Epic Cadence & Security Analyst
Remote job
What you will find ...
100% REMOTE
exceptional benefits (pension plan options)
top ranked hospital in the U.S.
What you will do ...
design & build Epic Cadence
build Epic Security
break-fix & support Epic Cadence & Security
optimize Decision Tree for scheduling
liaison with operational stakeholders
Wish list ...
5+ years Epic Cadence & Security build
REQUIRED Epic Cadence Certification
REQUIRED Epic Security Certification
recent Epic Security work
Decision Tree a plus
Nuclear Cyber Security Engineer - REMOTE
Remote job
IF YOU DO NOT HAVE THE REQUIRED BACKGROND IN THE U.S. COMMERCAL NUCLEAR INDUSTRY, PLEASE DO NOT APPLY. Immediate opening for a Cyber Security Engineer with commercial nuclear background, to perform design modifications (involving digital upgrades) as well as preparing cyber assessments on those digital components. Prefer direct/perm hire, will consider contract. This person will be the go-to individual for Cyber related projects.
Must be familiar with NEI-08-09, EPRI graded approach, have digital mod experience, and extensive understanding of plant SSC (Safety Classification of Structures, Systems, and Components). Site Cyber qualifications to perform CSAT (Cyber Security Assessment Team) would be a plus. Compensation based on experience, but likely in the 140K-$160K range.
JSG offers medical, dental, vision, life insurance options, short-term disability, 401(k), weekly pay, and more. Johnson Service Group (JSG) is an Equal Opportunity Employer. JSG provides equal employment opportunities to all applicants and employees without regard to race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, marital status, protected veteran status, or any other characteristic protected by law.
#D650
Smart Contract Security Engineer
Remote job
Our client is building the infrastructure for a more trustworthy internet.
We are looking for a Smart Contract Security Engineer. In this role, you wont just audit code, you'll shape the security model for high-value protocols and safeguard the trust of an entire ecosystem. You'll work at the intersection of cutting-edge research, high-stakes engineering, and adversarial thinking, building defences for decentralized systems.
This is a full-time position, fully remote or located with our primarily Seattle-based team.
What You Will Do
Lead design and security reviews of complex staking, reward distribution, and protocol contracts
Build tooling, fuzzers, and formal verification pipelines to identify vulnerabilities before attackers do
Collaborate directly with protocol researchers and engineers to harden new features from inception
Read, interpret, and refine formal verification specifications to ensure they capture critical security properties
Work closely with product and leadership teams to set on-chain strategy and roadmaps
This is a unique opportunity to create a new paradigm of permissionless innovation and have outsized impact on the protocol and broader ecosystem.
What You Will Bring
Deep understanding of blockchain fundamentals, EVM, and common vulnerabilities
Experience with developer tools for smart contract development (e.g., Hardhat, Foundry)
Passion for collaborating with developers, security auditors, and stakeholders
Strong testing skills and experience with testing frameworks for smart contracts
Experience with production deployments of non-trivial protocols and associated security audits
Ability to collaborate with cross-functional and geographically remote teams
For more information, please contact **************************
Cyber Security Analyst II (Remote)
Remote job
is remote and can be performed from anywhere in the United States. Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions.
KEY RESPONSIBILITIES:
* Act as the primary point of escalation for Cyber Security Analyst I technicians
* Provides coaching to Cyber Security Analyst I employees on how to perform their duties
* Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats
* Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole
* Performs all of the following functions of a Cyber Security Analyst I, with proficiency
* Monitor computer networks for security issues and respond accordingly, including:
* Creating/Managing firewall rules
* Managing anti-virus endpoint tools
* Performing event correlation analysis on potential threats identified through our SIEM
* Configuring/Managing log management
* Configuring/Managing file integrity monitoring
* Performing vulnerability scans and remediation of identified risks
* The methodology & analysis of identifying compromised servers
* Performing rule tuning in our SIEM for improved detection capabilities
* Interact with customers by phone, chat, or trouble ticket on any customer facing security issues
* Investigate, document and assess security breaches and other cyber security incidents
* Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs
* Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives
* Identify and fix detected vulnerabilities to maintain a high-security standard
* Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities
* May be relied upon as a technical point of contact during Escalated Events relating to security
* Review, investigate and respond to any external "abuse" complaints coming from our IP space
* Develop best practices for IT security
* Research security enhancements and make recommendations to management
* Handle escalated internal or customer security issues from support or another operations team
* Takes part in any security-oriented projects or critical initiatives
* Stay up to date on information technology & security news, trends and standards
* Deliver an exceptional customer experience every day
* Other duties as identified or assigned
DESIRED ROLE OUTCOMES:
* Keep us and our customers free from security incidents but respond capably when one occurs
* Our detection of security threats is continually improving
* Provide valuable insights and visibility around security incidents to our customers
* Have a staff of customer focused, energetic and security savvy team members
REQUIRED SKILLS:
* A minimum of 2 years' experience in a security analyst role
* Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred
* Must have experience in a Security Operations Center (SOC)
* Must have technical troubleshooting and problem-solving skills
* Understanding of network management principles
* Experience in systems administration of Windows and Linux based operating systems
* Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies
* Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts
* Ability to identify and mitigate network vulnerabilities and explain how to avoid them
* Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact
* Ability to learn and communicate technical information to non-technical people
* Must have excellent written & oral communication skills, and strong interpersonal skills
* Must emulate the Ntirety Values in all that they do
Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA).
Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law.
Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
Cyber Security Analyst - Incident Response
Remote job
Our client, a leading organization in the energy industry, is seeking a Cyber Security Analyst - Incident Response to join their team. As a Cyber Security Analyst - Incident Response, you will be part of the Cyber Defense team supporting enterprise-wide security operations. The ideal candidate will demonstrate analytical thinking, resilience, and collaborative skills, which will align successfully in the organization.
**Job Title:** Cyber Security Analyst - Incident Response
**Location:** Remote
**Pay Range: $65-68/hr**
**What's the Job?**
+ Support the identification, containment, eradication, and recovery of sophisticated level 2/3 cyber incidents.
+ Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve security incidents.
+ Analyze log files from various sources to identify potential threats and vulnerabilities.
+ Perform cyber defense incident triage, including scope determination and impact assessment, and recommend remediation strategies.
+ Track and document cyber defense incidents from initial detection through resolution, ensuring comprehensive reporting and artifact collection.
**What's Needed?**
+ 8+ years of experience in a cyber defense role or 4+ years with a relevant bachelor's degree.
+ Proficiency with EDR tools, Splunk, and experience with ESAs, sandboxing, and malware analysis tools.
+ Strong understanding of network principles and the cyber incident lifecycle.
+ Experience supporting incident response processes and coordinating with third-party vendors and internal teams.
+ Preferred certifications include GCIH, GSEC, GCIA, GCFE, or capture the flag experience.
**What's in it for me?**
+ Opportunity to work with a Fortune 200 company in a dynamic and impactful role.
+ Remote work flexibility to support work-life balance.
+ Engagement in cutting-edge cyber defense techniques and trend analysis.
+ Collaborative environment fostering professional growth and development.
+ Contributing to the security of critical energy infrastructure.
**Upon completion of waiting period consultants are eligible for:**
+ Medical and Prescription Drug Plans
+ Dental Plan
+ Vision Plan
+ Health Savings Account
+ Health Flexible Spending Account
+ Dependent Care Flexible Spending Account
+ Supplemental Life Insurance
+ Short Term and Long Term Disability Insurance
+ Business Travel Insurance
+ 401(k), Plus Match
+ Weekly Pay
If this is a role that interests you and you'd like to learn more, click apply now and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you!
**About ManpowerGroup, Parent Company of: Manpower, Experis, Talent Solutions, and Jefferson Wells.**
_ManpowerGroup (NYSE: MAN), the leading global workforce solutions company, helps organizations transform in a fast-changing world of work by sourcing, assessing, developing, and managing the talent that enables them to win. We develop innovative solutions for hundreds of thousands of organizations every year, providing them with skilled talent while finding meaningful, sustainable employment for millions of people across a wide range of industries and skills. Our expert family of brands -_ **_Manpower, Experis, Talent Solutions, and Jefferson Wells_** _- creates substantial value for candidates and clients across more than 75 countries and territories and has done so for over 70 years. We are recognized consistently for our diversity - as a best place to work for Women, Inclusion, Equality and Disability and in 2023 ManpowerGroup was named one of the World's Most Ethical Companies for the 14th year - all confirming our position as the brand of choice for in-demand talent._
ManpowerGroup is committed to providing equal employment opportunities in a professional, high quality work environment. It is the policy of ManpowerGroup and all of its subsidiaries to recruit, train, promote, transfer, pay and take all employment actions without regard to an employee's race, color, national origin, ancestry, sex, sexual orientation, gender identity, genetic information, religion, age, disability, protected veteran status, or any other basis protected by applicable law.
Cyber Security Analyst
Remote job
Responsibilities:
Investigate security incidents and escalate when necessary
Work Incident Response and Administrative tickets
Perform and develop data mining queries using Splunk/Splunk ES
Communicate in a clear and concise manner with Leadership, Customers and Peers
Monitor and respond to multiple shared Mailbox inquiries
Provide vulnerability, threat, and risk mitigation support
Monitor Security Operations Dashboards for alerts
Support daily Operations briefings
Monitor and answer the SOC phone hotline
Support customer defined metrics reports
Support government data calls
This opportunity offers remote work!
Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills
Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting)
Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
Global Cyber Wordings Analyst
Remote job
Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience.
Key responsibilities:
Wording library and drafting support
Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes.
Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards.
Track version control, change logs, approvals, and archiving;
Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance.
Commercial enablement
Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently.
Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives.
Triage wording queries from regions; track SLAs and referral approvals per the global governance framework.
Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards.
Regulatory and legal stewardship
Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions.
Maintain audit-ready documentation; assist with regulatory filings or attestations where required.
Claims partnership and feedback loop
Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty.
Support coverage position letters and documentation packs with research, citations, and clause histories.
Innovation and product development support
Help draft prototype wordings for new propositions
Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses.
Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics.
Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders.
Qualifications
Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience.
2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred.
Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail.
Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous.
Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates.
Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools.
Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs.
Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting.
About Us
Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role.
At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve.
We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: ***********************
Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law.
Fair Chance Notices
California
Los Angeles Incorporated
Los Angeles Unincorporated
Philadelphia
San Francisco
We can recommend jobs specifically for you! Click here to get started.
Auto-ApplySenior Cyber Security Ops Analyst | Remote | Contract
Remote job
Senior Cyber Security Ops Analyst
Applicants Need To Know
6+ Month Contract
Work Status: USC, GC
Sponsorship: No, Sponsorship provided.
Office Type: Remote
Hourly Rate: $75 to $85 W2 Only
No Corp-to-Corp
Please note that only candidates who are authorized to work in the United States without sponsorship will be considered for this position.
We seek a Senior Cyber Security Ops Analyst for our client. This is a contract position lasting 6+ months. The role is remote and requires availability in the Eastern or Central time zones.
As a Sr Cyber Security Ops Analyst, you will be responsible for security monitoring and incident response for both internal and external threats. You will collaborate with internal IT teams and MSSP to ensure effective security monitoring and response. Additionally, you will implement advanced security monitoring techniques to identify malicious behavior and develop automation response scripts to remediate commodity threats. Your role will also involve performing threat analysis utilizing industry standard frameworks and conducting threat research to improve detection and response capabilities. You will have the opportunity to propose and review security plans and policies to enhance the overall security environment.
The Work:
Conduct investigations and respond to internal and external security threats.
Oversee, respond to, and remediate DLP (data loss prevention) and SIEM events from on-premise and cloud systems.
Implement advanced security monitoring techniques to identify malicious behavior on SaaS, cloud systems, network, servers, and endpoints.
Manage, administer, and improve security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry-standard security technologies.
Develop automation response scripts to remediate commodity threats.
Perform threat hunting activities to identify compromised resources.
