Senior Information System Security Officer
Cyber security analyst job in Huntsville, AL
MANTECH seeks a motivated, career and customer-oriented Senior Information System Security Officer (ISSO) to join our team in Huntsville, Alabama.
Responsibilities include, but are not limited to:
Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS and that selected security controls are implemented and operating as intended during all phases of the IS lifecycle
Provide liaison support between the system owner and other IS security personnel
Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis; Conduct required IS vulnerability scans according to risk assessment parameters
Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs). Coordinate system owner concurrence for correction or mitigation actions
Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO); Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase
Ensure that changes to an FBI IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM)
Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR; Working knowledge of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and ATO processes
Minimum Qualifications:
Must meet one of the following levels of experience: A high school diploma/GED and 7 years' experience, a bachelor's degree in computer science cybersecurity or a related discipline and five years' experience, or a master's degree in computer science cybersecurity or a related discipline and 3 years' experience.
Hold at least one of the following Information Assurance Management (IAM) Level III certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or equivalent certifications
Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications
Preferred Qualifications:
A bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline
Clearance Requirements:
Must have a current/active Top Secret security clearance with eligibility to obtain SCI prior to starting this position.
Selected candidate must be willing to undergo a Polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer
Often positions self to maintain computers in the lab, including under the desks and in the server closet
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Cyber Security Engineer
Cyber security analyst job in Knoxville, TN
The Cybersecurity Engineer is responsible for the technical implementation and management of cybersecurity measures. This role involves extensive hands-on work with security technologies, developing and maintaining security protocols, and ensuring the protection of sensitive data. The Cybersecurity Engineer collaborates within the various IT teams to integrate security solutions into business projects and solutions, while supporting overall compliance with HIPAA regulations.
Technical Implementation:
Architect, deploy, and maintain enterprise-grade security technologies, including firewalls, intrusion detection/prevention systems, encryption platforms, and vulnerability management tools.
Implement and support security controls for network infrastructure such as routers, switches, and wireless access points.
Configure, administer, and secure Active Directory and Azure AD environments.
Deploy and oversee endpoint protection platforms and Security Information and Event Management (SIEM) solutions.
Manage Microsoft 365 security capabilities, including conditional access, data loss prevention (DLP), and advanced threat protection.
Evaluate, test, and recommend new security tools, processes, and technologies to strengthen the organization's security posture.
Security Operations:
Continuously monitor systems for security events, investigate alerts, and respond to incidents with appropriate documentation.
Perform ongoing risk assessments and vulnerability scans to identify exposures and drive remediation efforts.
Lead technical response efforts during security incidents or breaches in coordination with the incident response team.
Administer and monitor Identity and Access Management (IAM) systems to ensure secure and appropriate access.
Conduct routine vulnerability assessments and threat analysis to support continual improvement.
Perform digital forensics and incident response activities as needed.
Compliance:
Ensure adherence to HIPAA and all applicable regulatory and security standards.
Design and implement technical safeguards that protect sensitive information and support organizational objectives.
Collaboration:
Partner with IT and business teams to embed security controls into systems, applications, and workflows.
Educate and support staff on cybersecurity awareness, best practices, and evolving threats.
Documentation:
Create and maintain accurate documentation for security configurations, procedures, and incident activity.
Remain informed on current cybersecurity trends and recommend enhancements to existing controls.
Security Audits:
Plan and conduct scheduled and ad-hoc security audits to validate adherence to security policies and standards.
Security Standards and Policies:
Develop, review, and update security policies and standards in alignment with industry best practices and regulatory requirements.
Security Infrastructure Maintenance and Monitoring:
Configure, troubleshoot, and maintain security-related hardware and software.
Implement and manage monitoring tools to detect intrusions and potential security breaches.
Security Strategy Development:
Support the planning, execution, and ongoing refinement of the organization's information security strategy.
Adhere to organizational policies, procedures, and safety standards; complete required training annually; contribute to performance goals and quality improvement initiatives.
Perform additional duties as assigned.
Minimum Education:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related discipline required.
Minimum Experience:
Ten (10) years of overall IT experience, including at least five (5) years of hands-on cybersecurity leadership with demonstrated success designing, engineering, and deploying security solutions in an enterprise environment.
Certifications:
Relevant industry certifications such as CISSP, CISM, CISA, CCSP, CEH, Microsoft Azure Engineer, or equivalent are required.
Cyber Security Engineer
Cyber security analyst job in Knoxville, TN
Knoxville, TN | Cybersecurity Engineer | Full-time
We are actively recruiting a Cybersecurity Engineer for our client in Knoxville, TN. This is a hybrid direct placement opportunity that will require some onsite work in Knoxville. The successful candidate will be responsible for the design, implementation, and ongoing management of advanced cybersecurity measures to protect sensitive data, systems, and networks. This role involves hands-on work with a wide range of security technologies, development and enforcement of security protocols, and proactive risk mitigation. The engineer collaborates with cross-functional IT teams to integrate security solutions into enterprise projects and ensure compliance with applicable regulatory requirements, including HIPAA. Must have a minimum of five years' experience in cybersecurity engineering, with a proven track record in designing and implementing security solutions within an enterprise environment.
Due to client request, candidates must be eligible to work in the United States without sponsorship.
Equal Opportunity Employer/Veterans/Disabled
Senior Cloud Security Engineer
Cyber security analyst job in Missouri
Immediate need for a talented Senior Cloud Security Engineer . This is a 04 months contract opportunity with long-term potential and is located in Elkhorn,NE(Remote). Please review the job description below and contact me ASAP if you are interested.
Job ID:25-94911
Pay Range: $90 - $91.19/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).
Key Responsibilities:
Deploy and configure container scanning tools to ensure secure containerized environments.
Analyze vulnerabilities identified through SAST, DAST, SCA, and container scans, prioritizing remediation based on risk.
Develop and maintain custom scripts to automate security processes and enhance scanning capabilities.
Consult with development teams to provide secure coding guidance and assist with remediation strategies.
Onboard applications into DAST scanning workflows, ensuring proper configuration and coverage.
Configure and troubleshoot DAST scans, resolving issues related to application accessibility and scan accuracy.
Review and validate SAST and SCA findings, confirming or rejecting false positives and “mitigated by design” claims from development teams.
Document findings, create actionable reports, and communicate technical details effectively to stakeholders.
