Post job

Cyber security analyst work from home jobs

- 336 jobs
  • Epic Cadence & Security Analyst

    Onpoint Search Consultants 4.2company rating

    Remote job

    What you will find ... 100% REMOTE exceptional benefits (pension plan options) top ranked hospital in the U.S. What you will do ... design & build Epic Cadence build Epic Security break-fix & support Epic Cadence & Security optimize Decision Tree for scheduling liaison with operational stakeholders Wish list ... 5+ years Epic Cadence & Security build REQUIRED Epic Cadence Certification REQUIRED Epic Security Certification recent Epic Security work Decision Tree a plus
    $80k-116k yearly est. 2d ago
  • Cyber Security Analyst II (Remote)

    Ntirety, Inc.

    Remote job

    is remote and can be performed from anywhere in the United States. Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions. KEY RESPONSIBILITIES: * Act as the primary point of escalation for Cyber Security Analyst I technicians * Provides coaching to Cyber Security Analyst I employees on how to perform their duties * Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats * Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole * Performs all of the following functions of a Cyber Security Analyst I, with proficiency * Monitor computer networks for security issues and respond accordingly, including: * Creating/Managing firewall rules * Managing anti-virus endpoint tools * Performing event correlation analysis on potential threats identified through our SIEM * Configuring/Managing log management * Configuring/Managing file integrity monitoring * Performing vulnerability scans and remediation of identified risks * The methodology & analysis of identifying compromised servers * Performing rule tuning in our SIEM for improved detection capabilities * Interact with customers by phone, chat, or trouble ticket on any customer facing security issues * Investigate, document and assess security breaches and other cyber security incidents * Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs * Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives * Identify and fix detected vulnerabilities to maintain a high-security standard * Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities * May be relied upon as a technical point of contact during Escalated Events relating to security * Review, investigate and respond to any external "abuse" complaints coming from our IP space * Develop best practices for IT security * Research security enhancements and make recommendations to management * Handle escalated internal or customer security issues from support or another operations team * Takes part in any security-oriented projects or critical initiatives * Stay up to date on information technology & security news, trends and standards * Deliver an exceptional customer experience every day * Other duties as identified or assigned DESIRED ROLE OUTCOMES: * Keep us and our customers free from security incidents but respond capably when one occurs * Our detection of security threats is continually improving * Provide valuable insights and visibility around security incidents to our customers * Have a staff of customer focused, energetic and security savvy team members REQUIRED SKILLS: * A minimum of 2 years' experience in a security analyst role * Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred * Must have experience in a Security Operations Center (SOC) * Must have technical troubleshooting and problem-solving skills * Understanding of network management principles * Experience in systems administration of Windows and Linux based operating systems * Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies * Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts * Ability to identify and mitigate network vulnerabilities and explain how to avoid them * Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact * Ability to learn and communicate technical information to non-technical people * Must have excellent written & oral communication skills, and strong interpersonal skills * Must emulate the Ntirety Values in all that they do Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA). Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law. Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
    $76k-102k yearly est. 60d+ ago
  • Cyber Insider Threat Analyst (Remote)

    RTX

    Remote job

    Country: United States of America Remote U.S. Citizen, U.S. Person, or Immigration Status Requirements: U.S. citizenship is required, as only U.S. citizens are authorized to access information under this program/contract. Security Clearance: None/Not Required RTX Corporation is an Aerospace and Defense company that provides advanced systems and services for commercial, military and government customers worldwide. It comprises three industry-leading businesses - Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Its 185,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Arlington, VA. The following position is to join our RTX Enterprise Services team: Role Overview: Enterprise Services (ES) Cybersecurity has an immediate opening for a qualified insider threat analyst to join RTX Cyber Defense reporting to the Associate Director of Cyber Insider Threat Operations. As an insider threat analyst, you will be responsible for supporting the analysis, monitoring and triage of alerts stemming from potential insider threats. What You Will Do: Perform log analysis to detect anomalies, leveraging expertise in security operations tools to monitor and safeguard sensitive data. Utilize behavioral analytics and endpoint security solutions to identify and investigate unusual patterns. Monitor potential data exfiltration points using data loss prevention tools and other security solutions to detect and prevent unauthorized transfers. Apply Open-Source Intelligence (OSINT) techniques to gather and analyze publicly available information related to insider threats. Identify insider threat trends and patterns to assist content teams in the development of new detection rules and models. Articulate the implications of the risks relative to insider threats and educate team members, peers and stakeholders on the potential impacts. Review data, alerts and behaviors to identify potential concerns from multiple angles, gather information and understand and articulate information gaps needed to inform decisions. Work independently and with teams to define and complete analysis activities. Document findings in a manner that technical and non-technical stakeholders understand and can articulate findings to leadership and peers. Perform initial analysis on data from systems to identify unexpected or malicious activity across channels while understanding how activity fits into the threat landscape. Assist in building processes, procedures and training for the insider threat team. Collaborate with stakeholders to provide suggestions and feedback for validation and improvement of various tools, models, and processes. Stay updated on the latest developments and trends in insider threats, emerging and/or advanced persistent attack vectors, and industry best practices, incorporating this knowledge into RTX's defense strategies. Perform other duties as assigned and as required to continuously drive process excellence. Qualifications You Must Have: Typically requires a University Degree or equivalent experience and a minimum 5 years of experience, or an Advanced Degree and a minimum 3 year's experience. Minimum 5 years supporting a cyber insider threat program and/or a cyber incident response team, including at least 3 years with cybersecurity tools and technologies used to detect and mitigate insider threats, including, but not limited to security information and event monitoring (SIEM), user entity and behavior analytics (UEBA), user activity monitoring (UAM), data loss prevention (DLP) technologies and endpoint security solutions. Must be able to effectively communicate (verbal and written) technical and strategic details to peers, leadership, and stakeholders with varying levels of operational expertise. The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance. Qualifications We Prefer: Insider Threat specific training/certifications such as CERT Insider Threat course work or Center for Development of Security Excellence (CDSE). Industry certifications in information security or technology such as, CISSP, CISM, CGEIT. Experience collaborating with teams inside and outside of Digital Technology (ex. Privacy, Legal, HR). Preferred candidate will have experience with Operating System, cloud access, and web proxy event logs, endpoint/extended detection & response, and security incident & event management (SIEM) platforms. Demonstrate critical thinking and problem-solving skills. What We Offer: Whether you're just starting out on your career journey or are an experienced professional, we offer a robust total rewards package with compensation; healthcare, wellness, retirement and work/life benefits; career development and recognition programs. Some of the benefits we offer include parental (including paternal) leave, flexible work schedules, achievement awards, educational assistance and child/adult backup care. Learn More & Apply Now! Work Location: Remote Please consider the following role type definition as you apply for this role: Remote: This position is currently designated as remote. However, the successful candidate will be required to work from one of the 50 U.S. states (excluding U.S. Territories). Employees who are working in Remote roles will work primarily offsite (from home). An employee may be expected to travel to the site location as needed. As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote. The salary range for this role is 82,000 USD - 164,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $82k-111k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Analyst - Incident Response

