Post job

Cyber security analyst jobs in Kentucky - 40 jobs

  • Deloitte & Touche LLP - Government & Public Services - Analyst - Cyber

    Deloitte 4.7company rating

    Cyber security analyst job in Louisville, KY

    Are you ready to go beyond your potential and reach something greater? At Deloitte, we believe in more than just growth-we believe in exponential possibilities. Here, your unique talents and ambitions are amplified by the power of our collaborative teams, innovative thinking, and mentorship. When you join Deloitte, you don't just build a career-you unlock unlimited opportunities, shaping your future and the world around you. Take the power of you and put it to the power of Deloitte. Reach your exponential! Work You'll Do As an Analyst in our Government & Public Services practice, you will be an integral member of a client service team, collaborating with diverse and talented team members to help solve multidimensional problems, improve performance, and generate value for our clients. You can capitalize on our cross-industry presence to find your niche and build your individual brand within the organization. This person should have strong analytical and critical thinking skills with the ability to solve complex problems and communicate findings. While a career in consulting is dynamic and evolving, we look for people who will perform in specific areas, grow those related skills, and deliver exceptional results to our clients. We recognize that you have unique skills, experiences, and interests, so we divide the broad scope of the Analyst role into skills-based profiles in order to best align each Analyst with a focus area. Setting our people up for success is our highest priority. We are currently recruiting Cyber Analysts whose skills and interests align with the below description: Cyber Analyst * This Analyst is a vigilant, tech-savvy professional who safeguards digital assets and ensures cybersecurity resilience. Identifies, assesses, and mitigates cyber threats by analyzing systems and networks for vulnerabilities. Designs and implements security measures, supports threat detection, incident response, compliance, and risk management. Provides actionable recommendations to strengthen security posture and reduce risk exposure. Collaborates with clients to enhance overall protection against cyber risks. * Majors: Computer Science, Cybersecurity, Data Analytics, Engineering, Information Systems, Information Security, Mathematics, Risk Management The Team Our professionals will be able to maintain the specialization they have built to date in certain areas while also learning how it connects to broader issues in the market. We are committed to continuously supporting our professionals as they build skills in either one specific part of our business or across the business - our Portfolio is structured to facilitate this learning. Engagement teams at Deloitte drive value for our clients but also understand the importance of developing resources and contributing to the communities in which we work. We make it our business to take issue to impact, both within and beyond a client setting. Required Qualifications * Current enrollment in a full-time Bachelor's Degree with a target graduation date by Spring/Summer 2026 in these or related areas of study: * Computer Science, Cybersecurity, Data Analytics, Engineering, Information Systems, Information Security, Mathematics, Risk Management * Must be legally authorized to work in the United States without the need for employer sponsorship now or at any time in the future * Ability to obtain a U.S. Security Clearance * Strong academic track record (3.0 cumulative GPA required, 3.4 cumulative GPA preferred) * Ability to travel up to 50%, on average, based on the work you do and the clients and industries/sectors you serve * Must live within a commutable distance to your assigned office (e.g. 100-mile radius) with the ability to commute daily, if required, upon start date * Candidates must be at least 18 years of age at the time of employment The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $88,000 - $91,000. Information for applicants with a need for Accommodation ************************************************************************************************************ Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Benefits At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Our purpose Deloitte's purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Learn more. Professional development From entry-level employees to senior leaders, we believe there's always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career. As used in this posting, "Deloitte" means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see ************************* for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law. Requisition code: 309171 Job ID 309171
    $88k-91k yearly 6d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cyber Security Analyst

    OSC Global

    Cyber security analyst job in Radcliff, KY

    OSC EdgeTech, LLC is seeking a talented Cyber Security Analyst to join the team. OSC EdgeTech is a wholly owned subsidiary of Cook Inlet Region, Inc. (CIRI), an Alaska Native Corporation proudly owned by over 9,400 Shareholders. OSC EdgeTech was created to deliver agile, responsive IT solutions to meet the evolving needs of federal and defense customers. As an SBA-certified 8(a) entity with a Facility Clearance (FCL), OSC EdgeTech streamlines the acquisition process while maintaining the trusted quality, security, and innovation that define OSC Edge. Cook Inlet Region, Inc., also known as CIRI, is one of 12 land-based Alaska Native regional corporations created pursuant to the Alaska Native Claims Settlement Act (ANCSA). CIRI's regional boundaries roughly follow the traditional Dena'ina territory of Southcentral Alaska. CIRI was incorporated on June 8, 1972, and is owned today by a diverse group of more than 9,500 Shareholders who live in Alaska and throughout the world. OSC EdgeTech offers excellent benefits for eligible employees. Benefits include paid holidays, paid time off, 401K with employer match, dental, vision, health insurance plans, as well as life and disability benefits. Position Overview The Cyber Security Analyst will contribute to the Cyber mission by conducting vulnerability scans, reviewing security alerts and incidents, and assessing technical compliance in accordance with DoD and Federal requirements. This position will utilize Cyber security tools, including ACAS, eMASS, HBSS, and Microsoft 365 Defender, to support vulnerability management, POA&M management, threat detection, and other Cyber tasks as required. Additionally, this position will collaborate with other Cyber analysts to develop programmatic actions and minimize security risks. Major Activities Conduct vulnerability scans of IT assets as requested from tickets or as directed by Cybersecurity Manager. Apply knowledge of monitoring, analyzing, detecting, and responding to Cyber events and incidents within information systems and networks. Advise on an integrated, dynamic Cyber defense and leverage Cybersecurity solutions to deliver Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, and data spillage, and incident response actions. Assess IT assets for cybersecurity compliance in accordance with DISA STIGs requirements. Develop POA&Ms to track any Overdue vulnerabilities or STIG deviations Review and investigate security alerts and incidents from Microsoft 365 Defender Utilize eMASS to maintain and update POA&M status Review device compliance status from HBSS Work with other NEC Operations team members to remediate and mitigate security vulnerabilities. Review the latest Cybersecurity intelligence information and provide recommendations to improve the Cybersecurity posture. Perform other duties as appropriate and as assigned. Knowledge/Skills/Abilities Experience analyzing log files, firewall logs, and IDS Logs to identify possible threats to network security, and to perform command and control functions in response to incidents. If not 8570 certified at contract start must be within six months. Experience in Host Based Security Systems (HBSS), ACAS vulnerability scanning software, knowledge of and experience with Security Information and Events Manager (SIEM) analysis and administration, as well as Information Assurance Vulnerability Alert (IAVA) management. Excellent verbal, written and interpersonal communication skills, excellent organizational and multi-tasking skills. Great analytical, critical thinking and problem-solving abilities. Superior presentation and negotiation skills. Strong management and organizational skills. Adaptable and capable of working in fast-paced environments. Proficient in Microsoft Word, Excel, PowerPoint, and SharePoint Required Qualifications Bachelor's degree in IT, Cyber Security or related field or seven years of IT work experience Demonstrated work experience as Cyber Security Analyst in DoD or Federal government environments Two or more years' experience performing vulnerability scans using Tenable SecurityCenter (Tenable.sc) or ACAS Must possess appropriate DISA ESS certifications and experience. Must be DoD 8570 certified at IAT Level 3 or higher (e.g., CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP) Must be US citizen Must possess active secret security clearance or higher Must be able to pass pre-employment background check Preferred Qualifications Bachelor's degree in IT, IM, or Cyber Security ACAS certification obtained within the last three (3) years, preferred HBSS Administrator certification obtained within the last three (3) years, preferred E-Verify: OSC EdgeTech participates in E-Verify. We will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization. Reasonable Accommodation: OSC EdgeTech, LLC will provide reasonable accommodations, according to applicable state and federal laws, to all qualified individuals with physical or mental disabilities. In compliance with the ADA Amendments Act (ADAAA), if you have a disability and would like to request an accommodation in order to apply for a position with OSC EdgeTech, LLC or any of its subsidiaries, please email *******************.
    $64k-88k yearly est. 35d ago
  • Cyber Applications Security Engineer

