Post job

Cyber security analyst work from home jobs

- 425 jobs
  • FISMA Information Security Engineer - Public Trust (Hybrid)

    Peyton Resource Group 3.5company rating

    Remote job

    6 month Contract-to-Hire Contract Rate: $60-67/hr on W2 Salary Conversion: $145-155K, DOE Hybrid; 3 days/week onsite work is required Must be a US Citizen or Green Card/Permanent Resident Ability to obtain a Public Trust Clearance is required Technical Environment (preferred): CSAM, Splunk, Tenable, Palo Alto, Checkmarx Summary: Immediate need for a FISMA Information Security Engineer to bridge the gap between technical security controls and federal compliance requirements. This position involves both security engineering and governance, risk, and compliance (GRC) activities, primarily centered around the Federal Information Security Modernization Act (FISMA) and the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). FISMA/NIST Compliance & Documentation, Auditing & Reporting: Implement and Monitor Controls: Implement, document, and monitor security controls in accordance with NIST SP 800-53 (Security and Privacy Controls for Federal Information Systems and Organizations). Assessment & Authorization (A&A) Support: Support the Authorization process, including contributing to security assessments, control validation, and evidence gathering to achieve and maintain an Authority to Operate (ATO). System Security Plan (SSP) Management: Assist in the development, maintenance, and update of System Security Plans (SSPs), including continuous monitoring strategies and Plans of Action and Milestones (POA&Ms). Coordinate and support Internal & External Security Audits (e.g., Office of Inspector General (OIG), independent assessors). Reporting: Generate reports on security control compliance, vulnerability posture, and POA&M status for stakeholders and the Authorizing Official (AO). Security Engineering & Operations: Control Implementation: Consult on the configuration and management of security tools and systems (e.g., SIEM, vulnerability scanners, intrusion detection/prevention systems) to effectively enforce NIST 800-53 controls. Vulnerability Management: Analyze results, prioritize remediation efforts based on risk to the system's security categorization (e.g., FIPS 199), and track POA&M completion. Incident Response: Participate in security incident response planning and testing activities, ensuring all incidents are documented and handled in compliance with federal reporting requirements. Change Management: Review system and network change requests to ensure security implications are addressed and maintain the security posture of authorized systems. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field Relevant security certifications 3-5 years of progressive experience in Federal IT Security Engineering 2-4+ years of experience focusing on federal compliance (FISMA, NIST RMF) Technical environment: CSAM, Splunk, Tenable, Palo Alto, Checkmarx About PRG With 20+ years of success in the staffing industry, Peyton Resource Group focuses on matching talent to the precise needs of our clients. Your success is our commitment, and we back up that commitment by only recommending opportunities that align with your goals. Our candidate-centric approach ensures you are in the driver's seat of your career, and our team of recruiters will partner with you and support you every step of the way. PRG's dedication to service has been widely recognized throughout the industry. PRG has been awarded ClearlyRated's Best of Staffing award for 10+ years, as well as the Business Journal's Best Places to Work in Dallas, San Antonio and Austin.
    $60-67 hourly 1d ago
  • Data Security Engineer-Snowflake-100% Remote in CA

    Beacon Hill 3.9company rating

    Remote job

    for California Residents ONLY Data Security Engineer - Snowflake (Information Security Focus) Seeking a Data Security Engineer with deep, hands-on experience securing Snowflake environments. This role focuses on designing, implementing, and maintaining advanced security controls across Snowflake and connected data platforms. The position requires a strong information security background, proven Snowflake security expertise, and the ability to support secure adoption of modern data workloads including AI/ML pipelines and vector data. Must Haves 5+ years of experience in Information Security. Security-focused background supporting enterprise data platforms. Hands-on Snowflake security expertise (RBAC, masking, encryption, governance, etc.). Key Responsibilities Design, implement, and manage Snowflake security controls, including RBAC, data masking, row/column-level security, encryption, and object tagging. Define and enforce least-privilege access models aligned with governance, compliance, and business requirements. Implement best practices for Snowflake configuration (network policies, secure access, warehouse/account settings, monitoring). Secure and support AI/ML workloads, vector databases, embeddings, and advanced Snowflake features. Partner with engineering, architecture, governance, and privacy teams to ensure the platform meets security standards. Evaluate security findings, document risks, and work with internal teams and vendors to drive mitigation and remediation. Basic Qualifications 5+ years in Information Security, including 2+ years securing Snowflake environments. Deep understanding of Snowflake RBAC, masking policies, external tokens, object tagging, and data classification. Experience securing AI/ML pipelines, vector databases, embeddings, or Snowflake Cortex capabilities. Familiarity with IAM platforms (Okta, Azure AD, Ping) and authentication standards (SSO, MFA, SCIM). Proficiency in SQL, Python (or similar), and scripting/automation for security controls. Knowledge of data governance, privacy standards, and regulatory frameworks. Experience with cloud platforms (AWS, GCP, or Azure) and securing data in multi-cloud environments. Strong written and verbal communication; able to explain complex concepts clearly to diverse audiences. Preferred Qualifications Certifications such as SnowPro Advanced: Data Protection & Security, CISSP, CISM, or CCSK. Experience with data access governance tools (e.g., Immuta, SecuPi). Familiarity with data lineage and cataloging platforms (Alation, BigID, etc.). Experience working in large-scale enterprise or regulated environments (finance, healthcare, media, etc.). Background with Agile/Scrum and collaborative delivery models. Interested candidates may submit their resumes online or call at ************ for further information regarding the position. Beacon Hill is an equal opportunity employer and individuals with disabilities and/or protected veterans are encouraged to apply. California residents: Qualified applications with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act. If you would like to complete our voluntary self-identification form, please click here or copy and paste the following link into an open window in your browser: ***************************************** Completion of this form is voluntary and will not affect your opportunity for employment, or the terms or conditions of your employment. This form will be used for reporting purposes only and will be kept separate from all other records. Company Profile: Beacon Hill Technologies, a premier National Information Technology Staffing Group, provides world class technology talent across all industries utilizing a complete suite of staffing services. Beacon Hill Technologies' dedicated team of recruiting and staffing experts consistently delivers quality IT professionals to solve our customers' technical and business needs. Beacon Hill Technologies covers a broad spectrum of IT positions, including Project Management and Business Analysis, Programming/Development, Database, Infrastructure, Quality Assurance, Production/Support and ERP roles. Learn more about Beacon Hill and our specialty divisions, Beacon Hill Associates, Beacon Hill Financial, Beacon Hill HR, Beacon Hill Legal, Beacon Hill Life Sciences and Beacon Hill Technologies by visiting ************* Benefits Information: Beacon Hill offers a robust benefit package including, but not limited to, medical, dental, vision, and federal and state leave programs as required by applicable agency regulations to those that meet eligibility. Upon successfully being hired, details will be provided related to our benefit offerings. We look forward to working with you. Beacon Hill. Employing the Future™
    $123k-174k yearly est. 3d ago
  • Cyber Security Engineer