    Manpowergroup 4.7company rating

    Remote job

    Our client, a leading organization in the energy industry, is seeking a Cyber Security Analyst - Incident Response to join their team. As a Cyber Security Analyst - Incident Response, you will be part of the Cyber Defense team supporting enterprise-wide security operations. The ideal candidate will demonstrate analytical thinking, resilience, and collaborative skills, which will align successfully in the organization. **Job Title:** Cyber Security Analyst - Incident Response **Location:** Remote **Pay Range: $65-68/hr** **What's the Job?** + Support the identification, containment, eradication, and recovery of sophisticated level 2/3 cyber incidents. + Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve security incidents. + Analyze log files from various sources to identify potential threats and vulnerabilities. + Perform cyber defense incident triage, including scope determination and impact assessment, and recommend remediation strategies. + Track and document cyber defense incidents from initial detection through resolution, ensuring comprehensive reporting and artifact collection. **What's Needed?** + 8+ years of experience in a cyber defense role or 4+ years with a relevant bachelor's degree. + Proficiency with EDR tools, Splunk, and experience with ESAs, sandboxing, and malware analysis tools. + Strong understanding of network principles and the cyber incident lifecycle. + Experience supporting incident response processes and coordinating with third-party vendors and internal teams. + Preferred certifications include GCIH, GSEC, GCIA, GCFE, or capture the flag experience. **What's in it for me?** + Opportunity to work with a Fortune 200 company in a dynamic and impactful role. + Remote work flexibility to support work-life balance. + Engagement in cutting-edge cyber defense techniques and trend analysis. + Collaborative environment fostering professional growth and development. + Contributing to the security of critical energy infrastructure. **Upon completion of waiting period consultants are eligible for:** + Medical and Prescription Drug Plans + Dental Plan + Vision Plan + Health Savings Account + Health Flexible Spending Account + Dependent Care Flexible Spending Account + Supplemental Life Insurance + Short Term and Long Term Disability Insurance + Business Travel Insurance + 401(k), Plus Match + Weekly Pay If this is a role that interests you and you'd like to learn more, click apply now and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you! **About ManpowerGroup, Parent Company of: Manpower, Experis, Talent Solutions, and Jefferson Wells.** _ManpowerGroup (NYSE: MAN), the leading global workforce solutions company, helps organizations transform in a fast-changing world of work by sourcing, assessing, developing, and managing the talent that enables them to win. We develop innovative solutions for hundreds of thousands of organizations every year, providing them with skilled talent while finding meaningful, sustainable employment for millions of people across a wide range of industries and skills. Our expert family of brands -_ **_Manpower, Experis, Talent Solutions, and Jefferson Wells_** _- creates substantial value for candidates and clients across more than 75 countries and territories and has done so for over 70 years. We are recognized consistently for our diversity - as a best place to work for Women, Inclusion, Equality and Disability and in 2023 ManpowerGroup was named one of the World's Most Ethical Companies for the 14th year - all confirming our position as the brand of choice for in-demand talent._ ManpowerGroup is committed to providing equal employment opportunities in a professional, high quality work environment. It is the policy of ManpowerGroup and all of its subsidiaries to recruit, train, promote, transfer, pay and take all employment actions without regard to an employee's race, color, national origin, ancestry, sex, sexual orientation, gender identity, genetic information, religion, age, disability, protected veteran status, or any other basis protected by applicable law.
    $65-68 hourly 27d ago
  • Cyber Security Analyst

    Military, Veterans and Diverse Job Seekers

    Remote job

    Responsibilities: Investigate security incidents and escalate when necessary Work Incident Response and Administrative tickets Perform and develop data mining queries using Splunk/Splunk ES Communicate in a clear and concise manner with Leadership, Customers and Peers Monitor and respond to multiple shared Mailbox inquiries Provide vulnerability, threat, and risk mitigation support Monitor Security Operations Dashboards for alerts Support daily Operations briefings Monitor and answer the SOC phone hotline Support customer defined metrics reports Support government data calls This opportunity offers remote work! Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting) Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
    $74k-100k yearly est. 60d+ ago
  • AI & Cyber SME

    American Bureau of Shipping 4.8company rating

    Remote job

    The Senior Principal Consultant will work as a senior expert on the successful delivery of projects for clients as a member of a project team within a market program. This includes providing technical expertise to the project manager and team members with initiating, planning, executing, monitoring and controlling, and closing projects. This position also includes maintaining relationships with clients and key decision-makers to help identify follow-on Business opportunities and maintain customer intelligence. What You Will Do: Provide expertise on project tasks to ensure quality services are delivered on schedule and within the available budget to meet customer requirements. Define project tasks, estimate task duration, and develop a project schedule as part of developing a project management plan Review project management plans to understand the scope, schedule, and assigned work authorization Provide technical expertise to support the execution of project tasks Develop briefing materials and write reports to communicate concepts and analysis results to clients and end users Lead research and data analysis, including but not limited to assisting with conducting customer or stakeholder analyses Prepare written documents, and reports, and provides presentations to clients. Develop conclusions and recommendations, write reports, and assist with client presentations Track and reports hours spend executing projects Work with individuals at all levels, provide input to reports and other deliverables, execute multiple assignments, meet agreed deadlines, and adjust to changing client demands Develop relationships with existing customers to facilitate the development of new business. Identify new business opportunities with existing customers for current and/or additional services Participate in marketing activities, conference presentations, technical whitepapers Assist with proposal development, including writing proposals, estimating the level of effort Learn, understand and be conversant in ABSG Industrial Cybersecurity products and services Review published reports and news articles about existing and potential new clients to identify customer intelligence Networking to meet new potential clients Serves as senior technical expert guiding project tasks and ensuring quality, schedule, and budget compliance. Project management with planning, sequencing tasks, estimating durations, and developing project schedules. Performs quality assurance on deliverables and tracks project execution metrics. Maintains and develops relationships with clients and key decision-makers. Actively participates in client meetings, presentations, and proposal development. Identifies new business opportunities through client interactions and market intelligence. Communicates client needs internally and contributes to proposal writing. Leverages subject matter expertise to drive growth and expand services. What You Will Need: Education and Experience Bachelor's degree in Computer Science, Business, or a recognized equivalent from an accredited university. Experience will be considered in lieu of education, preferably in data processing or a related field. Typically requires a minimum of five (5) years of working with a Customer Relationship Management System (CRM). Proven experience in Systems Development environment with project management responsibility for successful projects. Extensive IT and functional experience in cultivating positive customer relationships. experience working in organizations to support services provided to internal/external clients PMP Certification is preferred. Microsoft Dynamics CE experience preferred Knowledge, Skills, and Abilities Analytical and problem-solving capabilities. Strong understanding of sales, marketing, and customer service processes, to ensure functionally correct implementation. Strong understanding of Dynamics 365 CRM design, structure, functionality, and processes. Knowledge of CPQ (Configure, Price, Quote), PRM (Partner Relationship Management), CLM (Contract Lifecycle Management), and Sale Compensation Management applications, and their functionality. Managed complete life cycle projects involving multiple cross-functional business teams. Excellent verbal, written, and presentation skills consistent with a client group, including senior managers & executives. Knowledge of Microsoft Power Platform, working with Power BI to build data visualization, and Power Automate implementing business workflow. Strategic while also able to perform tactical duties. Self-starter, highly motivated with the ability to work with limited supervision. Experienced in the design and maintenance of business applications. Ability to obtain a working knowledge of the ABS Health, Safety, Quality, and Environmental Management System. Salary: $210k - $220k Reporting Relationships: Reports to a Manager, Director, or Executive level position and has no direct reports.
    $72k-98k yearly est. Auto-Apply 12d ago
  • Global Cyber Wordings Analyst