Key Requirements and Technology Experience:
Key Skills; Strong experience with application security tools: DAST (e.g., Burp Suite, OWASP ZAP), SAST (e.g., Checkmarx, Veracode), and SCA (e.g., Black Duck, Snyk).
Hands-on experience with container security and deployment of scanning tools (e.g., Wiz, Prisma, Aqua Security).
Proficiency in scripting languages (Python, Bash, or PowerShell) for automation and tool integration.
Deep understanding of secure software development lifecycle (SDLC) and common vulnerabilities (OWASP Top 10).
Strong experience with application security tools: DAST (e.g., Burp Suite, OWASP ZAP), SAST (e.g., Checkmarx, Veracode), and SCA (e.g., Black Duck, Snyk).
Hands-on experience with container security and deployment of scanning tools (e.g., Wiz, Prisma, Aqua Security).
Proficiency in scripting languages (Python, Bash, or PowerShell) for automation and tool integration.
Deep understanding of secure software development lifecycle (SDLC) and common vulnerabilities (OWASP Top 10).
Ability to troubleshoot complex scanning issues and optimize configurations for accuracy and performance.
Strong analytical skills for vulnerability triage and risk prioritization.
Excellent communication skills for consulting with development teams and explaining technical findings.
Experience integrating security tools into CI/CD pipelines.
Familiarity with cloud-native security (AWS, Azure, GCP) and container orchestration (Kubernetes).
Knowledge of API security testing and microservices architecture.
Exposure to DevSecOps practices and security automation frameworks.
Relevant certifications such as OSWE, GWAPT, or CSSLP.
Our client is a leading Financial Industry, and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration.
Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, colour, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
By applying to our jobs you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here.
Security Analyst
Cyber security analyst job in Nashville, TN
Jr. Security Analyst
Our client is currently looking for a Jr. Security Analyst to join their team in a long term contract capacity focusing on an increase in compliance and audit work heading into the new year. This person will be brought on to support an established information security and compliance team. This role is ideal for someone looking to grow in TPA (Third Party Assessment), audit support, compliance operations, NIST frameworks, and GRC practices.
Below is a breakdown of what our enterprise client is looking for in their potential candidate!
Key Responsibilities
Support Third Party Assessments (TPAs) by gathering evidence, tracking documentation, and helping review vendor security controls.
Participate in internal and external audit readiness tasks including evidence collection, control testing preparation, remediation tracking, and audit log review coordination.
Assist with vulnerability scan reporting, ticket creation, and follow-up with technical teams on remediation tasks.
Support intake, documentation, and status tracking of new compliance and security projects.
Help maintain dashboards, risk registers, and compliance reporting metrics within the GRC tool.
Participate in annual assessment activities including contingency plan exercises, incident response tests, access reviews, and other required security program tasks.
Assist with audit log reviews and routine monitoring processes as assigned.
Maintain structured, accurate documentation to support continuous compliance efforts.
Minimum Qualifications
1-3 years of experience in security, IT, audit, or compliance support roles (internships or rotational experience accepted).
Foundational knowledge of NIST frameworks, FISMA requirements, or other security compliance standards (HIPAA, SOC 2, ISO 27001 a plus).
Experience with GRC platforms (ServiceNow, Archer, OneTrust, ZenGRC, etc.) OR strong interest in learning.
Strong attention to detail with the ability to create, edit, and maintain structured documentation.
Proficiency with Microsoft Office and basic workflow tracking tools (Excel, SharePoint, Confluence, Smartsheet, etc.).
Familiarity with basic cybersecurity terminology and frameworks (e.g., CIS Controls).
Experience supporting compliance evidence collection or policy documentation.
Interest in security governance, risk, and compliance as a long-term career path.
Endpoint Security Engineer #10904
Cyber security analyst job in Kansas City, MO
ECCO Select is a talent acquisition and consulting company specializing in people, process and technology solutions. We provide the talent behind the technology enabling our clients to achieve their goals. For more information about ECCO Select, visit us at *******************
Position Title: Endpoint Security Engineer
Location Information Kansas City Metro (Onsite)
Position Responsibilities:
The Endpoint Security Engineer will play a critical role within the IT security and operations team, responsible for the administration, implementation, and continual improvement of endpoint security solutions-primarily utilizing Microsoft Intune. The ideal candidate must possess advanced expertise in Intune for Mobile Device Management (MDM) and Mobile Application Management (MAM), and be prepared to respond to security incidents beyond regular business hours. Experience with Jamf in Apple environments is an advantage.
Design, deploy, and manage the organization's Microsoft Intune environment for both corporate-owned and BYOD (Bring Your Own Device) devices, ensuring a secure yet seamless user experience.
Develop and maintain solutions for device enrollment, authentication, and complete lifecycle management utilizing Intune, while leveraging Jamf for Apple device environments when required.
Configure, optimize, and monitor Microsoft Intune settings for MDM and MAM across Windows, Android, and iOS devices to ensure security and compliance.
Establish and enforce device compliance policies, security baselines, encryption protocols, and remote wipe capabilities for rapid incident response.
Manage application deployment, app protection policies, and conditional access requirements via Intune and related tools.
Continuously monitor the performance of security solutions via analytics, logs, and user feedback; proactively identify areas for improvement to enhance protection and efficiency.
Lead or contribute to large-scale device migrations, OS upgrades, and mobility transformation projects, ensuring minimal business impact and service continuity.
Regularly monitor, investigate, and respond to endpoint threats, vulnerabilities, and anomalies; promptly remediate endpoint security incidents and collaborate with SOC and IT support teams for escalated security issues and rapid resolution.
Ensure that endpoint security implementations meet regulatory standards and internal governance requirements; stay up to date with relevant compliance frameworks (HIPAA, GDPR, SOC 2, etc.).
Generate detailed reports on device compliance, application usage, and security incidents, supplying metrics and documentation for audits and stakeholders as required.
Develop, refine, and deliver training sessions and materials for end-users and IT helpdesk staff on device enrollment, usage, and security best practices.
Provide Tier 2/3 support for complex endpoint security, mobility, and compliance issues; serve as a subject matter expert for cross-functional teams implementing security initiatives.
Promote a culture of continuous improvement by researching and recommending new endpoint security technologies, trends, and best practices; implement process and tool enhancements as appropriate.
Essential Skills, Experience
3-5 years of hands-on experience in administering and supporting Microsoft Intune, Office 365, and enterprise device security solutions.
Strong proficiency in configuring, managing, and troubleshooting Intune, Microsoft Endpoint Manager, and Azure Active Directory settings.