    Exeter Government Servi 4.1company rating

    Cyber security analyst job in Fort Knox, KY

    Cyber Applications/Information Assurance Engineer Required Clearance: SECRET Required Certification(s): DoD 8570.01-M IAT II Required Education: Bachelor's degree in Information Technology, Computer Science, or related field. Substantial experience in lieu of degree may be considered. Required Experience: 2+ years of related experience Position Description: Exeter is seeking a Cybersecurity Application Security Analyst to support the U.S. Army at Fort Knox, Kentucky. Paid relocation to Fort Knox is not available; candidates must be local or willing to relocate at their own expense. Primary Responsibilities: Support the Cybersecurity Division (CSD) Cyber Weapons and Interdiction (CWIB) branch. Perform web application scanning & application security assessments. Perform manual application testing to identify vulnerabilities or deviations from software standards. Provide timely and detailed reports, with proofs of findings and analysis of risk. Assist with integration of static & dynamic web application assessments into secure SLDC lifecycles Use SharePoint and other collaboration tools to collect, monitor, and manipulate C&A documentation through the collection, review, approval, and final distribution processes. Support Cybersecurity IT internal and external inspection teams. Supports the Cybersecurity Division (CSD), staff, and senior management in areas of Risk Management Framework (RMF) for DoD IT, DoD/Army Regulations, Incident Response, Software Assurance, and related Cyber disciplines. Work closely with representatives from other divisions and branches (IT, Networking, etc.) to request information, provide clarification, and validate findings, evidence, and POA&M statements. Maintain and meet deliverable schedules. Must be proactive in obtaining information from multiple internal and external teams to complete requirements on schedule. Additional details of positions will be provided to qualified applicants. Required Skills: Development background is required. Microsoft .NET or Java development experience required. Microsoft .NET is preferred. Knowledge of SDLC methodologies. Intermediate to advanced knowledge of secure code development practices and OWASP Top 10 web application security issues. Web services development and design with integrated security engineering experience. Requires excellent English verbal and writing skills including report generation, presentations, and technical writing. Highly organized with the ability to independently maintain schedules and meet deadlines. Desired Skills: Experience with supporting assessment of IT systems compliance with Federal IT Security standards. (NIST 800-53, FISMA, etc.) 3-7 years of web application development related work experience. Experience performing manual and automated code review and penetration tests for complex applications. Experience with static code scanning tools (Fortify, AppScan, etc.) Experience with dynamic analysis tools (Burp, Zaprozy, SQLMap, BeEF, DAVtest, dirb, fierce, curl, hping, etc.) Technical understanding of database, web server, and operating system security. Knowledge of security systems and controls, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc. Understanding of data handling privacy standards to include PII and PHI. Familiarity with DISA application security related Security Technical Implementation Guides (STIGs). Veterans with prior Army/DoD Cybersecurity experience highly desired. Required Qualifications: Minimum 2 years' relevant experience. Bachelor's degree in Information Technology, Computer Science, or related field. Substantial experience in lieu of degree may be considered. Current DoD 8570.01-M Information Assurance Technical IAT Level II (IAT II) baseline certification, such as Security+ CE. Uncertified candidates cannot be considered. U.S. citizen with active DoD SECRET level security clearance. Uncleared candidates cannot be considered. Desired Qualifications: Certified Application Security Engineer (CASE), Certified Secure Software Lifecycle Professional (CSSLP), or similar certification. Higher level DoD 8570 IAT-III/IAM certifications (i.e. CISSP, CASP, etc.) Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. #clearancejobs
    $74k-101k yearly est. Auto-Apply 60d+ ago
  • Product Security Engineer, AI

    Meta 4.8company rating

    Cyber security analyst job in Frankfort, KY

    Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys. **Required Skills:** Product Security Engineer, AI Responsibilities: 1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more 2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities 3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products **Minimum Qualifications:** Minimum Qualifications: 4. BS or MS in Computer Science or a related field, or equivalent experience 5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development 6. Experience with exploiting common security vulnerabilities 7. Knowledge of common exploit mitigations and how they work 8. Coding and scripting experience in one or more general purpose languages **Preferred Qualifications:** Preferred Qualifications: 9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software that enables security processes 12. 8+ years of experience finding vulnerabilities in C/C++ code 13. Contributions to the security community (public research, blogging, presentations, bug bounty) 14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows **Public Compensation:** $184,000/year to $257,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $184k-257k yearly 60d+ ago
  • Information Security Engineer