    Liberty Mutual 4.5company rating

    Remote job

    Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience. Key responsibilities: Wording library and drafting support Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes. Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards. Track version control, change logs, approvals, and archiving; Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance. Commercial enablement Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently. Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives. Triage wording queries from regions; track SLAs and referral approvals per the global governance framework. Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards. Regulatory and legal stewardship Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions. Maintain audit-ready documentation; assist with regulatory filings or attestations where required. Claims partnership and feedback loop Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty. Support coverage position letters and documentation packs with research, citations, and clause histories. Innovation and product development support Help draft prototype wordings for new propositions Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses. Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics. Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders. Qualifications Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience. 2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred. Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail. Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous. Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates. Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools. Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs. Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting. About Us Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role. At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve. We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: *********************** Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law. Fair Chance Notices California Los Angeles Incorporated Los Angeles Unincorporated Philadelphia San Francisco We can recommend jobs specifically for you! Click here to get started.
    $76k-99k yearly est. Auto-Apply 34d ago
  • Senior Cyber Security Ops Analyst | Remote | Contract

    Spartan Technologies

    Remote job

    Senior Cyber Security Ops Analyst Applicants Need To Know 6+ Month Contract Work Status: USC, GC Sponsorship: No, Sponsorship provided. Office Type: Remote Hourly Rate: $75 to $85 W2 Only No Corp-to-Corp Please note that only candidates who are authorized to work in the United States without sponsorship will be considered for this position. We seek a Senior Cyber Security Ops Analyst for our client. This is a contract position lasting 6+ months. The role is remote and requires availability in the Eastern or Central time zones. As a Sr Cyber Security Ops Analyst, you will be responsible for security monitoring and incident response for both internal and external threats. You will collaborate with internal IT teams and MSSP to ensure effective security monitoring and response. Additionally, you will implement advanced security monitoring techniques to identify malicious behavior and develop automation response scripts to remediate commodity threats. Your role will also involve performing threat analysis utilizing industry standard frameworks and conducting threat research to improve detection and response capabilities. You will have the opportunity to propose and review security plans and policies to enhance the overall security environment. The Work: Conduct investigations and respond to internal and external security threats. Oversee, respond to, and remediate DLP (data loss prevention) and SIEM events from on-premise and cloud systems. Implement advanced security monitoring techniques to identify malicious behavior on SaaS, cloud systems, network, servers, and endpoints. Manage, administer, and improve security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry-standard security technologies. Develop automation response scripts to remediate commodity threats. Perform threat hunting activities to identify compromised resources. Understand and perform threat analysis utilizing industry-standard frameworks (kill chain and diamond model). Perform threat research and intelligence gathering to improve detection and response capabilities. Propose and review security plans and policies to improve the security environment. Maintain operational playbooks, process diagrams, and documentation for security monitoring and response. Review proposed Security deployments to ensure security monitoring requirements are met. Provide off-hour support as needed for security monitoring and response activities. Work closely with MSSP services, external forensic providers, and in-house IT teams to respond to and remediate security incidents both internal and external. Review compromised systems to identify the root cause of security incidents. Qualifications: Minimum of 5 years of experience in security monitoring and incident response Strong knowledge of DLP (data loss prevention) and SIEM events Experience with advanced security monitoring techniques on SaaS, cloud systems, network, servers, and endpoints Proficiency in managing and administering security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry standard security technologies Ability to develop automation response scripts for commodity threats Familiarity with threat hunting activities to identify compromised resources Understanding of threat analysis utilizing industry standard frameworks (kill chain and diamond model) Experience in threat research and intelligence gathering to improve detection and response capabilities Knowledge of reviewing security plans and policies to enhance the security environment Strong documentation skills for operational playbooks, process diagrams, and security monitoring/response documentation Ability to review proposed Security deployments to ensure compliance with security monitoring requirements Willingness to provide off-hour support for security monitoring and response activities Nice to Have: Experience with cloud security technologies such as CASB, Cloud Access Security Brokers Knowledge of scripting languages such as Python or PowerShell Familiarity with industry compliance standards (e.g., PCI DSS, HIPAA, GDPR) Certifications in relevant areas such as CISSP, CISM, or CEH Experience working with incident response tools and processes #CyberSecurity #SecurityOps #IncidentResponse #ThreatAnalysis #SecurityMonitoring #DataLossPrevention #SIEMEvents #CloudSecurity #EndpointSecurity #ITSecurity
    $75-85 hourly 60d+ ago
  • Senior Security Analyst III