Proven expertise in designing, deploying, and supporting MDM/MAM solutions for large enterprise environments.
Comprehensive understanding of endpoint security principles, including antivirus, EDR, encryption, secure authentication, and access controls.
Practical experience with endpoint compliance and governance requirements; strong working knowledge of frameworks such as HIPAA, GDPR, or SOC 2 and involvement in audit processes.
Familiarity with automation and scripting tools (e.g., PowerShell, Bash) for task automation, device management, and mobile application deployment.
Demonstrated ability to manage multiple complex projects simultaneously, with excellent organizational, analytical, and documentation skills.
Knowledge of Active Directory, Group Policy Objects (GPO), and remote support tools for user and device management.
Exceptional interpersonal and communication skills, with a proven track record of successful cross-functional collaboration and the ability to operate independently or as part of a team.
Preferred: Hands-on experience with Jamf administration for mac OS and iOS device management, including policy configuration and endpoint protection.
Preparedness to provide support and incident response outside normal business hours as needed.
Qualifications:
Bachelor's degree in Computer Science, Information Security, or a related field (advanced degrees or relevant certifications are a plus).
Preferred certifications: Microsoft Certified (Intune, Azure, or Endpoint Manager), Jamf Certification.
ECCO Select is committed to hiring and retaining a diverse workforce. Our policy is to provide equal opportunity to all people without regard to race, color, religion, national origin, ancestry, marital status, veteran status, age, disability, pregnancy, genetic information, citizenship status, sex, sexual orientation, gender identity or any other legally protected category. Veterans of our United States Uniformed Services are specifically encouraged to apply for ECCO Select opportunities.
Equal Employment Opportunity is The Law
This Organization Participates in E-Verify
Information Systems Security Officer
Cyber security analyst job in Huntsville, AL
Clearance Required: Top Secret/SCI
We are seeking an experienced Information Systems Security Officer (ISSO) to support classified environments and mission-critical programs and initiatives. This role provides day-to-day cybersecurity, accreditation, and compliance support for Collateral and SCI systems within secure areas.
The ISSO will play a key role in maintaining the security posture of classified information systems, ensuring compliance with DoD, Intelligence Community directives, and the Risk Management Framework (RMF).
Key Responsibilities
Security & Policy Support
Apply knowledge of security policies, ICDs, DoD manuals, JAFANs, and related guidance.
Work effectively across a dynamic environment with DoD personnel, military/civilian stakeholders, and industry partners.
Operate with minimal supervision while demonstrating initiative, independence, and strong problem-solving capabilities.
RMF Responsibilities
Review, prepare, update, and maintain RMF accreditation packages.
Perform RMF self-inspections and support compliance reviews.
Track changes affecting system accreditation and notify appropriate stakeholders.
Identify vulnerabilities and recommend/implement mitigation strategies.
Conduct security surveys and coordinate documentation for accreditation packages.
Prepare and track RMF inspections, findings, and corrective action responses.
Maintain RMF security documentation and system records.
System Operations & Continuous Monitoring
Ensure all authorized systems are operated, maintained, and disposed of in accordance with RMF and security policies.
Assist with Cyber Test & Evaluation (CT&E) activities for government partners.
Collect, review, and analyze security scans, audit logs, and system alerts.
Perform vulnerability management and apply continuous monitoring processes for classified systems.
Customer & Mission Support
Support both internal and external customers as part of ISSO duties.
Maintain strong communication and coordination with stakeholders regarding system security posture.
Required Qualifications
5-9 years of related ISSO, cybersecurity, or information assurance experience.
ACAS (Assured Compliance Assessment Solution)
Splunk
Background in Systems Administration.
Strong understanding of RMF processes, documentation, and compliance requirements.
Education
Bachelor's degree or an additional 4 years of relevant experience in lieu of a degree.
Certifications
Must meet DoD 8570.01-M requirements
Must posess/obtain IAT Level II certification within 6 months of hire (e.g., Security+ CE, CCNA Security, CySA+, etc.).
Security Clearance
Active Top Secret/SCI required.
Security Engineer - Threat & Vulnerability
Cyber security analyst job in Saint Louis, MO
We are seeking a Security Engineer II to support threat and vulnerability management across on-premises and cloud environments. This role focuses on identifying security risks, assessing vulnerabilities, ensuring secure configurations, and driving remediation efforts to improve overall security posture.
Key Responsibilities:
Identify, assess, and remediate vulnerabilities across on-prem and cloud environments (AWS/Azure/GCP)
Monitor and analyze threat intelligence using frameworks such as MITRE ATT&CK, OWASP, and CVSS
Utilize vulnerability and cloud security tools (Tenable, Qualys, Rapid7, Prisma Cloud, Defender for Cloud, Wiz)
Perform secure configuration audits using CIS Benchmarks, NIST, and STIGs
Collaborate with IT, Cloud, and DevOps teams to implement remediation
Automate security processes using scripting (Python, PowerShell, Bash)
Track remediation progress and communicate risks to technical and non-technical stakeholders
Required Skills & Experience:
4+ years of experience in Cybersecurity or IT with exposure to vulnerability or cloud security
Hands-on experience with vulnerability management tools
Strong understanding of security controls, risk management, and compliance
Experience with scripting/automation and API integrations
Familiarity with SIEM, logging, monitoring, and ticketing systems
Cyber Security Analyst
Cyber security analyst job in Huntsville, AL
Bellatrix-Latin for "Female Warrior" Owned and operated in a HUBZone, with over 25 years in the HR, Talent Acquisition and Government Contracting. Like the Bellatrix Star in the Orion Constellation, our Team Members are the Brilliance of the company, and are all shareholders, leading the company to success. Bellatrix prides itself on being a Small Woman Owned HUBZone company. We believe big does not equal best. By staying small, we can focus on agility, efficiency, and our people. At Bellatrix we believe in advancement from within through training, mentorship, innovation and truly being a family. Bellatrix believes in excellence in customer service, and catering to the customer's needs. We realize not everyone fits into a box, and we think outside of the box to ensure, affordable and outstanding services. Human Resources, Retention and Recruiting, and Medical Coding/Billing are the HRM of Bellatrix. Come and join our team, where you are a team member and shareholder, working together for growth.