    Heaven Hill Brands 4.6company rating

    Cyber security analyst job in Louisville, KY

    Job Description: with a base location in Louisville, KY. What the Role Is The Information Security Engineer is responsible for strengthening and supporting Heaven Hill's cybersecurity program. This hands-on technical role focuses on implementation, monitoring, and continuous improvement of security controls across cloud and on-premise environments. The Engineer supports governance and risk management efforts and plays a key role in incident response and in deploying and maintaining secure technology solutions. This position will collaborate with IT and business units to ensure Heaven Hill's data and systems remain resilient against evolving threats, while helping enable secure and efficient access through identity and access management solutions. This role is instrumental in advancing Heaven Hill's overall security maturity and ensuring that cybersecurity enables, rather than limits, innovation and operational excellence. How You Will Spend Your Time? Security Engineering & OperationsDesign, implement, monitor, and maintain security controls across cloud, identity, endpoint, and network environments. Implement and manage Privileged Access Management (PAM) and Role-Based Access Control (RBAC) programs that align with business needs and support POLP (Principle of Least Privilege). Support and enhance Identity Management solutions, including user provisioning, Single Sign-On (SSO) integrations, and secure application configurations. Support secure configuration and hardening of Windows and Linux servers, as well as Windows and mac OS workstations. Manage and maintain DNS and domain registrar configurations to ensure secure and reliable name resolution and domain integrity. Implement, integrate, and manage authentication, including Kerberos, FIDO2, Smart Cards, passkeys, certificate-based authentication, and TLS or key management solutions. Administer and support Public Key Infrastructure (PKI), including certificate issuance, renewal, and lifecycle management. Perform vulnerability scanning and coordinate remediation activities. Administer and optimize core security platforms such as endpoint detection and response (EDR) and security information and event management (SIEM) systems, including alert tuning, integration, and incident response support. Develop and maintain automation or scripting (e. g. , PowerShell, Python) to improve efficiency in security monitoring, configuration management, and response processes. Monitor security events, investigate incidents, perform root cause analysis, and drive post-incident improvements. Collaborate with IT and business teams to ensure security considerations are integrated into infrastructure and project planning from the outset. Risk & GovernanceConduct and document formal risk assessments, identify, evaluate, and communicate risk mitigation strategies. Develop, update, and maintain cybersecurity policies, standards, and procedures aligned with the NIST framework. Partner across the business to build awareness, ensure accountability, and foster a risk-informed culture. Support security aspects of vendor assessments and technology evaluations. Collaboration & Continuous ImprovementProvide security guidance for new initiatives, integrations, and system changes. Contribute to incident response planning, tabletop exercises, and lessons-learned reviews. Develop, maintain, and refine security operations and incident response playbooks to support consistent and effective response activities. Stay informed on emerging threats, technologies, and best practices relevant to manufacturing and spirits production environments. Who You Are… Required Skills and Experience:Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or equivalent experience along with Information Technology related associate's degree. Minimum 5 years of experience in cybersecurity engineering and/or IT engineering. Strong cloud security experience, including the design input, configuration, and operation of controls in cloud and hybrid environments. Hands-on experience with Microsoft Entra ID (Azure AD), including Conditional Access, identity lifecycle management, and integration within hybrid Active Directory environments. Experience with enterprise email security, endpoint protection, network security, data protection. Experience implementing and managing Microsoft Purview for data protection, governance, and compliance. Experience supporting third-party risk management or vendor assessments. Strong understanding of identity, endpoint, and network security architectures and their integration across enterprise environments. Experience performing root cause analysis during and after security incidents. Experience developing or contributing to security documentation such as policies, standards, or procedures. Strong communication skills across technical and non-technical audiences. Experience in manufacturing or industrial environments. Familiarity with OT/ICS security principles, including network segmentation, asset visibility, and industrial protocol security. Valued but not Required Skills and Experience:Professional certifications such as CISSP, CISM, CRISC, or equivalent. Understanding secure application deployment or DevSecOps principles. Physical Requirements While performing duties of job, employee is occasionally required to:Stand; walk; use hands and fingers to handle or feel objects; use a computer; and reach with hands and arms. Occasionally lift and/or move up to 20 pounds. BenefitsPaid Vacation11 Paid HolidaysHealth, Dental & Vision eligibility from day one FSA/HSA401K match EAPMaternity/Paternity Leave Heaven Hill and its affiliates are committed to fostering a diverse workforce as an Equal Employment Opportunity company. We invite applications from candidates of all backgrounds, without regard to race, religion, color, sex, sexual orientation, natural origin, gender identity or expression, age, disability, veteran status, or any other legally protected characteristic.
    $69k-90k yearly est. 29d ago
  • Senior Analyst, Security Compliance (SOX IT)

    Coinbase 4.2company rating

    Cyber security analyst job in Frankfort, KY

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program. *What you'll be doing (ie. job duties):* * Lead Security and IT initiatives to support the SOX roadmap and advance program maturity * Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit * Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion * Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders * Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management * Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities * Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership * Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates * Work closely with internal and external auditors to educate them about a complex technology control environment * Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members * Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry * Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation *What we look for in you (ie. job requirements):* * Minimum of 5+ years of security/IT compliance or equivalent experience * Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance * Prior experience at a big 4 accounting firm * Experience leading compliance initiatives from start to finish * Proven understanding and audit experience of cloud technologies, AWS preferred * Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision * Strong oral and written communication skills * Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment * Ability to communicate with technical / non-technical stakeholders to align on shared outcomes * Experience in Financial services, Big Tech, or FinTech *Nice to haves:* * BA or BS in a technical field or equivalent experience * Security certifications e.g. CISA, CISSP, CISM or other relevant certifications * Experience auditing in Crypto space Position ID: P73675 \#LI-Remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $167,280-$196,800 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $167.3k-196.8k yearly 60d+ ago
  • Information Security Analyst, Senior

    BHS 4.3company rating

    Cyber security analyst job in Kentucky

    Baptist Health is looking for an Information Security Analyst, Senior to join their team. This is a remote work position that requires residency in KY or IN Working under minimal supervision, the Information Security Analyst, Senior will play a critical role in the Baptist Health Information Security team. This position will serve as a principal expert across a broad range of information security functions including but not limited to the design, implementation, and management of key security solutions, incident response, proactive threat hunting and cyber risk mitigation, risk management, security education, awareness, and training, and new project/entity technical evaluation. This position will include a significant amount of collaboration with IT teams to provide security oversight, guidance, and the creation of security baseline standards. The Information Security Analyst, Senior will also play a key role in high level security operations functions such as the creation and execution of cyber incident and emergency response processes and vulnerability management. A person in this position is expected to have an expert level of knowledge of key cyber security domains as well as a moderate understanding of regulatory compliance requirements related to the healthcare environment. Qualifications: High School/GED; bachelor's degree in computer science, mathematics, engineering, or other related area of study preferred. 6 years' experience required. Experiencing utilizing security tools such as CrowdStrike Falcon, Splunk, Nexpose, CyberArk, Ordr, Fidelis, Cisco Umbrella, Duo, and Cloudflare preferred. Firewall management, IT, IoT, IoMT vulnerability and asset management preferred. Enterprise server, endpoint, identity management, mail or other system administration experience preferred. Security certifications preferred but not required such as: CISSP, CISM, CRISC, CISA, GIAC certifications. Work Experience Education If you would like to be part of a growing family focused on supporting clinical excellence, teamwork and innovation, we urge you to apply now! Baptist Health is an Equal Employment Opportunity employer.
    $86k-113k yearly est. Auto-Apply 23d ago
  • Clinical Cyber Security Engineer

