Post job

Cyber Security Analyst remote jobs

- 479 jobs
  • Network Security Analyst 2 - Austin, TX (Hybrid)

    My3Tech

    Remote job

    Years Required/Preferred Experience 4 Required Experience with Linux and Windows operating systems 2 Required Experience of Vulnerability Management and Proficiency with Vulnerability Management tools 2 Required Understanding of networking concepts 2 Required Knowledge of Cybersecurity Frameworks such as NIST, ISO, or PCI. 2 Required Understanding of the MITRE ATT&CK framework 2 Required Ability to comprehend technical infrastructure, cloud computing, third-party dependencies and managed services 3 Preferred Degree in cybersecurity, computer science or related field 3 Preferred Experience with Red Hat Enterprise Linux (RHEI) administration, and Microsoft Active Directory and Group Policy 3 Preferred Experience with vulnerability management in cloud platforms such as AWS or Azure 3 Preferred Experience with Tenable/Qualys; JavaScript or PowerShell 3 Preferred Experience with ServiceNow dashboards 3 Preferred Ability to make actionable recommendations for discovered vulnerabilities 3 Preferred Ability to convey technical concepts clearly to both technical and non-technical audiences 3 Preferred Strong written skill for creating documentation and executive summaries
    $67k-91k yearly est. 1d ago
  • Nuclear Cyber Security Engineer - REMOTE

    JSG (Johnson Service Group, Inc.

    Remote job

    IF YOU DO NOT HAVE THE REQUIRED BACKGROND IN THE U.S. COMMERCAL NUCLEAR INDUSTRY, PLEASE DO NOT APPLY. Immediate opening for a Cyber Security Engineer with commercial nuclear background, to perform design modifications (involving digital upgrades) as well as preparing cyber assessments on those digital components. Prefer direct/perm hire, will consider contract. This person will be the go-to individual for Cyber related projects. Must be familiar with NEI-08-09, EPRI graded approach, have digital mod experience, and extensive understanding of plant SSC (Safety Classification of Structures, Systems, and Components). Site Cyber qualifications to perform CSAT (Cyber Security Assessment Team) would be a plus. Compensation based on experience, but likely in the 140K-$160K range. JSG offers medical, dental, vision, life insurance options, short-term disability, 401(k), weekly pay, and more. Johnson Service Group (JSG) is an Equal Opportunity Employer. JSG provides equal employment opportunities to all applicants and employees without regard to race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, marital status, protected veteran status, or any other characteristic protected by law. #D650
    $160k yearly 5d ago
  • Mid Level Systems Security Analyst

    Blu Omega 4.1company rating

    Remote job

    Blu Omega is looking for a Mid-Level Systems Security Analyst to support a program at NIH. Join our elite cybersecurity team supporting the National Institutes of Health (NIH) and play a vital role in safeguarding national health data. As a System Security Analyst, you'll be at the forefront of protecting critical systems by monitoring, analyzing, and strengthening cybersecurity defenses in a high-stakes, enterprise-level environment. This is your chance to contribute to a mission-driven, fully remote setting, ensuring compliance with federal standards such as HHS, DHS CISA, and FISMA, while utilizing your expertise to make a real-world impact. Location: 100% Remote Shift work hours: Must be flexible and able to work (2nd and 3rd Shift Opportunities: 4 PM - 12 AM EST / 12 AM - 8 AM EST) Clearance: NIH Public Trust Responsibilities: Continuously monitor and analyze system security to identify vulnerabilities, threats, and potential breaches. Conduct risk assessments and system audits to uncover security gaps. Recommend and implement mitigation strategies to enhance system security. Collaborate with IT and cybersecurity teams to embed security best practices into architecture and operations. Keep up-to-date with emerging cyber threats and adjust security measures proactively. Support 24/7 cybersecurity operations to ensure ongoing detection, response, and protection in compliance with federal standards. Required Skills: 2+ years of experience in cybersecurity, with a focus on system security analysis. Strong knowledge of cybersecurity principles, threat intelligence, and vulnerability management. Hands-on experience with monitoring tools like Splunk and endpoint security solutions such as Microsoft Defender. Familiarity with incident response and intrusion detection techniques. Understanding of federal cybersecurity frameworks including FISMA and NIST. Excellent analytical, problem-solving, and communication skills. Ability to operate independently in a remote setting and collaborate with diverse teams. Nice to Have Skills: Certifications such as CISSP, CISA, or Security+ are highly advantageous. Experience supporting government agency IT operations, especially within health or federal environments. Knowledge of security architecture, system virtualization, and multi-cloud environments. Familiarity with Tenable, DBProtect, and advanced threat detection methods is a plus. Other Requirements: Ability to work on 2nd or 3rd shift (4 PM - 12 AM EST or 12 AM - 8 AM EST). Must be able to obtain and maintain NIH Public Trust clearance. If you're ready to elevate your cybersecurity career and contribute to national health security, we want to hear from you. Apply now to become a key player in federal cybersecurity operations and help protect critical health data at the highest levels!
    $75k-103k yearly est. 3d ago
  • Epic Cadence & Security Analyst