Bellatrix has the current position open as a direct W2, Fulltime position for one of our top clients in the Huntsville, AL Market. This position requires a Secret Clearance and is on location with the Missile Defense Agency
Title: Cyber Security Analyst
Location: Onsite-Huntsville, AL
Program: MDA, C3BM and C2BMC
Number of Openings: 2
Immediate Direct Hire
Clearance: Secret
Travel: 25%
Salary Range: $150,000-165,000, DOE
General Overview:
Command, Control, Communications, and Battle Management (C3BM) cyber engineering efforts include engaging in Command, Control, Battle Management, and Communications (C2BMC) technical engineering and integration, future concepts, new functionality, and multi-national exchange designs. Cyber engineering tasking includes participation in reviews and assessments of C2BMC cyber security and documentation. Collaboration with MDS stakeholders is required to prepare C2BMC cyber products as part of the engineering objectives documentation and analysis processes as related to Defense Of Guam (DoG).Other activities include participation in engineering meetings, presenting engineering product development updates, providing analysis and failure review summaries.
Responsibilities:
Understand cybersecurity aspects of systems engineering development, as well as DoD cybersecurity requirements, and be capable of recommending changes to the Government about the contractor's system engineering development process.
Perform cybersecurity risk assessment reviews to include changes, modifications, and/or updates of software and/or hardware to individual information systems and/or enterprise environment.
Familiarity with Configuration Management to include oversight and engineering assessments of Cybersecurity fixes, patch development, and pre-release testing in support of DoG.
Performing cybersecurity risk assessment describing the posture of an individual information systems through an enterprise architecture in support of DoG.
Will directly support the Software Assurance program for C2BMC. Includes ability for assessments of code reviews and approvals/disapprovals of software products for use on Mission, Training and Test/Development C2BMC systems is support of DoG
Requirements:
Bachelor's degree in STEM program: Computer Science, Information Technology, Network Engineering or other similar program
5+ years of Related Experience
Secret Clearance
Familiarity with MDS cyber capabilities and policy
Familiarity with Missile Defense Agency, Ballistic Missile Defense System, and/or C3BM Program Office work efforts
Security +, CE with a preferred certification level of CISSP
Ability to work independently within a dynamic environment
Apply cyber engineering and solutions to support real-world test, integration, and operations
Work within a collaborative environment composed of Government, prime contractor, sub-contractor and supporting contractor personnel in a badge-less contractor environment
Bellatrix is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
Mid-Level Cyber/Watch Floor Analyst
Cyber security analyst job in Huntsville, AL
Job DescriptionJob Title: Mid-Level Cybersecurity/Watch floor Analyst Clearance: MUST CURRENTLY POSSESS AND ACTIVE TOP SECRET CLEARANCE Noetic is currently seeking a motivated and detail-oriented Mid-Level Cybersecurity/Watch Floor Analyst to join our growing security team. In this junior-level role, you will play a key part in protecting our organization's digital assets by assisting in the detection, analysis, and response to cybersecurity threats and incidents. The ideal candidate will have foundational knowledge of security principles and a strong interest in security operations, with hands-on experience or coursework involving Splunk.
BASIC QUALIFICATIONS:
Minimum of 5 year of Splunk/SOC experience.
Bachelor's in a computer science related field
Active Top Secret Clearance
Ability and willingness to do shift work
MAIN RESPONSIBILITIES:
Responsible for monitoring computer networks for security issues.
Investigating security breaches and other cybersecurity incidents.
Document security breaches and assess the damage they cause.
Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing.
Fix detected vulnerabilities to maintain a high-security standard.
Recommend best practices for IT security.
Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs.
Must be capable of conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files.
Decrypts data and provides technical summaries and input.
Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis.
Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).
PREFERRED QUALIFICATIONS
Microsoft Sentinel
GIAC Continuous Monitoring Certification (GMON)
GIAC Certified Incident Handler (GCIH)
GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Network Forensic Analyst (GNFA)
Noetic Strategies Inc. offers a competitive salary, an extensive benefits package and a work environment that encourages excellence. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Noetic Strategies Inc. is an equal opportunity and affirmative action employer that does not discriminate in employment.
All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, or national origin, disability or protected veteran status.
Noetic Strategies Inc. endeavors to make ************************ accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact noeticstrategies.com for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
Powered by JazzHR
6IxgcPuXI3
Cyber Threat Emulation Analyst
Cyber security analyst job in Huntsville, AL
or
Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10%
LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics.
What You'll Do
As a Mid-Level Cyber Threat Emulation Analyst, you will:
Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM)
Perform cybersecurity duties on customer networks to improve enterprise-wide security posture
Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture
Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation
Measure defense-in-depth effectiveness against known vulnerabilities
Generate vulnerability assessment reports and escalate findings for review
Support enterprise Incident Response in accordance with DoD regulations and instructions
Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting
Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans
Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly
Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction
Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs)
Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results
Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements
Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices
What You Bring
Basic Requirements:
Must have 6, or more, years of general (full-time) work experience
Must have 4 years of combined experience with:
Performing manual or automated penetration tests in an enterprise environment
Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments
Experience performing the full life cycle of incident response and enterprise-level monitoring
Must have 1 year of experience in management or leadership in a team environment
Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP)
Must have, or obtain within 6 months of start date, a PenTest+ certification
Must have an active DoD Secret Security Clearance
Desired Requirements:
Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field
Have experience with Cyber Threat Emulation tools, policies, and procedures
Have experience operating custom software on a Linux platform
Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux)
Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc.
Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred)
Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred)
Be able to mentor and train personnel in a high-paced environment
Be familiar with DoD Security Operations Centers (SOC/CSSP)
Be familiar with DCO/CSSP-guiding security policies and procedures
Have an active DoD Top Secret clearance
Why LaunchTech?
At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence.
We offer competitive benefits, including:
Medical, Dental, and Vision coverage
401(k) with company match
Paid Time Off (PTO)
Opportunities to make a meaningful impact while advancing your career
And more
Ready to Join the LaunchTech Crew?
If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you.
LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law.
Auto-ApplyCyber Security Analyst
Cyber security analyst job in Alabama
Cyber Security Analyst - (2400000X) Description AL-KHOBAR, KINGDOM OF SAUDI ARABIA Cyber Security Analyst Department Information Technology Institution Prince Mohammad bin Fahd University Reports to Manager - Cyber Security introduction The Cyber Security Analyst at Prince Mohammad bin Fahd University protects the university's digital assets, network, and data by identifying vulnerabilities, monitoring threats, and enforcing security measures. This role ensures compliance with security policies, supporting a safe environment for research and academic activities.