Understand and perform threat analysis utilizing industry-standard frameworks (kill chain and diamond model).
Perform threat research and intelligence gathering to improve detection and response capabilities.
Propose and review security plans and policies to improve the security environment.
Maintain operational playbooks, process diagrams, and documentation for security monitoring and response.
Review proposed Security deployments to ensure security monitoring requirements are met.
Provide off-hour support as needed for security monitoring and response activities.
Work closely with MSSP services, external forensic providers, and in-house IT teams to respond to and remediate security incidents both internal and external.
Review compromised systems to identify the root cause of security incidents.
Qualifications:
Minimum of 5 years of experience in security monitoring and incident response
Strong knowledge of DLP (data loss prevention) and SIEM events
Experience with advanced security monitoring techniques on SaaS, cloud systems, network, servers, and endpoints
Proficiency in managing and administering security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry standard security technologies
Ability to develop automation response scripts for commodity threats
Familiarity with threat hunting activities to identify compromised resources
Understanding of threat analysis utilizing industry standard frameworks (kill chain and diamond model)
Experience in threat research and intelligence gathering to improve detection and response capabilities
Knowledge of reviewing security plans and policies to enhance the security environment
Strong documentation skills for operational playbooks, process diagrams, and security monitoring/response documentation
Ability to review proposed Security deployments to ensure compliance with security monitoring requirements
Willingness to provide off-hour support for security monitoring and response activities
Nice to Have:
Experience with cloud security technologies such as CASB, Cloud Access Security Brokers
Knowledge of scripting languages such as Python or PowerShell
Familiarity with industry compliance standards (e.g., PCI DSS, HIPAA, GDPR)
Certifications in relevant areas such as CISSP, CISM, or CEH
Experience working with incident response tools and processes
#CyberSecurity #SecurityOps #IncidentResponse #ThreatAnalysis #SecurityMonitoring #DataLossPrevention #SIEMEvents #CloudSecurity #EndpointSecurity #ITSecurity
Senior Cyber Security Analyst
Remote job
Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting nearly 10,000 organizations from unknown threats using its proprietary AI. The Darktrace Active AI Security Platform™ delivers a proactive approach to cyber resilience to secure the business across the entire digital estate - from network to cloud to email. Breakthrough innovations from our R&D teams have resulted in over 200 patent applications filed. Darktrace's platform and services are supported by over 2,400 employees around the world. To learn more, visit *************************
Job Description:
Ready to take your cybersecurity career to the next level? Join Darktrace, the global leader in AI-driven cyber defense, as a Senior Cyber Security Analyst. In this role, you'll investigate real-world threats, deliver expert consultancy, and help organizations stay secure in an ever-changing digital landscape. If you have 2-5 years of experience, a passion for problem-solving, and thrive in fast-paced environments, we want to hear from you. Apply today and be part of a team that's redefining cybersecurity.
As a Senior Cyber Security Analyst, you will:
Investigate alerts and network traffic using the Darktrace platform and supporting tools.
Analyze technical data to identify potential cyber threats and communicate findings to customers.
Deliver bespoke consultancy on security workflows and best practices.
Research emerging threats and identify trends across customer environments.
Represent analyst work internally and externally, including technical blogs and knowledge sharing.
Mentor junior team members and contribute to continuous improvement initiatives.
Key Responsibilities
Monitor and analyze network traffic for anomalies and suspicious activity.
Produce clear, technical reports for customers and respond to inquiries via email or chat.
Stay current with cybersecurity trends and integrate insights into customer engagements.
Support customers in adopting and optimizing Darktrace solutions.
Maintain strict data security standards and uphold compliance requirements.
Qualifications
2-5 years of experience in cybersecurity (SOC, Threat Intelligence, or Consultancy).
Located in the Pacific Time Zone
Strong analytical and problem-solving skills with attention to detail.
Excellent written and verbal communication skills.
Ability to work independently and collaboratively in a diverse team.
Familiarity with security operations, incident response, consultancy and threat analysis.
Knowledge of Darktrace products or similar AI-driven security tools is a plus.
Fluent in Spanish and capable of delivering written technical reports and verbal consultancy services is highly desired but not required
Bachelors Degree or higher in a technical field also a plus
What We Offer
Comprehensive training and ongoing professional development.
Opportunities for career growth in a rapidly expanding industry.
Collaborative, inclusive work environment.
Base $95k-$105k. Final offer will be determined based on years of experience and location.
Benefits:
100% medical, dental and vision insurance, plus dependents
Paid parental leave
Pet insurance Discount
Life insurance
Commuter benefits
401(k)
Employee Assistance Program
Auto-ApplyCyber Security Analyst II (Remote)
Remote job
is remote and can be performed from anywhere in the United States.
Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions.
KEY RESPONSIBILITIES:
Act as the primary point of escalation for Cyber Security Analyst I technicians
Provides coaching to Cyber Security Analyst I employees on how to perform their duties
Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats
Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole
Performs all of the following functions of a Cyber Security Analyst I, with proficiency
Monitor computer networks for security issues and respond accordingly, including:
Creating/Managing firewall rules
Managing anti-virus endpoint tools
Performing event correlation analysis on potential threats identified through our SIEM
Configuring/Managing log management
Configuring/Managing file integrity monitoring
Performing vulnerability scans and remediation of identified risks
The methodology & analysis of identifying compromised servers
Performing rule tuning in our SIEM for improved detection capabilities
Interact with customers by phone, chat, or trouble ticket on any customer facing security issues
Investigate, document and assess security breaches and other cyber security incidents
Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs
Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives
Identify and fix detected vulnerabilities to maintain a high-security standard
Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities
May be relied upon as a technical point of contact during Escalated Events relating to security
Review, investigate and respond to any external “abuse” complaints coming from our IP space
Develop best practices for IT security
Research security enhancements and make recommendations to management
Handle escalated internal or customer security issues from support or another operations team
Takes part in any security-oriented projects or critical initiatives
Stay up to date on information technology & security news, trends and standards
Deliver an exceptional customer experience every day
Other duties as identified or assigned
DESIRED ROLE OUTCOMES:
Keep us and our customers free from security incidents but respond capably when one occurs
Our detection of security threats is continually improving
Provide valuable insights and visibility around security incidents to our customers
Have a staff of customer focused, energetic and security savvy team members
REQUIRED SKILLS:
A minimum of 2 years' experience in a security analyst role
Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred
Must have experience in a Security Operations Center (SOC)
Must have technical troubleshooting and problem-solving skills
Understanding of network management principles
Experience in systems administration of Windows and Linux based operating systems
Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies
Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts
Ability to identify and mitigate network vulnerabilities and explain how to avoid them
Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact
Ability to learn and communicate technical information to non-technical people
Must have excellent written & oral communication skills, and strong interpersonal skills
Must emulate the Ntirety Values in all that they do
Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA).
Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law.
Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
Auto-ApplySenior Security Operations Analyst
Remote job
About Extend:
Extend is revolutionizing the post-purchase experience for retailers and their customers by providing merchants with AI-driven solutions that enhance customer satisfaction and drive revenue growth. Our comprehensive platform offers automated customer service handling, seamless returns/exchange management, end-to-end automated fulfillment, and product protection and shipping protection alongside Extend's best-in-class fraud detection. By integrating leading-edge technology with exceptional customer service, Extend empowers businesses to build trust and loyalty among consumers while reducing costs and increasing profits.
Today, Extend works with more than 1,000 leading merchant partners across industries, including fashion/apparel, cosmetics, furniture, jewelry, consumer electronics, auto parts, sports and fitness, and much more. Extend is backed by some of the most prominent technology investors in the industry, and our headquarters is in downtown San Francisco.
What You'll Do:
Serve as a core member of Security Operations, monitoring and triaging alerts from platforms such as SentinelOne and Wiz. Perform end-to-end investigations to identify, contain, and remediate threats and incidents, driving timely, appropriate response.
Proactively identify and assess vulnerabilities in infrastructure and code, working with development and other cross functional teams to address issues.
Contribute to the end-to-end detection lifecycle: model attacker behaviors (MITRE ATT&CK), write and test detections as code across security programs and tooling (SentinelOne, Wiz, Okta, AWS CloudTrail), and continuously enrich to reduce false positives and improve MTTD. Support data quality and telemetry onboarding, maintain response playbooks, and provide threat validation assistance across the business.
Assist teams with the application of secure configuration baselines and best practices in accordance with CIS Benchmarks, NIST, vendor hardening guides, and applicable compliance standards across all company computing assets.
Correlate endpoint and infrastructure telemetry to identify emerging threats. Curate and operationalize intelligence (IOCs, TTPs) into detections and response playbooks, and maintain vetted intelligence feeds.
Assist GRC initiatives by mapping controls to internal policies and frameworks (e.g., SOC 2, NIST CSF, NYC DFS 500), identifying gaps, supporting audits and evidence collection, tracking remediation, and maintaining policies and control documentation.
Work with engineering and business teams to champion security best practices, communicate risks to accountable owners, and assist with mitigation planning and execution.
What We Are Looking For:
3+ years experience in a Security Analyst / Security Operations role
3+ years experience with AWS CloudFormation, or other infrastructure-as-code systems (like Terraform)
3+ years experience or certification in AWS serverless technologies (API Gateway, Lambda, S3, DynamoDB)
Certifications (one or more preferred): CISSP, CCSP, GIAC (GCIH/GCIA/GMON/GCED/GCFA/GREM), cloud security (AWS or cloud agnostic security specialty) or equivalent experience.
Proficiency with hands on management and use of SIEM, CNAPP, EDR, Vulnerability Management tooling, and Detection Engineering strategies.
Proficiency with AI technologies and the corresponding threat landscape and strategies for mitigation. Understands agentic workflows such as AWS Bedrock, MCP based workflows (or similar technologies)
Working Knowledge of best practices around security roles and responsibilities for AWS IAM
Experience working with observability services and tooling (including Coralogix, CloudWatch, OpenTelemetry)
Ability to perform in a high energy environment with dynamic job responsibilities and priorities
Nice to Haves:
Experience with AWS Cloud Development Kit(CDK)
Experience with Mastra AI
Expected Pay Range: $157,000 - $182,000 per year salaried*
* The target base salary range for this position is listed above. Individual salaries are determined based on a number of factors including, but not limited to, job-related knowledge, skills and experience.
Life at Extend:
Working with a great team from diverse backgrounds in a collaborative and supportive environment.
Competitive salary based on experience, with full medical and dental & vision benefits.
Stock in an early-stage startup growing quickly.
Generous, flexible paid time off policy.
401(k) with Financial Guidance from Morgan Stanley.
Extend CCPA HR Notice
Auto-ApplySenior Security Analyst III
Remote job
OppFi is a leading tech-enabled digital finance platform that works with banks to provide financial products and services for everyday Americans. Through a transparent and responsible platform, which includes financial inclusion and excellent customer experience, the Company supports consumers who are turned away by mainstream options to build better financial health.
We are a team of caring, innovative, and inclusive individuals who thrive in being immersed in diverse talents, expertise, perspectives, and backgrounds. Our employees approach every new challenge with an unparalleled ability to see what could be rather than settle for what is. Our business principles guide us and create an open and collaborative culture where we improve 1% every day, and the best ideas always win! We welcome individuals who want to make an impact in the financial system by facilitating credit access, expanding financial inclusion, promoting financial health, and delivering exceptional customer service.
A few other fun facts about us. OppFi is one of the top consumer-rated financial platforms online, maintaining a 4.5/5.0-star rating on Trustpilot. We are a 2025 Crain's Fast 50™ company and were named on Built In's 2025 Best Places to Work in Chicago.
Senior Security Analyst III
As Senior Information Security Analyst III, you will be a key contributor to our day-to-day security operations, assisting with threat monitoring, incident triage, vulnerability remediation, and GRC activities. This role is an excellent opportunity for someone with security experience who is eager to grow their skills in risk management, cloud environments and security best practices. You will work closely with senior team members and various OppFi internal teams to ensure our environment maintains security, visibility, and compliance standards.