    Oppfi

    Remote job

    OppFi is a leading tech-enabled digital finance platform that works with banks to provide financial products and services for everyday Americans. Through a transparent and responsible platform, which includes financial inclusion and excellent customer experience, the Company supports consumers who are turned away by mainstream options to build better financial health. We are a team of caring, innovative, and inclusive individuals who thrive in being immersed in diverse talents, expertise, perspectives, and backgrounds. Our employees approach every new challenge with an unparalleled ability to see what could be rather than settle for what is. Our business principles guide us and create an open and collaborative culture where we improve 1% every day, and the best ideas always win! We welcome individuals who want to make an impact in the financial system by facilitating credit access, expanding financial inclusion, promoting financial health, and delivering exceptional customer service. A few other fun facts about us. OppFi is one of the top consumer-rated financial platforms online, maintaining a 4.5/5.0-star rating on Trustpilot. We are a 2025 Crain's Fast 50â„¢ company and were named on Built In's 2025 Best Places to Work in Chicago. Senior Security Analyst III As Senior Information Security Analyst III, you will be a key contributor to our day-to-day security operations, assisting with threat monitoring, incident triage, vulnerability remediation, and GRC activities. This role is an excellent opportunity for someone with security experience who is eager to grow their skills in risk management, cloud environments and security best practices. You will work closely with senior team members and various OppFi internal teams to ensure our environment maintains security, visibility, and compliance standards. What you get to do: Information Security Risk Management: Own the security review and assessment process evaluating the risk associated with introducing new applications/tools into the environment. Assist with security risk management activities, including the analysis, quantification, and tracking of information security risks, plus the review and documentation of risk exception requests. Policy and Compliance Analysis: Identify emerging compliance requirements and assess their impact on our policies. Develop and refresh our policies, procedures, standards, and guidelines to stay compliant and aligned with industry best practices. Governance Visibility: Design and maintain dynamic dashboards or scorecards that offer clear insights into Information Security Governance activities, demonstrating our commitment to security and compliance. Security Operations & Incident Support Monitor security alerts from various tools (SIEM, EDR, cloud logs) and support the triage of potential security incidents by gathering initial data and escalating to senior engineers as needed. Assist in the execution of security incident response playbooks, focusing on initial steps like investigation, basic containment, and documentation. Contribute to the documentation and tracking of security incidents to support audit and compliance requirements. Support the monitoring and logging strategy by assisting with the configuration and tuning of SIEM (Security Information and Event Management) alerts and reports. Perform regular log review and analysis for suspicious activities under the guidance of senior staff. Improvement & Collaboration Contribute to the development and maintenance of operational playbooks and documentation for security processes. Learn to deploy and manage new security tools and assist in the development of basic threat detection logic. Develop basic security performance metrics and assist with reporting to measure the effectiveness of security controls. Performs other related duties as assigned. What you will bring to the team: 3-5 years of professional experience in Information Security or IT Risk Management, with a background supporting IT compliance programs to meet regulatory requirements and demonstrated expertise in at least one of the following areas: Security Operations, Incident Response, or Vulnerability Management. Experience with Security and control frameworks, such as FFIEC, NIST, COBIT, ITIL, and ISO control framework EDR platforms (e.g., CrowdStrike, Defender for Endpoint, SentinelOne) SIEM/SOAR tools (e.g., Sumo Logic, Splunk, Chronicle, or Azure Sentinel) CSPM tools (e.g., Wiz, Prisma, Orca) Vulnerability management platforms (e.g., Qualys, Tenable, Rapid7) Experience identifying potential IT controls risks and opportunities through and offering sustainable recommendations that address cause rather than symptoms Experience with information security standards, best practices for securing computer systems within applicable laws and regulations Experience with Governance Risk & Compliance (GRC) tools and procedure development Solid understanding of common attack techniques (MITRE ATT&CK), incident triage, and remediation workflows. Foundational knowledge of AWS (Amazon Web Services) or other cloud environments. Basic understanding of networking, operating systems (Linux/Windows), and common security principles (e.g., least privilege, defense-in-depth). Familiarity with automation frameworks or API integrations for security tools. Strong written communication skills necessary for developing clear, concise procedures and playbooks, coupled with effective verbal skills for communicating technical findings. Experience building dashboards and metrics for leadership visibility. Strong analytical and problem-solving skills with a keen attention to detail and a desire to learn quickly. Bachelor's degree in Cybersecurity, Computer Science, or equivalent experience. Certifications such as CompTIA CySA+, GCIH, GCIA, GMON, GCDA, GSOC, or CISSP associate are preferred. Experience working in a regulated industry (financial services or health care) Reports to: Manager, Security Operations Total Rewards and Benefits: At OppFi, we are committed to fostering a fair and equitable workplace. The compensation range for this role reflects our good faith compensation estimate for this position. Final offers are determined based on a myriad of factors including, but not limited to experience, skills, qualifications, and other relevant business considerations. Candidates are encouraged to discuss compensation expectations during the hiring process. In addition to base pay, the total compensation package includes eligibility and potential for performance-based bonuses and equity grants dependent upon the role and job level. OppFi offers a flexible, remote environment, 401(k) matching program, and generous paid time off. Other benefits include medical, dental, and vision coverage, and tuition reimbursement. Additional benefits include DoorDash DashPass, Figo pet insurance, Rocket Lawyer, and access to LinkedIn Learning. OppFi also offers Fringe, a lifestyle benefits platform that allows employees to decide how to spend rewards from dozens of vendors like Uber, DoorDash, and UrbanSitter. #LI-Remote Compensation Range:$102,400-$153,600 USD EEO Statement: OppFi is an equal opportunity employer and does not discriminate based on any actual or perceived legally recognized protected bases under local, state, federal law, or regulations. Our goal as a company is to build an equitable workplace that actively works to dismantle systems of oppression in our processes, procedures, and interactions. We aim to help our employees thrive where they work and beyond. Check out our Culture page here. As part of OppFi's commitment to providing equal opportunity to qualified individuals, OppFi will ensure that persons with disabilities are provided reasonable accommodation as defined by applicable laws and organizational policies. If reasonable accommodation is needed to participate in the job application or interview processes or job requirements, please contact our People Team at ********************. Pursuant to the requirements of the California Consumer Privacy Act, OppFi is providing the "OppFi California Employee Privacy Policy", which details the categories of personal information collected and your rights under the policy. If you are a California resident, please review the policy here: ******************************* The information in this document is for general informational purposes only. It is not intended to be an all-inclusive list or description of the organization and its requirements for positions and employees. OppFi reserves the right to modify or change the information on this document at its discretion.
    $102.4k-153.6k yearly Auto-Apply 39d ago
  • Sr. Security Analyst

