Cyber Analyst, Digital Forensics Incident Response
Remote job
Why you should join our At-Bay Security team:
At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to expand our DFIR team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers.
The Role:
Cybersecurity Analysts focused on Digital Forensics and Incident Response (DFIR) deliver incident investigation and response services to At-Bay insureds via:
Forensically sound collection, transmission, and storage of digital evidence
Analysis of digital evidence to identify indicators of compromise and adversary activity
Development of incident timelines and theories of compromise
Identification of incident root causes
Participation in threat actor negotiations as necessary (e.g., ransom negotiations, etc.)
Participation in incident recovery (e.g., restoration of data from backups, reimaging workstations and servers, rebuilding network infrastructure, etc.) activities as necessary
Development and delivery of incident reports to document key incident details for engagement stakeholders including executive leaders for insureds, breach coach attorneys, and At-Bay claims management staff as necessary
Development and delivery of recommendations to mitigate the risk of future incidents for impacted insureds
Development and delivery of incident response training and simulations for targeted insureds
Key skills:
Previous digital forensics and incident response experience
Strong oral and written communication skills
Previous hands-on experience performing digital forensics and incident response, including several of the following:
Business Email Compromise
Ransomware
Digital evidence collection and analysis
Development and analysis of cyber threat intelligence
Leadership of or participation in investigations involving digital evidence
Intrusion detection / cyber threat hunting
Malware analysis
Incident recovery activities such as restoration of data from backups, operation of decryptor tools, etc.
Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.)
Minimum requirements:
Bachelor's degree or equivalent
Minimum of 2 years of experience in cybersecurity operations, incident response, incident recovery, or another security discipline
Willingness to travel as needed to perform job functions
Preferred requirements:
Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity
Previous background in law enforcement or government/military with experience leading complex technical investigations
Knowledge of cloud environments, including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google)
Experience in a top-10 cyber consulting firm or leading DFIR provider preferred
One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.)
Work location:
USA, Nationwide
Fully Remote
Our estimated base pay range for this role is $80,000-$115,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent.
#LI-CK1
Auto-ApplyCyber Security Analyst II (Remote)
Remote job
is remote and can be performed from anywhere in the United States. Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions.
KEY RESPONSIBILITIES:
* Act as the primary point of escalation for Cyber Security Analyst I technicians
* Provides coaching to Cyber Security Analyst I employees on how to perform their duties
* Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats
* Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole
* Performs all of the following functions of a Cyber Security Analyst I, with proficiency
* Monitor computer networks for security issues and respond accordingly, including:
* Creating/Managing firewall rules
* Managing anti-virus endpoint tools
* Performing event correlation analysis on potential threats identified through our SIEM
* Configuring/Managing log management
* Configuring/Managing file integrity monitoring
* Performing vulnerability scans and remediation of identified risks
* The methodology & analysis of identifying compromised servers
* Performing rule tuning in our SIEM for improved detection capabilities
* Interact with customers by phone, chat, or trouble ticket on any customer facing security issues
* Investigate, document and assess security breaches and other cyber security incidents
* Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs
* Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives
* Identify and fix detected vulnerabilities to maintain a high-security standard
* Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities
* May be relied upon as a technical point of contact during Escalated Events relating to security
* Review, investigate and respond to any external "abuse" complaints coming from our IP space
* Develop best practices for IT security
* Research security enhancements and make recommendations to management
* Handle escalated internal or customer security issues from support or another operations team
* Takes part in any security-oriented projects or critical initiatives
* Stay up to date on information technology & security news, trends and standards
* Deliver an exceptional customer experience every day
* Other duties as identified or assigned
DESIRED ROLE OUTCOMES:
* Keep us and our customers free from security incidents but respond capably when one occurs
* Our detection of security threats is continually improving
* Provide valuable insights and visibility around security incidents to our customers
* Have a staff of customer focused, energetic and security savvy team members
REQUIRED SKILLS:
* A minimum of 2 years' experience in a security analyst role
* Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred
* Must have experience in a Security Operations Center (SOC)
* Must have technical troubleshooting and problem-solving skills
* Understanding of network management principles
* Experience in systems administration of Windows and Linux based operating systems
* Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies
* Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts
* Ability to identify and mitigate network vulnerabilities and explain how to avoid them
* Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact
* Ability to learn and communicate technical information to non-technical people
* Must have excellent written & oral communication skills, and strong interpersonal skills
* Must emulate the Ntirety Values in all that they do
Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA).
Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law.
Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
Cyber Security Analyst
Remote job
We are looking to add a cyber security analyst team member to our IT Department. The cyber security analyst will play a key role in enhancing and improving the security posture across the organization. You will be responsible for identifying and mitigating areas of vulnerability and potential exposure from a cyber security standpoint. The successful candidate will have hands-on and practical experience in areas of cyber and data security, cyber security methodologies and frameworks, including experience in establishing both technical and organizational controls to protect the confidentiality, integrity, and availability of data.
RESPONSIBILITIES
Provides seamless customer service support to end users in relation to cyber security within the organization.
Works closely with operations staff, IT management and information security teams.
Builds a security minded culture that keeps communication and transparency at the forefront of securing the organization.
Demonstrate working knowledge in the following: Networks and Network Security, Identity & Access Management, Data Management, Incident Management and Threat & Vulnerability Management.
Perform information security reviews and scans of designated systems to assess the effectiveness of overall system security, identify vulnerabilities and make mitigation recommendations.
Support the implementation, operation, and maintenance of vulnerability management projects.
Proactively collaborate and communicate within the IT team to address and mitigate vulnerabilities actively leveraged by malicious actors.
Recommend and support the implementation, operation, testing and on-going sustainment of HIPAA and PHI/PII security and compliance.
Constantly working to evolve and improve technologies and processes to ensure confidentiality, integrity and availability of data.
Perform enterprise vulnerability scanning, secure configuration baseline verification, tool validation, data and identity protection activities.
Detect and, as required, perform, or oversee remediation of information security vulnerabilities to minimize risks to operating environments.
Collaborates with external vendors and service providers, auditors or partner organizations to further cyber security objectives, reviews, mitigations and overall security posture improvements.
Seeks opportunities for additional responsibilities and growth within organization. Shows initiative and enthusiasm in suggesting and implementing new concepts and/or ideas for improvement.
These areas include IT cyber security support and troubleshooting, project management, system design and implementation.
Other duties as assigned.
REQUIREMENTS AND EXPERIENCE
Bachelor's Degree in Computer Science, Healthcare Information Technology, or relevant field or equivalent knowledge and skills obtained through a combination of education, training and experience required.
Knowledgeable and deep understanding of vulnerability and risk management.
Experience with NIST frameworks preferred.
Strong verbal and written communication skills required, and problem-solving ability.
Minimum of 3 years of experience with vulnerability scanning and reporting assessment tools.
Ability to articulate raw vulnerability and audit data into executive reports.
Experience with patch management software.
Understanding of SEIM / Log Aggregation tools.
Familiar with attack and exploitation techniques involving operating systems, applications, and devices.
Minimum of five (5) years of experience in configuration management compliance baselines for Windows, Mac, Linux.