What you get to do:
Information Security Risk Management:
Own the security review and assessment process evaluating the risk associated with introducing new applications/tools into the environment.
Assist with security risk management activities, including the analysis, quantification, and tracking of information security risks, plus the review and documentation of risk exception requests.
Policy and Compliance Analysis: Identify emerging compliance requirements and assess their impact on our policies. Develop and refresh our policies, procedures, standards, and guidelines to stay compliant and aligned with industry best practices.
Governance Visibility: Design and maintain dynamic dashboards or scorecards that offer clear insights into Information Security Governance activities, demonstrating our commitment to security and compliance.
Security Operations & Incident Support
Monitor security alerts from various tools (SIEM, EDR, cloud logs) and support the triage of potential security incidents by gathering initial data and escalating to senior engineers as needed.
Assist in the execution of security incident response playbooks, focusing on initial steps like investigation, basic containment, and documentation.
Contribute to the documentation and tracking of security incidents to support audit and compliance requirements.
Support the monitoring and logging strategy by assisting with the configuration and tuning of SIEM (Security Information and Event Management) alerts and reports.
Perform regular log review and analysis for suspicious activities under the guidance of senior staff.
Improvement & Collaboration
Contribute to the development and maintenance of operational playbooks and documentation for security processes.
Learn to deploy and manage new security tools and assist in the development of basic threat detection logic.
Develop basic security performance metrics and assist with reporting to measure the effectiveness of security controls.
Performs other related duties as assigned.
What you will bring to the team:
3-5 years of professional experience in Information Security or IT Risk Management, with a background supporting IT compliance programs to meet regulatory requirements and demonstrated expertise in at least one of the following areas: Security Operations, Incident Response, or Vulnerability Management.
Experience with
Security and control frameworks, such as FFIEC, NIST, COBIT, ITIL, and ISO control framework
EDR platforms (e.g., CrowdStrike, Defender for Endpoint, SentinelOne)
SIEM/SOAR tools (e.g., Sumo Logic, Splunk, Chronicle, or Azure Sentinel)
CSPM tools (e.g., Wiz, Prisma, Orca)
Vulnerability management platforms (e.g., Qualys, Tenable, Rapid7)
Experience identifying potential IT controls risks and opportunities through and offering sustainable recommendations that address cause rather than symptoms
Experience with information security standards, best practices for securing computer systems within applicable laws and regulations
Experience with Governance Risk & Compliance (GRC) tools and procedure development
Solid understanding of common attack techniques (MITRE ATT&CK), incident triage, and remediation workflows.
Foundational knowledge of AWS (Amazon Web Services) or other cloud environments.
Basic understanding of networking, operating systems (Linux/Windows), and common security principles (e.g., least privilege, defense-in-depth).
Familiarity with automation frameworks or API integrations for security tools.
Strong written communication skills necessary for developing clear, concise procedures and playbooks, coupled with effective verbal skills for communicating technical findings.
Experience building dashboards and metrics for leadership visibility.
Strong analytical and problem-solving skills with a keen attention to detail and a desire to learn quickly.
Bachelor's degree in Cybersecurity, Computer Science, or equivalent experience.
Certifications such as CompTIA CySA+, GCIH, GCIA, GMON, GCDA, GSOC, or CISSP associate are preferred.
Experience working in a regulated industry (financial services or health care)
Reports to: Manager, Security Operations
Total Rewards and Benefits:
At OppFi, we are committed to fostering a fair and equitable workplace. The compensation range for this role reflects our good faith compensation estimate for this position. Final offers are determined based on a myriad of factors including, but not limited to experience, skills, qualifications, and other relevant business considerations. Candidates are encouraged to discuss compensation expectations during the hiring process. In addition to base pay, the total compensation package includes eligibility and potential for performance-based bonuses and equity grants dependent upon the role and job level.
OppFi offers a flexible, remote environment, 401(k) matching program, and generous paid time off. Other benefits include medical, dental, and vision coverage, and tuition reimbursement. Additional benefits include DoorDash DashPass, Figo pet insurance, Rocket Lawyer, and access to LinkedIn Learning. OppFi also offers Fringe, a lifestyle benefits platform that allows employees to decide how to spend rewards from dozens of vendors like Uber, DoorDash, and UrbanSitter. #LI-Remote
Compensation Range:$102,400-$153,600 USD
EEO Statement:
OppFi is an equal opportunity employer and does not discriminate based on any actual or perceived legally recognized protected bases under local, state, federal law, or regulations. Our goal as a company is to build an equitable workplace that actively works to dismantle systems of oppression in our processes, procedures, and interactions. We aim to help our employees thrive where they work and beyond. Check out our Culture page here.
As part of OppFi's commitment to providing equal opportunity to qualified individuals, OppFi will ensure that persons with disabilities are provided reasonable accommodation as defined by applicable laws and organizational policies. If reasonable accommodation is needed to participate in the job application or interview processes or job requirements, please contact our People Team at ********************.
Pursuant to the requirements of the California Consumer Privacy Act, OppFi is providing the "OppFi California Employee Privacy Policy", which details the categories of personal information collected and your rights under the policy. If you are a California resident, please review the policy here: *******************************
The information in this document is for general informational purposes only. It is not intended to be an all-inclusive list or description of the organization and its requirements for positions and employees. OppFi reserves the right to modify or change the information on this document at its discretion.
Auto-ApplySr. Security Analyst
Remote job
Vectra is the leader in AI-driven threat detection and response for hybrid and multi-cloud enterprises.
The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a single platform. Powered by patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely on the Vectra AI to move at the speed and scale of hybrid attackers. For more information, visit **************
*Location: US-Remote
This position works on a 4x10, 3rd shift
Position Overview
Vectra is seeking a highly skilled and experienced MDR (Managed Detection and Response) Security Analyst to join our team. As a Sr. Security Analyst, you will serve in a critical role in protecting and defending Vectra MDR customer infrastructure. You will be responsible for supervising and analyzing security events, responding to incidents, conducting SOC (Security Operations Center) operations, and assisting MDR customers to ensure their needs are met.