    Renovo Solutions 3.1company rating

    Cyber security analyst job in Lexington, KY

    As a hybrid biomedical equipment/IT technician, a Clinical Cyber Security Engineer usually has a four-year degree or the associated experience to maintain a diverse population of patient care equipment and networked medical devices. A Clinical Cyber Security Engineer has a good knowledge of electronics, schematics, computer operating systems, networking, and security. This individual must have strong project management skills and organizational skills. Often, they must collaborate with the Manager of Clinical Cyber Security Engineering and the facility's IT department and must demonstrate excellent customer service skills. Essential Duties & Responsibilities: Responsible for support and oversight of the clinical information systems under his/her care. This includes the tracking of hardware (configuration items), software and network documentation. Provides user support, systems technical service and support, and participates in system projects as requested. Coordinates and/or implements software patches / updates in collaboration with Clinical Staff, Original Equipment Manufactures and the Hospitals SIT Department. Demonstrates cost containment and financial acumen Maintains a good personal relationship with fellow co-workers, hospital staff, and vendors Maintains an accurate inventory of Networked Medical Devices or devices containing ePHl Works with IT and security staff to identify and mitigate risks; helps to enforce policies and procedures on medical devices and IoT systems Utilizes system management tools and industry best practices to asses security vulnerabilities and risk to medical devices and IoT management Uses project management tools to manage system implementations and change management procedures Acts as a consultant to the facility regarding system hardware/software evaluation and selection Coordinates installation and maintenance of networked medical devices containing PC hardware with facility IT department Performs other duties as assigned** Required Skills Possesses a comprehensive knowledge of electromechanical devices and principles, as well as a thorough understanding of general patient care equipment and can demonstrate the usage of supported devices Basic understanding of life-support and diagnostic support devices and their usage within the healthcare setting Configuration of computer hardware and software, cyber security systems Use and management of operating systems including Microsoft, Linux/Unix and RTOS Configuration and deployment of computer software support tools (i.e. Configuration, Remote Management, Antivirus, Backup and Recovery, Monitoring tools, etc.) Proficient in the use of Microsoft Office products, and the creation of network diagrams using Microsoft Visio or similar software Configuration of basic network components and understanding of routing and subnetting processes Application of CIS, NIST, HITRUST best practices and guidelines to technology devices & systems Knowledge and understanding of human anatomy and physiology Required Competencies Accountability - takes ownership of assigned work and responsibilities, follows through and closes the loop Communication - clearly expresses thoughts and ideas both in written and verbal communications, provides timely information Financial Acumen - Considers financial impact of all decisions Integrity - Can admit mistakes, is direct and truthful Customer Service - demonstrates a "customer-first" mentality, focused on meeting the needs of customers and captures feedback to make improvements Priority Setting - Prioritizes assigned schedules and workload Knowledge - Stay current with technological developments, security trends and best practices in the information technology field. Information Technology - Possesses knowledge and understanding of basic cyber security and IT terminology as it pertains to medical devices and facility IT systems Team Building - Mentors newer technicians, facilitates clear communication amongst the team, demonstrates care and respect for co-workers and colleagues Regulatory - understands the various regulations and best practices that apply to the HTM space (HIPAA, HITECH, Omnibus, SOC, COBIT, ITIL) Attributes Culture - promotes the Vision, Mission and Values that make up the RENOVO culture as well as the culture of the healthcare facility Mechanically inclined - technical skills and abilities to figure out how things work Self-motivated - can work on their own or under limited direction while prioritizing equipment schedules and repair activities. Advanced projects or activities require supervision Open-minded - Willing to listen to opinions and criticism, can switch directions quickly Agility - Can break complex projects into smaller iterative tasks Improvement - willing to learn and grow, wants to update job skills for career growth Confidence - Self-reliant decision maker that doesn't second guess decisions Multi-tasker - Is organized and efficient, handles multiple projects or tasks simultaneously Education/Special Training H.S. Diploma or equivalent required Technical Certificate or DOD training required 4-year College Degree, Certification, or other higher level of education pertaining to this job description preferred CompTIA A+ & Network+ or equivalent certification, CISSP, CCNA, MSCE desired Required Work Hours Forty hours per week during daytime and evening hours. Scheduled work hours may change. Overtime may be required or permitted with prior approval. This position may be included in the on-call rotation for the facility. Reporting and Supervisor Responsibilities The Clinical Systems Engineer reports to - Manager, Biomedical Engineering This position has no supervisory responsibilities Physical Requirements The Clinical Systems Engineer must be able to speak, hear, see, read, write, type, dial, reach, bend, climb, crawl, crouch, kneel, squat, and twist. Must have near vision, far vision, depth perception, and be able to distinguish colors. Must have sensory ability to distinguish hot, cold, range of temperatures, surfaces, fine motor skills, manual dexterity, and detect/distinguish odors. Must be able to carry or lift up to 50 pounds routinely. Travel Travel will be required for this position, unless otherwise specified. Total travel based on project needs and locations Classification FLSA: Non-exempt Administration: Understand and observe company policies and procedures. Relationships: Utilize teamwork in your daily activity and ensure customer satisfaction. Other: Housekeeping - Maintain a clean, orderly appearance of all work areas. Personal appearance - Must observe company dress code always and must have good personal hygiene. Maintain all RENOVO owned equipment including tools, test equipment, computers, and others as specified in proper working condition and ensure annual calibration where appropriate. **Note: This position description does not list every activity, duty, and responsibility of the position and may be altered by RENOVO at any time.
    $77k-105k yearly est. 6d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Frankfort, KY

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 54d ago
  • Security Analyst II

    JY Legner Associates

    Cyber security analyst job in Louisville, KY

    The IT Security team is responsible for safeguarding the integrity, confidentiality, and availability of the Corporation's information and systems. This cybersecurity lead role provides technical leadership and supports secure architecture design, project engagement, and operational improvements. This position will contribute to both IT and Operational Technology (OT) environments, shaping cybersecurity controls and protecting against evolving global threats. Hybrid - Allentown, PA or Louisville, KY Tuesday-Thursday in office; Monday & Friday remote Key Callouts Hybrid role: Allentown, PA or Louisville, KY Ideal background: Audit/Compliance with exposure to NERC CIP Nice to have: Technical understanding of Networking Primary Responsibilities Apply cybersecurity architecture and operations best practices to meet business goals and mitigate risk. Protect the integrity, confidentiality, and availability of corporate data and systems. Escalate unresolved cybersecurity exposures or noncompliance issues. Serve as a cybersecurity advocate, providing leadership and managing vendor partnerships. Consult with business and IT teams to align security with operational goals. Support internal/external audits and regulatory assessments (e.g., NERC CIP, SOX). Stay current with security trends and pursue certifications or continuing education. Lead research and provide strategic recommendations for cybersecurity improvements. Design and enhance security monitoring, log correlation, and defense processes. Develop and execute security testing protocols to assess system defenses. Serve in 24x7 on-call security response rotation. Mentor junior security team members and promote internal knowledge sharing. Provide analytical leadership on projects with cybersecurity components. Investigate and document internal incidents or compliance violations as requested. Ensure consistent implementation of security solutions across organizational boundaries. Basic Qualifications Bachelor's degree in Information Security, Computer Science, Mathematics, Business, or equivalent experience. Minimum 5 years of IT experience, including security controls, networking, telecom, or application development. Minimum 7 years required for lead-level designation. Familiarity with Industrial Control Systems (ICS) security vulnerabilities and mitigation. Experience across asset types: desktop, mobile, servers, networks, and web systems. Ability to adapt to emerging technologies and apply tools to solve security issues. Strong analytical, problem-solving, and project management skills. Preferred Qualifications Master's degree in Cybersecurity, Information Systems, or related field. Industry certifications such as CISSP, CISM, or cloud security credentials. Degree in Engineering, Information Security, or Computer Science. Active Secret Clearance is a plus.
    $60k-83k yearly est. 60d+ ago
  • ArcSight Security Engineer