Minimum of three (3) years of experience with Incident Response Team (IR/IRT) troubleshooting, root cause analysis and remediation verification.
Knowledgeable of Identity Management and authorization, least privilege, and reducing unauthorized elevated access.
Understanding of Firewalls to include basic networking, sub-netting, IDS, NAT, ACL's.
Deep knowledge of Office 365, Azure Security concepts and best practices.
Minimum of five (5) years of experience in IT, information security, cyber risk management, compliance or a related field required; of which at least 3 years' experience in information security is required.
Healthcare experience preferred.
Strong interpersonal skills and ability to work both independently and as part of a team required
Certification:
One or more relevant information security-related certifications preferred. Examples include: CISSP, CISA, HCISPP, CCSP, CRISC, CISM, CGIH, GCFA, GNFA, GPEN, GSEC, QSA and CEH.
Microsoft AZ-500 preferred.
PHYSICAL DEMANDS AND WORK ENVIRONMENT
Must have use of sensory skills to effectively communicate and interact with other employees and the public through use of the telephone, email, video conference and face to face contact
Must have manual dexterity, visual acuity and hearing acuity to effectively use and operate office related equipment such as but not limited to a computer, copier, scanner, camera, phone, headset, keyboard and mouse
Must be able to sit for extended periods of time at a keyboard and workstation with low periods of reaching and standing
EQUAL EMPLOYMENT OPPORTUNITY STATEMENT
Ingenovis Health is an equal opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination and harassment of any kind on the basis of race, color, national origin, religion, gender, gender identity, sexual orientation, disability, genetic information, pregnancy, age, or any other protected status set forth in federal, state, or local laws. This policy applies to all employment practices within our organization.
RESERVATION OF RIGHTS
Essential functions contained within this job description are listed above; they are subject to change at any time due to reasonable accommodation or other reasons set forth by management.
SIGNATURE
Employee signature below constitutes employee's understanding of the requirements, essential functions and duties of the position.
Employee Name:
Employee Signature:
Date:
Compensation Range
$78,600.00 - $98,300.00
Benefits include: health, dental, vision, FSA/HSA, company-paid life insurance, 401K with discretionary match, paid time off, paid parental leave, and tuition reimbursement.
Job will remain open until position is filled.
Auto-ApplyCyber Insider Threat Analyst (Remote)
Remote job
Country:
United States of America Remote
U.S. Citizen, U.S. Person, or Immigration Status Requirements:
U.S. citizenship is required, as only U.S. citizens are authorized to access information under this program/contract.
Security Clearance:
None/Not Required
RTX Corporation is an Aerospace and Defense company that provides advanced systems and services for commercial, military and government customers worldwide. It comprises three industry-leading businesses - Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Its 185,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Arlington, VA.
The following position is to join our RTX Enterprise Services team:
Role Overview:
Enterprise Services (ES) Cybersecurity has an immediate opening for a qualified insider threat analyst to join RTX Cyber Defense reporting to the Associate Director of Cyber Insider Threat Operations. As an insider threat analyst, you will be responsible for supporting the analysis, monitoring and triage of alerts stemming from potential insider threats.
What You Will Do:
Perform log analysis to detect anomalies, leveraging expertise in security operations tools to monitor and safeguard sensitive data. Utilize behavioral analytics and endpoint security solutions to identify and investigate unusual patterns.
Monitor potential data exfiltration points using data loss prevention tools and other security solutions to detect and prevent unauthorized transfers.
Apply Open-Source Intelligence (OSINT) techniques to gather and analyze publicly available information related to insider threats.
Identify insider threat trends and patterns to assist content teams in the development of new detection rules and models.
Articulate the implications of the risks relative to insider threats and educate team members, peers and stakeholders on the potential impacts.
Review data, alerts and behaviors to identify potential concerns from multiple angles, gather information and understand and articulate information gaps needed to inform decisions.
Work independently and with teams to define and complete analysis activities.
Document findings in a manner that technical and non-technical stakeholders understand and can articulate findings to leadership and peers.
Perform initial analysis on data from systems to identify unexpected or malicious activity across channels while understanding how activity fits into the threat landscape.
Assist in building processes, procedures and training for the insider threat team.
Collaborate with stakeholders to provide suggestions and feedback for validation and improvement of various tools, models, and processes.
Stay updated on the latest developments and trends in insider threats, emerging and/or advanced persistent attack vectors, and industry best practices, incorporating this knowledge into RTX's defense strategies.
Perform other duties as assigned and as required to continuously drive process excellence.
Qualifications You Must Have:
Typically requires a University Degree or equivalent experience and a minimum 5 years of experience, or an Advanced Degree and a minimum 3 year's experience.
Minimum 5 years supporting a cyber insider threat program and/or a cyber incident response team, including at least 3 years with cybersecurity tools and technologies used to detect and mitigate insider threats, including, but not limited to security information and event monitoring (SIEM), user entity and behavior analytics (UEBA), user activity monitoring (UAM), data loss prevention (DLP) technologies and endpoint security solutions.
Must be able to effectively communicate (verbal and written) technical and strategic details to peers, leadership, and stakeholders with varying levels of operational expertise.
The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance.
Qualifications We Prefer:
Insider Threat specific training/certifications such as CERT Insider Threat course work or Center for Development of Security Excellence (CDSE).
Industry certifications in information security or technology such as, CISSP, CISM, CGEIT.
Experience collaborating with teams inside and outside of Digital Technology (ex. Privacy, Legal, HR).
Preferred candidate will have experience with Operating System, cloud access, and web proxy event logs, endpoint/extended detection & response, and security incident & event management (SIEM) platforms.
Demonstrate critical thinking and problem-solving skills.
What We Offer: Whether you're just starting out on your career journey or are an experienced professional, we offer a robust total rewards package with compensation; healthcare, wellness, retirement and work/life benefits; career development and recognition programs. Some of the benefits we offer include parental (including paternal) leave, flexible work schedules, achievement awards, educational assistance and child/adult backup care.
Learn More & Apply Now!
Work Location: Remote
Please consider the following role type definition as you apply for this role:
Remote: This position is currently designated as remote. However, the successful candidate will be required to work from one of the 50 U.S. states (excluding U.S. Territories). Employees who are working in Remote roles will work primarily offsite (from home). An employee may be expected to travel to the site location as needed.
As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote.
The salary range for this role is 82,000 USD - 164,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
Auto-ApplyCyber Security Analyst - Incident Response
Remote job
Our client, a leading organization in the energy industry, is seeking a Cyber Security Analyst - Incident Response to join their team. As a Cyber Security Analyst - Incident Response, you will be part of the Cyber Defense team supporting enterprise-wide security operations. The ideal candidate will demonstrate analytical thinking, resilience, and collaborative skills, which will align successfully in the organization.
**Job Title:** Cyber Security Analyst - Incident Response
**Location:** Remote
**Pay Range: $65-68/hr**
**What's the Job?**
+ Support the identification, containment, eradication, and recovery of sophisticated level 2/3 cyber incidents.
+ Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve security incidents.
+ Analyze log files from various sources to identify potential threats and vulnerabilities.