    Lucas James Talent Partners

    Remote job

    Our client Dscout is a flexible Experience Research Platform for capturing in-context insights from high-quality participants, bridging the gap between product teams and users. Leading brands like Sonos, Spotify, Duolingo and Best Buy use Dscout to test ideas, iterate quickly, collaborate, and build confidently. We are expanding our smart and driven team and would love for you to join us. We are looking for a Cybersecurity Engineer to become a part of the Cybersecurity team reporting to the VP, Compliance and Information. The Cybersecurity Engineer will contribute to reducing risk within the Dscout SaaS environment and internal IT systems. This includes planning and implementing cybersecurity controls, supporting cybersecurity operations, and monitoring the threat landscape. This role will ensure Dscout controls operate effectively over time. What You Will Do Lead the process to build security into the Dscout SaaS environment. This includes applying security throughout the software development lifecycle. Collaborate with Engineering to plan and implement cybersecurity controls to protect the SaaS environment. This includes applying leading practices to secure AWS resources (e.g., VPCs, EC2 instances, and containers). Continually enhance security monitoring of the SaaS environment and internal IT services by implementing SIEM and working with Engineering to continuously improve logging and auditability. Assess evolving threats and develop recommendations to mitigate risk to Dscout. You will provide weekly threat intelligence reports highlighting potential risk to the organization. Work side-by-side with Engineering to analyze, contain, and mitigate cyber attacks and other related incidents. Perform vulnerability monitoring and, where appropriate, ensure remediation. Participate in the development of security policies and processes. Assist third party risk reviews. Provide recommendations to continually improve security controls. Assist in development of security programs and efforts to promote security awareness. What you need to have (we can call them Desired Skills and Background): Experience working with developers to conduct security reviews and provide strong recommendations to manage risk. This includes a strong understanding and practical use of OWASP Top 10 (web and AI). Experience securing AWS cloud environments and infrastructure as code solutions such as Terraform. Proven ability to implement security monitoring tools such as Datadog. This includes the ability to identify relevant scenarios and ensure proper logging. Experience responding to cyber attacks such as bots and account compromise as well as threats like data leakage and infected computers. Strong knowledge of cloud computing environments. Working knowledge of security in software development and continuous integration/continuous delivery (CI/CD). Experience documenting and implementing security policies and processes. Knowledge of security frameworks and standards: ISO 27001, NIST, or SANS preferred. Experience with HITRUST and/or SOC 2 certification is preferred. Good communication, documentation and presentation skills. Limitless curiosity and insatiable appetite to understand human behavior and relevant technologies. Background Bachelor's degree is preferred CISSP, CCSP, or GIAC security certification preferred A minimum of 3 years of security experience Of course, what is outlined above is an ideal set of expectations, but things may shift based on business needs, and other projects and tasks could be added at the discretion of your manager. About Dscout Dscout is a team of passionate, empathetic, and curious professionals. As a recognized leader in the Forrester Wave, we're at the cutting edge of experience research technology. The power of research drives us-how in-context insights from real people can build more enjoyable products and services. We prioritize learning, sharing, and building. We also deeply value being a diverse and inclusive team and company and look for team members who align with that belief. Join our dynamic team and help shape product roadmaps and business strategies for the world's most loved brands. It doesn't stop there. When you join the Dscout team, you will get: * A strong and competitive compensation package with a built-in bonus and equity program. * An incredible and progressive benefits package (for both you and your dependents) to support work/life balance, including flexible PTO, 16 company holidays, 12 weeks of paid parental leave, 401k match, and much more. * An education stipend to support your growth & development and a remote work stipend. * A company that is open and transparent with our team. You will know what is happening and why it matters. Dscout is an equal-opportunity employer that values diversity. We do not discriminate based on identity, including race, color, religion, national origin or ancestry, sex, gender identity and expression, age, physical or mental disability, pregnancy, veteran or military status, unfavorable discharge from military service, genetic information, sexual orientation, marital status, order of protection status, citizenship status, arrest record or expunged or sealed convictions, or any other legally recognized protected basis under federal, state, or local law. If you need reasonable accommodations for any part of the employment process, please email us at accommodations@dscout.com with the nature of your request and your contact information. We'll do all we can to ensure you're set up for success during our interview process while upholding your privacy, including accommodation requests. Please note that only inquiries concerning a request for reasonable accommodation will be responded to from this email address. When you apply at Dscout, we will process your job applicant data, including your employment and education history, transcript, writing samples, and references, as necessary to consider your job application for open positions. For more information about our privacy practices, please visit our Privacy Policy. Dscout participates in the E-Verify program in certain locations, as required by law. NOTE: DSCOUT NEVER CONTACTS JOB APPLICANTS VIA TEXT, MESSENGER, OR OTHER SIMILAR APPLICATIONS. BE AWARE OF PHISHING AND SPOOFING SCAMS, BOTH VIA TEXT AND EMAIL. ONLY RESPOND TO EMAILS FROM DSCOUT.COM #BI-Remote #LI-Remote
    $68k-92k yearly est. 3d ago
  • Nuclear Cyber Security Engineer - REMOTE

    JSG (Johnson Service Group, Inc.

    Remote job

    IF YOU DO NOT HAVE THE REQUIRED BACKGROND IN THE U.S. COMMERCAL NUCLEAR INDUSTRY, PLEASE DO NOT APPLY. Immediate opening for a Cyber Security Engineer with commercial nuclear background, to perform design modifications (involving digital upgrades) as well as preparing cyber assessments on those digital components. Prefer direct/perm hire, will consider contract. This person will be the go-to individual for Cyber related projects. Must be familiar with NEI-08-09, EPRI graded approach, have digital mod experience, and extensive understanding of plant SSC (Safety Classification of Structures, Systems, and Components). Site Cyber qualifications to perform CSAT (Cyber Security Assessment Team) would be a plus. Compensation based on experience, but likely in the 140K-$160K range. JSG offers medical, dental, vision, life insurance options, short-term disability, 401(k), weekly pay, and more. Johnson Service Group (JSG) is an Equal Opportunity Employer. JSG provides equal employment opportunities to all applicants and employees without regard to race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, marital status, protected veteran status, or any other characteristic protected by law. #D650
    $160k yearly 2d ago
  • Sr Technical Security Engineer-Remote

