analysis for senior leadership after major incidents.
* Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams
* Experience with using data analysis tools such as Excel, PowerBI, Splunk, etc. and the ability to drive change based on evidence as well as design new means of collecting, storing and building views.
* Experience using Agile practices for project and program management
**What makes a Worldpayer**
At Worldpay, we take our Values seriously, and we live them every day. Think like a customer, Act like an owner, and Win as a team.
* **Curious. Humble. Creative**. We ask the right questions, listening and learning to get better every day. We simplify the complex and we're always looking to create a bigger impact for our colleagues and customers.
* **Empowered. Accountable. Dynamic**. We stay agile, using our initiative, taking calculated risks to progress. Never standing still, never settling, we work at pace to achieve our goals. We champion our ideas and stay flexible to make them happen. We know that every action adds up.
* **Determined. Inclusive. Open.** Unlocking potential means working as one global community. Our work spans borders, and we stay united by our purpose. We collaborate, always encouraging others to perform at their best, welcoming new perspectives.
Apply now to write the next chapter in your career. We can't wait to hear from you.
To find out more about working with us, find us on .
#LI-JK1
Worldpay is committed to providing its employees with an exciting career opportunity and competitive compensation. The pay range for this full-time position is $89,180.00 - $149,820.00 and reflects the minimum and maximum target for new hire salaries for this position based on the posted role, level, and location. Within the range, actual individual starting pay is determined by additional factors, including job-related skills, experience, and relevant education or training. Any changes in work location will also impact actual individual starting pay. Please consult with your recruiter about the specific salary range for your preferred location during the hiring process. The job duties outlined above may be directly, and negatively impacted by a criminal history, which could lead to the withdrawal of a conditional offer. However, all qualified candidates with arrests or convictions will still be considered.**Privacy Statement**
Worldpay is committed to protecting the privacy and security of all personal information that we process in order to provide services to our clients. For specific information on how Worldpay protects personal information online, please see the .
**EEOC Statement**
Worldpay is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, marital status, genetic information, natio
Information Security Analyst 3, Digital Technology Solutions
Cyber Security Analyst Job 12 miles from Independence
Information Security Analyst 3, Digital Technology Solutions University of Cincinnati Posted: December 10, 2024 Location: Cincinnati, Ohio * Assist with developing strategies to achieve organizational goals; understand organization's strengths and weaknesses; analyze potential risks and opportunities; adapt recommendations to changing conditions and aligns with best practices.
* Help facilitate large collaborative teams to achieve organizational goals.
* Support community communication efforts, presenting security insights to leadership.
* Develop technical documentation (designs, specifications, processes, workflows) and communications.
* Develop and validate baseline security configurations for operating systems, applications, networking, and telecommunications equipment.
* Participate in multiple, moderate- to high-risk projects.
* Work with a team to advance project goals and provide technical help and subject matter expertise. Actively engage in project support and solutioning.
* Share technical knowledge with teammates and help solve more complex problems.
* Document individual progress on assigned deliverables.
* Gather, maintain, and validate metrics for area of responsibility.
* Mentor student workers and junior employees.
* Carry out procedures to ensure that all systems, products, and services meet organization security standards. Recommend procedural improvements.
* Research information security trends to maintain technical understanding of the latest vulnerabilities and threats.
* Assist with providing artifacts to Governance, Risk & Compliance in relation to internal & external audits.
* Independently work with business units to achieve security objectives and identifies, reports, and resolves security risks and violations.
* Perform cyber investigations through forensic fact gathering with a focus on e-discovery.
* Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations.
* Provide guidance and technical expertise as needed for information security training and awareness programs.
* Participate in troubleshooting processes during and outside of normal business hours and participate in change management and root cause analysis.
* Mentor others regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
* Serve as an expert resource to others.
* Perform related duties based on departmental need. This job description can be changed at any time.
****Required Education****
Bachelor's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
Eight (8) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
****Required Experience****
* Two (2) years of related experience
* Advanced knowledge of security tool administration.
* Moderate project management skills.
* Experience with system administration.
* Experience with network architecture or some level of related technical training.
* Advanced understanding of risk and vulnerability management.
* Experience with incident response.
* Advanced knowledge of industry standard security and compliance frameworks.
****Additional Qualifications Considered****
This position will primarily work in the area of information security risk management. The ideal candidate will have experience in the field of information security risk. Responsibilities may include, but are not limited to: assessing information security reviews to identify business risk, make recommendations for implementation of security controls, performing gap analysis of contracts and ensuring appropriate data security verbiage is included in contracts, documenting excessive risk via institutional risk acceptance processes, participating on projects with data security concerns to represent the office of information security and ensure appropriate documentation is in place, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes, and supervision/mentorship of co-op and student workers.2. CISSP, CISM, GISP or similar information security certification(s) are preferred.
****Physical Requirements/Work Environment****
* Sitting - Continuously
* Repetitive hand motion (such as typing) - Continuously
* Hearing, listening - Continuously
* Talking - Continuously
* Standing - Seldom
* Walking - Seldom
* Bending - Seldom
* Stooping - Seldom
* Climbing stairs/ladders - Seldom
* Kneeling, squatting - Seldom
* Crouching - Seldom
* Crawling - Seldom
* Reaching overhead - Seldom
* Pulling, pushing - Seldom
* Lifting - up to 20 pounds - Seldom
* Lifting - up to 50 pounds - Seldom
* Lifting - over 50 pounds - Seldom
Competitive salary range dependent on the candidate's experience. HISTORY IN BRIEF - The University of Cincinnati is a public urban serving research institution that was founded in 1819 and today is one of the country's largest universities offering more than 350 academic programs to more than 44,000 students. UC has many top ranked programs in areas such as Music and Arts, Medical and Human-Services, Criminal Justice and more. Located in an urban setting, UC is close to the heart of Cincinnati and allows easy access for students to enjoy all that the city offers. UC is also the alma mater of many notables such as President William Howard Taft; Albert Sabin, developer of the oral polio vaccine; Astronaut Neil Armstrong and Mary Weinberg, 2008 Olympic gold medalist. UC is classified as a Research University (Very High Research Activity) by the Carnegie Commission and is ranked as one of America's top 35 public research universities by the National Science Foundation. UC jumped 17 spots in the U.S. News & World Report rankings in the past two years alone. In addition to being named a “green university” by Princeton Review, UC has been named one of the world's most beautiful campuses by Forbes and Delta Sky magazines. Learn more at ******************** N STATEMENT - The University of Cincinnati serves the people of Ohio, the nation, and the world as a premier, public, urban research university dedicated to undergraduate, graduate, and professional education, experience-based learning, and research. We are committed to excellence and diversity in our students, faculty, staff, and all of our activities. We provide an inclusive environment where innovation and freedom of intellectual inquiry flourish. Through scholarship, service, partnerships, and leadership, we create opportunity, develop educated and engaged citizens, enhance the economy and enrich our University, city, state and global community. Show more Show less ISACA Career Center is Just One of the Benefits. Discover what else ISACA has to offer!