    Onpoint Search Consultants 4.2company rating

    Remote job

    What you will find ... 100% REMOTE exceptional benefits (pension plan options) top ranked hospital in the U.S. What you will do ... design & build Epic Cadence build Epic Security break-fix & support Epic Cadence & Security optimize Decision Tree for scheduling liaison with operational stakeholders Wish list ... 5+ years Epic Cadence & Security build REQUIRED Epic Cadence Certification REQUIRED Epic Security Certification recent Epic Security work Decision Tree a plus
    $80k-116k yearly est. 3d ago
  • Smart Contract Security Engineer

    Techchain Talent

    Remote job

    Our client is building the infrastructure for a more trustworthy internet. We are looking for a Smart Contract Security Engineer. In this role, you wont just audit code, you'll shape the security model for high-value protocols and safeguard the trust of an entire ecosystem. You'll work at the intersection of cutting-edge research, high-stakes engineering, and adversarial thinking, building defences for decentralized systems. This is a full-time position, fully remote or located with our primarily Seattle-based team. What You Will Do Lead design and security reviews of complex staking, reward distribution, and protocol contracts Build tooling, fuzzers, and formal verification pipelines to identify vulnerabilities before attackers do Collaborate directly with protocol researchers and engineers to harden new features from inception Read, interpret, and refine formal verification specifications to ensure they capture critical security properties Work closely with product and leadership teams to set on-chain strategy and roadmaps This is a unique opportunity to create a new paradigm of permissionless innovation and have outsized impact on the protocol and broader ecosystem. What You Will Bring Deep understanding of blockchain fundamentals, EVM, and common vulnerabilities Experience with developer tools for smart contract development (e.g., Hardhat, Foundry) Passion for collaborating with developers, security auditors, and stakeholders Strong testing skills and experience with testing frameworks for smart contracts Experience with production deployments of non-trivial protocols and associated security audits Ability to collaborate with cross-functional and geographically remote teams For more information, please contact **************************
    $97k-136k yearly est. 1d ago
  • Security Analyst III - Hybrid

    Charles Schwab 4.8company rating

    Remote job

    Regular Your opportunity At Schwab, you're empowered to make an impact on your career. Here, innovative thought meets creative problem solving, helping us “challenge the status quo” and transform the finance industry together. We believe in the importance of in-office collaboration and fully intend for the selected candidate for this role to work on site in the specified location(s). The Access Management department is responsible for provisioning and securing user and privileged access to our core applications and systems in both the distributed and mainframe environments for all Schwab internal users. This includes Active Directory, Exchange, TSO/Beta, SecurID, VAS enabled UNIX, Remedy, and a variety of other Schwab Business applications. We also provide technical support for access control issues for Schwab global-wide production systems. In addition the team implements security controls and interacts with auditors and regulators to provide evidence of access compliance. The information security analyst will be primarily responsible for administration of high risk business applications across a variety of technology platforms. These administrative tasks may require coordination with outside vendors and/or configuration of user accounts on Windows, Unix, mainframe, or SQL and Oracle environments. What you'll do: This position administers access and provides support for Schwab-wide production systems in compliance with Information Security, Privacy and SOX policies and procedures. This position also partners regularly with internal business partners to design service delivery processes. Responsible for administering access, maintaining documentation and troubleshooting access issues specifically for High Risk Business applications. Work both independently and within teams to complete work with minimum supervision, and strong customer service, written and verbal communication skills are required. Develop and enhance automated solutions. What you have A bachelors in Computer Science or related technical area and/or 4-6 years of experience with multiple operating systems, including Windows, Unix, and Mainframe systems. Develop in Power BI, UI Path or Power Automate Experience administering access for multiple applications simultaneously. Experience documenting work procedures required. Strong analytical, technical and communication skills are required. Experience with systems account creation, modification and removal is required. Experience analyzing complex business and system requirements Demonstrated the ability to work both independently and within teams Ability to partner with small teams in technical tasks. Ability to anticipate technical issues that require resolution for success. Ability to interface with business / technology partners on projects. Demonstrated ability to achieve success on large complex initiatives Experience with Remedy or other service management ticketing tooling desired. Knowledge of IT Security concepts and Access Management principles desired. Be driven to expand your technical capabilities and experiences outside of your day-to-day tasks. What's in it for you At Schwab, you're empowered to shape your future. We champion your growth through meaningful work, continuous learning, and a culture of trust and collaboration-so you can build the skills to make a lasting impact. Our Hybrid Work and Flexibility approach balances our ongoing commitment to workplace flexibility, serving our clients, and our strong belief in the value of being together in person on a regular basis. We offer a competitive benefits package that takes care of the whole you - both today and in the future: 401(k) with company match and Employee stock purchase plan Paid time for vacation, volunteering, and 28-day sabbatical after every 5 years of service for eligible positions Paid parental leave and family building benefits Tuition reimbursement Health, dental, and vision insurance
    $78k-105k yearly est. Auto-Apply 2d ago
  • Offensive Cyber Analyst / Programmer 2