    Vectra Ai 4.5company rating

    Remote job

    Vectra is the leader in AI-driven threat detection and response for hybrid and multi-cloud enterprises. The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a single platform. Powered by patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely on the Vectra AI to move at the speed and scale of hybrid attackers. For more information, visit ************** *Location: US-Remote This position works on a 4x10, 3rd shift Position Overview Vectra is seeking a highly skilled and experienced MDR (Managed Detection and Response) Security Analyst to join our team. As a Sr. Security Analyst, you will serve in a critical role in protecting and defending Vectra MDR customer infrastructure. You will be responsible for supervising and analyzing security events, responding to incidents, conducting SOC (Security Operations Center) operations, and assisting MDR customers to ensure their needs are met. A successful candidate will have sound technical experience and skills, blended with good interpersonal, communication, and project management skills. Responsibilities Monitor security logs and alerts from various sources, including intrusion detection systems, Endpoint Detection and Response (EDR) systems, and security information and event management (SIEM) tools. Investigate and analyze security incidents, identify root cause, and develop appropriate mitigation strategies. Complete security response actions, including full remote remediation of endpoints. Perform threat hunting and proactive analysis to identify potential security risks and vulnerabilities. Collaborate with multi-functional teams, including product, engineering, and support, to resolve customer incidents or issues. Mentor and provide guidance to junior security analysts, sharing knowledge and standard processes. Conduct health checks and architecture reviews, providing technical expertise and real-life experience in creating solutions, designs, and recommendations. Be a strong voice for your customers across business to identify new detection models, identify new product features, build content for both internal and external customer knowledge bases, and ensure successful Vectra deployments. Travel expected 0-5% Requirements Demonstrable experience as an MDR security analyst, SOC analyst, or similar role in a fast-paced environment. Experience providing remote response and remediation activities within networks and on endpoints. Solid understanding of intrusion detection systems, artificial intelligence-based attack detection and prevention, incident response methodologies, and SOC operations. Experience with SIEM tools, log analysis, network analysis, endpoint analysis, and threat intelligence platforms. Solid knowledge of operating systems, networking protocols, and security technologies. Proficient in incident handling, threat hunting, and forensics. Excellent analytical and problem-solving skills, with the ability to think critically under pressure. Good communication skills to effectively collaborate with multi-functional teams and communicate complex security issues to non-technical stakeholders. Continuous learning attitude to stay updated with the evolving threat landscape and emerging security technologies. Desirable Prior experience with Vectra, SentinelOne, Microsoft Defender, or CrowdStrike Coding experience in Bash, Python, or Powershell Open-source development Our competitive total rewards package includes cash compensation within the range provided below. Actual pay for this position may vary based on the hired candidate's location, experience and relevant incumbent pay position. Vectra Total Rewards$110,000-$150,000 USD Vectra provides a comprehensive total rewards package that supports the financial, physical, mental and overall health of our employees and their families. Compensation includes competitive base pay, incentive plan eligibility, and participation in the employee equity plan (stock options). Specific benefits offered varies by location, but commonly include health care insurance, income protection / life insurance, access to retirement savings plans, behavioral & emotional wellness services, generous time away from work, and a comprehensive employee recognition program. Vectra is committed to creating a diverse environment and is proud to be an equal opportunity employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status.
    $110k-150k yearly Auto-Apply 3d ago
  • Senior Information Security Risk Specialist (GRC)

    Unveiling Opportunities

    Remote job

    About Us At SentinelOne, we're redefining cybersecurity by pushing the limits of what's possible-leveraging AI-powered, data-driven innovation to stay ahead of tomorrow's threats. From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We're looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you're excited about solving complex challenges in bold, innovative ways, we'd love to connect with you. What are we looking for? We are looking for a highly motivated, collaborative and experienced Senior InfoSec Risk Specialist with a security-focused mindset who can balance risk, business drivers and timelines. This position will be responsible for understanding and supporting the design of SentinelOne's organizational, procedural and technological security controls within the context of the security frameworks applicable to SentinelOne. In addition, you will be responsible for identifying and testing appropriate controls to ensure they are designed, implemented, and operating effectively to mitigate risk. The selected employee will help implement, automate, document and maintain controls while supporting and responding to inquiries from internal and external stakeholders. This individual must be self-directed and be able to work independently and collaboratively. What will you do? Support the planning and performance of IT risk-based security audits and projects, risk assessments, execution of fieldwork and communication to stakeholders. Help in evaluating relevant global standards, compliance frameworks and regulations to analyze existing controls; identify areas for improvement; and design control growth. Collaborate with process and control owners through the audit lifecycle for process documentation updates, testing coordination, remediation of identified deficiencies and advising on internal control enhancements or process changes, as appropriate. Proactively manage audit findings, tracking and documentation of status updates obtained via action owners, and timely execution of remediation activities. Participate in internal security and compliance programs and track recurring controls, such as SSAE 18 SOC 2, ISO 27001/27002. Provide control consultative support to the business to assist in redesign efforts to improve the control environment and identify opportunities for control improvements with the objective of mitigating risk and improving compliance and operational performance. Help support internal/external audits and evidence collection via a GRC tool. Document new and update existing policies, procedures, standards and resources Participate in Security awareness program, train personnel on data security and privacy-related processes and responsibilities. Help support customer security reviews, RFPs and external security and privacy inquiries. Participate in defining, collecting and tracking various Security Metrics. What skills and experience should you bring? 5+ years of experience working in information security, risk or compliance. Experience working with Security Controls across at least some of the following domains: Access Management, Encryption, Risk Management, Network Security, Configuration Management, Patch Management, Change Management, Awareness and Training, BC/DRP, etc. Ability to perform internal audits with minimal direct supervision, exhibit professional audit judgment and have experience in a broad range of audit projects such as SSAE 16/18 SOC 2, ISO 27001/2, NIST. Strong risk management experience, performing assessments and audits, designing controls, managing enterprise control frameworks, and prioritizing risk. Strong project management skills and ability to manage a variety of projects simultaneously to completion within the agreed timelines. Excellent collaboration and interpersonal skills. Must be able to communicate with all levels in the organization. Ability to communicate effectively, in writing and verbally, to target audiences, including customers, partners, auditors, executive management, vendors, and peers. Experience working with both technical and non-technical teams. Ability and desire to understand the intent of requirements and provide effective recommendations. Ability to prioritize in a highly dynamic work environment. Our Preferred Qualifications: Advanced degree in computer science, Information Technology, Information Security or related field. Experience with, and strong understanding of common Security Compliance frameworks, controls, and best practices such as COSO, SOC 2, SOX ITGC, ISO 27001/27002, GDPR, PCI, NIST and other applicable regulatory compliance frameworks. Relevant certifications (ISO 27001 LA/LI, CISA, CISM, CISSP, CRISC, etc.) Ability to assess and pragmatically define scope and relevant controls. Strong desire to learn and continuously develop and deepen technical skills. Why us? You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry. Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA Unlimited PTO Industry-leading gender-neutral parental leave Paid Company Holidays Paid Sick Time Employee stock purchase program Disability and life insurance Employee assistance program Gym membership reimbursement Cell phone reimbursement Numerous company-sponsored events, including regular happy hours and team-building events This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply. If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions. Base Salary Range$104,000-$138,000 USD SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. SentinelOne participates in the E-Verify Program for all U.S. based roles.
    $104k-138k yearly Auto-Apply 32d ago
  • Senior Security Analyst