Information Security Analyst
Cyber Security Analyst Job 12 miles from Independence
JOB\_DESCRIPTION.SHARE.HTML CAROUSEL\_PARAGRAPH JOB\_DESCRIPTION.SHARE.HTML * Cincinnati, Ohio * IT Infrastructure & Support * 9379 We are hiring a full-time Information Security Analyst who is technical, dedicated to learning new things, security-minded, has strong initiative, and is able to manage projects autonomously. The Information Security team defends the company's digital infrastructure by designing, implementing, and improving the company's cybersecurity architecture. This is a critical role responsible for protecting infrastructure, cloud, edge devices, and data against unauthorized use, modification, exfiltration, or damage. If you're excited to be part of a fast-growing, then Medpace is a great place to grow your career.
**Responsibilities**
* Engineer security solutions without oversight while collaborating with multiple internal departments and vendors;
* Analyze security systems and seek continuous improvements;
* Research vulnerabilities, perform vulnerability scanning and alleviate threats;
* Mature security best practices and policies internal to the organization;
* Develop new processes while cross-training coworkers and assisting employees on security-related matters;
* Provide security awareness training and testing for employees to verify proper security protocols are being adhered to;
* Performing cyber security incident triage, reviewing logs, and performing remediation activities; and
* Review and reduce inappropriate/overprovisioned access to drive least privileged access.
**Qualifications**
* Minimum of bachelor's degree, preferably in Cybersecurity or Information Technology'
* 1+ years of experience within Information Security;
* Understanding of security best practices and how to implement them at a business-wide level;
* Experience with managing, configuring, and deploying enterprise-grade security solutions in some of the following:
+ SIEM
+ Privileged Access Management/Identity Access
+ Endpoint Detection & Response
+ Cloud based architecture such as Azure/AWS
+ Active Directory
* Exceptional communication skills; and
* Fundamental scripting skills, such as PowerShell/Python.
**Nice to have:**
* Experience with vulnerability assessment tools such as Nessus and Tenable;
* Experience with enterprise web proxy solutions, web filters, and VPN such as Zscaler;
* Experience with governing Windows environment including GPO;
* Previous employment or experience in a highly regulated industry such as healthcare, financial, or defense experience with standards such as ISO, NIST, HIPPA, and/or SOC2; and
* Auditing and policy-writing experience.
**Medpace Overview**
Medpace is a full-service clinical contract research organization (CRO). We provide Phase I-IV clinical development services to the biotechnology, pharmaceutical and medical device industries. Our mission is to accelerate the global development of safe and effective medical therapeutics through its scientific and disciplined approach. We leverage local regulatory and therapeutic expertise across all major areas including oncology, cardiology, metabolic disease, endocrinology, central nervous system, anti-viral and anti-infective. Headquartered in Cincinnati, Ohio, employing more than 5,000 people across 40+ countries.
People. Purpose. Passion. Make a Difference Tomorrow. Join Us Today.
The work we've done over the past 30+ years has positively impacted the lives of countless patients and families who face hundreds of diseases across all key therapeutic areas. The work we do today will improve the lives of people living with illness and disease in the future.
**Cincinnati Perks**
* Flexible work environment
* Competitive PTO packages, starting at 20+ days
* Competitive compensation and benefits package
* Company-sponsored employee appreciation events
* Employee health and wellness initiatives
* Community involvement with local nonprofit organizations
* Discounts on local sports games, fitness gyms and attractions
* Modern, ecofriendly campus with an on-site fitness center
* Structured career paths with opportunities for professional growth
* Discounted tuition for UC online programs
**Awards**
* Named a Top Workplace in 2024 by The Cincinnati Enquirer
* Recognized by Forbes as one of America's Most Successful Midsize Companies in 2021, 2022, 2023 and 2024
* Continually recognized with CRO Leadership Awards from Life Science Leader magazine based on expertise, quality, capabilities, reliability, and compatibility
**What to Expect Next**
A Medpace team member will review your qualifications and, if interested, you will be contacted with details for next steps.
EO/AA Employer M/F/Disability/Vets
Cyber Engineer
Cyber Security Analyst Job 29 miles from Independence
At Cryptic Vector, we are dedicated to mission success. We take the time to understand our customers' needs, delivering products that perform when our nation needs them most. We understand that properly supporting the most unique missions of the United States government requires the nation's best. Our focus is on creating a culture where the best and brightest want to grow, learn, and stay. If coming up with out-of-the-box solutions is your specialty, then you'll feel right at home at Cryptic Vector. We are solving the country's most unique problems in an environment where problem solvers and hard workers thrive. We've replaced corporate red tape with transparency and servant leadership. Honestly, it's hard not to love this culture!
We value the individual experiences that our team members add to our culture and capabilities. Please don't hesitate to apply even if you don't meet the exact qualifications! We are interested in varying levels of experience.
Cryptic Vector is looking for Cyber Engineers with experience or interest in offensive cyber engineering. Cyber Engineering at Cryptic Vector is a research and development position spanning a variety of disciplines.
The responsibilities of the Cyber Engineer position may include the following:
Reverse Engineering (RE) of software/firmware, Vulnerability Research (VR), exploit development/productization
Design/develop post-exploitation effects in software/firmware, which can withstand scrutiny and attack
Design/develop secure, reliable, software-based communication solutions
Design/develop stealth solutions
Collaborate with engineering teams and product end users to translate customer/business/technical requirements into architectural designs and software solutions
Write unit tests, functional tests, and end-to-end tests
Provide constructive code reviews for colleagues
Programming languages:
Direct and recent experience coding in C and/or C++
Interest in new systems programming languages
Proficiency in modern scripting languages (like Python) is important but not central
An ideal candidate for these positions will have:
Experience developing user-mode applications for traditional platforms (Windows, Linux, mac OS, Android, iOS) or user/kernel-mode capabilities for non-traditional platforms (embedded/proprietary/custom firmware or operating systems)
A hacker mindset. Interest analyzing software/firmware for weaknesses.