+ Perform cyber defense incident triage, including scope determination and impact assessment, and recommend remediation strategies.
+ Track and document cyber defense incidents from initial detection through resolution, ensuring comprehensive reporting and artifact collection.
**What's Needed?**
+ 8+ years of experience in a cyber defense role or 4+ years with a relevant bachelor's degree.
+ Proficiency with EDR tools, Splunk, and experience with ESAs, sandboxing, and malware analysis tools.
+ Strong understanding of network principles and the cyber incident lifecycle.
+ Experience supporting incident response processes and coordinating with third-party vendors and internal teams.
+ Preferred certifications include GCIH, GSEC, GCIA, GCFE, or capture the flag experience.
**What's in it for me?**
+ Opportunity to work with a Fortune 200 company in a dynamic and impactful role.
+ Remote work flexibility to support work-life balance.
+ Engagement in cutting-edge cyber defense techniques and trend analysis.
+ Collaborative environment fostering professional growth and development.
+ Contributing to the security of critical energy infrastructure.
**Upon completion of waiting period consultants are eligible for:**
+ Medical and Prescription Drug Plans
+ Dental Plan
+ Vision Plan
+ Health Savings Account
+ Health Flexible Spending Account
+ Dependent Care Flexible Spending Account
+ Supplemental Life Insurance
+ Short Term and Long Term Disability Insurance
+ Business Travel Insurance
+ 401(k), Plus Match
+ Weekly Pay
If this is a role that interests you and you'd like to learn more, click apply now and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you!
**About ManpowerGroup, Parent Company of: Manpower, Experis, Talent Solutions, and Jefferson Wells.**
_ManpowerGroup (NYSE: MAN), the leading global workforce solutions company, helps organizations transform in a fast-changing world of work by sourcing, assessing, developing, and managing the talent that enables them to win. We develop innovative solutions for hundreds of thousands of organizations every year, providing them with skilled talent while finding meaningful, sustainable employment for millions of people across a wide range of industries and skills. Our expert family of brands -_ **_Manpower, Experis, Talent Solutions, and Jefferson Wells_** _- creates substantial value for candidates and clients across more than 75 countries and territories and has done so for over 70 years. We are recognized consistently for our diversity - as a best place to work for Women, Inclusion, Equality and Disability and in 2023 ManpowerGroup was named one of the World's Most Ethical Companies for the 14th year - all confirming our position as the brand of choice for in-demand talent._
ManpowerGroup is committed to providing equal employment opportunities in a professional, high quality work environment. It is the policy of ManpowerGroup and all of its subsidiaries to recruit, train, promote, transfer, pay and take all employment actions without regard to an employee's race, color, national origin, ancestry, sex, sexual orientation, gender identity, genetic information, religion, age, disability, protected veteran status, or any other basis protected by applicable law.
Cyber Security Analyst
Remote job
Responsibilities:
Investigate security incidents and escalate when necessary
Work Incident Response and Administrative tickets
Perform and develop data mining queries using Splunk/Splunk ES
Communicate in a clear and concise manner with Leadership, Customers and Peers
Monitor and respond to multiple shared Mailbox inquiries
Provide vulnerability, threat, and risk mitigation support
Monitor Security Operations Dashboards for alerts
Support daily Operations briefings
Monitor and answer the SOC phone hotline
Support customer defined metrics reports
Support government data calls
This opportunity offers remote work!
Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills
Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting)
Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
Global Cyber Wordings Analyst
Remote job
Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience.
Key responsibilities:
Wording library and drafting support
Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes.
Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards.
Track version control, change logs, approvals, and archiving;
Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance.
Commercial enablement
Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently.
Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives.
Triage wording queries from regions; track SLAs and referral approvals per the global governance framework.
Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards.
Regulatory and legal stewardship
Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions.
Maintain audit-ready documentation; assist with regulatory filings or attestations where required.
Claims partnership and feedback loop
Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty.
Support coverage position letters and documentation packs with research, citations, and clause histories.
Innovation and product development support
Help draft prototype wordings for new propositions
Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses.
Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics.
Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders.
Qualifications
Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience.
2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred.
Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail.
Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous.
Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates.
Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools.
Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs.
Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting.
About Us
Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role.
At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve.
We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: ***********************
Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law.
Fair Chance Notices
California
Los Angeles Incorporated
Los Angeles Unincorporated
Philadelphia
San Francisco
We can recommend jobs specifically for you! Click here to get started.
Auto-ApplySenior Cyber Security Ops Analyst | Remote | Contract
Remote job
Senior Cyber Security Ops Analyst
Applicants Need To Know
6+ Month Contract
Work Status: USC, GC
Sponsorship: No, Sponsorship provided.
Office Type: Remote
Hourly Rate: $75 to $85 W2 Only
No Corp-to-Corp
Please note that only candidates who are authorized to work in the United States without sponsorship will be considered for this position.
We seek a Senior Cyber Security Ops Analyst for our client. This is a contract position lasting 6+ months. The role is remote and requires availability in the Eastern or Central time zones.
As a Sr Cyber Security Ops Analyst, you will be responsible for security monitoring and incident response for both internal and external threats. You will collaborate with internal IT teams and MSSP to ensure effective security monitoring and response. Additionally, you will implement advanced security monitoring techniques to identify malicious behavior and develop automation response scripts to remediate commodity threats. Your role will also involve performing threat analysis utilizing industry standard frameworks and conducting threat research to improve detection and response capabilities. You will have the opportunity to propose and review security plans and policies to enhance the overall security environment.
The Work:
Conduct investigations and respond to internal and external security threats.
Oversee, respond to, and remediate DLP (data loss prevention) and SIEM events from on-premise and cloud systems.
Implement advanced security monitoring techniques to identify malicious behavior on SaaS, cloud systems, network, servers, and endpoints.
Manage, administer, and improve security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry-standard security technologies.
Develop automation response scripts to remediate commodity threats.
Perform threat hunting activities to identify compromised resources.
Understand and perform threat analysis utilizing industry-standard frameworks (kill chain and diamond model).
Perform threat research and intelligence gathering to improve detection and response capabilities.
Propose and review security plans and policies to improve the security environment.
Maintain operational playbooks, process diagrams, and documentation for security monitoring and response.
Review proposed Security deployments to ensure security monitoring requirements are met.
Provide off-hour support as needed for security monitoring and response activities.
Work closely with MSSP services, external forensic providers, and in-house IT teams to respond to and remediate security incidents both internal and external.
Review compromised systems to identify the root cause of security incidents.