A successful candidate will have sound technical experience and skills, blended with good interpersonal, communication, and project management skills.
Responsibilities
Monitor security logs and alerts from various sources, including intrusion detection systems, Endpoint Detection and Response (EDR) systems, and security information and event management (SIEM) tools.
Investigate and analyze security incidents, identify root cause, and develop appropriate mitigation strategies.
Complete security response actions, including full remote remediation of endpoints.
Perform threat hunting and proactive analysis to identify potential security risks and vulnerabilities.
Collaborate with multi-functional teams, including product, engineering, and support, to resolve customer incidents or issues.
Mentor and provide guidance to junior security analysts, sharing knowledge and standard processes.
Conduct health checks and architecture reviews, providing technical expertise and real-life experience in creating solutions, designs, and recommendations.
Be a strong voice for your customers across business to identify new detection models, identify new product features, build content for both internal and external customer knowledge bases, and ensure successful Vectra deployments.
Travel expected 0-5%
Requirements
Demonstrable experience as an MDR security analyst, SOC analyst, or similar role in a fast-paced environment.
Experience providing remote response and remediation activities within networks and on endpoints.
Solid understanding of intrusion detection systems, artificial intelligence-based attack detection and prevention, incident response methodologies, and SOC operations.
Experience with SIEM tools, log analysis, network analysis, endpoint analysis, and threat intelligence platforms.
Solid knowledge of operating systems, networking protocols, and security technologies.
Proficient in incident handling, threat hunting, and forensics.
Excellent analytical and problem-solving skills, with the ability to think critically under pressure.
Good communication skills to effectively collaborate with multi-functional teams and communicate complex security issues to non-technical stakeholders.
Continuous learning attitude to stay updated with the evolving threat landscape and emerging security technologies.
Desirable
Prior experience with Vectra, SentinelOne, Microsoft Defender, or CrowdStrike
Coding experience in Bash, Python, or Powershell
Open-source development
Our competitive total rewards package includes cash compensation within the range provided below. Actual pay for this position may vary based on the hired candidate's location, experience and relevant incumbent pay position. Vectra Total Rewards$110,000-$150,000 USD
Vectra provides a comprehensive total rewards package that supports the financial, physical, mental and overall health of our employees and their families. Compensation includes competitive base pay, incentive plan eligibility, and participation in the employee equity plan (stock options). Specific benefits offered varies by location, but commonly include health care insurance, income protection / life insurance, access to retirement savings plans, behavioral & emotional wellness services, generous time away from work, and a comprehensive employee recognition program.
Vectra is committed to creating a diverse environment and is proud to be an equal opportunity employer.
We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status.
Auto-ApplySenior Information Security Risk Specialist (GRC)
Remote job
About Us
At SentinelOne, we're redefining cybersecurity by pushing the limits of what's possible-leveraging AI-powered, data-driven innovation to stay ahead of tomorrow's threats.
From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We're looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you're excited about solving complex challenges in bold, innovative ways, we'd love to connect with you.
What are we looking for?
We are looking for a highly motivated, collaborative and experienced Senior InfoSec Risk Specialist with a security-focused mindset who can balance risk, business drivers and timelines. This position will be responsible for understanding and supporting the design of SentinelOne's organizational, procedural and technological security controls within the context of the security frameworks applicable to SentinelOne. In addition, you will be responsible for identifying and testing appropriate controls to ensure they are designed, implemented, and operating effectively to mitigate risk. The selected employee will help implement, automate, document and maintain controls while supporting and responding to inquiries from internal and external stakeholders. This individual must be self-directed and be able to work independently and collaboratively.
What will you do?
Support the planning and performance of IT risk-based security audits and projects, risk assessments, execution of fieldwork and communication to stakeholders.
Help in evaluating relevant global standards, compliance frameworks and regulations to analyze existing controls; identify areas for improvement; and design control growth.
Collaborate with process and control owners through the audit lifecycle for process documentation updates, testing coordination, remediation of identified deficiencies and advising on internal control enhancements or process changes, as appropriate.
Proactively manage audit findings, tracking and documentation of status updates obtained via action owners, and timely execution of remediation activities.
Participate in internal security and compliance programs and track recurring controls, such as SSAE 18 SOC 2, ISO 27001/27002.
Provide control consultative support to the business to assist in redesign efforts to improve the control environment and identify opportunities for control improvements with the objective of mitigating risk and improving compliance and operational performance.
Help support internal/external audits and evidence collection via a GRC tool.
Document new and update existing policies, procedures, standards and resources
Participate in Security awareness program, train personnel on data security and privacy-related processes and responsibilities.
Help support customer security reviews, RFPs and external security and privacy inquiries.
Participate in defining, collecting and tracking various Security Metrics.
What skills and experience should you bring?
5+ years of experience working in information security, risk or compliance.
Experience working with Security Controls across at least some of the following domains: Access Management, Encryption, Risk Management, Network Security, Configuration Management, Patch Management, Change Management, Awareness and Training, BC/DRP, etc.
Ability to perform internal audits with minimal direct supervision, exhibit professional audit judgment and have experience in a broad range of audit projects such as SSAE 16/18 SOC 2, ISO 27001/2, NIST.
Strong risk management experience, performing assessments and audits, designing controls, managing enterprise control frameworks, and prioritizing risk.
Strong project management skills and ability to manage a variety of projects simultaneously to completion within the agreed timelines.
Excellent collaboration and interpersonal skills. Must be able to communicate with all levels in the organization.
Ability to communicate effectively, in writing and verbally, to target audiences, including customers, partners, auditors, executive management, vendors, and peers.
Experience working with both technical and non-technical teams.
Ability and desire to understand the intent of requirements and provide effective recommendations.
Ability to prioritize in a highly dynamic work environment.
Our Preferred Qualifications:
Advanced degree in computer science, Information Technology, Information Security or related field.