Participation or interest in Capture the Flag (CTF)/hacking competitions
Interest in the architecture/internals of proprietary operating systems
Comfort working with assembly, machine code, hexadecimal, and binary. Familiarity with reverse engineering tools, such as IDA Pro and/or Ghidra.
Experience using, analyzing, and manipulating old/new network protocols. Interest in network/socket programming using TCP/UDP.
Working knowledge of basic cryptography functions and programming
Humble confidence, with a desire to work in a team setting (perhaps using an agile methodology)
Familiarity with software engineering methods/process. Familiarity with CI/CD pipelines and best practices.
Requirements
Preference for B.S. degree in Computer Science, Cyber Operations, Computer Engineering, Electrical Engineering, or related field
Ability to obtain/maintain a US security clearance
Willing to work in the greater Cincinnati area
Merger and Acquisition Security Analyst - Erlanger, KY @ ADM
Cyber Security Analyst Job 7 miles from Independence
**Merger & Acquisition Security Analyst - ADM Global Primary Locations** . Under general supervision, analyze, architect, engineer, implement, integrate and maintain effective methods to protect ADM systems and data during Merger, Acquisition, Divestiture, and Joint Venture (MADJV) process. Use established process, procedures and standards, while recommending process improvements through experience and leading practices. Interface with IT and MADJV Leads to operationalize security requirements to enable the business and maintain the security posture to appropriate risk levels.
Must display enthusiasm and interest in Information Security and draw recommendations based on real world experience.
**Job Responsibilities:**
* Under guidance of the Global Information & Cyber Security (GICS) MADJV Manager, represent GICS for MADJV related activities.
* Work with GICS Directors and GICS MADJV Lead on recommending plans on all MADJV related activity. Use established process, procedures and standards, while recommending process improvements through experience and best practice.
* Assess security posture, identify risks, and develop strategies to mitigate / manage risks through MADJV projects.
* Interface with IT and other MADJV stakeholders to operationalize security requirements to enable the business and maintain the security posture to appropriate risk levels. Collaborate within the broader Information Security function, and MADJV leads to help design and implement security improvements and requirements.
* Perform functions in a timely manner and with extreme level of attention to detail, urgency and thoroughness.
* Anticipate problems and identify long-term implications of decisions and actions.
**Job Requirements:**
* “Full Professional Proficiency” (Inter-agency Language Round-table [IRL] level 4, or equivalent) or greater written & verbal capability in English.
* 3+ years' experience in Information Technology, demonstrating work with Information Security, Security Governance, Audit or Risk and Control .
* Experience with security principles and defense-in-depth techniques.
* Bachelors' degree or equivalent work experience.
* Understanding of Information Security Layers.
* Security experience related to concepts of least privilege, risk management, vulnerability management, identity and access management, access controls, and segmentation.
* Experience executing large global projects with slim timelines and schedules.
* Understanding and knowledge of Sarbanes-Oxley and IT General Controls.
* Knowledge of third party auditing, such as cloud, and risk assessment methodologies.
* Ability to communicate and collaborate effectively with other team members in a geographic and culturally diverse workforce.
* Expected to complete projects within specified deadlines.
* Expected to work occasional nights, weekends, holidays, and overtime.
* Occasional travel may be required.
* Strong sense of professionalism and ethics.
**Desired Skills:**
* Current holder of CISSP and / or other industry certifications a plus.
* Security project management experience preferred.
* Additional language skills a plus.
Before applying for an exempt, non-exempt or hourly job opportunity, you are expected to initiate position for more than 18 months, supervisor approval is not required. a discussion and share your intentions with your supervisor. * If you've been in your current * If you've been in your current position for less than 18 months, verbal supervisor approval is required.
Hiring Manager- Arthur Avart
Recruiter- Alisa Koster
**City**
Erlanger
**State**
KY - Kentucky
**Location Country**
United States
About ADM
At ADM, we unlock the power of nature to provide access to nutrition worldwide. With industry-advancing innovations, a complete portfolio of ingredients and solutions to meet any taste, and a commitment to sustainability, we give customers an edge in solving the nutritional challenges of today and tomorrow. We're a global leader in human and animal nutrition and the world's premier agricultural origination and processing company. Our breadth, depth, insights, facilities and logistical expertise give us unparalleled capabilities to meet needs for food, beverages, health and wellness, and more. From the seed of the idea to the outcome of the solution, we enrich the quality of life the world over. Learn more at ************
**Explore more career opportunities**
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Senior API Security Engineer Company Hidden Finance Cincinnati, OH Developer 1 Opening Posted today $1,000 reward per hire
Cyber Security Analyst Job 12 miles from Independence
**Senior API Security Engineer** Company Hidden Finance Cincinnati, OH Base pay $12,345 - $678,910 or to view salary and company information Developer Contract 1 Opening $1,000 reward per hire **About this Role** Agility Partners is seeking a qualified Senior API Security Engineer to fill an open position with one of our banking clients. This is an exciting opportunity to play a critical role in shifting left the technology development by securing APIs and mitigating security risks. This role requires extensive experience in API security and a strong understanding of IT security best practices.
Responsibilities:
* Participate in technical discussions to identify API security risks and establish API security scanning strategies.
* Write and define API patterns and create business and security requirements with a focus on threat modeling.
* Collaborate with technical and business stakeholders to address Information Security risks while meeting business objectives and regulatory requirements.
* Provide expertise and support on decisions and priorities regarding the enterprise's overall Information Security strategy and posture.
**Benefits and Perks**
Work within a collaborative team environment where ideas and creativity are welcomed! Family and Work Life balance are important to this organization and valued for the employees.
* Working for an organization that focuses on company culture, inclusion and diversity
* 50% medical coverage for you and your entire family, short/long term disability and life insurance options
* 401(k)
* Life Insurance
* Disability coverage
**The Ideal Candidate**
* 8+ years of engineering or other IT/Security work experience relevant to the position.
* Extensive experience designing, developing, and implementing serverless solutions within AWS.
* Extensive development experience with different API capabilities and building and deploying CI/CD pipelines.
* 5+ years of interdisciplinary experience in 4 or more of the following: Access Control Systems, Application Security, Application SDLC, Operating Systems, Cryptographic Controls, API Security, API Scanning, secure development tools, and Networking.