    Collabera 4.5company rating

    Cyber security analyst job in Fort Knox, KY

    Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs. Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance. Job Description Title: ArcSight Security Engineer Duration: 6 months (Possibility to Hire) Location: Fort Knox, KY Description: • Assist the customer and required to provide technical leadership on major tasks or technology assignments. • The ideal candidate will have a wide range of technical knowledge in Applicant should posses an in -depth understanding of ArcSight ESM, and be able to perform the functions of a Senior Analyst, Advanced Content Author, and Security Solutions Architect. • Applicant should be able to provide a practical solutions-based approach for design and implementation of a complete enterprise SIEM deployment, and understand methodologies, terms, concepts, and best practices within the context of the HP ArcSight product line. Duties & Responsibilities: • Assist in the Information Assurance Office activities to support with the installation, configuration, troubleshooting, customization and optimization of the ArcSight product suite and its dependencies. • This position requires strong knowledge in network security operations and familiarity with a variety of endpoint security products. • The candidate will develop ArcSight specific content including reports, filters, trends and dashboard content. The candidate must be experienced with ArcSight in order to provide optimization, tuning, and flex agent development. The successful candidate should be very experienced in IT networks, security systems design, and deployment and troubleshooting. • Duties will include the ability to lead the installation, configuration, optimization and customization of ArcSight software and appliances. • Required to translate customer requirements into use cases, design and implement as ArcSight content. The ability to perform system administration for ArcSight components and create customized dashboards for ArcSight ESM and Logger to elevate high threat items to incident responders. DOD 8570 CNDSP Infrastructure certification is desired. Qualifications • Expert level knowledge in defining an organization's ArcSight ESM Network Model • Extensive experience implementing the ArcSight suite of software and appliances in an Enterprise Environment • Experience developing ArcSight FlexConnectors • Proficient in Unix scripting • Ability to develop an ArcSight training program to be used to train our Systems Administrators, Network Administrators, Security Engineers, and Security Analysts in the efficient use of the ArcSight Suite • A Bachelor's degree from an accredited institution or equivalent in Computer Science, Information Systems, Engineering, or related technical discipline is required. • Significant experience may substitute for minimum educational requirements. • Must possess at least 8 years of hands on technical experience with a minimum of 5 year of experience in ArcSight ESM. • Ability to Create Advanced ESM content for Security Use Cases in order to find, track and remediate security incidents, including: Using variables and correlation activities, Customizing report templates to use dynamic content and Customizing notification templates to send the appropriate notification based upon specific attributes of an event Required Qualifications: • ArcSight Certified Analyst (ACSA) and or ArcSight Certified Integrator Administrator (ACIA) • Familiarity with network defense technologies including IDS/IPS, Firewalls, VPN • Determine appropriate Logger/ESM architecture to address specific log management requirements • Integrate Logger/ESM in peering and hierarchical deployments • Optimize ArcSight SmartConnector configurations for a Logger/ESM integrated environment • Identify types of criteria used to define system requirements • Present a thorough compilation of the various architectures and the pros and cons of each • Identify integration capabilities and best practices for each product • Identify data sources and ESM resources required to fulfill the objectives of the use case • Present multiple real-world scenarios that will be the basis of a complete implementation exercise • Must possess a CompTIA Security+ certification (baseline certification - day 1 requirement) • Minimum Certification as a DoD 8570 IAM II, must possess or able to obtain from hire date, within 6 months IAT Level II certification related to Release Management field • Must hold an active Department of Defense Security Clearance (interim Secret minimum - day 1 requirement). • Knowledge of DoD directives 8500.2, 8530.2, CJCSI 6510, and DISA STIGS- specifically requirements pertaining to the access and retention of network device logs. • Strong customer service, organizational skills, knowledge of applicable DoD/Government policies and procedures. • Demonstrated exceptional ability to troubleshoot complex systems required. • Solid understanding of industry standard availability and security practices required. Additional Information To discuss on this, please contact: Himanshu Prajapat Call on: ************ **********************************
    $69k-94k yearly est. Easy Apply 2d ago
  • Senior Security Engineer

    Arvato Bertelsmann

    Cyber security analyst job in Louisville, KY

    We are looking for an experienced and knowledgeable System Security Engineer to join our team! As a System Security Engineer, you will be responsible for implementing and managing the overall system security strategy as part of a global security team. Your Tasks * Deploy and test SIEM and Security Architectures together with IT teams * Serve as a deeply skilled and knowledgeable resource within the SIEM technology area * Perform security incident analysis and recommend remediation steps as second level to our Security Operations Analysts * Evaluate the impact of security threats, risks, vulnerabilities and processes and ensure remediation and mitigation actions are appropriately implemented * Participate on automation of the incidents prioritization and false positives identification; perform local SIEM optimization * Participate in project teams together with international development team * Provide consultation on information security implementation in local IT * Participate on interconnecting Cloud SIEM technology with sources of security incidents - e.g. logs from servers, network and security devices, Vulnerability Management system, Antivirus system, etc. * You will be the contact person in questions of IT security and related topics for the local organization as well as international IT organization in cooperation with information security office Your Profile * Minimum of 5 years' experience with security analysis * Security+ certification preferred * CISSP certification preferred * Experience with Microsoft Defender, Rapid7, Cycognito strongly preferred * Experience in external penetration testing strongly preferred * Hosted Azure Environment Security experience preferred * Application layer security preferred * Previous experience working with international teams strongly preferred We Offer * Medical, Dental, Vision, Life Insurance, and Disability Pay. * 401(k) with company matching up to 6%. * Paid Time Off, including paid holidays. * Flexible Spending Accounts. * Voluntary benefits such as legal and financial assistance, pet insurance, and more. * Employee Assistance Program. * Ongoing employee development opportunities including tuition reimbursement, scholarships, and training. * Commuter benefits. * Employee engagement activities. EOE Protected Veterans/Disability
    $82k-111k yearly est. 60d+ ago
  • Cyber Security Engineer, Threat Hunter