Experience with, and strong understanding of common Security Compliance frameworks, controls, and best practices such as COSO, SOC 2, SOX ITGC, ISO 27001/27002, GDPR, PCI, NIST and other applicable regulatory compliance frameworks.
Relevant certifications (ISO 27001 LA/LI, CISA, CISM, CISSP, CRISC, etc.)
Ability to assess and pragmatically define scope and relevant controls.
Strong desire to learn and continuously develop and deepen technical skills.
Why us?
You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry.
Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
Unlimited PTO
Industry-leading gender-neutral parental leave
Paid Company Holidays
Paid Sick Time
Employee stock purchase program
Disability and life insurance
Employee assistance program
Gym membership reimbursement
Cell phone reimbursement
Numerous company-sponsored events, including regular happy hours and team-building events
This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply. If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions.
Base Salary Range$104,000-$138,000 USD
SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
SentinelOne participates in the E-Verify Program for all U.S. based roles.
Auto-ApplySenior Security GRC Analyst
Remote job
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
*Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
Manage IT Risk Register including risk identification, tracking, and prioritization.
Assist with and drive remediation of control deficiencies and gaps
Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
Assist control owners with root cause analysis and track risk management action plan progress.
Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements
You
Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
Experience in the machine learning or computer hardware industry
Experience with Security by Design and/or Privacy by Design principles
Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
Founded in 2012, with 500+ employees, and growing fast
Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
Our values are publicly available: *************************
We offer generous cash & equity compensation
Health, dental, and vision coverage for you and your dependents
Wellness and commuter stipends for select roles
401k Plan with 2% company match (USA employees)
Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
Auto-ApplySenior Consultant - Epic Security Analyst - Remote
Remote job
Make a difference. Be happy. Grow your career.
A Nordic consultant is more than just an Epic expert. Our analysts take ownership for their work and the greater success of the organization. We're also looking for someone who listens to the client and understands that each project and each organization is unique. You'll need to tackle tough projects to help those organizations succeed. Experience implementing Epic is required, and if you have experience on a Connect or optimization project, that's a plus. Here are a couple things you'll need:
-At least 3 years of Epic experience
-At least 1 current Epic certification (Security, Security Coordinator) Senior Consultant
A Senior Consultant provides consulting services to clients on Epic-related projects in an analyst, project management, project leadership or training capacity.
Key Responsibilities
Perform Epic-related consulting and administrative computer services for Nordic clients
Apply technical expertise to individual client system build in order to identify, troubleshoot, and resolve problems.
Mentor client project teams as necessary in project and system build strategy.
Track and document risks and issues.
Analyze and document workflows.
Work closely with project leadership, including documentation and facilitation.
Work directly with Epic end users. Monitor workflows, provide documentation, and optimization suggestions.
Lead meetings regarding project status and on-going work-product coordination.
Additional specific duties related to the project as may be required and dictated by individual clients. These duties are documented on a per-contract basis in the client's statement of work.
May be invited to attend corporate functions as a representative of the company to meet prospective consultants, as well as solidify relationships with client and Nordic co-workers.
#LI-AB1
EEO Language:
Nordic is an equal opportunity employer dedicated to a policy of non-discrimination on any protected basis including race, creed, color, age, gender, religion, national origin, disability, marital or veteran status, sexual orientation, or any other legally protected status under applicable local, state or federal law. EEO/AA Employer: M/F/Disabled and Vet.
Nordic is an equal opportunity employer. We are committed to creating an inclusive environment for all employees and applicants. We do not discriminate on the basis of race, color, religion, sex, national origin, age, disability, genetic information, marital or veteran status, or any other protected status under applicable federal, state, or local laws. We encourage individuals of all backgrounds to apply, including women, minorities, individuals with disabilities, and veterans.
Auto-ApplySenior Information Security Specialist-SECRET CLEARANCE REQUIRED
Remote job
Primary Responsibilities:
Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization.
Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation.
Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts.
Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment.
Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats.
Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps.
Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment.
Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures.
Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance.
Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments.
All other duties as assigned by management.
Qualifications
Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education.
Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies.
Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS).
Minimum of (5) years of experience with Security Information and Event Management (SIEM).
Minimum of five (5) years of experience in the risk management framework.
Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases.
Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred.
Must have an active DoD Secret Clearance.
Auto-ApplyCloud Security Analyst (Remote)
Remote job
Join the cybersecurity company that puts security first; literally and without compromise. At KnowBe4, our AI-driven Human Risk Management platform empowers over 70,000 organizations worldwide to strengthen their security culture and transform their workforce from their biggest vulnerability into their strongest security asset. As the undisputed industry standard with unusually high customer retention rates and recognition as a Leader by G2 and TrustRadius, we're not just providing security awareness training - we're redefining what it means to be a trusted security partner in an increasingly complex threat landscape.
Our team values radical transparency, extreme ownership, and continuous professional development in a welcoming workplace that encourages all employees to be themselves. Whether working remotely or in-person, we strive to make every day fun and engaging; from team lunches to trivia competitions to local outings, there is always something exciting happening at KnowBe4.
Remote positions open to the US only.
The Opportunity
Join our Information Security team as the person responsible for monitoring and protecting KnowBe4's cloud infrastructure. As Cloud Security Analyst, you'll be the first responder for security alerts across our AWS and Azure environments; triaging, investigating, and coordinating responses that protect both company and customer data. You'll own the day-to-day security operations that keep our cloud ecosystem secure: analyzing alerts, hunting threats, investigating incidents, and partnering with engineering teams to ensure vulnerabilities get fixed before they become problems. The successful candidate stays calm under pressure, stays curious about new attack vectors, builds tools to make their job easier, and is passionate about cybersecurity.
What You'll Do
Security Monitoring & Response: Continuously monitor and triage alerts from SIEM, CSPM, CWPP, and cloud security tools - identifying what's a real threat, what needs immediate action, and what requires deeper investigation.
Incident Management: Serve as primary responder for cloud security incidents, leading investigation efforts from initial detection through containment, eradication, and recovery while keeping stakeholders informed throughout.