Share this job. Make $1,000.
When a friend applies to this position and gets hired, you'll get credited with a referral reward!*
*Reward paid upon hire of your candidate according to our Recruiting Agreement Policy (see right).
Information Security Specialist II
Cyber Security Analyst Job 12 miles from Independence
Information Security Specialist II page is loaded **Information Security Specialist II** **Information Security Specialist II** locations Minneapolis, MNCincinnati, OHCharlotte, NC time type Full time posted on Posted 16 Days Ago job requisition id2024-0025301 At U.S. Bank, we're on a journey to do our best. Helping the customers and businesses we serve to make better and smarter financial decisions and enabling the communities we support to grow and succeed. We believe it takes all of us to bring our shared ambition to life, and each person is unique in their potential. A career with U.S. Bank gives you a wide, ever-growing range of opportunities to discover what makes you thrive at every stage of your career. Try new things, learn new skills and discover what you excel at-all from Day One.
****Job Description****
U.S. Bank is seeking a Senior Information Security Specialist to join the Identity and Access Management (IAM) Security Access Operations team. We are looking for candidates with demonstrated operational and technical competence and leadership experience to contribute toward the success of our security and operational initiatives. The ideal candidate will be process improvement-minded, customer and security focused, and a thought leader. This person will also be responsible for driving automation initiatives, recommending and implementing process improvements, and assisting with department project work. Also responsible for driving automation, process improvements, and projects.
***The role offers a hybrid/flexible schedule, which means there's an in-office expectation of 3 or more days per week and the flexibility to work outside the office location for the other days at one of the following locations:***
* Minneapolis, MN
* Cincinnati, Ohio
* Charlotte, NC
The primary platforms of focus will be one or more of the following: Windows, Active Directory, Unix/Linux, Mainframe, and Microsoft 365, and/or MS-Exchange.
Day-to-day responsibilities include
* Assessing and provisioning access requests
* Processing change tasks
* Trouble shooting of access-related incidents
* Providing analysis and implementation of complex project access requests
* Identifying possible solutions to satisfy customer requirements and security policy standards.
* Working with business lines to identify initial access security requirements
**This position requires participating in 7x24 on-call rotation - 1 week every 6-8 weeks**
**Basic Qualifications**
* Bachelor's degree or equivalent work experience
* At least seven years of experience with the processes, tools, techniques and practices for assuring adherence to quality standards associated with developing, enhancing and operationalizing application systems and databases
**Experience should include** :
* 2+ years Active Directory &/or UNIX administration
* 2+ years working with and understanding security principles/best practices in regard to Access Management/Windows/Active Directory.
* 1+ years experience creating and executing PowerShell scripts
* Professional verbal and written communication skills
* 2+ years experience with MS-Office using the advanced functions Excel
**Preferred Skills/Experience/Certifications**
* 6+ months experience in Cloud Provisioning
* 6+ months experience using ServiceNow for ticketing
* ISACA Certified Information Security Manager (CISM, CRISC, CISA)
* Cloud Certifications (Azure)
* Certified Information System Security Professional (CISSP)
If there's anything we can do to accommodate a disability during any portion of the application or hiring process, please refer to our .
**Benefits:**
Our approach to benefits and total rewards considers our team members' whole selves and what may be needed to thrive in and outside work. That's why our benefits are designed to help you and your family boost your health, protect your financial security and give you peace of mind. Our benefits include the following (some may vary based on role, location or hours):
* Healthcare (medical, dental, vision)
* Basic term and optional term life insurance
* Short-term and long-term disability
* Pregnancy disability and parental leave
* 401(k) and employer-funded retirement plan
* Paid vacation (from two to five weeks depending on salary grade and tenure)
* Up to 11 paid holiday opportunities
* Adoption assistance
* Sick and Safe Leave accruals of one hour for every 30 worked, up to 80 hours per calendar year unless otherwise provided by law
**EEO is the Law**
U.S. Bank is an equal opportunity employer committed to creating a diverse workforce. We consider all qualified applicants without regard to race, religion, color, sex, national origin, age, sexual orientation, gender identity, disability or veteran status, among other factors. Applicants can learn more about the company's status as an equal opportunity employer by viewing the federal EEO poster.
**E-Verify**
U.S. Bank participates in the U.S. Department of Homeland Security E-Verify program in all facilities located in the United States and certain U.S. territories. The E-Verify program is an Internet-based employment eligibility verification system operated by the U.S. Citizenship and Immigration Services. Learn more about the .
The salary range reflects figures based on the primary location, which is listed first. The actual range for the role may differ based on the location of the role. In addition to salary, U.S. Bank offers a comprehensive benefits package, including incentive and recognition programs, equity stock purchase 401(k) contribution and pension (all benefits are subject to eligibility requirements). Pay Range: $105,400.00 - $124,000.00 - $136,400.00U.S. Bank will consider qualified applicants with arrest or conviction records for employment. U.S. Bank conducts background checks consistent with applicable local laws, including the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act as well as the San Francisco Fair Chance Ordinance. U.S. Bank is subject to, and conducts background checks consistent with the requirements of Section 19 of the Federal Deposit Insurance Act (FDIA). In addition, certain positions may also be subject to the requirements of FINRA, NMLS registration, Reg Z, Reg G, OFAC, the NFA, the FCPA, the Bank Secrecy Act, the SAFE Act, and/or federal guidelines applicable to an agreement, such as those related to ethics, safety, or operational procedures.
Applicants must be able to comply with U.S. Bank policies and procedures including the Code of Ethics and Business Conduct and related workplace conduct and safety policies.
Job postings typically remain open for approximately 20 days of the posting date listed above, however the job posting may be closed earlier should it be determined the position is no longer required due to business need. Job postings in areas with a high volume of applicants, such as customer service, contact center, and Financial Crimes investigations, remain open for approximately 5 days of the posting listed date. At U.S. Bank, we're on a journey to do our best. Helping the customers and businesses we serve to make better and smarter financial decisions and enabling the communities we support to grow and succeed. We believe it takes all of us to bring our shared ambition to life, and each person is unique in their potential. A career with U.S. Bank gives you a wide, ever-growing range of opportunities to discover what makes you thrive at every stage of your career. Try new things, learn new skills and discover what you excel at-all from Day One.