    Lockheed Martin 4.8company rating

    Remote job

    may be eligible for up to a $25K sign on bonus for external hires! What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. You'll develop innovative offensive cyber capabilities that help protect the nation and the world. Cyber | Lockheed Martin Who we are: Ready to make a real impact in the world of cybersecurity? Join Lockheed Martin Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetration testing - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. The Work: A CNO (Computer Network Operations) offensive cyber professional can be described as a "cyber warrior," harnessing their expertise in computer systems and networks to disrupt and disable adversary capabilities. Alternatively, they can be referred to as a "digital operator," skillfully navigating the virtual battlefield to achieve strategic objectives. They can also be characterized as "cyber operatives," leveraging their knowledge of cybersecurity and computer networks to conduct operations and gather critical intelligence. We are hiring for a variety of roles including vulnerability analysts, exploit developers, hardware/software reverse engineers, offensive cyber tool developers, embedded developers, and cyber researchers. We want your expertise in traditional computing (Windows/Linux/MacOS), mobile technology (Android/iOS), wireless technology, IoT, ICS/SCADA, enterprise technologies, and special-purpose embedded and real-time systems. Come join a company with incredible breadth and depth in the nature of programs and technologies we support that will never leave you bored or looking for your next assignment. Why Join Us: Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work. Learn more about Lockheed Martin's competitive and comprehensive benefits package. We support our employees, so they can support our mission. This position is participating in our External Referral Program. If you know somebody who may be a fit, click here to submit a referral. If your referral is hired, you'll receive a $3000 payment! code-extrefer #RMSCYTJ #RMSC6ISR #OneLMHotJobs #RMSTG2025 #RMSTG2026 Basic Qualifications • Candidate must possess active US security clearance with a polygraph • 8+ years overall experience • Bachelor of Science in Math, Science, Engineering, Statistics, Engineering Management, or related discipline. May substitute an additional four years' experience in lieu of a Bachelor's Degree. Masters degree may substitute for additional 2 years experience. • Experience programming in Assembly, C, C++, or Python • Experience with Offensive Cyber Tools and Techniques Desired skills • 6+ years desired of USG offensive cyber experience. • Experience using network sockets programming including developing packet-level programs, expert packet-level understanding of IP, TCP, and application-level protocols Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. * At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Other Important Information By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to work remotely Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedule Information Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Security Clearance Information This position requires a government security clearance, you must be a US Citizen for consideration. Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $93,200 - $164,450. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $107,300 - $185,840. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. This position is incentive plan eligible.
    $107.3k-185.8k yearly 48d ago
  • Cyber Security Analyst - Cyber Security Certification Manager

    Techximius

    Remote job

    Tech(x) is an energized company with experienced, specialized and progressive thought leaders progressing talented professionals in areas of technology, security, logistics, project management, talent management and procurement. We are building our DoD and technology footprint by allowing hybrid and remote work locations, as well as flexible schedules. As a solution-based company, we foster a creative environment that welcomes new perspectives from all of our team members. This is a pivotal position for our team; internal and external customers, who is focused on supporting the program and its growth. Responsibilities This position supports a DEVCOM lab under NSA and requires cyber security SME level oversight in certifying lab policies, and procedures for cyber security industry level standards. Implement security measures and monitor networks. Identify, interpret, and evaluate major applications, infrastructure, enclaves, and Enterprise system environments based on proposed accreditation boundaries. Establish and publish upon approval Cybersecurity policies and Standard Operating Procedures (SOPs) as required to include Quality control process documentation. Coordinating with third party certification labs. Assist in the maintainability of a Continuous Monitoring Strategy and Program to maintain information system networks for operational testing Work with Engineers and COMSEC SME to assess security levels for projects. Performing certification audits, at internally and at assembly facilities. Sample coordination and submissions. Update of online certification website. Must be able to participate in testing, and contribute towards solutions when problems arise, at third party certification agencies. This position does not have direct reports or supervisory responsibilities. All other duties assigned. Qualifications Experienced debriefer. Have excellent communications, teamwork, leadership and conflict management skills. Knowledge of computer applications software. Can identify and communicate risks and provide mitigation strategies. Ability to enter data accurately into databases. Ability to write routine reports and correspondence. Interpersonal skills are necessary to work effectively and cooperatively with all levels of management and staff. Must possess effective oral and technical written communication skills to clearly communicate information to others. Must be proficient in applying Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) and or Security Requirements Guide (SRG) checklist to various devices within an Information System Preferred Qualifications ISSP certified. DoD contract experience. Experience with the Army's cryptographic programs. COMSEC training and or experience. Certified as a Certified Information System Security Professional (CISSP) Military trained and a Veteran. DoD TS/SCI w/poly Clearance. Certified Information Systems Auditor (CISA) Clearance: Active DoD TS/SCI clearance. Education & Experience: Bachelor's degree in Cyber Security, Computer Science, Engineering or other closely related field. 4-9 years of cyber security experience. Location: Linthicum Heights, Maryland. Monday-Friday 8:00 am to 5:00 pm. Schedule flexing (starting and ending times) is available with the PM's approval. Travel: Some travel. Join the Team: Tech(x) is a customer centric team, both external and internal customers. This team supports each other to be successful on the job and in meeting the mission. Tech(x) is an Equal Opportunity Employer.
    $75k-101k yearly est. Auto-Apply 7d ago
  • Cyber Security Analyst - Incident Response