Threat Hunting & Analysis: Proactively hunt for threats across security log feeds, perform root cause analysis on vulnerabilities and incidents, and stay ahead of emerging attack patterns using frameworks like MITRE ATT&CK.
Alert Engineering: Build and refine security alerts and dashboards that catch the signals that matter - reducing noise while ensuring critical issues surface quickly and clearly.
Security Testing & Validation: Conduct security reviews and penetration testing across cloud infrastructure, identifying weaknesses before attackers do and validating that our defenses actually work.
Cross-Team Collaboration: Partner closely with IT, engineering, and development teams to ensure security findings are understood, prioritized appropriately, and remediated with solid engineering principles-not just quick fixes.
What You Bring
2+ years of hands-on experience in cloud security, information security operations, or similar roles where you've monitored alerts, investigated incidents, and worked within AWS and/or Azure environments.
Practical cloud security knowledge with demonstrated ability to navigate cloud environments, understand misconfigurations, and think like an attacker to anticipate where vulnerabilities hide.
Builder mindset with AI-assisted development skills - you actively leverage AI tools to write scripts, automate repetitive tasks, and solve your own problems rather than waiting for someone else to build solutions for you.
Security operations foundation - you understand how to triage alerts, distinguish true positives from noise, investigate incidents methodically, and communicate findings clearly to both technical and non-technical audiences.
Strong organizational skills and time management - you can juggle multiple security investigations simultaneously, prioritize what needs attention now versus what can wait, and keep track of incidents through resolution without dropping details.
Some experience with offensive security - you know your way around infosec testing tools, understand OWASP Top 10, can think through how attackers exploit cloud environments, and have some exposure to penetration testing concepts.
Comfort across technical domains - basic scripting ability, Linux command line navigation, understanding of application concepts (APIs, containers, databases), and some experience working with infrastructure-as-code tools like Terraform or CloudFormation.
Bonus points if you have:
Cloud security certifications (AWS Security Specialty, Azure Security Engineer, or similar professional credentials that validate your expertise).
Bachelor's degree in information security, information systems, computer science, or related technical field.
Experience with MITRE ATT&CK Framework in practical incident response scenarios where you've mapped adversary techniques to actual alerts.
Background deploying security tooling as code - building alerts, automation, or security solutions using proper engineering principles that others can actually use and maintain.
Why You'll Love It Here
Builder-Friendly Culture: We encourage you to solve your own problems with good engineering principles; everything is deployed through Terraform, following the same standards as our development teams-you'll write solutions that scale, not just quick scripts.
Remote Flexibility: Fully remote position open across the US, giving you the autonomy to work where you're most effective while staying connected to a collaborative security team.
Continuous Learning: Budgets for certifications, conferences, and dedicated exploration time to research new tools and stay current
Transparency and Trust: Radical candor, low ego, high accountability
Global Scale: Your work will help protect users across 70,000+ organizations worldwide.
The base pay for this position ranges from $80,000 - $85,000, which will vary depending on how well an applicant's skills and experience align with the job description listed above.
We will accept applications until 12/30/2025.
Our Fantastic Benefits
We offer company-wide bonuses based on monthly sales targets, employee referral bonuses, adoption assistance, tuition reimbursement, certification reimbursement, and certification completion bonuses - all in a modern, high-tech, and fun work environment. For more details about our benefits in each office location, please visit *********************************
Note: An applicant assessment and background check may be part of your hiring procedure.
Individuals seeking employment at KnowBe4 are considered without prejudice to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, sexual orientation or any other characteristic protected under applicable federal, state, or local law. If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please visit **********************************************
No recruitment agencies, please.
Auto-ApplyRemote Pre-Sales Security Systems Engineer - Access Control & CCTV
Remote job
Together, We Enhance Innovation and Growth
i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations.
i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most.
This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success.
Responsibilities
Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure.
Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings.
Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions.
Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses.
Create solution design documentation (drawings, BOMs, solution design summaries).
Provide technical support for in-office and on-site team members.
Support management in the process of creating documentation for implementing new technology with new and existing customers.
Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors.
Qualifications
A minimum of 3-7 years previous experience in the industry.
Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background.
Experience in the design and planning of access control and video systems.
Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred.
Other Eligibility Requirements
Ability to manage time and multiple tasks without supervision.
Organizational skills & detail oriented.
Good analytical and problem-solving skills.
Excellent presentation, writing skills, verbal, and written customer communication skills.
Experience in computer programs such as Microsoft Office, Adobe, etc. preferred. Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus.
Company Overview
This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: ***************************************
"Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here:
***********************************************************************************************************************************************************************************
Equal Opportunity Statement
We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
Auto-ApplyInformation Security Controls Analyst
Remote job
United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization.
What You'll Do
* Review and document the adequacy of security and technology controls across business and IT environments.
* Evaluate control posture through interviews, documentation reviews, and workflow analysis.
* Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls.
* Partner with risk management and security leadership to align controls with organizational risk tolerance.
* Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance.
* Document and advocate for control improvements that balance risk with operational efficiency.
* Support control development across testing, QA, and production environments.
* Present control effectiveness reports to senior risk leadership.
* Stay current on regulatory requirements, internal policies, and industry best practices.
Requirements For Success
Experience:
* 3+ years in cybersecurity or IT practitioner roles.
* 2+ years in IT risk or controls analysis.
* Practical experience with risk management and IT control frameworks.
Education: Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field.
Required Skills:
* Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST).
* Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA).
* Experience with CIS CSC, ISO 2700, or NIST CSF.
* Excellent written and verbal communication across all organizational levels.
* Strong organizational skills and ability to meet SLAs.
* Sound judgment and decision-making in complex scenarios.
* High integrity, trustworthiness, and adaptability.
Preferred Skills:
* Certifications such as CISSP, CISA, CRISC, or CISM.
* Technical experience with enterprise networks, applications, and directory services.
* Familiarity with enterprise GRC platforms.
Conditions of Employment
* Must be able to pass a criminal background & credit check
* This is a full-time, non-remote position
FLSA Status:
* Exempt
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Pay Range
USD $49,972.00 - USD $76,958.00 /Yr.