    Blackcloak LLC 3.5company rating

    Remote job

    BlackCloak's mission is to protect corporate executives and high-profile individuals in their personal lives, mitigating risks to their families, companies, reputation, and finances. We defend our clients' digital lives from hackers, privacy leaks, and identity theft. If you are passionate about helping to protect others, then keep reading - this may be your next great opportunity. Ready to be on the front lines of cybersecurity? BlackCloak is looking for a sharp and proactive Security Analyst to join our team. In this role, you'll be the first responder, monitoring and triaging security alerts from a variety of sources and leading the charge on security incidents. You'll play a critical part in our continuous compliance program, help develop our threat detection capabilities, and analyze emerging threats. If you're passionate about protecting against cyber threats and thrive in a fast-paced environment, we want to hear from you. What You Will Do * Monitor and triage security alerts from a variety of sources including SIEM (SecOps, Sentinel), EDR (SentinelOne, CrowdStrike) and cloud security platforms like Wiz, Orca. * Serve as a primary responder for security incidents, executing the incident response lifecycle from initial detection and containment to eradication and recovery. * Support development of threat detection library, including incorporating threat intelligence, tuning within security tools, and SOAR response actions. * Maintain and draft SOP's and supporting documents for the Incident Response Plan and strategy * Analyze phishing attempts, malware, and other cyber threats; partner with Security Engineering to devise additional security controls, administer email security, EDR, ZTNA, and other security tooling configurations to block emerging threats. * Participate in a 24/7 on-call rotation to respond to critical security incidents. * Support triage and response for compliance alerts and requests, enabling the continuous compliance program at BlackCloak using tools such as Vanta, Drata. * Prepare and present detailed incident reports and security metrics to technical and leadership audiences. What You Need To Be Successful * 4-6 years of direct experience in a Security Operations Center, incident response, threat intelligence, or similar cybersecurity role. * Ability to navigate complex problems, stay cool under pressure, and be highly inquisitive. * Hands-on experience with SIEM, SOAR, and other security platforms for log analysis, correlation, automated response, and maturation of detections/runbooks. * Deep understanding and practical experience with Endpoint Detection and Response (EDR) tools and their investigative capabilities. * Good knowledge of cloud security principles and services in AWS, Azure, or GCP, including experience with security tools like Wiz or Prisma Cloud. * Solid understanding of network protocols, operating systems (Windows, Linux, mac OS), and common attack vectors (OWASP, MITRE) * Familiarity with identity and access management concepts, including SAML, OAuth, and role-based access control (RBAC) * Relevant industry certifications are highly desirable, such as GIAC (GCIH, GCFA), CISSP, or CompTIA Security+. * Excellent problem-solving skills and the ability to communicate complex technical concepts to both technical and non-technical audiences. $100,000 - $130,000 a year About BlackCloak BlackCloak is an extremely fast-growing company in an entirely new product category. We have amazing product fit validated by industry awards and an impressive client base of Fortune 500 companies across all industries. BlackCloak offers a competitive salary, exceptional benefits, and a dynamic work environment. Below is a quick summary of BlackCloak's generous benefits package for full-time employees includes: * 100% Remote Company, within the USA * Comprehensive Medical, Dental, and Vision plans with a 100% employer-paid monthly premium option for employees & 50% employer-paid monthly premiums for dependents. * Health Savings Account with company contribution for eligible medical plans. * Flexible Vacation Plan * 10 Paid Company Holidays * 100% employer-paid Life, AD&D and Short- and Long-Term Disability Insurance * 401k with Traditional and Roth options, including employer match. * Company Equity * Paid Parental and Pregnancy Recovery Leave * Company and team off-sites and virtual events throughout the year * Home office stipend We are an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic. Learn More about Us Website: ********************* LinkedIn: /blackcloak Twitter: @BlackCloakCyber White Paper: ******************************************************************************************************* #liremote
    $100k-130k yearly 7d ago
  • Senior Security GRC Analyst

    Lambda 4.2company rating

    Remote job

    Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU. If you'd like to build the world's best AI cloud, join us. *Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday. What You'll Do Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives Manage IT Risk Register including risk identification, tracking, and prioritization. Assist with and drive remediation of control deficiencies and gaps Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.) Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires Assist control owners with root cause analysis and track risk management action plan progress. Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements You Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives Nice to Have Experience in the machine learning or computer hardware industry Experience with Security by Design and/or Privacy by Design principles Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks. Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) Certified Information Systems Security Professional (CISSP) Certified in Risk and Information Systems Control (CRISC) Experience in the AI infrastructure, machine learning and/or computer hardware industry Salary Range Information The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description. About Lambda Founded in 2012, with 500+ employees, and growing fast Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG Our values are publicly available: ************************* We offer generous cash & equity compensation Health, dental, and vision coverage for you and your dependents Wellness and commuter stipends for select roles 401k Plan with 2% company match (USA employees) Flexible paid time off plan that we all actually use A Final Note: You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills. Equal Opportunity Employer Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
    $93k-129k yearly est. Auto-Apply 42d ago
  • Senior Consultant - Epic Security Analyst - Remote

    Nordic Consulting Partners 4.4company rating

    Remote job

    Make a difference. Be happy. Grow your career. A Nordic consultant is more than just an Epic expert. Our analysts take ownership for their work and the greater success of the organization. We're also looking for someone who listens to the client and understands that each project and each organization is unique. You'll need to tackle tough projects to help those organizations succeed. Experience implementing Epic is required, and if you have experience on a Connect or optimization project, that's a plus. Here are a couple things you'll need: -At least 3 years of Epic experience -At least 1 current Epic certification (Security, Security Coordinator) Senior Consultant A Senior Consultant provides consulting services to clients on Epic-related projects in an analyst, project management, project leadership or training capacity. Key Responsibilities Perform Epic-related consulting and administrative computer services for Nordic clients Apply technical expertise to individual client system build in order to identify, troubleshoot, and resolve problems. Mentor client project teams as necessary in project and system build strategy. Track and document risks and issues. Analyze and document workflows. Work closely with project leadership, including documentation and facilitation. Work directly with Epic end users. Monitor workflows, provide documentation, and optimization suggestions. Lead meetings regarding project status and on-going work-product coordination. Additional specific duties related to the project as may be required and dictated by individual clients. These duties are documented on a per-contract basis in the client's statement of work. May be invited to attend corporate functions as a representative of the company to meet prospective consultants, as well as solidify relationships with client and Nordic co-workers. #LI-AB1 EEO Language: Nordic is an equal opportunity employer dedicated to a policy of non-discrimination on any protected basis including race, creed, color, age, gender, religion, national origin, disability, marital or veteran status, sexual orientation, or any other legally protected status under applicable local, state or federal law. EEO/AA Employer: M/F/Disabled and Vet. Nordic is an equal opportunity employer. We are committed to creating an inclusive environment for all employees and applicants. We do not discriminate on the basis of race, color, religion, sex, national origin, age, disability, genetic information, marital or veteran status, or any other protected status under applicable federal, state, or local laws. We encourage individuals of all backgrounds to apply, including women, minorities, individuals with disabilities, and veterans.
    $94k-130k yearly est. Auto-Apply 60d+ ago
  • Sr. Security Ops Analyst- Incident Response

    Taxact Inc.

