Cyber Security Analyst
Cyber security analyst job in Greensboro, NC
Our client, a leading organization in the cybersecurity industry, is seeking a dedicated Cyber Security Analyst to join their team. As a Cyber Security Analyst, you will be an integral part of the Security Operations Center (SOC) supporting the organization's cybersecurity initiatives. The ideal candidate will demonstrate analytical thinking, proactive problem-solving skills, and excellent communication abilities, which will align successfully within the organization.
**Job Title:** Cyber Security Analyst
**Location:** Greensboro, NC
**Pay Range:**
**What's the Job?**
+ Monitor Security Operations Center (SOC) alert queues continuously and investigate detections to identify suspicious activities.
+ Rapidly analyze and respond to security breaches that could compromise sensitive organizational information.
+ Assess the nature and severity of security threats, determining appropriate actions to contain and mitigate risks.
+ Formulate temporary fixes to neutralize active threats, restore security posture, and ensure data integrity.
+ Handle true positive alerts and escalate incidents accordingly, ensuring swift resolution.
**What's Needed?**
+ Typically 2 to 5 years of relevant cybersecurity experience.
+ Strong knowledge of SOC operations, threat detection, and incident response.
+ Experience in analyzing and mitigating security threats and breaches.
+ Familiarity with security tools, frameworks, and best practices.
+ Ability to work independently with minimal supervision, managing complex scenarios with confidence.
**What's in it for me?**
+ Opportunity to work in a dynamic and innovative cybersecurity environment.
+ Engagement with cutting-edge security tools and technologies.
+ Chance to develop and enhance your cybersecurity skills and expertise.
+ Supportive team environment fostering professional growth.
+ Participation in ongoing security initiatives to strengthen organizational defenses.
**Upon completion of waiting period consultants are eligible for:**
+ Medical and Prescription Drug Plans
+ Dental Plan
+ Vision Plan
+ Health Savings Account
+ Health Flexible Spending Account
+ Dependent Care Flexible Spending Account
+ Supplemental Life Insurance
+ Short Term and Long Term Disability Insurance
+ Business Travel Insurance
+ 401(k), Plus Match
+ Weekly Pay
If this is a role that interests you and you'd like to learn more, click apply now and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you!
**About ManpowerGroup, Parent Company of: Manpower, Experis, Talent Solutions, and Jefferson Wells.**
_ManpowerGroup (NYSE: MAN), the leading global workforce solutions company, helps organizations transform in a fast-changing world of work by sourcing, assessing, developing, and managing the talent that enables them to win. We develop innovative solutions for hundreds of thousands of organizations every year, providing them with skilled talent while finding meaningful, sustainable employment for millions of people across a wide range of industries and skills. Our expert family of brands -_ **_Manpower, Experis, Talent Solutions, and Jefferson Wells_** _-_ creates substantial value for candidates and clients across more than 75 countries and territories and has done so for over 70 years. We are recognized consistently for our diversity - as a best place to work for Women, Inclusion, Equality and Disability and in 2023 ManpowerGroup was named one of the World's Most Ethical Companies for the 14th year - all confirming our position as the brand of choice for in-demand talent.
ManpowerGroup is committed to providing equal employment opportunities in a professional, high quality work environment. It is the policy of ManpowerGroup and all of its subsidiaries to recruit, train, promote, transfer, pay and take all employment actions without regard to an employee's race, color, national origin, ancestry, sex, sexual orientation, gender identity, genetic information, religion, age, disability, protected veteran status, or any other basis protected by applicable law.
Network Security Analyst
Cyber security analyst job in Durham, NC
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network Security Analyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta
Cyber Defense Incident Responder, Senior (L3)
Cyber security analyst job in Greensboro, NC
Details:
Stefanini Group is hiring!
Stefanini is looking for a Cyber Defense Incident Responder, Senior (Level 3) in Greensboro, NC (Onsite)
For quick apply, please reach out to Krisha Lago
Call: ************** / Email: *************************
Work Location
7900 National Service Road Greensboro, NC 27409
Job Title: Cyber Defense Incident Responder, Senior (L3)
Days are M-F, 2pm to 10pm Eastern time
Training (During first month of the job): M-F, 10am to 6pm Eastern time
As a Senior Cyber Defense Incident Responder within the Global Cybersecurity Operations Center (CSOC) you will play a crucial role as a key technical expert responsible for managing and responding to advanced cyber threats, conducting in-depth investigations, and supporting the overall security posture of The Company. This role combines hands-on technical expertise with mentoring responsibilities, ensuring effective threat detection, incident response, and continuous improvement of SOC capabilities.