Qualifications:
Minimum of 5 years of experience in security monitoring and incident response
Strong knowledge of DLP (data loss prevention) and SIEM events
Experience with advanced security monitoring techniques on SaaS, cloud systems, network, servers, and endpoints
Proficiency in managing and administering security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry standard security technologies
Ability to develop automation response scripts for commodity threats
Familiarity with threat hunting activities to identify compromised resources
Understanding of threat analysis utilizing industry standard frameworks (kill chain and diamond model)
Experience in threat research and intelligence gathering to improve detection and response capabilities
Knowledge of reviewing security plans and policies to enhance the security environment
Strong documentation skills for operational playbooks, process diagrams, and security monitoring/response documentation
Ability to review proposed Security deployments to ensure compliance with security monitoring requirements
Willingness to provide off-hour support for security monitoring and response activities
Nice to Have:
Experience with cloud security technologies such as CASB, Cloud Access Security Brokers
Knowledge of scripting languages such as Python or PowerShell
Familiarity with industry compliance standards (e.g., PCI DSS, HIPAA, GDPR)
Certifications in relevant areas such as CISSP, CISM, or CEH
Experience working with incident response tools and processes
#CyberSecurity #SecurityOps #IncidentResponse #ThreatAnalysis #SecurityMonitoring #DataLossPrevention #SIEMEvents #CloudSecurity #EndpointSecurity #ITSecurity
Consultant - Cyber Security Analyst (Fractional/Contract Role)
Remote job
Join our experienced roster of consultants that support Hedge Funds and Family Offices. Arootah is a personal and professional development leader in the Investment and Financial Services industry. Our mission is to provide top business advisory services to our hedge fund client base. We focus our Business Consulting on the multi-faceted needs of Hedge Funds and Family Offices.
Arootah was founded by Rich Bello, the Co-Founder and COO of the industry-leading $10 billion hedge fund, Blue Ridge Capital. Rich brings more than 30 years of experience, including leadership positions at Morgan Stanley, Tiger Management, and Ernst & Young.
Visit us at **************************************** for more information. WHO WE NEED: Arootah is searching for experienced Cybersecurity Analysts to consult to our highly prestigious client base. As a consultant, you will work with our Hedge Fund and Family Office clients to provide expert advice. Having previously served in this role, you have specific, hands-on experience implementing, maintaining, and operating a cybersecurity program for a leading Hedge Fund or Family Office.
What You'll Do
Best practice reviews.
Developing realistic and effective action plans.
Breaking apart goals into actionable steps.
Advising on vendor selection and oversight.
Creating and implementing policies, procedures, and control measures.
Evaluating each client's advancement toward goal actualization through key performance indicators (KPIs) and scoring matrices.
Special projects or other areas of need.
Implement and assist with the day-to-day operations of securing the firm's various information systems by providing technical expertise in all areas of network, system, and application security.
Protect sensitive information by installing and configuring security software like firewalls and encryption programs.
Monitor network traffic and analyze records like authentication logs to identify and investigate anomalies to prevent and detect security incidents.
Lead the firm's vulnerability management program, conduct the annual cybersecurity assessments and penetration tests, and research and report on emerging threats, to help the firm take pre-emptive risk mitigation steps.
Implement organization-wide security best practices to protect the business against existing, new, and emerging security threats.
Test and analyze the organization's business continuity and disaster recovery plan to ensure operations will continue in the event of a cyberattack or natural disaster.
Assesses new security technologies to determine potential value for the firm.
Execute and carry out firm incident response program to identify and prevent all potential breaches (internal or external), or misuse of data, that may occur.
Review, investigate, and respond to real-time alerts within the environment.
Generate real-time and historical reports for internal and external stakeholders regarding security and/or compliance violations.
Qualifications
A Bachelor's degree in Computer Science, Computer Engineering, Information Systems, Information Sciences, or a related field, with a strong academic record.
One or more of the following certifications: CEH, CISM, CompTIA Security+, CISSP, GSEC, GCIH, GNFA, GREM or other related SANS certifications.
5+ years of specific experience as a Cybersecurity Analyst at a hedge fund or family office.
Working experience with one or more of the following technology vendors and products: Splunk Cloud, Rapid7 Nexpose Vulnerability Scanner, Sophos Antivirus, Varonis DatAlert, ForeScout CounterACT, or similar.
Thorough understanding of Microsoft's enterprise technology platform, including Azure, Active Directory, SQL, Office365, and the Windows server and desktop operating systems.
In-depth knowledge of security event management, network security monitoring, investigating common types of attacks, network packet analysis, log collection and analysis, and reviewing security events.
Demonstrated experience implementing and/or enforcing security and compliance frameworks such as NIST, Cobit, and ISO.
Strong writing and presentation skills are requiredin order to communicate findings and recommendations, as well as the ability to articulate security-related concepts to a broad range of technical and non-technical staff.
Job Status
Contractor
Hours are based on the needs of the assigned client (0-40 hours per week).
Join a well-funded disruptor in finance and technology. Enjoy the flexibility of remote work and choosing your assignments. Be part of a dynamic, high-energy company in its expansion stage. Now is the time to join!
For more information, visit us at Arootah.com.
Auto-ApplySenior Information Security Risk Specialist (GRC)
Remote job
About Us
At SentinelOne, we're redefining cybersecurity by pushing the limits of what's possible-leveraging AI-powered, data-driven innovation to stay ahead of tomorrow's threats.
From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We're looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you're excited about solving complex challenges in bold, innovative ways, we'd love to connect with you.
What are we looking for?
We are looking for a highly motivated, collaborative and experienced Senior InfoSec Risk Specialist with a security-focused mindset who can balance risk, business drivers and timelines. This position will be responsible for understanding and supporting the design of SentinelOne's organizational, procedural and technological security controls within the context of the security frameworks applicable to SentinelOne. In addition, you will be responsible for identifying and testing appropriate controls to ensure they are designed, implemented, and operating effectively to mitigate risk. The selected employee will help implement, automate, document and maintain controls while supporting and responding to inquiries from internal and external stakeholders. This individual must be self-directed and be able to work independently and collaboratively.
What will you do?
Support the planning and performance of IT risk-based security audits and projects, risk assessments, execution of fieldwork and communication to stakeholders.
Help in evaluating relevant global standards, compliance frameworks and regulations to analyze existing controls; identify areas for improvement; and design control growth.
Collaborate with process and control owners through the audit lifecycle for process documentation updates, testing coordination, remediation of identified deficiencies and advising on internal control enhancements or process changes, as appropriate.
Proactively manage audit findings, tracking and documentation of status updates obtained via action owners, and timely execution of remediation activities.
Participate in internal security and compliance programs and track recurring controls, such as SSAE 18 SOC 2, ISO 27001/27002.
Provide control consultative support to the business to assist in redesign efforts to improve the control environment and identify opportunities for control improvements with the objective of mitigating risk and improving compliance and operational performance.
Help support internal/external audits and evidence collection via a GRC tool.
Document new and update existing policies, procedures, standards and resources
Participate in Security awareness program, train personnel on data security and privacy-related processes and responsibilities.
Help support customer security reviews, RFPs and external security and privacy inquiries.
Participate in defining, collecting and tracking various Security Metrics.
What skills and experience should you bring?
5+ years of experience working in information security, risk or compliance.
Experience working with Security Controls across at least some of the following domains: Access Management, Encryption, Risk Management, Network Security, Configuration Management, Patch Management, Change Management, Awareness and Training, BC/DRP, etc.
Ability to perform internal audits with minimal direct supervision, exhibit professional audit judgment and have experience in a broad range of audit projects such as SSAE 16/18 SOC 2, ISO 27001/2, NIST.