Job Purpose
The Cyber Security Analyst role is to safeguard the university's IT infrastructure by proactively monitoring, identifying, and addressing security threats. This position involves implementing security measures, responding to incidents, and ensuring compliance with security policies to protect data and maintain the integrity of university systems. The analyst plays a key role in supporting a secure environment for all digital and academic activities.
Duties and Responsibilities
Major Duties/ Responsibilities:
· Monitor all networks and computer systems to prevent, detect, and investigate security breaches.
· Perform penetration testing to ensure the company's networks are free of bugs that malware authors can take advantage of.
· Design and implement multilevel security strategies to protect networks and data resources.
· Plan computer and network security upgrades and test hardware and software related to the upgrade.
· Stay up to date on new information technologies and apply those innovations in the company's security standards and best practices.
· Lead analysis of current architecture, risk exposure and defining mitigation measures in order to develop suitable recommendations.
· Highlight Cyber Security threats and prepare the official reports.
· Lead assessments of company's security posture including benchmarking/maturity assessments.
· Lead design of cyber security solutions and development of detailed technical specifications for the approved designs.
· Lead implementation, integration and testing of approved security solutions.
· Provide specialist technical support and address technical problems related to applications and production equipment to ensure any complex/escalated issues are handled with no or minimal downtime.
· Oversee/perform preventive maintenance as per schedule to ensure relevant security systems/processes remain fit for purpose.
· Provide subject matter expertise for cyber security related projects throughout its lifecycle to ensure delivery is as per plan/budget and client/TCC expectations.
· Prepare and deliver technical presentations for successful project delivery
· Lead cybersecurity evaluation and configuration review services
· Anticipate future problem areas by monitoring workflows and network traffic patterns.
· Prepare and perform cyber security awareness activities.
· Prepare work papers documenting procedures performed and that fully support audit findings.
· Assist IT operational audits in accordance with the annual audit plan.
· Follows up the action plan progress (such as penetration tests, vulnerability scans) and ensures that recommendations are implemented in a timely manner
· Assist staff members when they need help with security products and processes.
Job-Specific Skills:
· Working experience in a SOC or NOSC environment
· Must have strong working knowledge of information technology, including applications, networks and systems.
· Knowledge in performing IT Audit reports
· Experience in performing Risk Assessments reports.
· Experience in developing Business Continuity Plans and Disaster Recovery Plans
· Knowledge in the usage of vulnerability assessment and penetration testing tools
· Knowledge of security attacks techniques, familiar with MITRE ATT@CK framework
· Experience in using MS Office, MS Visio, Project Management tool.
· Experience in project management, problem-solving, training/coaching, presentation skills, and conflict resolution skills.
· General knowledge of ISO 27001, ITIL or other control frameworks
· Experience in writing SOP's - operation manuals
· Independent, motivated, and ambitious personality
Qualifications & Experience (Required)
Bachelor's degree in computer science, technology or computer engineering
5 to 8 years of experience in progressively more complex and responsible operational roles within a dynamic Enterprise function
Certified CompTIA Security+, CEH, CCNA, CCNP, CISSP (preferred)
Experience in Cisco ASA, WatchGuard, Juniper, CheckPoint Firewall
Knowledge of network and web protocols, and an in-depth knowledge of Linux/Unix tools and architecture
Experience in Patch Management and vulnerably assessment.
Knowledge and understanding of relevant legal and regulatory requirements.
Knowledge of common information security management frameworks.
Experience in Information Security and NCA controls implementation.
Having experience in IT, Operational IT, Cybersecurity, incident detection, incident response, and forensics.
Maintain quality service delivery by adhering to company standards and best practices.
Strong attention to detail with an analytical mind and outstanding problem-solving skills.
Familiarity with information technology concepts such as infrastructure, cyber security, and application controls.
Great awareness of cybersecurity trends and hacking techniques.
On-call network troubleshooting
Knowledge, Skills and Abilities (Required)
· Strong written and verbal communication skills
· Strong focus on first time quality
· Desire to grow technical skills and ability to learn new technologies swiftly
· High attention to detail, self-starter, result driven
· Ability to work in a cross-functional team
· Professional, polite, and attentive while also being accurate
· Always prepared and responsive, willing to meet each challenge directly
· Teamwork
· Problem solving, Leadership
· Perseverance and motivation
· Ability to work under pressure, Confidence
· Managing ambiguity, Resilience
· Analytical skills, IT skills
Disclaimer
PMU reserves the right to alter, amend and add responsibilities to this position in line with the institutional needs. Changes and amendments to this job description shall be within the academic framework and the general employment conditions. Primary Location: Al-KHOBARJob: AnalystOrganization: Information Technology DepartmentSchedule: Regular StandardJob Type: Full-time Job Posting: Feb 25, 2025, 9:10:34 AM
Auto-ApplyAdvanced Acquisition Analyst/Cyber Security Analyst/CompTIA Certified
Cyber security analyst job in Redstone Arsenal, AL
Full-time Description
Support the Missile Defense Agency (MDA) with development and analysis of programmatic data for program management support, to include monitoring and reporting against the acquisition program baselines, and assistance with program oversight and execution briefings. Alternative responsibilities may encompass development and execution of acquisition strategies/plans, contract requirements packages (e.g., writing SOWs, CDRLs, special provisions, source selection evaluation plans) and supporting prime contract monitoring/management activities. CompTIA Certification Preferred.
Certified Authorization Professional (CAP) certification (or ability to attain within 90 days after employment)
Provide interpretation and execution of MDA Acquisition policy, directives, guidance, and instructions
Provide program management support in developing, maintaining, and reporting against program baselines, gathering and analyzing programmatic data for internal Agency oversight reviews of programs (e.g., MDAR, DPR, PER, PMRs, internal reviews)
Prepare briefings and correspondence in response to internal taskings and external RFIs (e.g., GAO/Congressional/DoDIG/DoD oversight organizations)
Analyze acquisition requirements and provide recommendations during pre-solicitation phase through contract execution
Support program and contract management processes through the preparation and/or review of acquisition and program management documentation, briefings, white papers, reports, metrics
Provide support through all phases of the acquisition cycle with an emphasis on cybersecurity throughout the process
Requirements
Prior MDA experience preferred.