    Remote job

    Taxwell helps everyday Americans get every tax advantage they deserve by finding credits and deductions they never even knew existed. Our tax preparation software offers easy guidance and ensures your maximum tax refund. We strive to build a team of like-minded experts in both tax and technology who align with our brand purpose, are advocates for our customers and have a fresh, non-traditional approach to the tax industry. The Sr. Security Ops Analyst/Incident Response role is a part of the Taxwell IRM team. IRM SecOps provides cyber security monitoring, reporting, and response along with detection capabilities and threat hunting. Duties include, but are not limited to: Receive incident escalations from monitoring team and assist with real-time advanced analysis, response, and reporting. Mentor and assist in training analysts to aid in their skills development and analytical capabilities. Proactively hunt for threats and enacting identification, containment, and eradication measures while supporting recovery efforts. Point person for coordination with appropriate parties during a security incident - client, management, legal, security, operations, etc. Create thorough reports and documentation of all incidents and procedures, presenting findings to team and leadership on a routine basis Supports detection capabilities and refines process through alert validation. Performs threat hunting and proactive incident response. Completes follow-through to ensure quality forensic materials are captured, preserved and documented along with details and timelines of events and recommendations to avoid future occurrences. Assist in the general maintenance and improvement of processes and/or playbooks. Conduct research regarding the latest methods, tools, and trends in digital forensics analysis. Conduct analysis using logs, previous alerts, etc. to identify trends to identify and prevent potential incidents. Ingest data from multiple sources and aggregate client metrics. Basic Qualifications Bachelor's degree or equivalent combination of CISSP certification and prior experience Five or more years of experience in information systems security. Good communication skills to interact with clients, team members, management, and support personnel. Good analytical and problem-solving skills. Ability to work independently and as part of a team, be highly self-motivated. Experience with cloud environments, such as Microsoft Azure and Amazon. Web Services; Container services and Kubernetes; Azure Monitor and/or Sentinel; Experience with AD and Entra ID; Mimecast and Microsoft Purview; Microsoft OpenAI Services; AWS technologies such as EC2, ECS, Lambdas, LightSail, and VMware Cloud. Ability to script in PowerShell, Python. Preferred Qualifications Previous expertise in consulting or finance, tax background desirable Preferred experience with EDR solutions such as Defender XDR and CrowdStrike Falcon. Experience in Data Visualization (example: PowerBI). Preferred experience with Splunk and osquery. GIAC GCFA and/or GCFR certification. Work Environment Requires being on-call during off hours. May require occasional weekend work. Location is Remote. #LI-DNI At Taxwell, we believe our work benefits from the diverse perspectives of our employees. As such, Taxwell welcomes and celebrates diversity and inclusion and is committed to equal opportunity employment. At Taxwell, you can expect a supportive, open, and inclusive atmosphere and a team that values your contributions. Taxwell is committed to providing an environment of mutual respect where equal employment opportunities are available to all applicants without regard to race, color, religion, sex, national origin, age, d isability, marital status, sexual orientation, gender identity, veteran status, and any other status protected under applicable law. Taxwell considers information gathered in the hiring process, including information on this application, confidential, and only shares it on a need-to-know basis or as required by law. If you need assistance or accommodation due to a disability, you may contact us at ************** or by calling ************ extension 6049 to speak with a member of the HR Talent Acquisition team.
    $89k-119k yearly est. Auto-Apply 60d+ ago
  • Senior Security GRC Analyst

    Lambda Labs

    Remote job

    Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU. If you'd like to build the world's best AI cloud, join us. * Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday. What You'll Do * Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives * Manage IT Risk Register including risk identification, tracking, and prioritization. * Assist with and drive remediation of control deficiencies and gaps * Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.) * Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting * Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires * Assist control owners with root cause analysis and track risk management action plan progress. * Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements You * Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements * Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks * Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations * Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives Nice to Have * Experience in the machine learning or computer hardware industry * Experience with Security by Design and/or Privacy by Design principles * Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks. * Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems * Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management * Certified Information Systems Auditor (CISA) * Certified Information Security Manager (CISM) * Certified Information Systems Security Professional (CISSP) * Certified in Risk and Information Systems Control (CRISC) * Experience in the AI infrastructure, machine learning and/or computer hardware industry Salary Range Information The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description. About Lambda * Founded in 2012, with 500+ employees, and growing fast * Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove * We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG * Our values are publicly available: ************************* * We offer generous cash & equity compensation * Health, dental, and vision coverage for you and your dependents * Wellness and commuter stipends for select roles * 401k Plan with 2% company match (USA employees) * Flexible paid time off plan that we all actually use A Final Note: You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills. Equal Opportunity Employer Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
    $89k-119k yearly est. 42d ago
  • Senior Information Security Specialist-SECRET CLEARANCE REQUIRED

    Latitude Inc.

    Remote job

    Primary Responsibilities: Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization. Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation. Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts. Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment. Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats. Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps. Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment. Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures. Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance. Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments. All other duties as assigned by management. Qualifications Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education. Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies. Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS). Minimum of (5) years of experience with Security Information and Event Management (SIEM). Minimum of five (5) years of experience in the risk management framework. Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases. Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred. Must have an active DoD Secret Clearance.
    $82k-116k yearly est. Auto-Apply 60d+ ago
  • Cloud Security Analyst (Remote)