    Darling Ingredients, Inc. 4.5company rating

    Cyber security analyst job in Cold Spring, KY

    Company Details Darling Ingredients repurposes and recycles materials from the animal agriculture and food industries - transforming them into essential ingredients that do everything from feeding animals to fertilizing crops to fueling planes and nourishing people. We're the number one publicly traded company of our kind, operating a global family of brands and businesses that span more than 260 facilities in over 15 countries. Our unique scale allows us to make entire industries less wasteful and more sustainable, helping move the world toward a more circular economy. Darling Ingredients offers full time employees a full suite of benefits including but not limited to the following: 401(k), Health, Dental and Vision Insurance, and Paid Time Off. Job Summary Darling Ingredients seeks a Cyber Security Engineer - Threat Hunter with an analytical mind and meticulous attention to detail, outstanding problem-solving skills, work comfortably under pressure and deliver on tight deadlines. As a threat hunter you will be responsible proactively identifying, investigating, and mitigating advanced cyber threats across the organization's digital environment. This role combines traditional threat hunting methodologies with advanced AI-driven detection, analytics, and automation tools to uncover stealthy adversaries, anomalous behaviors, and potential vulnerabilities before they can be exploited. The ideal candidate can demonstrate technical knowledge, strong analytical thinking, and the ability to leverage machine learning (ML) and artificial intelligence (AI/LLMs). Essential Duties/Responsibilities: Nothing in this restricts management's right to assign or reassign duties and responsibilities to this job at any time. * A strong desire to deepen their knowledge of ML & AI to achieve the following responsibilities: * Conduct proactive threat hunts across enterprise systems, networks, cloud workloads, and endpoints using both manual techniques and AI-enhanced detection models. * Develop, train, tune, and deploy machine learning and generative AI models that identify anomalies, classify threats, and enhance detection fidelity. * Utilize AI-based tooling (LLMs, automated analysis agents, supervised ML models) to accelerate malware analysis, log enrichment, correlation, and triage. * Build hypotheses based on threat intelligence, attacker TTPs, environmental telemetry, and known adversary behavior patterns. * Analyze large-scale datasets (network flows, endpoint telemetry, authentication logs, EDR/XDR data, cloud logs) to uncover indicators of compromise and previously undetected intrusion activity. * Create advanced detection logic, behavioral analytics, and automated playbooks using AI-powered security platforms (SIEM, SOAR, XDR, and custom tooling). * Perform root-cause analysis of identified threats and provide actionable remediation guidance to SOC, IR, and engineering teams. * Collaborate with red teams, threat intelligence analysts, and security engineering to continuously improve organizational detection maturity. * Maintain up-to-date knowledge of emerging threats, AI-based attack methods, and adversarial machine learning techniques. * Document findings, produce executive-ready reports, and brief stakeholders on hunting outcomes and recommended control improvements. * Regularly communicate with the business at all levels (local user to executive level) about relevant risks. Minimum Qualifications: * High School Diploma Required * Ability to demonstrate a general understanding of machine learning & artificial intelligence * Languages: Portuguese - Strong & English - Strong * Ability to work under pressure in a fast-paced environment * Strong attention to detail with an analytical mind and outstanding problem-solving skills * Self-motivated and communicates well with both technical and non-technical audiences * Passion for cybersecurity and strong interpersonal and collaborative skills, with the ability to work in a team environment Preferred Qualifications: * Proven experience using AI-driven security tools, LLMs, or ML-based analytics in a security context. * Awareness of cybersecurity trends and hacking techniques * Familiarity with generative AI, agentic AI, and LLM-based automation for cyber defense. * Advanced training on anomaly detection; tool-specific training for data aggregation, analysis, and adversary detection The information contained in this job description is intended to describe the essential job functions required of those assigned to this job. It is not intended to be an exhaustive list of all responsibilities, duties, knowledge, skills, and abilities needed to perform the job. Please note that management retains the right to assign or reassign duties and responsibilities to this job at any time. The ability to competently perform all the essential duties of the position, with or without reasonable accommodation, demonstrated commitment to effective customer service delivery, integrity, and the ability to work productively as a member of a team or work group are basic requirements of all positions at Darling Ingredients. Darling Ingredients is an equal opportunity employer and gives consideration to qualified applicants without regard to race, age, color, religion, sex, national origin, sexual orientation, gender identity, disability, or, protected veteran status. Know Your Rights: If you would like more information, please click on the link and paste into your browser: ***************************************************************************** Working Conditions and Physical Demands Cyber Security Engineer, Threat Hunter The physical demands and work environment factors described below are representative of those that must be met by an employee to successfully perform the main duties of this job. Working Environment None Occasionally = up to 20% Frequently = 21% to 50% Constantly = at least 51% Exposed to unpleasant or disagreeable physical environments such as high noise level, strong odors, and/or exposure to heat and cold ☒ ☐ ☐ ☐ Exposed to bio hazardous conditions ☒ ☐ ☐ ☐ Exposed to toxic or caustic chemicals which mandate attention to safety considerations ☒ ☐ ☐ ☐ Exposed to Electrical hazards; risk of electrical shock ☒ ☐ ☐ ☐ Handles or works with potentially dangerous equipment ☒ ☐ ☐ ☐ Travels to offsite locations ☒ ☐ ☐ ☐ Other (please describe): ☒ ☐ ☐ ☐ Physical Demands None Occasionally = up to 20% Frequently = 21% to 50% Constantly = at least 51% Sit: Must be able to remain in a stationary position. ☐ ☐ ☒ ☐ Walk: Must be able to move about inside/outside office or work location. ☐ ☐ ☒ ☐ Use hands to finger, handle or feel: Operates a computer and other office machinery. ☐ ☐ ☒ ☐ Stoop, kneel, crouch, or crawl: Must be able to position one's self to maintain computers in the lab, including under desks and in the server closet. ☐ ☐ ☒ ☐ Climb or balance: Must be able to ascend/descend on a ladder. ☐ ☐ ☒ ☐ Talk, hear, taste, smell: Must be able to use senses to; effectively communicate with co-workers and clients and detect hazardous conditions. ☐ ☐ ☒ ☐ Weight and Force Demands None Occasionally = up to 20% Frequently = 21% to 50% Constantly = at least 51% Up to 10 pounds ☐ ☐ ☐ ☐ Up to 25 pounds ☐ ☐ ☐ ☐ Up to 50 pounds ☐ ☒ ☐ ☐ Up to 100 pounds ☐ ☐ ☐ ☐ More than 100 pounds ☐ ☐ ☐ ☐ Vision Demands Required No special vision requirements ☒ Close vision (clear vision at 20 inches or less) ☐ Distance vision (Clear vision at 20 feet or more) ☐ Color vision (ability to identify and distinguish colors) ☐ Peripheral vision ☐ Depth perception ☐ Ability to adjust focus ☐
    $86k-118k yearly est. 4d ago
  • Information Security Analyst