    Generis Tek Inc. 4.0company rating

    Remote job

    Please Contact: To discuss this amazing opportunity, reach out to our Talent Acquisition Specialist Faizan Mohammed at email address ****************************** can be reached on # ************. We have Contract role Sr Technical Security Engineer-Remote for our client at Bolingbrook IL. Please let me know if you or any of your friends would be interested in this position. Position Details: Sr Technical Security Engineer-Remote-Bolingbrook IL Location : Remote Project Duration : 4+ months of contract Pay rate : $64 to $72 an hour on W2 Minimum Requirements: 5+ years of experience in application or product security, with a track record of securing desktop and mobile applications. Strong understanding of secure architecture for thick clients, including local storage protection, inter-process communication, JavaScript engines, OS-level security features, and web security standards (CSP, same-origin policy, TLS/HTTPS). Experience with mobile (iOS/Android) and desktop (Windows/mac OS/Linux) application security models. Proficiency in GenAI security, modern cryptography, certificate management, secure authentication (OAuth, WebAuthn, FIDO2), and secure session handling. Knowledge of OS-level hardening techniques, sandboxing, privilege separation, and secure use of platform APIs. Hands-on experience with secure coding practices in at least one systems language (C++, Rust, Go) and one application language (Kotlin, Swift, C#). Familiarity with static/dynamic analysis tools, fuzzing, penetration testing, and reverse engineering for client applications. Experience embedding security into the software development lifecycle (threat modeling, code reviews, secure design patterns). Ability to manage incident response and vulnerability remediation for thick client environments. Strong cross-team communication skills and ability to write clear developer-facing security guidelines. Preferred Contributions to open-source client frameworks, SDKs, or application security tools. Prior work with secure local storage, anti-tampering, DRM, or obfuscation in client software. Familiarity with offline-first application security challenges (sync, caching, data persistence). Experience with privacy-preserving client design, including minimizing telemetry and preventing data leakage. Deep understanding of reverse engineering techniques and defenses (e.g., code obfuscation, anti-debugging, integrity checks). Experience leading security architecture for a thick client application launch at scale. Advanced degree (MS/PhD) in Computer Science, Cybersecurity, or related field. To discuss this amazing opportunity, reach out to our Talent Acquisition Specialist Faizan Mohammed at email address ****************************** can be reached on # ************.
    $64-72 hourly 1d ago
  • Chief Information Security Officer (CISO)

    Enterprise Mangement Solutions Inc.

    Remote job

    ABOUT ENTERPRISE MANAGEMENT: Enterprise Management Solutions, Inc. (Enterprise) is a full-spectrum administrative and operational management firm headquartered in Baltimore, Maryland. We provide contracted infrastructure support to independently governed organizations in sectors such as behavioral health, primary care, supportive housing, food service, commercial real estate, and nonprofit development. Enterprise does not own or govern the organizations we serve. Instead, we operate as a trusted administrative services provider under formal contractual agreements, offering high-level back-office services that allow our clients to focus on mission execution and program delivery. Our scope of service includes: Comprehensive fiscal systems and multi-entity accounting Human resource infrastructure and staff onboarding Legal compliance and audit readiness Technology integration and IT systems governance Organizational growth planning and fiscal sustainability analysis Federal and state grant compliance, budget monitoring, and reporting Financial and operational performance dashboards CEO- and executive-level strategy support Our goal is to relieve mission-driven companies of administrative burden by overseeing financial and operational systems that allow leadership teams to focus on quality care and innovation. DISCLOSURES: The specific statements shown in each section of this are not intended to be all-inclusive. They represent typical elements and criteria considered necessary to perform the job successfully. The job's responsibilities/tasks may be modified and/or expanded over time. Company will inform the personnel member when changes in the respective job description are made. COMPANY WEBSITE: COMPANY PHONE NUMBER: ************** HUMAN RESOURCES PHONE NUMBER: ************** ext. 10 Position and Employment Details POSITION TITLE: Chief Information Security Officer (CISO) ALTERNATE TITLE(S): Chief Cybersecurity Officer (CCSO), Chief Security Officer (CSO - Cybersecurity), Senior Cybersecurity Executive COMPANY: Enterprise Management Solutions, Inc. (in support of all customer companies under contract) DIVISION: Technology & Information Security DEPARTMENT: n/a UNIT: n/a BENEFITS PACKAGE: In addition to hourly wages, eligible employees may receive a comprehensive benefits package that includes: Paid Time Off (PTO) Family and Medical Leave Health, Medical, and Dental Insurance Reimbursement or health insurance coverage, as available Supplemental Health and Disability Insurance Options Retirement Savings Plan Professional Development Support and Continuing Education Opportunities WORK SCHEDULE: Two days per week, 8:00 AM - 5:00 PM (daily lunch break from 12:00 PM - 1:00 PM) ACCOUNTABLE TO: Chief Executive Officer (COO, in absence of CEO) ACCOUNTABLE FOR: Oversight of cybersecurity strategy, data protection, regulatory compliance, and the supervision of all information security systems, personnel, and vendors across all affiliated companies. This role is responsible for ensuring uninterrupted cybersecurity operations, incident response readiness, and cross-training protocols to protect critical client and company assets. CLASSIFICATION: W-2 employee; part-time hourly COMPENSATION RANGE: Ranges between $55.00 per hour to $90.00 per hour, and is commensurate with experience, expertise, verified credentials, and available company budget. ANTICIPATED TRAVEL: Up to 10% of the time (interoffice and site-based meetings) WORKPLACE POLICY: This is a 100% in-office role at Baltimore HQ, two days per week. Remote work or telework is prohibited unless explicitly pre-approved in writing by the CEO. SUMMARY OF POSITION RESPONSIBILITIES: The Chief Information Security Officer (CISO) serves as the organization's highest-ranking cybersecurity executive, responsible for designing, implementing, and maintaining a resilient information security program that safeguards company and client systems against internal and external threats. The CISO oversees all areas of cybersecurity including policy development, risk management, threat detection, incident response, and compliance with federal and state regulations (HIPAA, HITECH, GDPR, SOC2, PCI-DSS, NIST, and others as applicable). This role also ensures that Enterprise delivers all contracted Information Security, IT Governance, and Cybersecurity Risk Management services to affiliated entities, protecting sensitive healthcare, housing, financial, and client records. The CISO plays a critical role in aligning technology security with enterprise goals, while proactively mitigating risks across all operational areas. SCHEDULED DUTIES AND RESPONSIBILITIES: Cybersecurity Strategy & Leadership: Develop and execute a company-wide cybersecurity program aligned with business and client requirements; translate the CEO's strategic vision into measurable, risk-based security initiatives; conduct long-term security planning, including disaster recovery and business continuity. Risk Management & Regulatory Compliance: Ensure strict compliance with HIPAA, HITECH, GDPR, SOC2, PCI-DSS, NIST, and state regulations; perform enterprise-wide risk assessments and vulnerability scans; maintain and update incident response, breach notification, and audit readiness protocols. Threat Monitoring & Incident Response: Direct the Security Operations Center (SOC) or equivalent vendor-managed services; oversee intrusion detection, SIEM monitoring, log review, and malware defense; lead incident response, forensic investigation, and breach communication with executive leadership. Identity, Access, and Data Security: Manage identity and access management systems, including MFA and privileged access controls; oversee endpoint, mobile device, and server security configurations; ensure encryption, secure backups, and data loss prevention across all platforms. Vendor & Third-Party Oversight: Review vendor contracts, security certifications, and compliance attestations; establish standards for secure integration with external technology providers; lead vendor risk management and third-party security audits. Internal Policies & Training: Develop internal cybersecurity policies, acceptable use guidelines, and SOPs; deliver quarterly staff training on phishing, ransomware, and cybersecurity awareness; conduct simulated incident drills and security tabletop exercises. Collaboration & Executive Support: Advise the CEO and COO on cybersecurity risks and budget needs; partner with CFO, HR, and Operations Managers to ensure cross-department compliance; provide security briefings to the Board of Directors and client executives. UNSCHEDULED DUTIES AND RESPONSIBILITIES: Respond to emergent cybersecurity threats or system alerts. Support investigations of insider threats, fraud, or data misuse. Participate in interdepartmental workgroups to integrate new systems securely. Maintain active knowledge of evolving threats, ransomware tactics, and industry best practices. Lead recovery efforts in the event of a cyber-attack or natural disaster affecting IT infrastructure. PHYSICAL DEMANDS: Prolonged periods sitting at a desk and working on a computer. Occasional lifting up to 25 pounds. WORKING CONDITIONS: Cross-functional collaboration with executives and technical staff. 100% in-office role at Baltimore HQ (two days per week, no remote or hybrid unless CEO approved). Travel up to 10% may be required for audits, client meetings, or incident response. Must be available during scheduled hours with flexibility for emergent needs. COMPETENCIES AND SKILLS: Visionary leadership with deep technical and cybersecurity acumen. Expertise in risk management, incident response, and compliance frameworks. Skilled in cloud security (AWS, Azure, Google Cloud), SaaS protection, and on-premises systems. Strong command of cybersecurity frameworks: NIST CSF, ISO 27001, COBIT. Familiarity with healthcare IT and HIPAA/HITECH security requirements. Effective communicator able to brief executives and train staff. Demonstrated ability to lead multidisciplinary teams and manage security vendors. LEVEL OF EDUCATION / TRAINING / QUALIFICATIONS: Master's degree in Cybersecurity, Computer Science, or Information Technology (required). Certified Information Systems Security Professional (CISSP) in good standing (required). Additional certifications (CISM, CISA, CCSP, CRISC) strongly preferred. Minimum 8-10 years of progressive cybersecurity leadership experience, with at least 5 years in a senior or CISO role. Experience overseeing security in healthcare, housing, financial, or government environments strongly preferred. Demonstrated track record of regulatory compliance, successful incident response, and enterprise-level security program development. J-18808-Ljbffr
    $55-90 hourly 16h ago
  • Offensive Cyber Analyst / Programmer