    Manpowergroup 4.7company rating

    Remote job

    Our client, a leading organization in the energy industry, is seeking a Cyber Security Analyst - Incident Response to join their team. As a Cyber Security Analyst - Incident Response, you will be part of the Cyber Defense team supporting enterprise-wide security operations. The ideal candidate will demonstrate analytical thinking, resilience, and collaborative skills, which will align successfully in the organization. **Job Title:** Cyber Security Analyst - Incident Response **Location:** Remote **Pay Range: $65-68/hr** **What's the Job?** + Support the identification, containment, eradication, and recovery of sophisticated level 2/3 cyber incidents. + Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve security incidents. + Analyze log files from various sources to identify potential threats and vulnerabilities. + Perform cyber defense incident triage, including scope determination and impact assessment, and recommend remediation strategies. + Track and document cyber defense incidents from initial detection through resolution, ensuring comprehensive reporting and artifact collection. **What's Needed?** + 8+ years of experience in a cyber defense role or 4+ years with a relevant bachelor's degree. + Proficiency with EDR tools, Splunk, and experience with ESAs, sandboxing, and malware analysis tools. + Strong understanding of network principles and the cyber incident lifecycle. + Experience supporting incident response processes and coordinating with third-party vendors and internal teams. + Preferred certifications include GCIH, GSEC, GCIA, GCFE, or capture the flag experience. **What's in it for me?** + Opportunity to work with a Fortune 200 company in a dynamic and impactful role. + Remote work flexibility to support work-life balance. + Engagement in cutting-edge cyber defense techniques and trend analysis. + Collaborative environment fostering professional growth and development. + Contributing to the security of critical energy infrastructure. **Upon completion of waiting period consultants are eligible for:** + Medical and Prescription Drug Plans + Dental Plan + Vision Plan + Health Savings Account + Health Flexible Spending Account + Dependent Care Flexible Spending Account + Supplemental Life Insurance + Short Term and Long Term Disability Insurance + Business Travel Insurance + 401(k), Plus Match + Weekly Pay If this is a role that interests you and you'd like to learn more, click apply now and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you! **About ManpowerGroup, Parent Company of: Manpower, Experis, Talent Solutions, and Jefferson Wells.** _ManpowerGroup (NYSE: MAN), the leading global workforce solutions company, helps organizations transform in a fast-changing world of work by sourcing, assessing, developing, and managing the talent that enables them to win. We develop innovative solutions for hundreds of thousands of organizations every year, providing them with skilled talent while finding meaningful, sustainable employment for millions of people across a wide range of industries and skills. Our expert family of brands -_ **_Manpower, Experis, Talent Solutions, and Jefferson Wells_** _- creates substantial value for candidates and clients across more than 75 countries and territories and has done so for over 70 years. We are recognized consistently for our diversity - as a best place to work for Women, Inclusion, Equality and Disability and in 2023 ManpowerGroup was named one of the World's Most Ethical Companies for the 14th year - all confirming our position as the brand of choice for in-demand talent._ ManpowerGroup is committed to providing equal employment opportunities in a professional, high quality work environment. It is the policy of ManpowerGroup and all of its subsidiaries to recruit, train, promote, transfer, pay and take all employment actions without regard to an employee's race, color, national origin, ancestry, sex, sexual orientation, gender identity, genetic information, religion, age, disability, protected veteran status, or any other basis protected by applicable law.
    $65-68 hourly 29d ago
  • Cyber Analyst, Digital Forensics Incident Response