What you will do:
Analyze and respond to complex security incidents and alerts generated by SOC tools (e.g., SIEM, EDR, IDS/IPS)
Investigate and resolve escalated incidents from Level 1 and Level 2 analysts, ensuring swift containment and remediation
Lead investigations into cybersecurity incidents, including malware infections, data breaches, and insider threats
Perform digital forensics to collect, analyze, and preserve evidence for legal or compliance requirements
Provide incident reports with detailed root cause analyses and actionable recommendations
Use threat intelligence to identify patterns and indicators of compromise (IOCs) relevant to the organization
Work closely with junior analysts to provide guidance, training, and mentorship, fostering a culture of growth and knowledge-sharing
Collaborate with IT, cybersecurity, and business stakeholder teams to implement and improve security controls
Support the continuous improvement of SOC processes, tools, and technologies to enhance efficiency and effectiveness.
Identify gaps in detection and response capabilities and recommend improvements to SOC leadership.
Details:
In this role, you will bring:
Bachelor's degree in Computer Science or a related 4-year technical degree
Minimum 7 years of experience in supporting cyber defense operations in highly complex enterprise networks. Experience in SOC, SIRT, or CSIRT capacities
One or more of the following certifications: GIAC Certified Intrusion Analyst, GCIH Certified Incident Handler, GCIA Certified Intrusion Analyst, CISSP
Experience in enterprise cybersecurity environment investigating targeted intrusions through complex network segments
Expert understanding of Advanced Persistent Threat (APT), Cybercrime, and Hacktivist tactics, techniques, and procedures (TTPs)
Subject Matter Expert in cybersecurity principles, threat lifecycle management, incident management
Comprehensive knowledge of various operating systems (Windows, OS X, Linux), network protocols, and application layer protocols
Demonstratable experience in scripting languages (may include Powershell, Python, PERL, etc.)
Understanding of the Cyber Kill Chain methodology, the NIST framework, the MITRE ATT&CK framework, and SANS Critical Security controls
Working knowledge in modern cryptographic algorithms and systems
Experience working with and tuning signatures, rules, signatures, and security technologies (IDS/IPS, SIEM, Sandboxing tools, EDR, email security platforms, user behavior analytics
Network design knowledge including security architecture
Strong analytical and technical skills in network defense operations including experience with incident handling (detection, analysis, triage)
Conceptual understanding of cyber threat hunting
Prior experience and ability analyzing cybersecurity events to determine true positives and false positives. Including cybersecurity alert triage, incident investigation, implementing countermeasures, and managing incident response
Previous experience with SIEM platforms and log aggregation systems that perform collection, analysis, correlation, and alerting
Ability to develop rules, filters, views, signatures, countermeasures, and other cyber defense platforms as well as the ability to support analysis and detection continual improvement
Knowledge of new and emerging cybersecurity technologies
Ability to create technical documents as well as stakeholder sitreps and briefing documents
Preferred Qualifications:
Deep Cybersecurity Operations Center experience in the following: intelligence driven detection, security principles, threat lifecycle management, incident management, digital forensics and investigations, network monitoring, endpoint monitoring, OT security principles
CSOC Process Management experience, to include: process and procedure management, CSOC initiative management, continual operational improvement
Preferred certifications: CISSP, GCIH, GCIA, Linux+, CCNA, CCNP
Ability to demonstrate analytical skills, technical knowledge, and practical application of cyber and information security principles to both business leaders/key stakeholders as well as technical teams and SMEs
Demonstrated knowledge in cyber defense policies, procedures, and regulations
Knowledge of cyber vulnerability management processes
Knowledge of common user and system authentication and authorization mechanisms
Listed salary ranges may vary based on experience, qualifications, and local market.