    Stratacuity

    Cyber security analyst job in Frankfort, KY

    Required Experience * Monitor network resources for security issues. * Monitor a Security Information and Event Management (SIEM)system to enhance the overall cybersecurity of CHFS: Data Collection, Event Correlations, Incident Detection, Investigation and Analysis, Response and Mitigation, Tuning and Optimization, Compliance Monitoring * Investigate security breaches and other cybersecurity incidents. * Develop an audit to determine whether information systems are protected, controlled, and provide value to the organization. * Conduct audit follow-up to evaluate whether risks have been sufficiently addressed. * Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs. * Communicate audit progress, findings, results, and recommendations to stakeholders. * Document security breaches and assess the damage they cause. * Work with the security team to perform tests and uncover network vulnerabilities. * Fix detected vulnerabilities to maintain a high-security standard * Develop cabinet-wide best practices for IT security. * Help colleagues install security software and understand information security management. * Research security enhancements and make recommendations to management. * Stay up to date on information technology trends and security standards. * Maintain and update relevant system and process documentation and develop ad-hoc reports as needed. * Assist in the development of security tool requirements, trials, and evaluations, as well as security operations procedures and processes. * Provide off-hours support on an infrequent, but as-needed basis. * Work trouble tickets in the ticketing system * Conduct meetings and work closely with system owners and departmental leads in all business areas where ePHI and other confidential system data is found. * Assist with continuous monitoring activities documenting within the eGRC tool whether security and other related activities are consistently performed. * Perform various support activities for other projects including obtaining information and documentation to demonstrate policies, procedures, and operational processes that adhere to various regulations, policies, standards, and other compliance requirements. * Collaborate with OATS Departmental and other cross-agency staff to disseminate and engage appropriate OATS Security Teams for any new projects, tasks, and/or initiatives. * Lead and coordinate any special projects and/or tasks as directed by management. * Prepare reports for management. Preferred Education & Experience: Bachelor's degree in computer science, Software Engineering, or a related field (equivalent professional experience may be considered for substitution for the required degree on an exception basis). Candidates with one or more of the following certifications is a plus: * Offensive Security Certified Professional (OSCP) * Offensive Security Defensive Analysis (OSDA)* * Cybersecurity Analyst (CySA+) * CompTIA Security+ * CompTIA Advanced Security Practitioner (CASP+ * CompTIA Pen Test+ * Certified Network Defender (CND) * GIAC Security Essentials (GSEC) * System Security Certified Practitioner (SSCP) Knowledge, Skills & Abilities. This is a partial listing of the necessary knowledge, skills, and abilities required to perform the job successfully. It is not an exhaustive list. * Ability to set the tone for the organization and motivate management and team. * Understanding of information security regulations, including the Federal Information Security Management Act (FISMA), Federal Risk and Authorization Management Program (FedRAMP), ISO 27001, COBIT NIST, and ITIL. * Maintaining security, assessing and evaluating security, and doing security incident forensic work. Knowledge of vendors and their products including: * Experience with Government agencies, particularly the Department of Defense (DoD) on information security matters. Experience with Government Classified systems and the associated security requirements. * Updates job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities; reading professional publications; maintaining personal networks; and participating in professional organizations. * Proficiency in Microsoft Office Suite (Word, Excel, Outlook, etc.) * Innovative and creative mindset * Basic network security knowledge (general principles) * Excellent documentation and communication skills. * Ability to organize tasks into milestones and successfully execute to project completion. * Can work independently with little direct supervision. * General cyber-security understanding Apex Systems is a world-class IT services company that serves thousands of clients across the globe. When you join Apex, you become part of a team that values innovation, collaboration, and continuous learning. We offer quality career resources, training, certifications, development opportunities, and a comprehensive benefits package. Our commitment to excellence is reflected in many awards, including ClearlyRated's Best of Staffing in Talent Satisfaction in the United States and Great Place to Work in the United Kingdom and Mexico. Apex uses a virtual recruiter as part of the application process. Click here for more details. Apex Benefits Overview: Apex offers a range of supplemental benefits, including medical, dental, vision, life, disability, and other insurance plans that offer an optional layer of financial protection. We offer an ESPP (employee stock purchase program) and a 401K program which allows you to contribute typically within 30 days of starting, with a company match after 12 months of tenure. Apex also offers a HSA (Health Savings Account on the HDHP plan), a SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions, a corporate discount savings program and other discounts. In terms of professional development, Apex hosts an on-demand training program, provides access to certification prep and a library of technical and leadership courses/books/seminars once you have 6+ months of tenure, and certification discounts and other perks to associations that include CompTIA and IIBA. Apex has a dedicated customer service team for our Consultants that can address questions around benefits and other resources, as well as a certified Career Coach. You can access a full list of our benefits, programs, support teams and resources within our 'Welcome Packet' as well, which an Apex team member can provide. Employee Type: Contract Remote: Yes Location: Frankfort, KY, US Job Type: Date Posted: January 7, 2026 Pay Range: $35 - $43 per hour Similar Jobs * Information Security Analyst * Information Security Data Analyst * Information Systems Security Officer * Information Systems Analyst * Application Security Analyst
    $35-43 hourly 2d ago
  • Security Engineer II

    Trustmark 4.6company rating

    Cyber security analyst job in Frankfort, KY

    Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities. We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information. You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs. **Responsibilities:** + Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data. + Conduct vulnerability assessments and penetration testing to identify and mitigate risks. + Develop and implement security policies, standards, and procedures. + Monitor security systems and respond to incidents promptly and effectively. + Stay up-to-date with the latest cybersecurity threats and trends. + Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business. + Provide technical guidance and support to internal stakeholders. **Qualifications:** + Bachelor's degree in Computer Science, Information Technology, or a related field or + 3-5 Years of network engineering or cyber engineering experience + Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001). + Proficiency in network security, systems security, application security, and data security. + Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM). + Excellent problem-solving and analytical skills. + Strong communication and interpersonal skills. + Ability to work independently and as part of a team. **Preferred Qualifications:** + Certifications such as CISSP, CISA, or CEH. + Experience with cloud security (e.g., AWS, Azure, GCP). + Knowledge of scripting and programming languages (e.g., Python, PowerShell). Brand: Trustmark Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums. **For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability. Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match. When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives. At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
    $74k-95k yearly est. 60d+ ago
  • Product Security Engineer, Instagram

    Meta 4.8company rating

    Cyber security analyst job in Frankfort, KY

    The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform. **Required Skills:** Product Security Engineer, Instagram Responsibilities: 1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products 2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code 3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities 4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage 5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers 6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world **Minimum Qualifications:** Minimum Qualifications: 7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience 8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP) 9. Extensive, proven experience in threat modeling and secure systems design 10. Experience with exploiting common security vulnerabilities **Preferred Qualifications:** Preferred Qualifications: 11. Product software engineering or product management experience 12. Experience in security consulting or other leadership-facing security advisory roles 13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response 14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.) **Public Compensation:** $184,000/year to $257,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $184k-257k yearly 60d+ ago
  • Data Security Analyst