Advanced level - Master's degree required and/or 15 years' experience
Intermediate level - Bachelor's degree required and/or 10 years' relevant experience
Knowledge and experience in acquisition, procurement, and contracting highly desirable
Solid background in MS Office tools suite (e.g., Word, Excel, PowerPoint, Access) essential
Must possess exceptionally strong communications and analytical skills, be a self-starter, detail oriented, work well with a team, interacts with multiple levels and functional areas and able to manage customer and contractor relationship
SECRET or above Security Clearance required.
Lead Analyst, OT Cyber Security
Cyber security analyst job in Georgiana, AL
Description & Requirements Smurfit Westrock (NYSE:SW) is a global leader in sustainable paper and packaging solutions. We are materials scientists, packaging designers, mechanical engineers and manufacturing experts with a shared purpose: Innovate Boldly. Package Sustainably. Guided by our values of integrity, respect, accountability and excellence, we use leading science and technology to move fiber-based packaging forward.
Our Technology Organization Is Transforming How We Work At Smurfit Westrock. We Align With Our Businesses To Deliver Innovative Solutions That
* Address specific business challenges, integrate processes, and create great experiences
* Connect our work to shared goals that propel Smurfit Westrock forward in the Digital Age
* Imagine how technology can advance the way we work by using disruptive technology
We are looking for forward thinking technologists that can accelerate our focus areas such as building stronger foundational technology capabilities, reducing complexity, employing digital transformation concepts, and leveraging disruptive technology.
How You Will Impact Smurfit Westrock
* Work with mill and plant engineering SMEs and operational staff to design, implement and support the security of ICS networked systems.
* Participate in risk assessments, network design reviews, and security testing for networks, systems, and applications.
* Evaluate new security technology & emerging threats and provide recommendations to strengthen the OT security environment.
* Utilize existing and newly deployed OT security solutions to perform threat assessments, substantiate security incidents, and effectively respond.
* Evaluate available vendor security solutions to determine how they should be deployed in the OT environment.
* Consult on ICS security matters as needed and liaison between operations and corporate IT security teams.
* Respond and participate in ICS security incident response through phases, including investigating computer and network intrusions and remediation support.
* Perform proactive research to identify, categorize, and produce reports on new and existing threats.
* Monitor industry ICS trends and recognize opportunities for new and emerging technologies.
What You Need To Succeed
* Bachelor's Degree or equivalent in a related field of study (including any of the following but not limited to): Information Systems, Network or Electrical Engineering, and Information Security.
* Certifications are a plus (GICSP, GRID, CISSP, Cisco, Fortinet, Palo, AWS, Azure)
* 3+ years of hands-on experience within the Industrial Controls Systems environment.
* 3+ years of previous experience developing and deploying mitigation techniques to defend networks.
* In-depth understanding of operating systems, network/system architecture, and IT architecture design.
* Experience with maintaining documents, policies, and standards governing the security operations for ICS equipment and networks.
* Experience with operational technologies such as Programmable Logic Controllers (PLCs), Supervisory Control and Data Acquisition (SCADA) software, and Distributed Control Systems (DCS).
* Network and system security architecture expertise.
* Experience with common security systems and vendors such as cisco, Fortinet, palo
* Understanding IT and OT network communication protocols (including TCP/IP, UDP, DNP3, Modbus, IEC 61850, OPC, OPC UA, and PROFINET).
* Knowledge of IT and OT security best practices and knowledge of the differences.
* Understanding threats, vulnerabilities, and exploits in ICS environments and appropriate mitigation techniques.
* Superior organization and follow-up skills.
* Excellent verbal and written communication skills
* Strong oral and written communication skills.
* Willingness to travel (up to 50%)
What We Offer
* Corporate culture based on loyalty, integrity, & respect.
* Comprehensive training with numerous learning and development opportunities
* An attractive salary reflecting skills, competencies, and potential.
* A career with a global packaging company where Sustainability, Safety and Inclusion are business drivers and foundational elements of the daily work.
Candidates are required to undergo a drug screening after receiving a conditional job offer, but before starting employment.
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by state or federal law.
Cyber Security Vulnerability Analyst
Cyber security analyst job in Oak Ridge, TN
Job DescriptionEast Tennessee company is seeking a Cyber Security Vulnerability Analyst to perform defensive cyber operational tasks, respond to reported incidents, and track remediation of client system vulnerabilities to include industrial control systems. The ideal candidate will be an experienced analyst with a strong background in addressing network vulnerabilities and conducting incident response activities.
This is a full-time, hybrid position that will work onsite in Oak Ridge, TN 2-3 days each week.
Job Responsibilities:
• Join the Defensive Cyber Operations Group's multi-disciplinary team in responding to advanced Cyber threats from targeted phishing to network-based threats, ransomware, and APT-level activity in a Tier 2 role.
• Mentor the DCO's junior staff, developing their technical and incident resolution skills.
• Participate in incident response activities involving multiple teams and functions.
• Serve as primary coordinator for ORNL response to federal Binding Operational Directives and data calls.
• Leverage internal and external vulnerability scanning scan data to maintain a comprehensive view of ORNL's threat profile and risk status.
• Automate key DCO functions using Tines technology
• Partner with Emerging Threat team to remediate extant vulnerabilities identified by their intelligence activities.
• Maintain strong collaborative and data sharing relationships with DOE headquarters Cyber units, other DOE laboratories, and external entities.
• Leverage EDR, SIEM, IDS, and PCAP tools to identify and investigate cyber threats.
• Assist users with the creation, monitoring, and evaluation of policy and device exceptions.
• Assist in training and awareness activities to ensure ORNL staff are aware of Cyber Security responsibilities and requirements.
• Partner with Cyber Industrial Control System Engineers to monitor the lab's ICS enclaves for operational and security issues
Candidates must be able to obtain a federal security clearance so US citizenship is required.
Information Security Specialist
Cyber security analyst job in Kansas City, MO
CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future.
This role is responsible for modernizing the methods and procedures for performing cybersecurity risk management and assessing cybersecurity risk. This involves assessing the current approach, data, and tools to identify gaps and enhancements. It requires strong partnerships with key stakeholders and business leaders, conveying cyber risk to them in a way that allows them to make risk informed decisions and improve the Organization's security posture.
Important Information
Open to US Citizens, Green Card holders or Permanent Residents with at least 3 years of residency.
No sponsorship is available. Candidates must have valid work authorization, without an end date to be considered. No H1-B, OPT, STEM OPT, CPT, TN, J-1, etc.
This position requires working on-site with 5 days per month remote work flexibility.
Key Activities
Risk Assessment & Analysis
Modernize the current approach to cybersecurity risk management and assessments.