    Lockheed Martin 4.8company rating

    Remote job

    may be eligible for up to a $25K sign on bonus for external hires\! **What We're Doing:** Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life\. You'll develop innovative offensive cyber capabilities that help protect the nation and the world\. Cyber | Lockheed Martin **Who we are:** Are you driven by the thrill of outsmarting even the most advanced security systems and networks? Do you find satisfaction in crafting innovative solutions to stay one step ahead of the adversary? If so, join Lockheed Martin Cyber & Intelligence's elite Offensive Cyber team, where we don't just test defenses \- we pioneer the techniques, tools, and exploits that define the cutting edge of offensive cyber operations\. We're seeking a highly skilled and motivated individual to join our Cyber & Intelligence team as an Offensive Cyber specialist\. The ideal candidate will possess a strong passion for cybersecurity and a drive to develop innovative solutions that surpass existing security measures\. Key responsibilities will include designing and implementing advanced techniques, tools, and exploits to stay ahead of emerging threats\. If you have a proven track record of thinking creatively and pushing the boundaries of what's possible in cybersecurity, we encourage you to apply\. Our team is dedicated to pioneering the latest advancements in offensive cyber operations, and we're looking for someone who shares our commitment to excellence and innovation\. As a member of our elite team, you will have the opportunity to work on complex and challenging projects, collaborating with experienced professionals to develop cutting\-edge solutions that drive our industry forward\. If you're a talented and ambitious ind **Why Join Us:** Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work\. Learn more about Lockheed Martin's competitive and comprehensive benefits package\. We support our employees, so they can support our mission\. **The Work:** A CNO \(Computer Network Operations\) offensive cyber professional can be described as a "cyber warrior," harnessing their expertise in computer systems and networks to disrupt and disable adversary capabilities\. Alternatively, they can be referred to as a "digital operator," skillfully navigating the virtual battlefield to achieve strategic objectives\. They can also be characterized as "cyber operatives," leveraging their knowledge of cybersecurity and computer networks to conduct operations and gather critical intelligence\. We are hiring for a variety of roles including vulnerability analysts, exploit developers, hardware/software reverse engineers, offensive cyber tool developers, embedded developers, and cyber researchers\. We want your expertise in traditional computing \(Windows/Linux/MacOS\), mobile technology \(Android/iOS\), wireless technology, IoT, ICS/SCADA, enterprise technologies, and special\-purpose embedded and real\-time systems\. Come join a company with incredible breadth and depth in the nature of programs and technologies we support that will never leave you bored or looking for your next assignment\. Stop having to look for a new job with every rumor and whim of contract changes\. \#RMSC6ISR \#RMSCYTJ \#OneLMHotJobs \#RMSTG2025 \#RMSTG2026 **Basic Qualifications:** - Candidate must possess active US security clearance with a polygraph - Bachelor's degree in computer science, information systems, or network engineering from an accredited college\. OR 4 years equivalent experience in lieu of a degree\. - Experience programming with any of the following: Assembly, C, C\+\+, Java, Perl or Python - Experience programming in one or more systems: Windows, Unix, Embedded, or Mobile platform applications **Desired Skills:** - 2\+ years in computer science, information systems, or network engineering\. - Able to design, write, and execute software test plans **Security Clearance Statement:** This position requires a government security clearance, you must be a US Citizen for consideration\. **Clearance Level:** TS/SCI w/Poly **Other Important Information You Should Know** **Expression of Interest:** By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match\. Should this match be identified you may be contacted for this and future openings\. **Ability to Work Remotely:** Onsite Full\-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility\. **Work Schedules:** Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees\. Schedules range from standard 40 hours over a five day work week while others may be condensed\. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits\. **Schedule for this Position:** 9x80 every other Friday off **Pay Rate:** The annual base salary range for this position in California, Massachusetts, and New York \(excluding most major metropolitan areas\), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $76,500 \- $134,895\. For states not referenced above, the salary range for this position will reflect the candidate's final work location\. Please note that the salary information is a general guideline only\. Lockheed Martin considers factors such as \(but not limited to\) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer\. **Benefits offered:** Medical, Dental, Vision, Life Insurance, Short\-Term Disability, Long\-Term Disability, 401\(k\) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays\. \(Washington state applicants only\) Non\-represented full\-time employees: accrue at least 10 hours per month of Paid Time Off \(PTO\) to be used for incidental absences and other reasons; receive at least 90 hours for holidays\. Represented full time employees accrue 6\.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays\. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year\. This position is incentive plan eligible\. **Lockheed Martin is an equal opportunity employer\. Qualified candidates will be considered without regard to legally protected characteristics\.** **The application window will close in 90 days; applicants are encouraged to apply within 5 \- 30 days of the requisition posting date in order to receive optimal consideration\.** At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges\. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work\. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility\. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work\. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility\. If this sounds like a culture you connect with, you're invited to apply for this role\. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs , and apply for roles that align with your qualifications\. **Experience Level:** Experienced Professional **Business Unit:** RMS **Relocation Available:** Possible **Career Area:** Cyber Security **Type:** Task Order/IDIQ **Shift:** First
    $76.5k-134.9k yearly 30d ago
  • Cyber Analyst, Digital Forensics Incident Response