Information Security Analyst 3, Digital Technology Solutions
Cyber Security Analyst Job 12 miles from Independence
* Assist with developing strategies to achieve organizational goals; understand organization's strengths and weaknesses; analyze potential risks and opportunities; adapt recommendations to changing conditions and aligns with best practices. * Help facilitate large collaborative teams to achieve organizational goals.
* Support community communication efforts, presenting security insights to leadership.
* Develop technical documentation (designs, specifications, processes, workflows) and communications.
* Develop and validate baseline security configurations for operating systems, applications, networking, and telecommunications equipment.
* Participate in multiple, moderate- to high-risk projects.
* Work with a team to advance project goals and provide technical help and subject matter expertise. Actively engage in project support and solutioning.
* Share technical knowledge with teammates and help solve more complex problems.
* Document individual progress on assigned deliverables.
* Gather, maintain, and validate metrics for area of responsibility.
* Mentor student workers and junior employees.
* Carry out procedures to ensure that all systems, products, and services meet organization security standards. Recommend procedural improvements.
* Research information security trends to maintain technical understanding of the latest vulnerabilities and threats.
* Assist with providing artifacts to Governance, Risk & Compliance in relation to internal & external audits.
* Independently work with business units to achieve security objectives and identifies, reports, and resolves security risks and violations.
* Perform cyber investigations through forensic fact gathering with a focus on e-discovery.
* Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations.
* Provide guidance and technical expertise as needed for information security training and awareness programs.
* Participate in troubleshooting processes during and outside of normal business hours and participate in change management and root cause analysis.
* Mentor others regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
* Serve as an expert resource to others.
* Perform related duties based on departmental need. This job description can be changed at any time.
****Required Education****
Bachelor's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
Eight (8) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
****Required Experience****
* Two (2) years of related experience
* Advanced knowledge of security tool administration.
* Moderate project management skills.
* Experience with system administration.
* Experience with network architecture or some level of related technical training.
* Advanced understanding of risk and vulnerability management.
* Experience with incident response.
* Advanced knowledge of industry standard security and compliance frameworks.
****Additional Qualifications Considered****
This position will primarily work in the area of information security risk management. The ideal candidate will have experience in the field of information security risk. Responsibilities may include, but are not limited to: assessing information security reviews to identify business risk, make recommendations for implementation of security controls, performing gap analysis of contracts and ensuring appropriate data security verbiage is included in contracts, documenting excessive risk via institutional risk acceptance processes, participating on projects with data security concerns to represent the office of information security and ensure appropriate documentation is in place, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes, and supervision/mentorship of co-op and student workers.2. CISSP, CISM, GISP or similar information security certification(s) are preferred.
****Physical Requirements/Work Environment****
* Sitting - Continuously
* Repetitive hand motion (such as typing) - Continuously
* Hearing, listening - Continuously
* Talking - Continuously
* Standing - Seldom
* Walking - Seldom
* Bending - Seldom
* Stooping - Seldom
* Climbing stairs/ladders - Seldom
* Kneeling, squatting - Seldom
* Crouching - Seldom
* Crawling - Seldom
* Reaching overhead - Seldom
* Pulling, pushing - Seldom
* Lifting - up to 20 pounds - Seldom
* Lifting - up to 50 pounds - Seldom
* Lifting - over 50 pounds - Seldom
Competitive salary range dependent on the candidate's experience. ** Information Security Analyst 3, Digital Technology Solutions**
Date: Dec 9, 2024 Location: Cincinnati, OH, US
Facility: Main Campus
**Job Segment:** Information Security, Developer, Computer Science, Risk Management, Technology, Finance, Security
Information Security Analyst 1, Digital Technology Solution
Cyber Security Analyst Job 12 miles from Independence
Information Security Analyst 1, Digital Technology Solution University of Cincinnati Posted: December 10, 2024 Location: Cincinnati, Ohio **Current UC employees must apply internally via *SuccessFactors*** **You are invited to submit an application to be considered for one of multiple vacancies of the same position.**
****Job Overview****
Assist in performing procedures and provide technical solutions that serve to provide appropriate access to and protect systems from unauthorized users.
****Essential Functions****
* Participate in peer knowledge sharing groups.
* Communicate security concepts effectively, with guidance.
* Assist with development of technical documentation (designs, specifications, processes, workflows) and communications.
* Document individual progress on assigned deliverables.
* Participate in gathering of metrics for area of responsibility.
* Carry out procedures to ensure that support departmental and university operations in the information security area.
* Maintain familiarity with information security trends and best practices.
* Participate in internal information security projects and initiatives.
* Participate in preparation and maintenance of functional documentation for assigned tasks.
* Participate in the research, design, implementation, and support of systems supporting information security tools and services.
* Participate in the development, maintenance, and utilization of standard operating procedures.
* Participate in conducting risk and vulnerability assessments of information systems to identity vulnerabilities, risks, and protection needs.
* Participate in troubleshooting processes during and outside of normal business hours.
* Assist with mentoring non-security teams regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
* Assist with information security training and awareness programs.
* Perform related duties based on departmental need. This job description can be changed at any time.
****Required Education****
* Associate's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
* Two (2) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
****Required Experience****
Possess working knowledge of commonly-used concepts, practices, and procedures and contributes through support, using established processes, methods, and systems.
****Additional Qualifications Considered****
This position will primarily work in the area of information security operations. The ideal candidate will have education or experience in the field of information security operations. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and event management (SIEM), SSL and client certificate management, vulnerability management, privileged access management, password management, system/application administration for security related technologies, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes. CISSP, CISM, GISP or similar information security certification(s) are preferred.
Technical security certifications such as Security+, GSEC or similar.
****Physical Requirements/Work Environment****
* Talking - Continuously
* Sitting - Continuously
* Hearing, listening - Continuously
* Repetitive hand motion (such as typing) - Continuously
* Bending - Seldom
* Climbing stairs/ladders - Seldom
* Crawling - Seldom
* Crouching - Seldom
* Kneeling, squatting - Seldom
* Lifting - over 50 pounds - Seldom
* Lifting - up to 20 pounds - Seldom
* Lifting - up to 50 pounds - Seldom
* Pulling, pushing - Seldom
* Reaching overhead - Seldom
* Standing - Seldom
* Stooping - Seldom
* Walking - Seldom
* Shoveling - Not Required
**Compensation and Benefits**
UC offers a wide array of complementary and affordable benefit options, to meet the financial, educational, health, and wellness needs of you and your family. Eligibility varies by position and FTE.