Strong risk management experience, performing assessments and audits, designing controls, managing enterprise control frameworks, and prioritizing risk.
Strong project management skills and ability to manage a variety of projects simultaneously to completion within the agreed timelines.
Excellent collaboration and interpersonal skills. Must be able to communicate with all levels in the organization.
Ability to communicate effectively, in writing and verbally, to target audiences, including customers, partners, auditors, executive management, vendors, and peers.
Experience working with both technical and non-technical teams.
Ability and desire to understand the intent of requirements and provide effective recommendations.
Ability to prioritize in a highly dynamic work environment.
Our Preferred Qualifications:
Advanced degree in computer science, Information Technology, Information Security or related field.
Experience with, and strong understanding of common Security Compliance frameworks, controls, and best practices such as COSO, SOC 2, SOX ITGC, ISO 27001/27002, GDPR, PCI, NIST and other applicable regulatory compliance frameworks.
Relevant certifications (ISO 27001 LA/LI, CISA, CISM, CISSP, CRISC, etc.)
Ability to assess and pragmatically define scope and relevant controls.
Strong desire to learn and continuously develop and deepen technical skills.
Why us?
You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry.
Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
Unlimited PTO
Industry-leading gender-neutral parental leave
Paid Company Holidays
Paid Sick Time
Employee stock purchase program
Disability and life insurance
Employee assistance program
Gym membership reimbursement
Cell phone reimbursement
Numerous company-sponsored events, including regular happy hours and team-building events
This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply. If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions.
Base Salary Range$104,000-$138,000 USD
SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
SentinelOne participates in the E-Verify Program for all U.S. based roles.
Auto-ApplySenior Security GRC Analyst
Remote job
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
*Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
Manage IT Risk Register including risk identification, tracking, and prioritization.
Assist with and drive remediation of control deficiencies and gaps
Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
Assist control owners with root cause analysis and track risk management action plan progress.
Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements
You
Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
Experience in the machine learning or computer hardware industry
Experience with Security by Design and/or Privacy by Design principles
Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
Founded in 2012, with 500+ employees, and growing fast
Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
Our values are publicly available: *************************
We offer generous cash & equity compensation
Health, dental, and vision coverage for you and your dependents
Wellness and commuter stipends for select roles
401k Plan with 2% company match (USA employees)
Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
Auto-ApplySecurity Systems Engineer (Remote)
Remote job
The application window is expected to close on 12/08/2025. Job posting may be removed earlier if the position is filled or if a sufficient number of applications are received. **AI at Cisco** With Cisco, you're not just embracing the future - you're helping create it! We are focused on integrating AI into our solutions to transform collaboration, security, networking, observability, and more. We are innovating ethical AI products and infrastructure that enable our customers to stay ahead of cyberattacks, predict and prevent network outages, and make team meetings more productive. Our extensive data sets and broad customer reach means limitless possibilities for you to build impactful AI solutions that solve a wide array of real-world problems. Join us at Cisco where you will innovate with top AI experts and be a part of our mission to power an inclusive future for all.
**AI in the Business Unit**
The Cisco Security group includes such industry leading security suites and products as Hypershield, Cisco Secure Access, Identity Intelligence, Duo, XDR, Cisco Security AI, Talos, and more. We are using machine learning and GenAI across our products to simplify security, prevent sophisticated attacks, and ensure the secure use of large language models (LLMs).
In Security, we are building AI-enhanced cybersecurity for better outcomes, combining AI with the breadth of Cisco telemetry across the network, private and public cloud infrastructure, applications, internet, email, and endpoints. With Security AI, we make it simple to use natural language instruction and interact with GenAI - from deploying and managing firewall policies to streamlining incident response. With Duo, we are creating extensive machine learning and analytics to detect and block suspicious users. We are harnessing our rich security expertise in conjunction with AIML to transform the way we assist, augment, and automate security efforts for our customers! We need your help to tip the scale in favor of defenders and enable enterprises everywhere to cancel bad actors.
**Meet the Team**
You will be a part of our Cisco Security Innovation team within the Security Business Group. This team incubates ideas that turn into the future of Cisco's innovative security solutions. You will play a pivotal role in driving scalable performance AI models to improve the efficacy of threat detections. You will bring your expertise in deep learning and large transformer models conduct research, design and development of state-of-the-art ML/AI techniques applicable to threat detection, including anomaly detection, behavioral analysis, signature generation, and predictive modeling. The techniques are focused toward realtime efficacy and evaluating scalable architectures.
**Your Impact**
+ Leverage modern AI/ML techniques to improve the accuracy of threat detection solutions and automate/accelerate manual analysis processes.
+ Develop and implement advanced machine learning models across different hardware environments (including cloud and network edge); models may include adapting neural network architectures or creating novel ones to address challenges.
+ Develop methods to identify performance metrics and efficacy of the models especially of the hardware accelerated models.
+ Analyze and extract significant patterns in high-dimensional data spaces using advanced techniques.
+ Implement robust software systems for integrating and maintaining machine learning models.
+ Collaborate with software engineering teams to design primary deployment strategies for machine learning models into security systems.
+ Establish and maintain best practices for machine learning and security operations, including clear documentation of models and procedures.
**Minimum Qualifications:**
+ Bachelor's degree or higher in Computer Science or related field
+ 5+ years of related security experience, specifically in the areas of network security environments
+ Experience with multi-threaded environments
+ Experience with Linux operating systems and embedded Linux environments
**Preferred Qualifications:**
+ Master's or PhD degree in Computer Science, Computer Engineering, or a related field
+ Experience with state-of-the art machine learning techniques and libraries
+ Debugging skills in complex hardware/software
+ Coding experience with Python, C/C++, etc.
+ Experience with software development environments and version control systems (e.g. Git)
+ A strategic problem solver in the areas of threat detection and analysis
+ Experience optimizing machine learning or deep learning models for specific hardware
+ Familiarity with hardware acceleration libraries (e.g., Morpheus, cu DNN, TensorRT, OpenVINO).
+ Experience with containerization technologies (e.g., Docker, Kubernetes) in the context of hardware-specific deployments
+ Knowledge of cybersecurity concepts and threat detection methodologies
+ Low-level Kernel coding experience
**Why Cisco?**
At Cisco, we're revolutionizing how data and infrastructure connect and protect organizations in the AI era - and beyond. We've been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint.
Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you'll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere.
We are Cisco, and our power starts with you.
**Message to applicants applying to work in the U.S. and/or Canada:**
The starting salary range posted for this position is $165,000.00 to $241,400.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation*, equity, or benefits.
Individual pay is determined by the candidate's hiring location, market conditions, job-related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process.
U.S. employees are offered benefits, subject to Cisco's plan eligibility rules, which include medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, paid parental leave, short and long-term disability coverage, and basic life insurance. Please see the Cisco careers site to discover more benefits and perks. Employees may be eligible to receive grants of Cisco restricted stock units, which vest following continued employment with Cisco for defined periods of time.