    Bay 4.7company rating

    Remote job

    Why you should join our At-Bay Security team: At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to expand our DFIR team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers. The Role: Cybersecurity Analysts focused on Digital Forensics and Incident Response (DFIR) deliver incident investigation and response services to At-Bay insureds via: Forensically sound collection, transmission, and storage of digital evidence Analysis of digital evidence to identify indicators of compromise and adversary activity Development of incident timelines and theories of compromise Identification of incident root causes Participation in threat actor negotiations as necessary (e.g., ransom negotiations, etc.) Participation in incident recovery (e.g., restoration of data from backups, reimaging workstations and servers, rebuilding network infrastructure, etc.) activities as necessary Development and delivery of incident reports to document key incident details for engagement stakeholders including executive leaders for insureds, breach coach attorneys, and At-Bay claims management staff as necessary Development and delivery of recommendations to mitigate the risk of future incidents for impacted insureds Development and delivery of incident response training and simulations for targeted insureds Key skills: Previous digital forensics and incident response experience Strong oral and written communication skills Previous hands-on experience performing digital forensics and incident response, including several of the following: Business Email Compromise Ransomware Digital evidence collection and analysis Development and analysis of cyber threat intelligence Leadership of or participation in investigations involving digital evidence Intrusion detection / cyber threat hunting Malware analysis Incident recovery activities such as restoration of data from backups, operation of decryptor tools, etc. Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.) Minimum requirements: Bachelor's degree or equivalent Minimum of 2 years of experience in cybersecurity operations, incident response, incident recovery, or another security discipline Willingness to travel as needed to perform job functions Preferred requirements: Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity Previous background in law enforcement or government/military with experience leading complex technical investigations Knowledge of cloud environments, including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google) Experience in a top-10 cyber consulting firm or leading DFIR provider preferred One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.) Work location: USA, Nationwide Fully Remote Our estimated base pay range for this role is $80,000-$115,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent. #LI-CK1
    $80k-115k yearly Auto-Apply 33d ago
  • Cyber Threat Fusion Analyst

    Beyond SOF

    Remote job

    The client is looking for a Cyber Threat Fusion Analyst. This position will support the Joint Service Provider (JSP) Defensive Cyber Operations (DCO) organization with Cyber Threat Intelligence products and network security monitoring and will perform as the analyst in area of cyber threat intelligence. This role will be based onsite at the Mark Center in Alexandria, VA. Some remote work will be allowed. An active TS/SCI security clearance is required prior to start. Essential Job Functions Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats. Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections. Identify threat actor tactics, techniques and procedures and based on indicators develops custom signatures and blocks. Understand concepts of log and packet analysis Navigate the command line using specific expressions to manipulate data Handle and organize disparate data about detections, attacks, and attackers Employ discovery techniques and vetting of new intelligence. Create Situational Awareness Reports and Threat Briefs. Minimum Required Qualifications Due to the nature of this position and the information that employees will be required to access, U.S. Citizenship is required. Bachelor's Degree in Computer Science, Computer Engineering or related field and 8+ years of prior relevant experience; additional years of experience may be substituted in lieu of a degree. Computer defense technologies spanning endpoint, network, and open source. Required Security Clearance: TS/SCI. 8570 IAT II certification is required prior to start. It is preferred you will already possess an 8570 CSSP-Analyst certification. If not, it will be required for this to be obtained within 6 months of your start date.
    $74k-100k yearly est. 60d+ ago
  • Cyber Insider Threat Analyst (Remote)

    RTX

    Remote job

    Country: United States of America Remote U.S. Citizen, U.S. Person, or Immigration Status Requirements: U.S. citizenship is required, as only U.S. citizens are authorized to access information under this program/contract. Security Clearance: None/Not Required RTX Corporation is an Aerospace and Defense company that provides advanced systems and services for commercial, military and government customers worldwide. It comprises three industry-leading businesses - Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Its 185,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Arlington, VA. The following position is to join our RTX Enterprise Services team: Role Overview: Enterprise Services (ES) Cybersecurity has an immediate opening for a qualified insider threat analyst to join RTX Cyber Defense reporting to the Associate Director of Cyber Insider Threat Operations. As an insider threat analyst, you will be responsible for supporting the analysis, monitoring and triage of alerts stemming from potential insider threats. What You Will Do: Perform log analysis to detect anomalies, leveraging expertise in security operations tools to monitor and safeguard sensitive data. Utilize behavioral analytics and endpoint security solutions to identify and investigate unusual patterns. Monitor potential data exfiltration points using data loss prevention tools and other security solutions to detect and prevent unauthorized transfers. Apply Open-Source Intelligence (OSINT) techniques to gather and analyze publicly available information related to insider threats. Identify insider threat trends and patterns to assist content teams in the development of new detection rules and models. Articulate the implications of the risks relative to insider threats and educate team members, peers and stakeholders on the potential impacts. Review data, alerts and behaviors to identify potential concerns from multiple angles, gather information and understand and articulate information gaps needed to inform decisions. Work independently and with teams to define and complete analysis activities. Document findings in a manner that technical and non-technical stakeholders understand and can articulate findings to leadership and peers. Perform initial analysis on data from systems to identify unexpected or malicious activity across channels while understanding how activity fits into the threat landscape. Assist in building processes, procedures and training for the insider threat team. Collaborate with stakeholders to provide suggestions and feedback for validation and improvement of various tools, models, and processes. Stay updated on the latest developments and trends in insider threats, emerging and/or advanced persistent attack vectors, and industry best practices, incorporating this knowledge into RTX's defense strategies. Perform other duties as assigned and as required to continuously drive process excellence. Qualifications You Must Have: Typically requires a University Degree or equivalent experience and a minimum 5 years of experience, or an Advanced Degree and a minimum 3 year's experience. Minimum 5 years supporting a cyber insider threat program and/or a cyber incident response team, including at least 3 years with cybersecurity tools and technologies used to detect and mitigate insider threats, including, but not limited to security information and event monitoring (SIEM), user entity and behavior analytics (UEBA), user activity monitoring (UAM), data loss prevention (DLP) technologies and endpoint security solutions. Must be able to effectively communicate (verbal and written) technical and strategic details to peers, leadership, and stakeholders with varying levels of operational expertise. The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance. Qualifications We Prefer: Insider Threat specific training/certifications such as CERT Insider Threat course work or Center for Development of Security Excellence (CDSE). Industry certifications in information security or technology such as, CISSP, CISM, CGEIT. Experience collaborating with teams inside and outside of Digital Technology (ex. Privacy, Legal, HR). Preferred candidate will have experience with Operating System, cloud access, and web proxy event logs, endpoint/extended detection & response, and security incident & event management (SIEM) platforms. Demonstrate critical thinking and problem-solving skills. What We Offer: Whether you're just starting out on your career journey or are an experienced professional, we offer a robust total rewards package with compensation; healthcare, wellness, retirement and work/life benefits; career development and recognition programs. Some of the benefits we offer include parental (including paternal) leave, flexible work schedules, achievement awards, educational assistance and child/adult backup care. Learn More & Apply Now! Work Location: Remote Please consider the following role type definition as you apply for this role: Remote: This position is currently designated as remote. However, the successful candidate will be required to work from one of the 50 U.S. states (excluding U.S. Territories). Employees who are working in Remote roles will work primarily offsite (from home). An employee may be expected to travel to the site location as needed. As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote. The salary range for this role is 82,000 USD - 164,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $82k-111k yearly est. Auto-Apply 50d ago
  • Cyber Security Analyst II (Remote)

    Ntirety, Inc.