* Competitive salary range dependent on the candidate's experience.
* Comprehensive insurance plans including medical, dental, vision, and prescription coverage.
* Flexible spending accounts and an award-winning employee wellness program, plus an employee assistance program.
* Financial security via our life and long-term disability insurance, accident and illness insurance, and retirement savings plans.
* Generous paid time off work options including vacation, sick leave, annual holidays, and winter season days in addition to paid parental leave.
* Tuition remission is available for employees and their eligible dependents.
* Enjoy discounts for on and off-campus activities and services.
As a UC employee, and an employee of an Ohio public institution, if hired you will not contribute to the federal Social Security system, other than contributions to Medicare. Instead, UC employees have the option to contribute to a state retirement plan (OPERS, STRS) or an alternative retirement plan (ARP).
To learn more about why UC is a great place to work, please visit our careers page at .
For questions about the UC recruiting process or to request accommodations with the application, please contact Human Resources at ***********.
**The University of Cincinnati is an Equal Opportunity Employer.**
REQ: 97769
SF:OMJ SF:RM SF:HEJ, SF:INS SF:HERC SF:DIV SF:LJN SF:IHE
HISTORY IN BRIEF - The University of Cincinnati is a public urban serving research institution that was founded in 1819 and today is one of the country's largest universities offering more than 350 academic programs to more than 44,000 students. UC has many top ranked programs in areas such as Music and Arts, Medical and Human-Services, Criminal Justice and more. Located in an urban setting, UC is close to the heart of Cincinnati and allows easy access for students to enjoy all that the city offers. UC is also the alma mater of many notables such as President William Howard Taft; Albert Sabin, developer of the oral polio vaccine; Astronaut Neil Armstrong and Mary Weinberg, 2008 Olympic gold medalist. UC is classified as a Research University (Very High Research Activity) by the Carnegie Commission and is ranked as one of America's top 35 public research universities by the National Science Foundation. UC jumped 17 spots in the U.S. News & World Report rankings in the past two years alone. In addition to being named a “green university” by Princeton Review, UC has been named one of the world's most beautiful campuses by Forbes and Delta Sky magazines. Learn more at ******************** N STATEMENT - The University of Cincinnati serves the people of Ohio, the nation, and the world as a premier, public, urban research university dedicated to undergraduate, graduate, and professional education, experience-based learning, and research. We are committed to excellence and diversity in our students, faculty, staff, and all of our activities. We provide an inclusive environment where innovation and freedom of intellectual inquiry flourish. Through scholarship, service, partnerships, and leadership, we create opportunity, develop educated and engaged citizens, enhance the economy and enrich our University, city, state and global community. Show more Show less ISACA Career Center is Just One of the Benefits. Discover what else ISACA has to offer!
API Security Engineer Company Hidden Finance Cincinnati, OH 1 Opening 2 months ago $1,500 reward per hire
Cyber Security Analyst Job 12 miles from Independence
**API Security Engineer** Company Hidden Finance Cincinnati, OH Base pay $12,345 - $678,910 or to view salary and company information Other Contract 1 Opening $1,500 reward per hire **About this Role** Agility Partners is seeking a qualified API Security Engineer to fill an open position with one of our banking clients. In this exciting opportunity, you will play a crucial role in securing APIs, leading technical conversations, and establishing an API management strategy.
**Responsibilities:**
* Lead technical discussions to determine API security items and define API patterns.
* Write best practices and create business and security requirements with a focus on threat modeling.
* Collaborate with stakeholders to determine control criticality and work with application owners to create patterns.
* Address Information Security risks, ensuring alignment with business objectives and regulatory requirements.
* Provide expertise on decisions and priorities regarding the enterprise's Information Security strategy.
**Benefits and Perks**
***Reasons to Love It:***
Work within a collaborative team environment where ideas and creativity are welcomed! Family and Work Life balance are important to this organization and valued for the employees.
* Working for an organization that focuses on company culture, inclusion and diversity
* 50% medical coverage for you and your entire family, short/long term disability and life insurance options
* 401(k)
* Life Insurance
* Disability coverage
**The Ideal Candidate**
**Qualifications:**
* Bachelor's degree in a relevant technology field or equivalent combination of education and work experience.
* 8+ years of engineering or IT/Security work experience.
* 5+ years of interdisciplinary experience in Access Control Systems, Application Security, Application SDLC, Operating Systems, Cryptographic Controls, API Security, and Networking.
* Excellent communication skills and the ability to build effective relationships with business leaders.
* Strong organizational skills with the ability to manage multiple tasks simultaneously.
* Solid understanding of IT security best practices.
* Skilled in designing, implementing, and supporting complex technical solutions.
* Experience in API security testing, architecture, design, and lifecycle management.
* Proficient in integrating security-focused API initiatives with other development teams.
* Ability to provide clear and concise documentation on delivered code and customer onboarding.
**Additional Preferred Skills:**
* Experience with Jenkins pipelines and automating security controls within CI/CD pipelines.
* Extensive development experience with different API capabilities.
* Previous microservice development and application vulnerability remediation experience.
* Knowledge of serverless solutions within AWS.
Share this job. Make $1,500.
When a friend applies to this position and gets hired, you'll get credited with a referral reward!*
*Reward paid upon hire of your candidate according to our Recruiting Agreement Policy (see right).
Information Security Analyst 1, Digital Technology Solution
Cyber Security Analyst Job 12 miles from Independence
**Current UC employees must apply internally via *SuccessFactors*** **You are invited to submit an application to be considered for one of multiple vacancies of the same position.** Founded in 1819, the University of Cincinnati ranks among the nation's best urban public research universities. Home to 53,235 students, more than 11,000 faculty and staff and 350,000+ living alumni, UC combines a Top 35 public research university with a physical setting The New York Times calls “the most ambitious campus design program in the country.”
With the launch of Next Lives Here, the Cincinnati Innovation District, a $100 million JobsOhio investment, three straight years of record enrollment, worldwide leadership in cooperative education, a dynamic academic health center and entry into the Big 12 Conference, UC's momentum has never been stronger. UC's annual budget stands at $1.85 billion, and its endowment totals nearly $1.8 billion.
****Job Overview****
Assist in performing procedures and provide technical solutions that serve to provide appropriate access to and protect systems from unauthorized users.
****Essential Functions****
* Participate in peer knowledge sharing groups.