U.S. employees are eligible for paid time away as described below, subject to Cisco's policies:
+ 10 paid holidays per full calendar year, plus 1 floating holiday for non-exempt employees
+ 1 paid day off for employee's birthday, paid year-end holiday shutdown, and 4 paid days off for personal wellness determined by Cisco
+ Non-exempt employees** receive 16 days of paid vacation time per full calendar year, accrued at rate of 4.92 hours per pay period for full-time employees
+ Exempt employees participate in Cisco's flexible vacation time off program, which has no defined limit on how much vacation time eligible employees may use (subject to availability and some business limitations)
+ 80 hours of sick time off provided on hire date and each January 1st thereafter, and up to 80 hours of unused sick time carried forward from one calendar year to the next
+ Additional paid time away may be requested to deal with critical or emergency issues for family members
+ Optional 10 paid days per full calendar year to volunteer
For non-sales roles, employees are also eligible to earn annual bonuses subject to Cisco's policies.
Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components, subject to the applicable Cisco plan. For quota-based incentive pay, Cisco typically pays as follows:
+ .75% of incentive target for each 1% of revenue attainment up to 50% of quota;
+ 1.5% of incentive target for each 1% of attainment between 50% and 75%;
+ 1% of incentive target for each 1% of attainment between 75% and 100%; and
+ Once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation.
For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay 0% up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.
The applicable full salary ranges for this position, by specific state, are listed below:
New York City Metro Area:
$165,000.00 - $277,600.00
Non-Metro New York state & Washington state:
$146,700.00 - $247,000.00
* For quota-based sales roles on Cisco's sales plan, the ranges provided in this posting include base pay and sales target incentive compensation combined.
** Employees in Illinois, whether exempt or non-exempt, will participate in a unique time off program to meet local requirements.
Cisco is an Affirmative Action and Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis.
Cisco will consider for employment, on a case by case basis, qualified applicants with arrest and conviction records.
Information Security Support Analyst, Contract
Remote job
Overview of 66degrees
66degrees is a leading consulting and professional services company specializing in developing AI-focused, data-led solutions leveraging the latest advancements in cloud technology. With our unmatched engineering capabilities and vast industry experience, we help the world's leading brands transform their business challenges into opportunities and shape the future of work.
At 66degrees, we believe in embracing the challenge and winning together. These values not only guide us in achieving our goals as a company but also for our people. We are dedicated to creating a significant impact for our employees by fostering a culture that sparks innovation and supports professional and personal growth along the way.
Overview of Role
A client of 66degrees' is seeking a junior contractor to engage on a 8+-month remote contract with the potential to extend/convert into a permanent role with the client. Interested candidates should have the following required skills and the ability to work independently as well as within a team environment.
The Information Security Support Contractor will function as a member of the Security Support team and help support day-to-day operations. This role will focus on frontline duties and interact with technical and business units. This role requires strong teamwork and initiative, along with the ability to build and maintain relationships across technical and business units. Excellent communication skills are essential.
Responsibilities
Provide level 1 support for incident and request tickets escalated from other technical teams.
Contribute to protecting the integrity and confidentiality of client data and infrastructure while enabling business functionality in all systems and environments by learning to support applicable security solutions.
Learn about the security tools and solutions implemented within the organization.
Assist in improving processes, identify efficiencies, and recommend solution enhancements to improve service-level delivery.
Support the client Information Security Governance & Compliance team as needed during risk assessments, internal and external Information Security Audits, and Vendor reviews.
Assist in supporting the Identity Access Management team.
Gather and report on key organizational information security metrics.
Qualifications
1-3 years of experience as an Information Security Analyst or experience in an IT support capacity.
Required experience working with:
Active Directory/Azure
File Share Permissions
Email security understanding
Mimecast or a similar solution
Keeper - Nice to have
zScaler - Nice to have
Strong communication, good customer service experience and flexibility with change are all required.
Eagerness to work in a collaborative environment.
66degrees is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to actual or perceived race, color, religion, sex, gender, gender identity, national origin, age, weight, height, marital status, sexual orientation, veteran status, disability status or other legally protected class.
Auto-ApplySenior Information Security Specialist-SECRET CLEARANCE REQUIRED
Remote job
Primary Responsibilities:
Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization.
Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation.
Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts.
Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment.
Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats.
Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps.
Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment.
Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures.
Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance.
Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments.
All other duties as assigned by management.
Qualifications
Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education.
Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies.
Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS).
Minimum of (5) years of experience with Security Information and Event Management (SIEM).
Minimum of five (5) years of experience in the risk management framework.
Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases.
Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred.
Must have an active DoD Secret Clearance.
Auto-ApplyCloud Security Analyst (Remote)
Remote job
Join the cybersecurity company that puts security first; literally and without compromise. At KnowBe4, our AI-driven Human Risk Management platform empowers over 70,000 organizations worldwide to strengthen their security culture and transform their workforce from their biggest vulnerability into their strongest security asset. As the undisputed industry standard with unusually high customer retention rates and recognition as a Leader by G2 and TrustRadius, we're not just providing security awareness training - we're redefining what it means to be a trusted security partner in an increasingly complex threat landscape.
Our team values radical transparency, extreme ownership, and continuous professional development in a welcoming workplace that encourages all employees to be themselves. Whether working remotely or in-person, we strive to make every day fun and engaging; from team lunches to trivia competitions to local outings, there is always something exciting happening at KnowBe4.
Remote positions open to the US only.
The Opportunity
Join our Information Security team as the person responsible for monitoring and protecting KnowBe4's cloud infrastructure. As Cloud Security Analyst, you'll be the first responder for security alerts across our AWS and Azure environments; triaging, investigating, and coordinating responses that protect both company and customer data. You'll own the day-to-day security operations that keep our cloud ecosystem secure: analyzing alerts, hunting threats, investigating incidents, and partnering with engineering teams to ensure vulnerabilities get fixed before they become problems. The successful candidate stays calm under pressure, stays curious about new attack vectors, builds tools to make their job easier, and is passionate about cybersecurity.
What You'll Do
Security Monitoring & Response: Continuously monitor and triage alerts from SIEM, CSPM, CWPP, and cloud security tools - identifying what's a real threat, what needs immediate action, and what requires deeper investigation.
Incident Management: Serve as primary responder for cloud security incidents, leading investigation efforts from initial detection through containment, eradication, and recovery while keeping stakeholders informed throughout.
Threat Hunting & Analysis: Proactively hunt for threats across security log feeds, perform root cause analysis on vulnerabilities and incidents, and stay ahead of emerging attack patterns using frameworks like MITRE ATT&CK.
Alert Engineering: Build and refine security alerts and dashboards that catch the signals that matter - reducing noise while ensuring critical issues surface quickly and clearly.
Security Testing & Validation: Conduct security reviews and penetration testing across cloud infrastructure, identifying weaknesses before attackers do and validating that our defenses actually work.
Cross-Team Collaboration: Partner closely with IT, engineering, and development teams to ensure security findings are understood, prioritized appropriately, and remediated with solid engineering principles-not just quick fixes.
What You Bring
2+ years of hands-on experience in cloud security, information security operations, or similar roles where you've monitored alerts, investigated incidents, and worked within AWS and/or Azure environments.