    Remote job

    is remote and can be performed from anywhere in the United States. Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions. KEY RESPONSIBILITIES: * Act as the primary point of escalation for Cyber Security Analyst I technicians * Provides coaching to Cyber Security Analyst I employees on how to perform their duties * Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats * Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole * Performs all of the following functions of a Cyber Security Analyst I, with proficiency * Monitor computer networks for security issues and respond accordingly, including: * Creating/Managing firewall rules * Managing anti-virus endpoint tools * Performing event correlation analysis on potential threats identified through our SIEM * Configuring/Managing log management * Configuring/Managing file integrity monitoring * Performing vulnerability scans and remediation of identified risks * The methodology & analysis of identifying compromised servers * Performing rule tuning in our SIEM for improved detection capabilities * Interact with customers by phone, chat, or trouble ticket on any customer facing security issues * Investigate, document and assess security breaches and other cyber security incidents * Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs * Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives * Identify and fix detected vulnerabilities to maintain a high-security standard * Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities * May be relied upon as a technical point of contact during Escalated Events relating to security * Review, investigate and respond to any external "abuse" complaints coming from our IP space * Develop best practices for IT security * Research security enhancements and make recommendations to management * Handle escalated internal or customer security issues from support or another operations team * Takes part in any security-oriented projects or critical initiatives * Stay up to date on information technology & security news, trends and standards * Deliver an exceptional customer experience every day * Other duties as identified or assigned DESIRED ROLE OUTCOMES: * Keep us and our customers free from security incidents but respond capably when one occurs * Our detection of security threats is continually improving * Provide valuable insights and visibility around security incidents to our customers * Have a staff of customer focused, energetic and security savvy team members REQUIRED SKILLS: * A minimum of 2 years' experience in a security analyst role * Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred * Must have experience in a Security Operations Center (SOC) * Must have technical troubleshooting and problem-solving skills * Understanding of network management principles * Experience in systems administration of Windows and Linux based operating systems * Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies * Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts * Ability to identify and mitigate network vulnerabilities and explain how to avoid them * Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact * Ability to learn and communicate technical information to non-technical people * Must have excellent written & oral communication skills, and strong interpersonal skills * Must emulate the Ntirety Values in all that they do Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA). Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law. Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
    $76k-102k yearly est. 60d+ ago
  • Cyber Security Analyst

    Military, Veterans and Diverse Job Seekers

    Remote job

    Responsibilities: Investigate security incidents and escalate when necessary Work Incident Response and Administrative tickets Perform and develop data mining queries using Splunk/Splunk ES Communicate in a clear and concise manner with Leadership, Customers and Peers Monitor and respond to multiple shared Mailbox inquiries Provide vulnerability, threat, and risk mitigation support Monitor Security Operations Dashboards for alerts Support daily Operations briefings Monitor and answer the SOC phone hotline Support customer defined metrics reports Support government data calls This opportunity offers remote work! Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting) Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
    $74k-100k yearly est. 60d+ ago
  • Global Cyber Wordings Analyst

    Liberty Mutual 4.5company rating

    Remote job

    Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience. Key responsibilities: Wording library and drafting support Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes. Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards. Track version control, change logs, approvals, and archiving; Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance. Commercial enablement Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently. Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives. Triage wording queries from regions; track SLAs and referral approvals per the global governance framework. Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards. Regulatory and legal stewardship Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions. Maintain audit-ready documentation; assist with regulatory filings or attestations where required. Claims partnership and feedback loop Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty. Support coverage position letters and documentation packs with research, citations, and clause histories. Innovation and product development support Help draft prototype wordings for new propositions Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses. Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics. Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders. Qualifications Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience. 2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred. Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail. Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous. Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates. Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools. Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs. Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting. About Us Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role. At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve. We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: *********************** Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law. Fair Chance Notices California Los Angeles Incorporated Los Angeles Unincorporated Philadelphia San Francisco We can recommend jobs specifically for you! Click here to get started.
    $76k-99k yearly est. Auto-Apply 18d ago
  • Consultant - Cyber Security Analyst (Fractional/Contract Role)

    Arootah

    Remote job

    Join our experienced roster of consultants that support Hedge Funds and Family Offices. Arootah is a personal and professional development leader in the Investment and Financial Services industry. Our mission is to provide top business advisory services to our hedge fund client base. We focus our Business Consulting on the multi-faceted needs of Hedge Funds and Family Offices. Arootah was founded by Rich Bello, the Co-Founder and COO of the industry-leading $10 billion hedge fund, Blue Ridge Capital. Rich brings more than 30 years of experience, including leadership positions at Morgan Stanley, Tiger Management, and Ernst & Young. Visit us at **************************************** for more information. WHO WE NEED: Arootah is searching for experienced Cybersecurity Analysts to consult to our highly prestigious client base. As a consultant, you will work with our Hedge Fund and Family Office clients to provide expert advice. Having previously served in this role, you have specific, hands-on experience implementing, maintaining, and operating a cybersecurity program for a leading Hedge Fund or Family Office. What You'll Do Best practice reviews. Developing realistic and effective action plans. Breaking apart goals into actionable steps. Advising on vendor selection and oversight. Creating and implementing policies, procedures, and control measures. Evaluating each client's advancement toward goal actualization through key performance indicators (KPIs) and scoring matrices. Special projects or other areas of need. Implement and assist with the day-to-day operations of securing the firm's various information systems by providing technical expertise in all areas of network, system, and application security. Protect sensitive information by installing and configuring security software like firewalls and encryption programs. Monitor network traffic and analyze records like authentication logs to identify and investigate anomalies to prevent and detect security incidents. Lead the firm's vulnerability management program, conduct the annual cybersecurity assessments and penetration tests, and research and report on emerging threats, to help the firm take pre-emptive risk mitigation steps. Implement organization-wide security best practices to protect the business against existing, new, and emerging security threats. Test and analyze the organization's business continuity and disaster recovery plan to ensure operations will continue in the event of a cyberattack or natural disaster. Assesses new security technologies to determine potential value for the firm. Execute and carry out firm incident response program to identify and prevent all potential breaches (internal or external), or misuse of data, that may occur. Review, investigate, and respond to real-time alerts within the environment. Generate real-time and historical reports for internal and external stakeholders regarding security and/or compliance violations. Qualifications A Bachelor's degree in Computer Science, Computer Engineering, Information Systems, Information Sciences, or a related field, with a strong academic record. One or more of the following certifications: CEH, CISM, CompTIA Security+, CISSP, GSEC, GCIH, GNFA, GREM or other related SANS certifications. 5+ years of specific experience as a Cybersecurity Analyst at a hedge fund or family office. Working experience with one or more of the following technology vendors and products: Splunk Cloud, Rapid7 Nexpose Vulnerability Scanner, Sophos Antivirus, Varonis DatAlert, ForeScout CounterACT, or similar. Thorough understanding of Microsoft's enterprise technology platform, including Azure, Active Directory, SQL, Office365, and the Windows server and desktop operating systems. In-depth knowledge of security event management, network security monitoring, investigating common types of attacks, network packet analysis, log collection and analysis, and reviewing security events. Demonstrated experience implementing and/or enforcing security and compliance frameworks such as NIST, Cobit, and ISO. Strong writing and presentation skills are requiredin order to communicate findings and recommendations, as well as the ability to articulate security-related concepts to a broad range of technical and non-technical staff. Job Status Contractor Hours are based on the needs of the assigned client (0-40 hours per week). Join a well-funded disruptor in finance and technology. Enjoy the flexibility of remote work and choosing your assignments. Be part of a dynamic, high-energy company in its expansion stage. Now is the time to join! For more information, visit us at Arootah.com.
    $75k-102k yearly est. Auto-Apply 60d+ ago
  • Senior Cyber Intrusion Detection Analyst - 5th shift