* Communicate security concepts effectively, with guidance.
* Assist with development of technical documentation (designs, specifications, processes, workflows) and communications.
* Document individual progress on assigned deliverables.
* Participate in gathering of metrics for area of responsibility.
* Carry out procedures to ensure that support departmental and university operations in the information security area.
* Maintain familiarity with information security trends and best practices.
* Participate in internal information security projects and initiatives.
* Participate in preparation and maintenance of functional documentation for assigned tasks.
* Participate in the research, design, implementation, and support of systems supporting information security tools and services.
* Participate in the development, maintenance, and utilization of standard operating procedures.
* Participate in conducting risk and vulnerability assessments of information systems to identity vulnerabilities, risks, and protection needs.
* Participate in troubleshooting processes during and outside of normal business hours.
* Assist with mentoring non-security teams regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
* Assist with information security training and awareness programs.
* Perform related duties based on departmental need. This job description can be changed at any time.
****Required Education****
* Associate's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
* Two (2) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
****Required Experience****
Possess working knowledge of commonly-used concepts, practices, and procedures and contributes through support, using established processes, methods, and systems.
****Additional Qualifications Considered****
This position will primarily work in the area of information security operations. The ideal candidate will have education or experience in the field of information security operations. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and event management (SIEM), SSL and client certificate management, vulnerability management, privileged access management, password management, system/application administration for security related technologies, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes. CISSP, CISM, GISP or similar information security certification(s) are preferred.
Technical security certifications such as Security+, GSEC or similar.
****Physical Requirements/Work Environment****
* Talking - Continuously
* Sitting - Continuously
* Hearing, listening - Continuously
* Repetitive hand motion (such as typing) - Continuously
* Bending - Seldom
* Climbing stairs/ladders - Seldom
* Crawling - Seldom
* Crouching - Seldom
* Kneeling, squatting - Seldom
* Lifting - over 50 pounds - Seldom
* Lifting - up to 20 pounds - Seldom
* Lifting - up to 50 pounds - Seldom
* Pulling, pushing - Seldom
* Reaching overhead - Seldom
* Standing - Seldom
* Stooping - Seldom
* Walking - Seldom
* Shoveling - Not Required
**Compensation and Benefits**
UC offers a wide array of complementary and affordable benefit options, to meet the financial, educational, health, and wellness needs of you and your family. Eligibility varies by position and FTE.
* Competitive salary range dependent on the candidate's experience.
* Comprehensive insurance plans including medical, dental, vision, and prescription coverage.
* Flexible spending accounts and an award-winning employee wellness program, plus an employee assistance program.
* Financial security via our life and long-term disability insurance, accident and illness insurance, and retirement savings plans.
* Generous paid time off work options including vacation, sick leave, annual holidays, and winter season days in addition to paid parental leave.
* Tuition remission is available for employees and their eligible dependents.
* Enjoy discounts for on and off-campus activities and services.
As a UC employee, and an employee of an Ohio public institution, if hired you will not contribute to the federal Social Security system, other than contributions to Medicare. Instead, UC employees have the option to contribute to a state retirement plan (OPERS, STRS) or an alternative retirement plan (ARP).
To learn more about why UC is a great place to work, please visit our careers page at .
For questions about the UC recruiting process or to request accommodations with the application, please contact Human Resources at ***********.
**The University of Cincinnati is an Equal Opportunity Employer.**
REQ: 97769
SF:OMJ SF:RM SF:HEJ, SF:INS SF:HERC SF:DIV SF:LJN SF:IHE
** Information Security Analyst 1, Digital Technology Solution**
Date: Dec 9, 2024 Location: Cincinnati, OH, US
Facility: Main Campus
**Job Segment:** Information Security, Computer Science, Developer, Risk Management, Technology, Research, Finance
Information Security Analyst 3, Digital Technology Solutions
Cyber Security Analyst Job 12 miles from Independence
Information Security Analyst 3, Digital Technology Solutions University of Cincinnati Posted: December 10, 2024 Location: Cincinnati, Ohio **Current UC employees must apply internally via *SuccessFactors*** Assist in performing procedures and provides technical solutions that serve to provide appropriate access to and protect systems from unauthorized users.
****Essential Functions****
* Assist with developing strategies to achieve organizational goals; understand organization's strengths and weaknesses; analyze potential risks and opportunities; adapt recommendations to changing conditions and aligns with best practices.
* Help facilitate large collaborative teams to achieve organizational goals.
* Support community communication efforts, presenting security insights to leadership.
* Develop technical documentation (designs, specifications, processes, workflows) and communications.
* Develop and validate baseline security configurations for operating systems, applications, networking, and telecommunications equipment.
* Participate in multiple, moderate- to high-risk projects.
* Work with a team to advance project goals and provide technical help and subject matter expertise. Actively engage in project support and solutioning.
* Share technical knowledge with teammates and help solve more complex problems.
* Document individual progress on assigned deliverables.
* Gather, maintain, and validate metrics for area of responsibility.
* Mentor student workers and junior employees.
* Carry out procedures to ensure that all systems, products, and services meet organization security standards. Recommend procedural improvements.
* Research information security trends to maintain technical understanding of the latest vulnerabilities and threats.
* Assist with providing artifacts to Governance, Risk & Compliance in relation to internal & external audits.
* Independently work with business units to achieve security objectives and identifies, reports, and resolves security risks and violations.
* Perform cyber investigations through forensic fact gathering with a focus on e-discovery.
* Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations.
* Provide guidance and technical expertise as needed for information security training and awareness programs.
* Participate in troubleshooting processes during and outside of normal business hours and participate in change management and root cause analysis.
* Mentor others regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
* Serve as an expert resource to others.
* Perform related duties based on departmental need. This job description can be changed at any time.
****Required Education****
Bachelor's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
Eight (8) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
****Required Experience****
* Two (2) years of related experience
* Advanced knowledge of security tool administration.
* Moderate project management skills.
* Experience with system administration.
* Experience with network architecture or some level of related technical training.
* Advanced understanding of risk and vulnerability management.
* Experience with incident response.
* Advanced knowledge of industry standard security and compliance frameworks.
****Additional Qualifications Considered****
This position will primarily work in the area of information security operations. The ideal candidate will have experience in the field of information security operations. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and event management (SIEM), SSL and client certificate management, vulnerability management, privileged access management, password management, system/application administration for security related technologies, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes, and supervision/mentorship of co-op and student workers.2. CISSP, CISM, GISP or similar information security certification(s) are preferred.