Practical cloud security knowledge with demonstrated ability to navigate cloud environments, understand misconfigurations, and think like an attacker to anticipate where vulnerabilities hide.
Builder mindset with AI-assisted development skills - you actively leverage AI tools to write scripts, automate repetitive tasks, and solve your own problems rather than waiting for someone else to build solutions for you.
Security operations foundation - you understand how to triage alerts, distinguish true positives from noise, investigate incidents methodically, and communicate findings clearly to both technical and non-technical audiences.
Strong organizational skills and time management - you can juggle multiple security investigations simultaneously, prioritize what needs attention now versus what can wait, and keep track of incidents through resolution without dropping details.
Some experience with offensive security - you know your way around infosec testing tools, understand OWASP Top 10, can think through how attackers exploit cloud environments, and have some exposure to penetration testing concepts.
Comfort across technical domains - basic scripting ability, Linux command line navigation, understanding of application concepts (APIs, containers, databases), and some experience working with infrastructure-as-code tools like Terraform or CloudFormation.
Bonus points if you have:
Cloud security certifications (AWS Security Specialty, Azure Security Engineer, or similar professional credentials that validate your expertise).
Bachelor's degree in information security, information systems, computer science, or related technical field.
Experience with MITRE ATT&CK Framework in practical incident response scenarios where you've mapped adversary techniques to actual alerts.
Background deploying security tooling as code - building alerts, automation, or security solutions using proper engineering principles that others can actually use and maintain.
Why You'll Love It Here
Builder-Friendly Culture: We encourage you to solve your own problems with good engineering principles; everything is deployed through Terraform, following the same standards as our development teams-you'll write solutions that scale, not just quick scripts.
Remote Flexibility: Fully remote position open across the US, giving you the autonomy to work where you're most effective while staying connected to a collaborative security team.
Continuous Learning: Budgets for certifications, conferences, and dedicated exploration time to research new tools and stay current
Transparency and Trust: Radical candor, low ego, high accountability
Global Scale: Your work will help protect users across 70,000+ organizations worldwide.
The base pay for this position ranges from $80,000 - $85,000, which will vary depending on how well an applicant's skills and experience align with the job description listed above.
We will accept applications until 12/30/2025.
Our Fantastic Benefits
We offer company-wide bonuses based on monthly sales targets, employee referral bonuses, adoption assistance, tuition reimbursement, certification reimbursement, and certification completion bonuses - all in a modern, high-tech, and fun work environment. For more details about our benefits in each office location, please visit *********************************
Note: An applicant assessment and background check may be part of your hiring procedure.
Individuals seeking employment at KnowBe4 are considered without prejudice to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, sexual orientation or any other characteristic protected under applicable federal, state, or local law. If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please visit **********************************************
No recruitment agencies, please.
Auto-ApplyInformation Systems Security Officer (ISSO) - ATO & Compliance
Remote job
At Broadway Ventures, we transform challenges into opportunities with expert program management, cutting-edge technology, and innovative consulting solutions. As an 8(a), HUBZone, and Service-Disabled Veteran-Owned Small Business (SDVOSB), we empower government and private sector clients by delivering tailored solutions that drive operational success, sustainability, and growth. Built on integrity, collaboration, and excellence, we're more than a service provider-we're your trusted partner in innovation.
We are seeking an experienced System Security Officer (SSO) to support the CMS Review and Validation Contractor (RVC) Program. This role is responsible for ensuring all systems meet CMS business partner security requirements, including obtaining and maintaining the Authority to Operate (ATO) and participating in all phases of the Security Assessment and Authorization (SA&A) process.
The SSO ensures full compliance with federal and CMS information security standards, including IOM Pub. 100-17 and the CMS Business Partner System Security Manual (BPSSM). This position may also provide security oversight for additional lines of business.
Key Responsibilities
Lead efforts to obtain, maintain, and renew the Authority to Operate (ATO) for CMS systems.
Oversee and participate in the Security Assessment and Authorization (SA&A) process.
Ensure all RVC systems maintain compliance with CMS information security requirements and federal cybersecurity frameworks.
Implement and monitor adherence to the CMS Business Partner System Security Manual (BPSSM) and IOM Pub. 100-17.
Develop, manage, and enforce IT security policies, procedures, and protocols.
Conduct continuous monitoring, vulnerability assessments, and risk mitigation planning.
Prepare documentation, security artifacts, and reports for CMS audits and reviews.
Collaborate with technical teams, leadership, and CMS security personnel to ensure secure system operations.
Support security incident response, reporting, and remediation activities.
Provide subject matter expertise for additional programs or business lines as needed.
Required Qualifications
Minimum 3 years of hands-on experience with IT system security policies, procedures, and practices in large organizations.
Practical experience supporting federal cybersecurity requirements, SA&A, or RMF-based compliance programs.
Strong understanding of ATO processes, federal security controls, and continuous monitoring requirements.
Education & Certifications
Bachelor's degree in an Information Technology, Cybersecurity, Computer Science, or related field from an accredited institution.
Must be a credentialed Information Systems Security Professional (e.g., CISSP, CAP, CISM*, etc.).
*CISSP is most strongly aligned with CMS expectations.
Preferred Skills
Experience supporting CMS, HHS, or other federal healthcare security programs.
Working knowledge of NIST RMF, FISMA, and federal cybersecurity standards.
Strong communication, documentation, and stakeholder collaboration skills.
Ability to manage multiple priorities and security initiatives simultaneously.
Why Join Us
Opportunity to play a critical role in protecting systems supporting the Medicare program.
Work in a mission-driven environment focused on compliance, security, and public service.
Competitive compensation and comprehensive benefits package.
How to Apply
Submit your resume highlighting your ATO/SA&A experience, federal security expertise, and cybersecurity credentials.
What to Expect Next:
After submitting your application, our recruiting team members will review your resume to ensure you meet the qualifications. This may include a brief telephone interview or email communication with a recruiter to verify resume specifics and discuss salary requirements. Management will be conducting interviews with the most qualified candidates. We perform a background and drug test prior to the start of every new hires' employment. In addition, some positions may also require fingerprinting.
Broadway Ventures is an equal-opportunity employer and a VEVRAA Federal Contractor committed to providing a workplace free from harassment and discrimination. We celebrate the unique differences of our employees because they drive curiosity, innovation, and the success of our business. We do not discriminate based on military status, race, religion, color, national origin, gender, age, marital status, veteran status, disability, or any other status protected by the laws or regulations in the locations where we operate. Accommodations are available for applicants with disabilities.
Auto-ApplyPre-Sales Security Systems Engineer - Access Control & CCTV
Remote job
This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Remote Pre-Sales Security Systems Engineer - Access Control & CCTV (REVIT/AUTOCAD Specific) in United States.
This role offers the opportunity to work on advanced electronic security and life safety solutions for a variety of clients. The engineer will provide design, technical support, and pre-sales assistance for projects involving access control, CCTV, intrusion detection, and other security systems. This position requires proficiency in Revit and CAD (AutoCAD) to develop accurate system designs and documentation. You will collaborate with internal teams, external partners, clients, and subcontractors to ensure project success. The role is highly technical, involving the review of architectural and engineering plans, developing solution documentation, and supporting on-site implementations. This is a remote position with opportunities to contribute to high-value security projects and learn emerging technologies in the field.