    Govcio

    Remote job

    GovCIO is currently hiring for Senior Cyber Intrusion Detection Analyst for 5th shift work (7am-7pm Saturday + Sunday, Friday 11pm to 7am and Tuesday 7am to 3pm) in the Washington, DC and will be a hybrid remote position. Responsibilities Respond to cyber incidents, including responding to SOC IR phone calls and SOC emails Act as a Subject Matter Expert in investigations for potential incidents identified by SOC Tier I & II analysts and Shift Lead Investigate phishing and self-identified potential cyber threats (phishing emails sent to the SOC) Work with SOC federal staff and Incident Handlers to analyze, triage, contain, and remediate security incidents Participate regularly in SOC Splunk engineer working group sessions, to include idea generation for new content rules for security alerting and reduction of false positives. Collaborate across the SOC organizational lines with Threat Hunt and Security Intelligence, while developing depth in your desired cyber discipline and/or technologies Follow Federal IRP, SOC SOPs and other prudent documentation procedures in order to work and be effective while having an eye towards process improvement/effectivity Knowledgeable on multiple technology and system types Able to articulate the incident response lifecycle Manages and responds to computer security incidents that involve enterprise systems and data including personally identifiable information (PII) breaches Detect, collect and report cybersecurity incidents Experience detecting and remediate malicious codes Helps improve the overall security posture by independently verifying the security of enterprise systems, and to ensure the timely dissemination of security information to the appropriate contractor and federal stakeholders Analyze firewall logs, Full Packet Capture (PCAP), IDS alerts, Anti-malware alerts, Host Intrusion Prevent System (HIPS), and server and application logs to investigate events and incidents for anomalous activity and produce reports of findings Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, Orchestrator logs, and malicious code to identify, contain, eradicate, and ensure recovery from incidents Support and help the Cyber Workforce Development Lead, go through tickets analyzing security annotations on documented incidents Qualifications Bachelor's with 8+ years of cybser security experience (or commensurate experience) 6+ years intrusion detection examination experience (or commensurate experience) 6 years of security intrusion detection examination experience involving a range of security technologies that produce logging data; to include wide area networks host and Network IPS/IDS/HIPs traffic event review, server web log analysis, raw data logs; the ability to communicate clearly both orally and in writing. Working experience with Splunk SIEM. At least 3 years of experience working at a senior level, performing analytics examination of logs and console events and creating advance queries methods in Splunk or advance Grep skills, firewall ACL review, examining Snort based IDS events, Pcaps, web server log review, in SIEM environments. Candidate must have one or more advanced certification, including but not limited to: CERT Certified Computer Security Incident Handler, CEH Certified Ethical Hacker, CISSP, GCIH Certified Incident Handler, GISF Information Security Fundamentals Clearance Required:Ability to maintain a Public Trust clearance Company Overview GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens. But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer? What You Can Expect Interview & Hiring Process If you are selected to move forward through the process, here's what you can expect: During the Interview Process Virtual video interview conducted via video with the hiring manager and/or team Camera must be on A valid photo ID must be presented during each interview During the Hiring Process Enhanced Biometrics ID verification screening Background check, to include: Criminal history (past 7 years) Verification of your highest level of education Verification of your employment history (past 7 years), based on information provided in your application Employee Perks At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including: Employee Assistance Program (EAP) Corporate Discounts Learning & Development platform, to include certification preparation content Training, Education and Certification Assistance* Referral Bonus Program Internal Mobility Program Pet Insurance Flexible Work Environment *Available to full-time employees Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience. We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets. Posted Pay Range The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors. Posted Salary Range USD $108,310.00 - USD $140,000.00 /Yr.
    $108.3k-140k yearly Auto-Apply 23d ago
  • Senior Information Security Risk Specialist (GRC)