Research and evaluate methodologies and frameworks and subsequently apply them for use in the organization.
Identify and implement risk quantification and scoring approaches within the organization.
Perform in-depth data analysis to identify patterns, trends, and areas of focus and priority.
Incorporate threat intelligence into risk assessments to provide context-aware risk evaluations.
Conduct business impact analyses to understand how security incidents affect critical business functions.
Evaluate and quantify risks associated with third-party vendors and supply chain.
Assess specific risks related to cloud environments and services.
Program Development
Develop reports and dashboards to illustrate the organization's risk posture.
Ensure that cybersecurity risk is integrated with IT risk, and informs overall Enterprise risk.
Research and identify options to establish a risk register.
Develop and track risk treatment plans including mitigation strategies, acceptance justifications, or transfer options.
Map cybersecurity risks to relevant regulatory requirements and compliance frameworks.
Continuously improve risk management processes based on industry trends and organizational needs.
Communication & Collaboration
Meet with technical experts and business leaders to convey cybersecurity risk in a way they can understand.
Partner with incident response teams to incorporate lessons learned into risk models.
Translate complex technical risk scenarios into actionable insights for all levels of the organization.
Qualifications
Experience
Typically requires at least 6 years of relevant cybersecurity risk management experience.
Experience with risk scoring methods and risk quantification.
Experience with generating reports and dashboards to convey cybersecurity risk in a way that is easy to consume.
Experience establishing or running an Enterprise cybersecurity risk management program.
Experience with NIST SP 800-53 security standards.
Experience presenting risk information to executive leadership.
Education & Certifications
Bachelor's degree specializing in an information technology field from an accredited college or university, or equivalent combination of directly related education and/or experience.
Information Security industry certification (SSCP, CISSP, GIAC, CISM, CISA, etc.) preferred.
Technical Knowledge
Strong knowledge of and experience applying cybersecurity risk frameworks and assessment methodologies; examples may include Factor Analysis of Information Risk (FAIR), NIST Cybersecurity Framework (CSF).
Strong skills and experience with data analysis.
Experience with GRC (Governance, Risk, and Compliance) tools.
Knowledge of business impact analysis methodologies.
Familiarity with cloud security frameworks (CCSK, CCSP).
Skills & Abilities
Ability to understand technical details of cybersecurity risk.
Ability to communicate complicated technical risk scenarios to all levels of the organization.
Demonstrated self-motivation and ability to perform work independently, and also collaborate in a team environment.
Additional Information
How We Work (HWW):
On-site: 5 days per month remote work flexibility
Location: Kansas City, Denver, Oklahoma City, Omaha
Remote Eligible: No
Salary:
$98,600 - $139,000 / Senior Level
$117,300 - $165,400 / Advanced Level
Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location.
Screening: US Citizens or Green Card holders and Permanent Residents with at least 3 years of residency. This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and could take up to a couple of months to complete. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks.
Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future.
About Us
Total Rewards & Benefits
Who We Are
What We Do
Follow us on
LinkedIn
, Instagram,
X (formerly Twitter)
, and
YouTube
#KCFedIT
Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America)
The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels.
Privacy Notice
Auto-ApplyCyber Security Analyst
Cyber security analyst job in Radcliff, KY
OSC EdgeTech, LLC is seeking a talented Cyber Security Analyst to join the team.
OSC EdgeTech is a wholly owned subsidiary of Cook Inlet Region, Inc. (CIRI), an Alaska Native Corporation proudly owned by over 9,400 Shareholders. OSC EdgeTech was created to deliver agile, responsive IT solutions to meet the evolving needs of federal and defense customers. As an SBA-certified 8(a) entity with a Facility Clearance (FCL), OSC EdgeTech streamlines the acquisition process while maintaining the trusted quality, security, and innovation that define OSC Edge.
Cook Inlet Region, Inc., also known as CIRI, is one of 12 land-based Alaska Native regional corporations created pursuant to the Alaska Native Claims Settlement Act (ANCSA). CIRI's regional boundaries roughly follow the traditional Dena'ina territory of Southcentral Alaska. CIRI was incorporated on June 8, 1972, and is owned today by a diverse group of more than 9,500 Shareholders who live in Alaska and throughout the world.
OSC EdgeTech offers excellent benefits for eligible employees. Benefits include paid holidays, paid time off, 401K with employer match, dental, vision, health insurance plans, as well as life and disability benefits.
Position Overview
The Cyber Security Analyst will contribute to the Cyber mission by conducting vulnerability scans, reviewing security alerts and incidents, and assessing technical compliance in accordance with DoD and Federal requirements. This position will utilize Cyber security tools, including ACAS, eMASS, HBSS, and Microsoft 365 Defender, to support vulnerability management, POA&M management, threat detection, and other Cyber tasks as required. Additionally, this position will collaborate with other Cyber analysts to develop programmatic actions and minimize security risks.
Major Activities
Conduct vulnerability scans of IT assets as requested from tickets or as directed by Cybersecurity Manager.
Apply knowledge of monitoring, analyzing, detecting, and responding to Cyber events and incidents within information systems and networks.
Advise on an integrated, dynamic Cyber defense and leverage Cybersecurity solutions to deliver Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, and data spillage, and incident response actions.
Assess IT assets for cybersecurity compliance in accordance with DISA STIGs requirements.
Develop POA&Ms to track any Overdue vulnerabilities or STIG deviations
Review and investigate security alerts and incidents from Microsoft 365 Defender
Utilize eMASS to maintain and update POA&M status
Review device compliance status from HBSS
Work with other NEC Operations team members to remediate and mitigate security vulnerabilities.
Review the latest Cybersecurity intelligence information and provide recommendations to improve the Cybersecurity posture.
Perform other duties as appropriate and as assigned.
Knowledge/Skills/Abilities
Experience analyzing log files, firewall logs, and IDS Logs to identify possible threats to network security, and to perform command and control functions in response to incidents. If not 8570 certified at contract start must be within six months.
Experience in Host Based Security Systems (HBSS), ACAS vulnerability scanning software, knowledge of and experience with Security Information and Events Manager (SIEM) analysis and administration, as well as Information Assurance Vulnerability Alert (IAVA) management.
Excellent verbal, written and interpersonal communication skills, excellent organizational and multi-tasking skills.
Great analytical, critical thinking and problem-solving abilities.
Superior presentation and negotiation skills.
Strong management and organizational skills.
Adaptable and capable of working in fast-paced environments.