    Knowbe4 4.4company rating

    Remote job

    Join the cybersecurity company that puts security first; literally and without compromise. At KnowBe4, our AI-driven Human Risk Management platform empowers over 70,000 organizations worldwide to strengthen their security culture and transform their workforce from their biggest vulnerability into their strongest security asset. As the undisputed industry standard with unusually high customer retention rates and recognition as a Leader by G2 and TrustRadius, we're not just providing security awareness training - we're redefining what it means to be a trusted security partner in an increasingly complex threat landscape. Our team values radical transparency, extreme ownership, and continuous professional development in a welcoming workplace that encourages all employees to be themselves. Whether working remotely or in-person, we strive to make every day fun and engaging; from team lunches to trivia competitions to local outings, there is always something exciting happening at KnowBe4. Remote positions open to the US only. The Opportunity Join our Information Security team as the person responsible for monitoring and protecting KnowBe4's cloud infrastructure. As Cloud Security Analyst, you'll be the first responder for security alerts across our AWS and Azure environments; triaging, investigating, and coordinating responses that protect both company and customer data. You'll own the day-to-day security operations that keep our cloud ecosystem secure: analyzing alerts, hunting threats, investigating incidents, and partnering with engineering teams to ensure vulnerabilities get fixed before they become problems. The successful candidate stays calm under pressure, stays curious about new attack vectors, builds tools to make their job easier, and is passionate about cybersecurity. What You'll Do Security Monitoring & Response: Continuously monitor and triage alerts from SIEM, CSPM, CWPP, and cloud security tools - identifying what's a real threat, what needs immediate action, and what requires deeper investigation. Incident Management: Serve as primary responder for cloud security incidents, leading investigation efforts from initial detection through containment, eradication, and recovery while keeping stakeholders informed throughout. Threat Hunting & Analysis: Proactively hunt for threats across security log feeds, perform root cause analysis on vulnerabilities and incidents, and stay ahead of emerging attack patterns using frameworks like MITRE ATT&CK. Alert Engineering: Build and refine security alerts and dashboards that catch the signals that matter - reducing noise while ensuring critical issues surface quickly and clearly. Security Testing & Validation: Conduct security reviews and penetration testing across cloud infrastructure, identifying weaknesses before attackers do and validating that our defenses actually work. Cross-Team Collaboration: Partner closely with IT, engineering, and development teams to ensure security findings are understood, prioritized appropriately, and remediated with solid engineering principles-not just quick fixes. What You Bring 2+ years of hands-on experience in cloud security, information security operations, or similar roles where you've monitored alerts, investigated incidents, and worked within AWS and/or Azure environments. Practical cloud security knowledge with demonstrated ability to navigate cloud environments, understand misconfigurations, and think like an attacker to anticipate where vulnerabilities hide. Builder mindset with AI-assisted development skills - you actively leverage AI tools to write scripts, automate repetitive tasks, and solve your own problems rather than waiting for someone else to build solutions for you. Security operations foundation - you understand how to triage alerts, distinguish true positives from noise, investigate incidents methodically, and communicate findings clearly to both technical and non-technical audiences. Strong organizational skills and time management - you can juggle multiple security investigations simultaneously, prioritize what needs attention now versus what can wait, and keep track of incidents through resolution without dropping details. Some experience with offensive security - you know your way around infosec testing tools, understand OWASP Top 10, can think through how attackers exploit cloud environments, and have some exposure to penetration testing concepts. Comfort across technical domains - basic scripting ability, Linux command line navigation, understanding of application concepts (APIs, containers, databases), and some experience working with infrastructure-as-code tools like Terraform or CloudFormation. Bonus points if you have: Cloud security certifications (AWS Security Specialty, Azure Security Engineer, or similar professional credentials that validate your expertise). Bachelor's degree in information security, information systems, computer science, or related technical field. Experience with MITRE ATT&CK Framework in practical incident response scenarios where you've mapped adversary techniques to actual alerts. Background deploying security tooling as code - building alerts, automation, or security solutions using proper engineering principles that others can actually use and maintain. Why You'll Love It Here Builder-Friendly Culture: We encourage you to solve your own problems with good engineering principles; everything is deployed through Terraform, following the same standards as our development teams-you'll write solutions that scale, not just quick scripts. Remote Flexibility: Fully remote position open across the US, giving you the autonomy to work where you're most effective while staying connected to a collaborative security team. Continuous Learning: Budgets for certifications, conferences, and dedicated exploration time to research new tools and stay current Transparency and Trust: Radical candor, low ego, high accountability Global Scale: Your work will help protect users across 70,000+ organizations worldwide. The base pay for this position ranges from $80,000 - $85,000, which will vary depending on how well an applicant's skills and experience align with the job description listed above. We will accept applications until 12/30/2025. Our Fantastic Benefits We offer company-wide bonuses based on monthly sales targets, employee referral bonuses, adoption assistance, tuition reimbursement, certification reimbursement, and certification completion bonuses - all in a modern, high-tech, and fun work environment. For more details about our benefits in each office location, please visit ********************************* Note: An applicant assessment and background check may be part of your hiring procedure. Individuals seeking employment at KnowBe4 are considered without prejudice to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, sexual orientation or any other characteristic protected under applicable federal, state, or local law. If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please visit ********************************************** No recruitment agencies, please.
    $80k-85k yearly Auto-Apply 38d ago
  • Remote Pre-Sales Security Systems Engineer - Access Control & CCTV

    Kastle Systems International 3.6company rating

    Remote job

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. Responsibilities Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure. Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings. Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses. Create solution design documentation (drawings, BOMs, solution design summaries). Provide technical support for in-office and on-site team members. Support management in the process of creating documentation for implementing new technology with new and existing customers. Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors. Qualifications A minimum of 3-7 years previous experience in the industry. Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background. Experience in the design and planning of access control and video systems. Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred. Other Eligibility Requirements Ability to manage time and multiple tasks without supervision. Organizational skills & detail oriented. Good analytical and problem-solving skills. Excellent presentation, writing skills, verbal, and written customer communication skills. Experience in computer programs such as Microsoft Office, Adobe, etc. preferred. Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus. Company Overview This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: *********************************************************************************************************************************************************************************** Equal Opportunity Statement We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
    $82k-110k yearly est. Auto-Apply 19d ago
  • Information Security Controls Analyst

    United Community Bank 4.5company rating

    Remote job

    United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization. What You'll Do * Review and document the adequacy of security and technology controls across business and IT environments. * Evaluate control posture through interviews, documentation reviews, and workflow analysis. * Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls. * Partner with risk management and security leadership to align controls with organizational risk tolerance. * Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance. * Document and advocate for control improvements that balance risk with operational efficiency. * Support control development across testing, QA, and production environments. * Present control effectiveness reports to senior risk leadership. * Stay current on regulatory requirements, internal policies, and industry best practices. Requirements For Success Experience: * 3+ years in cybersecurity or IT practitioner roles. * 2+ years in IT risk or controls analysis. * Practical experience with risk management and IT control frameworks. Education: Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field. Required Skills: * Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST). * Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA). * Experience with CIS CSC, ISO 2700, or NIST CSF. * Excellent written and verbal communication across all organizational levels. * Strong organizational skills and ability to meet SLAs. * Sound judgment and decision-making in complex scenarios. * High integrity, trustworthiness, and adaptability. Preferred Skills: * Certifications such as CISSP, CISA, CRISC, or CISM. * Technical experience with enterprise networks, applications, and directory services. * Familiarity with enterprise GRC platforms. Conditions of Employment * Must be able to pass a criminal background & credit check * This is a full-time, non-remote position FLSA Status: * Exempt We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Pay Range USD $49,972.00 - USD $76,958.00 /Yr.
    $50k-77k yearly 39d ago

Learn more about cyber security analyst jobs