    at-Bay 4.7company rating

    Remote job

    Why you should join our At-Bay Security team: At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to expand our DFIR team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers. The Role: Cybersecurity Analysts focused on Digital Forensics and Incident Response (DFIR) deliver incident investigation and response services to At-Bay insureds via: Forensically sound collection, transmission, and storage of digital evidence Analysis of digital evidence to identify indicators of compromise and adversary activity Development of incident timelines and theories of compromise Identification of incident root causes Participation in threat actor negotiations as necessary (e.g., ransom negotiations, etc.) Participation in incident recovery (e.g., restoration of data from backups, reimaging workstations and servers, rebuilding network infrastructure, etc.) activities as necessary Development and delivery of incident reports to document key incident details for engagement stakeholders including executive leaders for insureds, breach coach attorneys, and At-Bay claims management staff as necessary Development and delivery of recommendations to mitigate the risk of future incidents for impacted insureds Development and delivery of incident response training and simulations for targeted insureds Key skills: Previous digital forensics and incident response experience Strong oral and written communication skills Previous hands-on experience performing digital forensics and incident response, including several of the following: Business Email Compromise Ransomware Digital evidence collection and analysis Development and analysis of cyber threat intelligence Leadership of or participation in investigations involving digital evidence Intrusion detection / cyber threat hunting Malware analysis Incident recovery activities such as restoration of data from backups, operation of decryptor tools, etc. Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.) Minimum requirements: Bachelor's degree or equivalent Minimum of 2 years of experience in cybersecurity operations, incident response, incident recovery, or another security discipline Willingness to travel as needed to perform job functions Preferred requirements: Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity Previous background in law enforcement or government/military with experience leading complex technical investigations Knowledge of cloud environments, including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google) Experience in a top-10 cyber consulting firm or leading DFIR provider preferred One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.) Work location: USA, Nationwide Fully Remote Our estimated base pay range for this role is $80,000-$115,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent. #LI-CK1
    $80k-115k yearly Auto-Apply 60d+ ago
  • Cyber Security Analyst II (Remote)

    Ntirety, Inc.

    Remote job

    is remote and can be performed from anywhere in the United States. Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions. KEY RESPONSIBILITIES: * Act as the primary point of escalation for Cyber Security Analyst I technicians * Provides coaching to Cyber Security Analyst I employees on how to perform their duties * Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats * Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole * Performs all of the following functions of a Cyber Security Analyst I, with proficiency * Monitor computer networks for security issues and respond accordingly, including: * Creating/Managing firewall rules * Managing anti-virus endpoint tools * Performing event correlation analysis on potential threats identified through our SIEM * Configuring/Managing log management * Configuring/Managing file integrity monitoring * Performing vulnerability scans and remediation of identified risks * The methodology & analysis of identifying compromised servers * Performing rule tuning in our SIEM for improved detection capabilities * Interact with customers by phone, chat, or trouble ticket on any customer facing security issues * Investigate, document and assess security breaches and other cyber security incidents * Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs * Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives * Identify and fix detected vulnerabilities to maintain a high-security standard * Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities * May be relied upon as a technical point of contact during Escalated Events relating to security * Review, investigate and respond to any external "abuse" complaints coming from our IP space * Develop best practices for IT security * Research security enhancements and make recommendations to management * Handle escalated internal or customer security issues from support or another operations team * Takes part in any security-oriented projects or critical initiatives * Stay up to date on information technology & security news, trends and standards * Deliver an exceptional customer experience every day * Other duties as identified or assigned DESIRED ROLE OUTCOMES: * Keep us and our customers free from security incidents but respond capably when one occurs * Our detection of security threats is continually improving * Provide valuable insights and visibility around security incidents to our customers * Have a staff of customer focused, energetic and security savvy team members REQUIRED SKILLS: * A minimum of 2 years' experience in a security analyst role * Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred * Must have experience in a Security Operations Center (SOC) * Must have technical troubleshooting and problem-solving skills * Understanding of network management principles * Experience in systems administration of Windows and Linux based operating systems * Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies * Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts * Ability to identify and mitigate network vulnerabilities and explain how to avoid them * Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact * Ability to learn and communicate technical information to non-technical people * Must have excellent written & oral communication skills, and strong interpersonal skills * Must emulate the Ntirety Values in all that they do Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA). Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law. Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
    $76k-102k yearly est. 60d+ ago
  • Cyber Security Analyst II

    Cybersheath 3.7company rating

    Remote job

    Job Description CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cyber Security Analyst to our Security Operations team! CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security. Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory. Job Overview The Cyber Security Analyst II is responsible for advanced security incident triage, investigation, and response across Microsoft 365, Azure, and on-premises infrastructure. Serves as the escalation point for complex security incidents while implementing containment and remediation procedures in hybrid environments. Key Responsibilities Investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel Conduct security assessment of Azure/Microsoft 365 configurations and implement hardening recommendations Analyze and respond to advanced Active Directory attacks (Kerberoasting, Pass-the-Hash, Golden Ticket) Monitor and investigate Exchange Server logs, email flow patterns, and phishing campaigns Analyze federation security including ADFS token-based attacks and SAML token manipulation Configure and tune WAF/firewall rule sets and investigate related security incidents Develop network segmentation strategies and identify lateral movement attempts Develop and maintain incident response playbooks for various attack scenarios Coordinate incident response activities with cross-functional teams Required Qualifications 3-5 years in cybersecurity with 2+ years SOC experience Deep knowledge of hybrid Microsoft environments (Microsoft 365, Azure, on-premises AD) Experience with SIEM platforms and security monitoring tools Scripting proficiency (PowerShell, Python) Strong analytical and communication skills Microsoft Certified: Security Operations Analyst (SC-200) One additional security certification: EC-Council CSA, CompTIA Security+, or similar Preferred Qualifications Microsoft Certified: Azure Security Engineer (AZ-500) Microsoft Certified: Identity and Access Administrator (SC-300) CrowdStrike Certified Falcon Responder (CCFR) or equivalent EDR certification CISSP, SSCP, CCSP Skills & Expertise Strong Proficiency with Microsoft Defender suite (Endpoint, Office 365, Identity, Cloud Apps) Azure Sentinel KQL query development and alert configuration Azure AD/Entra ID security configuration and attack path analysis Active Directory security assessment including GPOs, trust relationships, and delegation Email security and phishing detection/response Cloud security posture management Incident handling and digital forensics Threat intelligence analysis and implementation Work Environment CyberSheath is a fully remote organization, and this will be a work-from-home position The schedule for this role is: Week One: Friday - Sunday 8:00 AM - 8:00 PM Week Two: Friday - Monday 8:00 AM - 8:00 PM Travel requirements: 0-5% yearly. Please note that this role will be part of our SOC on-call rotation CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability. Budgeted Pay Range$70,000-$100,000 USD
    $70k-100k yearly 14d ago
  • Cyber Threat Fusion Analyst