Accountabilities:
Design, develop, and implement solutions for security system installations, upgrades, and conversions.
Review architectural, electrical, telecommunication, and security engineering plans, riser drawings, device schedules, and detail drawings.
Provide Revit-based system designs, CAD support, and create technical documentation including drawings, BOMs, and solution summaries.
Support internal and on-site team members with technical guidance and troubleshooting.
Assist in preparing responses to RFIs/RFPs and contribute to project planning and client solutions.
Stay current on emerging electronic security technologies and industry-leading vendors.
Requirements
3-7 years of relevant experience in electronic security design, installation, or engineering.
Associate or Bachelor's degree in a related field preferred, or equivalent industry experience.
Proficiency in Revit with CAD (AutoCAD) for supporting system designs.
Strong understanding of access control, CCTV, intrusion detection, and related security technologies.
Professional certifications or training preferred (Lenel, Genetec, C-Cure, Avigilon, Axis, Bosch, Milestone, etc.).
Strong organizational, analytical, and problem-solving skills.
Excellent verbal, written, and presentation communication skills.
Experience with Microsoft Office, Microsoft Project, Visio, BlueBeam, and other design software preferred.
Ability to manage multiple tasks independently and prioritize effectively.
Benefits
Competitive compensation based on experience and qualifications.
Remote work flexibility with potential project-based travel.
Professional development and exposure to cutting-edge security technologies.
Opportunity to work with cross-functional teams on high-value projects.
Comprehensive benefits package depending on eligibility (medical, dental, vision, etc.).
Jobgether is a Talent Matching Platform that partners with companies worldwide to efficiently connect top talent with the right opportunities through AI-driven job matching.
When you apply, your profile goes through our AI-powered screening process designed to identify top talent efficiently and fairly:
🔍 Our AI evaluates your CV and LinkedIn profile thoroughly, analyzing your skills, experience, and achievements.
📊 It compares your profile to the job's core requirements and past success factors to determine your match score.
🎯 The top 3 candidates with the highest match are automatically shortlisted.
🧠 When necessary, our human team may perform an additional manual review to ensure no strong profile is missed.
The process is transparent, skills-based, and free of bias - focusing solely on your fit for the role. Once shortlisted, your profile is shared with the hiring company, who will manage interviews and next steps.
Thank you for your interest!
#LI-CL1
Auto-ApplyRemote Pre-Sales Security Systems Engineer - Access Control & CCTV (REVIT /AUTOCAD Specific)
Remote job
Together, We Enhance Innovation and Growth
i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations.
i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most.
This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success.
Responsibilities
This position requires Revit as the primary focus with CAD proficiency (AutoCAD) required for supporting certain systems and projects.
Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure.
Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings.
Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions.
Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses.
Create solution design documentation (drawings, BOMs, solution design summaries).
Provide technical support for in-office and on-site team members.
Support management in the process of creating documentation for implementing new technology with new and existing customers.
Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors.
Qualifications
A minimum of 3-7 years previous experience in the industry.
Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background.
Experience in the design and planning of access control and video systems.
Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred.
This position requires Revit as the primary focus with CAD proficiency (AutoCAD) required for supporting certain systems and projects.
Other Eligibility Requirements
Ability to manage time and multiple tasks without supervision.
Organizational skills & detail oriented.
Good analytical and problem-solving skills.
Excellent presentation, writing skills, verbal, and written customer communication skills.
Experience in computer programs such as Microsoft Office, Adobe, etc. preferred. Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus.
Company Overview
This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: ***************************************
"Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here:
***********************************************************************************************************************************************************************************
Equal Opportunity Statement
We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
Auto-ApplyStaff Information Security Analyst
Remote job
Why PlayStation?
PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more.
PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team.
The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation.
Sony Interactive Entertainment LLC seeks a Staff Information Security Analyst in San Mateo, CA to define strategic GRC (Governance, Risk and Compliance) input in global initiatives, including Artificial Intelligence (AI) and Machine Learning (ML) adoption, cloud security, and enterprise wide policies, ensuring resilience while balancing business and regulatory needs. Requires a Master's degree in Cybersecurity, Information Security, or related field or equivalent, and four (4) years of experience conducting risk assessments on critical information systems to maintain and manage risk registers; facilitating the Security Risk Assessment methodology, policy, strategy and process; writing security assessment reports following security breaches and detailing the associated impact; monitoring and reviewing IT Security controls to identify operational effectiveness; mapping security controls to policies, standards, procedures and processes to ensure compliance with security measures; managing security remediation efforts and tracking status of security deficiencies; translating security risk mitigation plans into actionable items to mitigate risk in coordination with technical and business teams; developing and implementing policy frameworks for emerging technologies, including AI/ML and cloud security, with governance and legal stakeholders; applying industry standards including NIST, ISO 27001, and PCI DSS in support of organizational security objectives; supporting the evaluation of third-party vendor security through documentation review and risk assessment; contributing to the enhancement of vendor onboarding and compliance workflows; and, in executing duties, utilizing Archer GRC, ServiceNow, Splunk, JIRA, Confluence, SharePoint, Palo Alto Prisma Cloud and AWS. Telecommuting and/or working from home may be permissible pursuant to company policies. Sony is an EOE.
Salary range: $185,639.00 - $261,000.00/year
Equal Opportunity Statement:
Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category.
We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond.
PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
Auto-ApplyInformation Security Controls Analyst
Remote job
About the Role:
United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization.
What You'll Do:
Review and document the adequacy of security and technology controls across business and IT environments.
Evaluate control posture through interviews, documentation reviews, and workflow analysis.
Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls.
Partner with risk management and security leadership to align controls with organizational risk tolerance.
Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance.
Document and advocate for control improvements that balance risk with operational efficiency.
Support control development across testing, QA, and production environments.
Present control effectiveness reports to senior risk leadership.
Stay current on regulatory requirements, internal policies, and industry best practices.
Participate in required compliance training and support internal/external audit activities.
What We're Looking For:
• Experience:
3+ years in cybersecurity or IT practitioner roles.
2+ years in IT risk or controls analysis.
Practical experience with risk management and IT control frameworks.
• Education:
Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field.
• Required Skills:
Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST).
Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA).
Experience with CIS CSC, ISO 2700, or NIST CSF.
Excellent written and verbal communication across all organizational levels.
Strong organizational skills and ability to meet SLAs.
Sound judgment and decision-making in complex scenarios.
High integrity, trustworthiness, and adaptability.
• Preferred Skills:
Certifications such as CISSP, CISA, CRISC, or CISM.
Technical experience with enterprise networks, applications, and directory services.
Familiarity with enterprise GRC platforms.
Travel:
Up to 5% travel required.
Supervisory Responsibility:
This position does not have direct supervisory responsibilities.
Conditions of Employment:
Must be able to pass a criminal background & credit check
This is a full-time, non-remote position
FLSA Status:
Non-Exempt
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Auto-Apply