    Unveiling Opportunities

    Remote job

    About Us At SentinelOne, we're redefining cybersecurity by pushing the limits of what's possible-leveraging AI-powered, data-driven innovation to stay ahead of tomorrow's threats. From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We're looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you're excited about solving complex challenges in bold, innovative ways, we'd love to connect with you. What are we looking for? We are looking for a highly motivated, collaborative and experienced Senior InfoSec Risk Specialist with a security-focused mindset who can balance risk, business drivers and timelines. This position will be responsible for understanding and supporting the design of SentinelOne's organizational, procedural and technological security controls within the context of the security frameworks applicable to SentinelOne. In addition, you will be responsible for identifying and testing appropriate controls to ensure they are designed, implemented, and operating effectively to mitigate risk. The selected employee will help implement, automate, document and maintain controls while supporting and responding to inquiries from internal and external stakeholders. This individual must be self-directed and be able to work independently and collaboratively. What will you do? Support the planning and performance of IT risk-based security audits and projects, risk assessments, execution of fieldwork and communication to stakeholders. Help in evaluating relevant global standards, compliance frameworks and regulations to analyze existing controls; identify areas for improvement; and design control growth. Collaborate with process and control owners through the audit lifecycle for process documentation updates, testing coordination, remediation of identified deficiencies and advising on internal control enhancements or process changes, as appropriate. Proactively manage audit findings, tracking and documentation of status updates obtained via action owners, and timely execution of remediation activities. Participate in internal security and compliance programs and track recurring controls, such as SSAE 18 SOC 2, ISO 27001/27002. Provide control consultative support to the business to assist in redesign efforts to improve the control environment and identify opportunities for control improvements with the objective of mitigating risk and improving compliance and operational performance. Help support internal/external audits and evidence collection via a GRC tool. Document new and update existing policies, procedures, standards and resources Participate in Security awareness program, train personnel on data security and privacy-related processes and responsibilities. Help support customer security reviews, RFPs and external security and privacy inquiries. Participate in defining, collecting and tracking various Security Metrics. What skills and experience should you bring? 5+ years of experience working in information security, risk or compliance. Experience working with Security Controls across at least some of the following domains: Access Management, Encryption, Risk Management, Network Security, Configuration Management, Patch Management, Change Management, Awareness and Training, BC/DRP, etc. Ability to perform internal audits with minimal direct supervision, exhibit professional audit judgment and have experience in a broad range of audit projects such as SSAE 16/18 SOC 2, ISO 27001/2, NIST. Strong risk management experience, performing assessments and audits, designing controls, managing enterprise control frameworks, and prioritizing risk. Strong project management skills and ability to manage a variety of projects simultaneously to completion within the agreed timelines. Excellent collaboration and interpersonal skills. Must be able to communicate with all levels in the organization. Ability to communicate effectively, in writing and verbally, to target audiences, including customers, partners, auditors, executive management, vendors, and peers. Experience working with both technical and non-technical teams. Ability and desire to understand the intent of requirements and provide effective recommendations. Ability to prioritize in a highly dynamic work environment. Our Preferred Qualifications: Advanced degree in computer science, Information Technology, Information Security or related field. Experience with, and strong understanding of common Security Compliance frameworks, controls, and best practices such as COSO, SOC 2, SOX ITGC, ISO 27001/27002, GDPR, PCI, NIST and other applicable regulatory compliance frameworks. Relevant certifications (ISO 27001 LA/LI, CISA, CISM, CISSP, CRISC, etc.) Ability to assess and pragmatically define scope and relevant controls. Strong desire to learn and continuously develop and deepen technical skills. Why us? You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry. Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA Unlimited PTO Industry-leading gender-neutral parental leave Paid Company Holidays Paid Sick Time Employee stock purchase program Disability and life insurance Employee assistance program Gym membership reimbursement Cell phone reimbursement Numerous company-sponsored events, including regular happy hours and team-building events This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply. If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions. Base Salary Range$104,000-$138,000 USD SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. SentinelOne participates in the E-Verify Program for all U.S. based roles.
    $104k-138k yearly Auto-Apply 16d ago
  • Information Security Support Analyst, Contract

    66Degrees

    Remote job

    Overview of 66degrees 66degrees is a leading consulting and professional services company specializing in developing AI-focused, data-led solutions leveraging the latest advancements in cloud technology. With our unmatched engineering capabilities and vast industry experience, we help the world's leading brands transform their business challenges into opportunities and shape the future of work. At 66degrees, we believe in embracing the challenge and winning together. These values not only guide us in achieving our goals as a company but also for our people. We are dedicated to creating a significant impact for our employees by fostering a culture that sparks innovation and supports professional and personal growth along the way. Overview of Role A client of 66degrees' is seeking a junior contractor to engage on a 8+-month remote contract with the potential to extend/convert into a permanent role with the client. Interested candidates should have the following required skills and the ability to work independently as well as within a team environment. The Information Security Support Contractor will function as a member of the Security Support team and help support day-to-day operations. This role will focus on frontline duties and interact with technical and business units. This role requires strong teamwork and initiative, along with the ability to build and maintain relationships across technical and business units. Excellent communication skills are essential. Responsibilities Provide level 1 support for incident and request tickets escalated from other technical teams. Contribute to protecting the integrity and confidentiality of client data and infrastructure while enabling business functionality in all systems and environments by learning to support applicable security solutions. Learn about the security tools and solutions implemented within the organization. Assist in improving processes, identify efficiencies, and recommend solution enhancements to improve service-level delivery. Support the client Information Security Governance & Compliance team as needed during risk assessments, internal and external Information Security Audits, and Vendor reviews. Assist in supporting the Identity Access Management team. Gather and report on key organizational information security metrics. Qualifications 1-3 years of experience as an Information Security Analyst or experience in an IT support capacity. Required experience working with: Active Directory/Azure File Share Permissions Email security understanding Mimecast or a similar solution Keeper - Nice to have zScaler - Nice to have Strong communication, good customer service experience and flexibility with change are all required. Eagerness to work in a collaborative environment. 66degrees is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to actual or perceived race, color, religion, sex, gender, gender identity, national origin, age, weight, height, marital status, sexual orientation, veteran status, disability status or other legally protected class.
    $82k-116k yearly est. Auto-Apply 16d ago
  • Senior Information Security Specialist-SECRET CLEARANCE REQUIRED

    Latitude Inc.

    Remote job

    Primary Responsibilities: Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization. Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation. Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts. Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment. Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats. Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps. Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment. Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures. Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance. Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments. All other duties as assigned by management. Qualifications Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education. Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies. Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS). Minimum of (5) years of experience with Security Information and Event Management (SIEM). Minimum of five (5) years of experience in the risk management framework. Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases. Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred. Must have an active DoD Secret Clearance.
    $82k-116k yearly est. Auto-Apply 60d+ ago
  • Remote Pre-Sales Security Systems Engineer - Access Control & CCTV

    Kastle Systems 3.6company rating

    Remote job

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. Responsibilities * Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure. * Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings. * Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. * Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses. * Create solution design documentation (drawings, BOMs, solution design summaries). * Provide technical support for in-office and on-site team members. * Support management in the process of creating documentation for implementing new technology with new and existing customers. * Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors. Qualifications * A minimum of 3-7 years previous experience in the industry. * Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background. * Experience in the design and planning of access control and video systems. * Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred. Company Overview This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: *********************************************************************************************************************************************************************************** Equal Opportunity Statement We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
    $100k-140k yearly est. Auto-Apply 2d ago
  • Information Security Controls Analyst

    United Community Bank 4.5company rating

    Remote job

    About the Role: United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization. What You'll Do: Review and document the adequacy of security and technology controls across business and IT environments. Evaluate control posture through interviews, documentation reviews, and workflow analysis. Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls. Partner with risk management and security leadership to align controls with organizational risk tolerance. Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance. Document and advocate for control improvements that balance risk with operational efficiency. Support control development across testing, QA, and production environments. Present control effectiveness reports to senior risk leadership. Stay current on regulatory requirements, internal policies, and industry best practices. Participate in required compliance training and support internal/external audit activities. What We're Looking For: • Experience: 3+ years in cybersecurity or IT practitioner roles. 2+ years in IT risk or controls analysis. Practical experience with risk management and IT control frameworks. • Education: Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field. • Required Skills: Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST). Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA). Experience with CIS CSC, ISO 2700, or NIST CSF. Excellent written and verbal communication across all organizational levels. Strong organizational skills and ability to meet SLAs. Sound judgment and decision-making in complex scenarios. High integrity, trustworthiness, and adaptability. • Preferred Skills: Certifications such as CISSP, CISA, CRISC, or CISM. Technical experience with enterprise networks, applications, and directory services. Familiarity with enterprise GRC platforms. Travel: Up to 5% travel required. Supervisory Responsibility: This position does not have direct supervisory responsibilities. Conditions of Employment: Must be able to pass a criminal background & credit check This is a full-time, non-remote position FLSA Status: Non-Exempt We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
    $68k-87k yearly est. Auto-Apply 60d+ ago

Learn more about cyber security analyst jobs