    Beyond SOF

    Remote job

    The client is looking for a Cyber Threat Fusion Analyst. This position will support the Joint Service Provider (JSP) Defensive Cyber Operations (DCO) organization with Cyber Threat Intelligence products and network security monitoring and will perform as the analyst in area of cyber threat intelligence. This role will be based onsite at the Mark Center in Alexandria, VA. Some remote work will be allowed. An active TS/SCI security clearance is required prior to start. Essential Job Functions Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats. Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections. Identify threat actor tactics, techniques and procedures and based on indicators develops custom signatures and blocks. Understand concepts of log and packet analysis Navigate the command line using specific expressions to manipulate data Handle and organize disparate data about detections, attacks, and attackers Employ discovery techniques and vetting of new intelligence. Create Situational Awareness Reports and Threat Briefs. Minimum Required Qualifications Due to the nature of this position and the information that employees will be required to access, U.S. Citizenship is required. Bachelor's Degree in Computer Science, Computer Engineering or related field and 8+ years of prior relevant experience; additional years of experience may be substituted in lieu of a degree. Computer defense technologies spanning endpoint, network, and open source. Required Security Clearance: TS/SCI. 8570 IAT II certification is required prior to start. It is preferred you will already possess an 8570 CSSP-Analyst certification. If not, it will be required for this to be obtained within 6 months of your start date.
    $74k-100k yearly est. 60d+ ago
  • Cyber Security Analyst

    Military, Veterans and Diverse Job Seekers

    Remote job

    Responsibilities: Investigate security incidents and escalate when necessary Work Incident Response and Administrative tickets Perform and develop data mining queries using Splunk/Splunk ES Communicate in a clear and concise manner with Leadership, Customers and Peers Monitor and respond to multiple shared Mailbox inquiries Provide vulnerability, threat, and risk mitigation support Monitor Security Operations Dashboards for alerts Support daily Operations briefings Monitor and answer the SOC phone hotline Support customer defined metrics reports Support government data calls This opportunity offers remote work! Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting) Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
    $74k-100k yearly est. 60d+ ago
  • Global Cyber Wordings Analyst

    Liberty Mutual 4.5company rating

    Remote job

    Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience. Key responsibilities: Wording library and drafting support Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes. Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards. Track version control, change logs, approvals, and archiving; Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance. Commercial enablement Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently. Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives. Triage wording queries from regions; track SLAs and referral approvals per the global governance framework. Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards. Regulatory and legal stewardship Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions. Maintain audit-ready documentation; assist with regulatory filings or attestations where required. Claims partnership and feedback loop Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty. Support coverage position letters and documentation packs with research, citations, and clause histories. Innovation and product development support Help draft prototype wordings for new propositions Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses. Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics. Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders. Qualifications Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience. 2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred. Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail. Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous. Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates. Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools. Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs. Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting. About Us Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role. At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve. We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: *********************** Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law. Fair Chance Notices California Los Angeles Incorporated Los Angeles Unincorporated Philadelphia San Francisco We can recommend jobs specifically for you! Click here to get started.
    $76k-99k yearly est. Auto-Apply 35d ago
  • Cyber Security Analyst II (Remote)