Proficient in Microsoft Word, Excel, PowerPoint, and SharePoint
Required Qualifications
Bachelor's degree in IT, Cyber Security or related field or seven years of IT work experience
Demonstrated work experience as Cyber Security Analyst in DoD or Federal government environments
Two or more years' experience performing vulnerability scans using Tenable SecurityCenter (Tenable.sc) or ACAS
Must possess appropriate DISA ESS certifications and experience.
Must be DoD 8570 certified at IAT Level 3 or higher (e.g., CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP)
Must be US citizen
Must possess active secret security clearance or higher
Must be able to pass pre-employment background check
Preferred Qualifications
Bachelor's degree in IT, IM, or Cyber Security
ACAS certification obtained within the last three (3) years, preferred
HBSS Administrator certification obtained within the last three (3) years, preferred
E-Verify:
OSC EdgeTech participates in E-Verify. We will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization.
Reasonable Accommodation:
OSC EdgeTech, LLC will provide reasonable accommodations, according to applicable state and federal laws, to all qualified individuals with physical or mental disabilities. In compliance with the ADA Amendments Act (ADAAA), if you have a disability and would like to request an accommodation in order to apply for a position with OSC EdgeTech, LLC or any of its subsidiaries, please email *******************.
Cyber Security Analyst 2
Cyber security analyst job in Birmingham, AL
+ This position provides support to the Grid Operations and Planning Research area within client Company's Research & Development. + The engineer will support projects and in time lead efforts to deploy and evaluate the performance of emerging technologies in this arena.
+ The position is focused on cyber-physical security research for Transmission and Distribution.
+ The engineer will support cyber-physical security projects with power system and cyber modeling, simulation, and analyses to identify and characterize threats, and vulnerabilities and develop mitigation approaches.
+ Data from various sources and analytics tools will be leveraged to develop models to characterize normal power system and cyber data to facilitate the identification of anomalous events.
+ Working knowledge of intrusion detection, risk assessment frameworks, databases, data structures, computer networking is required as well as an aptitude to apply engineering analysis to solve problems.
**Description:**
+ This position supports the Schatz Grid Visualization and Analytics Center (SGVAC) within client Company's Research & Development department.
+ The SGVAC is an innovation center that facilitates the research, pre-operational development and assessment and demonstration of situational awareness technologies for Transmission and Distribution.
+ Areas of focus include synchrophasor technology, next generation control center functionalities, cyber security testing, new visualization approaches, DERMS platform evaluation, data analytics as well as modeling and simulation including via a Real Time Digital Simulator (RTDS) with hardware-in-the-loop testing capability.
**Qualification Requirements**
+ Experience in cybersecurity, including cyber security modeling and simulation
+ Experience with intrusion detection and risk assessment frameworks is required
+ Experience in power system modeling and simulation
+ Experience with data analytics including machine learning required
+ Experience with computer programming (Python, C#, SQL) desired
**Job Responsibilities:**
+ Develop research plan to evaluate new technology
+ Manage multiple tasks at one time
+ Provide documentation of study assumptions and methods used to arrive at results
+ Provide informative reports and presentations on projects
+ Some overnight travel may be required but this is not extensive.
**Other Knowledge, Skills & Abilities**
+ Must demonstrate good communication skills, both internal and external to the company
+ Must have excellent organizational skills
+ Must possess analytical skills as well as the ability to manage multiple projects simultaneously
+ Must work well in a team environment
+ Must have the ability to manage your own work schedule and work with limited direction
+ Must have strong initiative - a self-starter
+ Must be great at problem solving
**Education:**
+ Bachelors in computer science, computer engineering, cyber security, information systems, electrical engineering or related field required
+ Advanced degree in EE, computer science or other related fields strongly preferred.
**About US Tech Solutions:**
US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit *********************** (*********************************** .
US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Information Security Specialist
Cyber security analyst job in Saint Louis, MO
Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers.
Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations.
For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US.
Job Description
Responsibilities:
Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios.
Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization
Qualifications
Required Skills/Experience
• 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role
• Knowledge of quantitative and qualitative risk evaluation methods
• An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance
• Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
• An ability to effectively influence others to modify their opinions, plans, or behaviors
• An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
• Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part
• An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization
• Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement
Additional Information
To set up an inerview for this position, feel free to contact:
Imran Malek
************
*******************************
Easy ApplyInformation Security Operations Analyst II
Cyber security analyst job in OFallon, MO
Our Purpose Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential.
Title and Summary
Information Security Operations Analyst II
Overview
The Security Awareness team is looking for an Information Security Operations Analyst II to drive continued improvements to the education and training offerings we have for our Mastercard colleagues. Our award winning SecurIT First program must continue to remain relevant and effective in how we keep security awareness top of mind for all employees and contingent staff.
The ideal candidate is passionate about the internal customer experience, is highly motivated, intellectually curious, analytical, and possesses an entrepreneurial mindset.
Role
In this Security Awareness position, you will:
* Liaise between the Security Awareness team and all others at Mastercard.
* Build new content and design awareness events to positively impact the security behaviors of Mastercard staff.
* Partner with external providers to deliver effectives solutions with quality and integrity.
* Manage our collaboration with the M&A Team and manage all Audit and Regulatory requests that come into our team.
All About You
The ideal candidate for this position should:
* Possess advanced knowledge in security awareness concepts and principals.
* Be comfortable meeting with business leaders to discuss and educate their teams about the desired security behaviors and how to influence and improve those behaviors.
* Be able to identify appropriate security awareness solutions to further reduce the human risk at Mastercard.
* Analyze, recognize and escalate trends in security behaviors and identify ways to improve our offerings.
* Lead vendor relationships with those providers of contract solutions for the Security Awareness program.
* A professional certification in Security Awareness is not required but highly encouraged.
Corporate Security Responsibility
Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must:
Abide by Mastercard's security policies and practices;
* Ensure the confidentiality and integrity of the information being accessed.
* Report any suspected information security violation or breach.
* Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly.
Corporate Security Responsibility
All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must:
* Abide by Mastercard's security policies and practices;
* Ensure the confidentiality and integrity of the information being accessed;
* Report any suspected information security violation or breach, and
* Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Mastercard benefits for interns generally include: 56 hours of Paid Sick and Safe Time; jury duty leave; and on-site fitness facilities in some locations.
Pay Ranges
O'Fallon, Missouri: $76,000 - $127,000 USD
Auto-Apply