****Physical Requirements/Work Environment****
* Sitting - Continuously
* Repetitive hand motion (such as typing) - Continuously
* Hearing, listening - Continuously
* Talking - Continuously
* Standing - Seldom
* Walking - Seldom
* Bending - Seldom
* Stooping - Seldom
* Climbing stairs/ladders - Seldom
* Kneeling, squatting - Seldom
* Crouching - Seldom
* Crawling - Seldom
* Reaching overhead - Seldom
* Pulling, pushing - Seldom
* Lifting - up to 20 pounds - Seldom
* Lifting - up to 50 pounds - Seldom
* Lifting - over 50 pounds - Seldom
**Compensation and Benefits**
UC offers a wide array of complementary and affordable benefit options, to meet the financial, educational, health, and wellness needs of you and your family. Eligibility varies by position and FTE.
* Competitive salary range of $76,000 - $86,000 dependent on the candidate's experience.
* Comprehensive insurance plans including medical, dental, vision, and prescription coverage.
* Flexible spending accounts and an award-winning employee wellness program, plus an employee assistance program.
* Financial security via our life and long-term disability insurance, accident and illness insurance, and retirement savings plans.
* Generous paid time off work options including vacation, sick leave, annual holidays, and winter season days in addition to paid parental leave.
* Tuition remission is available for employees and their eligible dependents.
* Enjoy discounts for on and off-campus activities and services.
For questions about the UC recruiting process or to request accommodations with the application, please contact Human Resources at ***********.
**The University of Cincinnati is an Equal Opportunity Employer.**
REQ: 97767
HISTORY IN BRIEF - The University of Cincinnati is a public urban serving research institution that was founded in 1819 and today is one of the country's largest universities offering more than 350 academic programs to more than 44,000 students. UC has many top ranked programs in areas such as Music and Arts, Medical and Human-Services, Criminal Justice and more. Located in an urban setting, UC is close to the heart of Cincinnati and allows easy access for students to enjoy all that the city offers. UC is also the alma mater of many notables such as President William Howard Taft; Albert Sabin, developer of the oral polio vaccine; Astronaut Neil Armstrong and Mary Weinberg, 2008 Olympic gold medalist. UC is classified as a Research University (Very High Research Activity) by the Carnegie Commission and is ranked as one of America's top 35 public research universities by the National Science Foundation. UC jumped 17 spots in the U.S. News & World Report rankings in the past two years alone. In addition to being named a “green university” by Princeton Review, UC has been named one of the world's most beautiful campuses by Forbes and Delta Sky magazines. Learn more at ******************** N STATEMENT - The University of Cincinnati serves the people of Ohio, the nation, and the world as a premier, public, urban research university dedicated to undergraduate, graduate, and professional education, experience-based learning, and research. We are committed to excellence and diversity in our students, faculty, staff, and all of our activities. We provide an inclusive environment where innovation and freedom of intellectual inquiry flourish. Through scholarship, service, partnerships,
Information Security Analyst 2, Digital Technology Solutions
Cyber Security Analyst Job 12 miles from Independence
* Clearly convey complex security information to both technical and non-technical stakeholders. * Participate in developing technical documentation (designs, specifications, processes, workflows) and communications. * Mentor and delegate work assignments to student workers.
* Participate in multiple low and moderate risk projects. Work with a team to advance project goals and provide technical assistance.
* Document individual progress on assigned deliverables.
* Gather metrics for area of responsibility.
* Carry out procedures to ensure that all systems, products, and services meet organization security standards.
* Research information security trends to understand the latest vulnerabilities and threats.
* Conduct risk and vulnerability assessments of information systems to identity vulnerabilities, risk, and protection needs.
* Assist with providing artifacts to Governance, Risk & Compliance in relation to internal & external audits.
* With limited support, work with business units to achieve security objectives. Identify, report, and resolve security risks and violations.
* Develop subject matter expertise on security applications and services in the area of responsibility.
* With limited support, conduct information security reviews; determine and document risk and impact on the university; provide baseline remediation recommendations.
* Assist with cyber investigations through forensic fact gathering with a focus on e-discovery.
* Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations.
* Develop content for and present information security training and awareness programs.
* Develop familiarity with data security laws and regulations applicable to higher education.
* Participate in troubleshooting processes during and outside of normal business hours and participate in change management.
* Mentor non-security teams regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
* Serve as seasoned and proficient information security professional.
* Perform related duties based on departmental need. This job description can be changed at any time.
****Required Education****
* Bachelor's Degree in in Computer Science, Information Technology, Computer Engineering, or related field.
* Four (4) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
****Required Experience****
* Experience in security tool administration.
* Basic scripting skills.
* Basic project management skills.
* Understanding of system administration.
* Basic of network architecture.
* Moderate understanding of risk and vulnerability management.
* Basic awareness of incident response.
* Experience with industry standard security and compliance frameworks.
****Additional Qualifications Considered****
This position will primarily work in the area of information security education and awareness. The ideal candidate will have experience in the field of information security education awareness or similar. Responsibilities may include, but are not limited to: creating education materials including printed and virtual documents, images, and videos, creation of training videos, facilitating in-person and virtual training events and outreach events, creating/designing and maintaining inventory of departmental handouts, managing departmental websites, intranet sites, and social media presences, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes. CISSP, CISM, GISP or similar information security certification(s) are preferred.
****Physical Requirements/Work Environment****
* Hearing, listening - Continuously
* Repetitive hand motion (such as typing) - Continuously
* Talking - Continuously
* Sitting - Continuously
* Bending - Seldom
* Climbing stairs/ladders - Seldom
* Crawling - Seldom
* Crouching - Seldom
* Kneeling, squatting - Seldom
* Lifting - over 50 pounds - Seldom
* Lifting - up to 20 pounds - Seldom
* Lifting - up to 50 pounds - Seldom
* Pulling, pushing - Seldom
* Reaching overhead - Seldom
* Standing - Seldom
* Stooping - Seldom
* Walking - Seldom
* Shoveling - Not Required
Competitive salary range dependent on the candidate's experience. ** Information Security Analyst 2, Digital Technology Solutions**
Date: Dec 9, 2024 Location: Cincinnati, OH, US
Facility: Main Campus
**Job Segment:** Information Security, Developer, Computer Science, Medicare, Technology, Healthcare, Security