    Hostway 4.6company rating

    Remote job

    is remote and can be performed from anywhere in the United States. Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions. KEY RESPONSIBILITIES: Act as the primary point of escalation for Cyber Security Analyst I technicians Provides coaching to Cyber Security Analyst I employees on how to perform their duties Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole Performs all of the following functions of a Cyber Security Analyst I, with proficiency Monitor computer networks for security issues and respond accordingly, including: Creating/Managing firewall rules Managing anti-virus endpoint tools Performing event correlation analysis on potential threats identified through our SIEM Configuring/Managing log management Configuring/Managing file integrity monitoring Performing vulnerability scans and remediation of identified risks The methodology & analysis of identifying compromised servers Performing rule tuning in our SIEM for improved detection capabilities Interact with customers by phone, chat, or trouble ticket on any customer facing security issues Investigate, document and assess security breaches and other cyber security incidents Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives Identify and fix detected vulnerabilities to maintain a high-security standard Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities May be relied upon as a technical point of contact during Escalated Events relating to security Review, investigate and respond to any external “abuse” complaints coming from our IP space Develop best practices for IT security Research security enhancements and make recommendations to management Handle escalated internal or customer security issues from support or another operations team Takes part in any security-oriented projects or critical initiatives Stay up to date on information technology & security news, trends and standards Deliver an exceptional customer experience every day Other duties as identified or assigned DESIRED ROLE OUTCOMES: Keep us and our customers free from security incidents but respond capably when one occurs Our detection of security threats is continually improving Provide valuable insights and visibility around security incidents to our customers Have a staff of customer focused, energetic and security savvy team members REQUIRED SKILLS: A minimum of 2 years' experience in a security analyst role Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred Must have experience in a Security Operations Center (SOC) Must have technical troubleshooting and problem-solving skills Understanding of network management principles Experience in systems administration of Windows and Linux based operating systems Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts Ability to identify and mitigate network vulnerabilities and explain how to avoid them Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact Ability to learn and communicate technical information to non-technical people Must have excellent written & oral communication skills, and strong interpersonal skills Must emulate the Ntirety Values in all that they do Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA). Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law. Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
    $79k-102k yearly est. Auto-Apply 60d+ ago
  • Senior Information Security Risk Specialist (GRC)

    Unveiling Opportunities

    Remote job

    About Us At SentinelOne, we're redefining cybersecurity by pushing the limits of what's possible-leveraging AI-powered, data-driven innovation to stay ahead of tomorrow's threats. From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We're looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you're excited about solving complex challenges in bold, innovative ways, we'd love to connect with you. What are we looking for? We are looking for a highly motivated, collaborative and experienced Senior InfoSec Risk Specialist with a security-focused mindset who can balance risk, business drivers and timelines. This position will be responsible for understanding and supporting the design of SentinelOne's organizational, procedural and technological security controls within the context of the security frameworks applicable to SentinelOne. In addition, you will be responsible for identifying and testing appropriate controls to ensure they are designed, implemented, and operating effectively to mitigate risk. The selected employee will help implement, automate, document and maintain controls while supporting and responding to inquiries from internal and external stakeholders. This individual must be self-directed and be able to work independently and collaboratively. What will you do? Support the planning and performance of IT risk-based security audits and projects, risk assessments, execution of fieldwork and communication to stakeholders. Help in evaluating relevant global standards, compliance frameworks and regulations to analyze existing controls; identify areas for improvement; and design control growth. Collaborate with process and control owners through the audit lifecycle for process documentation updates, testing coordination, remediation of identified deficiencies and advising on internal control enhancements or process changes, as appropriate. Proactively manage audit findings, tracking and documentation of status updates obtained via action owners, and timely execution of remediation activities. Participate in internal security and compliance programs and track recurring controls, such as SSAE 18 SOC 2, ISO 27001/27002. Provide control consultative support to the business to assist in redesign efforts to improve the control environment and identify opportunities for control improvements with the objective of mitigating risk and improving compliance and operational performance. Help support internal/external audits and evidence collection via a GRC tool. Document new and update existing policies, procedures, standards and resources Participate in Security awareness program, train personnel on data security and privacy-related processes and responsibilities. Help support customer security reviews, RFPs and external security and privacy inquiries. Participate in defining, collecting and tracking various Security Metrics. What skills and experience should you bring? 5+ years of experience working in information security, risk or compliance. Experience working with Security Controls across at least some of the following domains: Access Management, Encryption, Risk Management, Network Security, Configuration Management, Patch Management, Change Management, Awareness and Training, BC/DRP, etc. Ability to perform internal audits with minimal direct supervision, exhibit professional audit judgment and have experience in a broad range of audit projects such as SSAE 16/18 SOC 2, ISO 27001/2, NIST. Strong risk management experience, performing assessments and audits, designing controls, managing enterprise control frameworks, and prioritizing risk. Strong project management skills and ability to manage a variety of projects simultaneously to completion within the agreed timelines. Excellent collaboration and interpersonal skills. Must be able to communicate with all levels in the organization. Ability to communicate effectively, in writing and verbally, to target audiences, including customers, partners, auditors, executive management, vendors, and peers. Experience working with both technical and non-technical teams. Ability and desire to understand the intent of requirements and provide effective recommendations. Ability to prioritize in a highly dynamic work environment. Our Preferred Qualifications: Advanced degree in computer science, Information Technology, Information Security or related field. Experience with, and strong understanding of common Security Compliance frameworks, controls, and best practices such as COSO, SOC 2, SOX ITGC, ISO 27001/27002, GDPR, PCI, NIST and other applicable regulatory compliance frameworks. Relevant certifications (ISO 27001 LA/LI, CISA, CISM, CISSP, CRISC, etc.) Ability to assess and pragmatically define scope and relevant controls. Strong desire to learn and continuously develop and deepen technical skills. Why us? You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry. Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA Unlimited PTO Industry-leading gender-neutral parental leave Paid Company Holidays Paid Sick Time Employee stock purchase program Disability and life insurance Employee assistance program Gym membership reimbursement Cell phone reimbursement Numerous company-sponsored events, including regular happy hours and team-building events This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply. If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions. Base Salary Range$104,000-$138,000 USD SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. SentinelOne participates in the E-Verify Program for all U.S. based roles.
    $104k-138k yearly Auto-Apply 33d ago
  • Senior Information Security Specialist-SECRET CLEARANCE REQUIRED

    Latitude Inc.