    Exeter Government Servi 4.1company rating

    Cyber security analyst job in Fort Knox, KY

    Provide support to the lead security Analyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of anomalies. Required Qualifications: Experience in administrative support & MS Office proficiency Bachelor's degree or 5 years of experience U.S. citizen and MUST possess a current active DoD Secret clearance Possess an understanding of cyber security principles and be able to obtain a security+ certification within 6 months Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. #clearancejobs
    $64k-88k yearly est. Auto-Apply 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Frankfort, KY

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 54d ago
  • ArcSight Security Engineer

    Collabera 4.5company rating

    Cyber security analyst job in Fort Knox, KY

    Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs. Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance. Job Description Title: ArcSight Security Engineer Duration: 6 months (Possibility to Hire) Location: Fort Knox, KY Description: • Assist the customer and required to provide technical leadership on major tasks or technology assignments. • The ideal candidate will have a wide range of technical knowledge in Applicant should posses an in -depth understanding of ArcSight ESM, and be able to perform the functions of a Senior Analyst, Advanced Content Author, and Security Solutions Architect. • Applicant should be able to provide a practical solutions-based approach for design and implementation of a complete enterprise SIEM deployment, and understand methodologies, terms, concepts, and best practices within the context of the HP ArcSight product line. Duties & Responsibilities: • Assist in the Information Assurance Office activities to support with the installation, configuration, troubleshooting, customization and optimization of the ArcSight product suite and its dependencies. • This position requires strong knowledge in network security operations and familiarity with a variety of endpoint security products. • The candidate will develop ArcSight specific content including reports, filters, trends and dashboard content. The candidate must be experienced with ArcSight in order to provide optimization, tuning, and flex agent development. The successful candidate should be very experienced in IT networks, security systems design, and deployment and troubleshooting. • Duties will include the ability to lead the installation, configuration, optimization and customization of ArcSight software and appliances. • Required to translate customer requirements into use cases, design and implement as ArcSight content. The ability to perform system administration for ArcSight components and create customized dashboards for ArcSight ESM and Logger to elevate high threat items to incident responders. DOD 8570 CNDSP Infrastructure certification is desired. Qualifications • Expert level knowledge in defining an organization's ArcSight ESM Network Model • Extensive experience implementing the ArcSight suite of software and appliances in an Enterprise Environment • Experience developing ArcSight FlexConnectors • Proficient in Unix scripting • Ability to develop an ArcSight training program to be used to train our Systems Administrators, Network Administrators, Security Engineers, and Security Analysts in the efficient use of the ArcSight Suite • A Bachelor's degree from an accredited institution or equivalent in Computer Science, Information Systems, Engineering, or related technical discipline is required. • Significant experience may substitute for minimum educational requirements. • Must possess at least 8 years of hands on technical experience with a minimum of 5 year of experience in ArcSight ESM. • Ability to Create Advanced ESM content for Security Use Cases in order to find, track and remediate security incidents, including: Using variables and correlation activities, Customizing report templates to use dynamic content and Customizing notification templates to send the appropriate notification based upon specific attributes of an event Required Qualifications: • ArcSight Certified Analyst (ACSA) and or ArcSight Certified Integrator Administrator (ACIA) • Familiarity with network defense technologies including IDS/IPS, Firewalls, VPN • Determine appropriate Logger/ESM architecture to address specific log management requirements • Integrate Logger/ESM in peering and hierarchical deployments • Optimize ArcSight SmartConnector configurations for a Logger/ESM integrated environment • Identify types of criteria used to define system requirements • Present a thorough compilation of the various architectures and the pros and cons of each • Identify integration capabilities and best practices for each product • Identify data sources and ESM resources required to fulfill the objectives of the use case • Present multiple real-world scenarios that will be the basis of a complete implementation exercise • Must possess a CompTIA Security+ certification (baseline certification - day 1 requirement) • Minimum Certification as a DoD 8570 IAM II, must possess or able to obtain from hire date, within 6 months IAT Level II certification related to Release Management field • Must hold an active Department of Defense Security Clearance (interim Secret minimum - day 1 requirement). • Knowledge of DoD directives 8500.2, 8530.2, CJCSI 6510, and DISA STIGS- specifically requirements pertaining to the access and retention of network device logs. • Strong customer service, organizational skills, knowledge of applicable DoD/Government policies and procedures. • Demonstrated exceptional ability to troubleshoot complex systems required. • Solid understanding of industry standard availability and security practices required. Additional Information To discuss on this, please contact: Himanshu Prajapat Call on: ************ **********************************
    $69k-94k yearly est. Easy Apply 60d+ ago
  • Offensive Security Engineer, Assessments (Web3)

    Coinbase 4.2company rating

    Cyber security analyst job in Frankfort, KY

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services. *What you'll be doing (ie. job duties):* * Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure. * Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities. * Stay informed on emerging security trends, advisories, and academic research in the Web3 space. * Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities. * Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community. * Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements. * Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement. * Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program. * Mentor and train junior security engineers in Web3 bug bounty triage and analysis. * Provide on-call support for critical Web3 bug bounty-related incidents. * Document and report on Web3 bug bounty metrics and program effectiveness. *What we look for in you (ie. job requirements):* * Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field. * 3+ years of experience in Web3 application security and penetration testing. * Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components. * Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms. * Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25). * Strong analytical skills to identify trends and patterns in vulnerabilities. * Excellent communication skills for engaging with internal teams. * Passion for security and a drive to improve Web3 security posture. * Ability to work independently and take ownership of penetration testing initiatives. * Energy and self-drive for continuous learning in the rapidly evolving crypto space. * Excellence in clear, direct, and kind communication with technical and non-technical stakeholders. * Experience building relationships with product, engineering, and security teams. *Nice to haves:* * Participation in CTFs, bug bounty programs, or open-source security research. * Expertise in Application Security, Network Security, or Cloud Security. * Relevant security certifications (e.g., OSCP, GPEN). * Experience developing and implementing security tooling to support bug bounty triage and analysis. * Experience with bug bounty programs and platforms, including triage, validation, and researcher communication. * Strong analytical skills to identify trends and patterns in bug bounty submissions. * Excellent communication skills to effectively engage with bug bounty researchers. Position ID: P69494 \#LI-remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $152,405-$179,300 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $152.4k-179.3k yearly 60d+ ago

Learn more about cyber security analyst jobs

Do you work as a cyber security analyst?

What are the top employers for cyber security analyst in KY?

OSC Global

Top 2 Cyber Security Analyst companies in KY

  1. Deloitte

  2. OSC Global

Job type you want
Full Time
Part Time
Internship
Temporary

Browse cyber security analyst jobs in kentucky by city

All cyber security analyst jobs

Jobs in Kentucky