    Remote job

    Primary Responsibilities: Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization. Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation. Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts. Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment. Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats. Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps. Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment. Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures. Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance. Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments. All other duties as assigned by management. Qualifications Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education. Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies. Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS). Minimum of (5) years of experience with Security Information and Event Management (SIEM). Minimum of five (5) years of experience in the risk management framework. Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases. Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred. Must have an active DoD Secret Clearance.
    $82k-116k yearly est. Auto-Apply 60d+ ago
  • Remote Pre-Sales Security Systems Engineer - Access Control & CCTV

    Kastle Systems 3.6company rating

    Remote job

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. Responsibilities * Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure. * Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings. * Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. * Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses. * Create solution design documentation (drawings, BOMs, solution design summaries). * Provide technical support for in-office and on-site team members. * Support management in the process of creating documentation for implementing new technology with new and existing customers. * Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors. Qualifications * A minimum of 3-7 years previous experience in the industry. * Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background. * Experience in the design and planning of access control and video systems. * Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred. Company Overview This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: *********************************************************************************************************************************************************************************** Equal Opportunity Statement We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
    $100k-140k yearly est. Auto-Apply 20d ago
  • Information Security Controls Analyst

    United Community Bank 4.5company rating

    Remote job

    United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization. What You'll Do * Review and document the adequacy of security and technology controls across business and IT environments. * Evaluate control posture through interviews, documentation reviews, and workflow analysis. * Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls. * Partner with risk management and security leadership to align controls with organizational risk tolerance. * Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance. * Document and advocate for control improvements that balance risk with operational efficiency. * Support control development across testing, QA, and production environments. * Present control effectiveness reports to senior risk leadership. * Stay current on regulatory requirements, internal policies, and industry best practices. Requirements For Success Experience: * 3+ years in cybersecurity or IT practitioner roles. * 2+ years in IT risk or controls analysis. * Practical experience with risk management and IT control frameworks. Education: Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field. Required Skills: * Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST). * Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA). * Experience with CIS CSC, ISO 2700, or NIST CSF. * Excellent written and verbal communication across all organizational levels. * Strong organizational skills and ability to meet SLAs. * Sound judgment and decision-making in complex scenarios. * High integrity, trustworthiness, and adaptability. Preferred Skills: * Certifications such as CISSP, CISA, CRISC, or CISM. * Technical experience with enterprise networks, applications, and directory services. * Familiarity with enterprise GRC platforms. Conditions of Employment * Must be able to pass a criminal background & credit check * This is a full-time, non-remote position FLSA Status: * Exempt We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Pay Range USD $49,972.00 - USD $76,958.00 /Yr.
    $50k-77k yearly 40d ago

Learn more about cyber security analyst jobs

Work from home and remote cyber security analyst jobs

Nowadays, it seems that many people would prefer to work from home over going into the office every day. With remote work becoming a more viable option, especially for cyber security analysts, we decided to look into what the best options are based on salary and industry. In addition, we scoured over millions of job listings to find all the best remote jobs for a cyber security analyst so that you can skip the commute and stay home with Fido.

We also looked into what type of skills might be useful for you to have in order to get that job offer. We found that cyber security analyst remote jobs require these skills:

  1. Incident response
  2. Windows
  3. Siem
  4. Dod
  5. Linux

We didn't just stop at finding the best skills. We also found the best remote employers that you're going to want to apply to. The best remote employers for a cyber security analyst include:

  1. Sentara Healthcare
  2. Logistics Management Institute
  3. Lockheed Martin

Since you're already searching for a remote job, you might as well find jobs that pay well because you should never have to settle. We found the industries that will pay you the most as a cyber security analyst:

  1. Automotive
  2. Health care
  3. Technology

Top companies hiring cyber security analysts for remote work

Most common employers for cyber security analyst

RankCompanyAverage salaryHourly rateJob openings
1NOVA Chemicals$99,364$47.770
2Center for Internet Security$94,561$45.460
3ICONMA$94,334$45.351
4Innovative Emergency Management$92,688$44.560
5Motion Recruitment$91,518$44.0011
6Jack Henry & Associates$90,188$43.368
7Huntington Ingalls Industries$89,611$43.0832
8SAIC$87,765$42.1925
9IT Concepts$85,470$41.090
10Lockheed Martin$81,683$39.27147

Browse computer and mathematical jobs