Stefanini takes pride in hiring top talent and developing relationships with our future employees. Our talent acquisition teams will never make an offer of employment without having a phone conversation with you. Those face-to-face conversations will involve a description of the job for which you have applied. We also speak with you about the process including interviews and job offers.
About Stefanini Group
The Stefanini Group is a global provider of offshore, onshore, and nearshore outsourcing, IT digital consulting, systems integration, application, and strategic staffing services to Fortune 1000 enterprises around the world. Our presence is in countries like the Americas, Europe, Africa, and Asia, and more than four hundred clients across a broad spectrum of markets, including financial services, manufacturing, telecommunications, chemical services, technology, public sector, and utilities. Stefanini is a CMM level 5, IT consulting company with a global presence. We are a CMM Level 5 company.
#LI-KL1
#LI-ONSITE
Easy ApplySenior Cyber Security Engineer
Cyber security analyst job in Raleigh, NC
CIVIC CULTURE
Our organization believes we can all do well by doing good. We value the contributions of diverse minds and prioritize the success and well-being of our employees. We also believe every person in our organization plays a role in supporting a healthy environment and helping to achieve our goal of prosperity for all. To this end, we recruit bright, energetic, and talented people to be members of our team. In return, we offer a dynamic workplace that presents opportunities for professional advancement and individual growth. We strive to always display integrity, self-awareness, courage, and respect for one another while continuing to seek opportunities to learn. We really believe that when our employees succeed, our community wins.
ABOUT THE POSITION
The individual who excels in this position will have demonstrated experience in multiple information security technologies, including, but not limited to: SIEM, SOAR, email security, vulnerability management, network, and endpoint security controls. The individual will also play a key role in deployment, troubleshooting, testing, risk rating, and maintaining cyber security tools, platforms, and programs within the credit union. The successful candidate will display a passion for developing new skills in the field of information security. The Senior Cyber Security Engineer will actively participate in incident response, security program and control implementation, administration, automation, and documentation. The individual will assist internal teams as well as external service providers on technical projects.
NORMAL DAY-TO-DAY WORK
Research, engineer, design, and implement security solutions to enhance the management of cyber security risks within the credit union.
Support the day-to-day maintenance of all cyber security applications, including administration, deployment, troubleshooting and maintaining all cyber security tools.
Create and maintain playbooks, standards, automation, processes, and procedures around security disciplines with a focus on administration of platforms.
Identify, design and complete regular security audits related to administrative access and activities for security platforms as well as perform regular security audits as required.
Research, recommend, implement changes and additions to security controls and business application solutions.
Identify and track metrics related to performance and improvements to related cyber security tools.
Develop, respond to and investigate alerts related to misuse of credit union technology.
Create and edit scripts for integration and analysis of all cyber security controls for coverage and effectiveness.
Serve as a backup for incident response, ensuring readiness to take immediate action in the event of security breaches or system incidents, providing support in containment, analysis, and remediation efforts.
Stay informed of tools, techniques and components utilized in the industry through research and apply this knowledge to system(s) being secured.
Work with end-users to identify and mitigate security threats.
Understand and support team, department, applicable credit union regulations (NCUA), policies and procedures, strategic goals, and vision.
Take ownership for actions, decisions, and results; openly accept feedback and demonstrate both the willingness and ability to improve.
JOB QUALIFICATIONS
Here are a few skills you MUST have to be qualified for this position.
Minimum 7 - 9 years' experience in an information security, systems administration or IT engineering role.
Solid experience and understanding of incident response, vulnerability management, security engineering, security automation, risk rating, network security, threat intelligence and systems administration concepts.
Experience tuning rules that identify anomalous and/or suspicious behavior within SIEM, IDS/IPS, and similar platforms.
Ability to work flexible hours and weekends as needed, as well as participate in a 24/7 rotation schedule.
Ability to function in a Consumer business office environment and utilize standard office equipment including but not limited to: PC, copier, telephone, etc.
Ability to lift a minimum of 25 lbs. (file boxes, computer).
Travel required on occasion.
Here are a few qualities we'd LIKE for you to have to make you more suited for this position.
BA/BS in Information Technology, Information Security, Information Assurance or equivalent experience.
Experience managing Active Directory, and ADFS.
Experience with regular expressions and scripting (PowerShell, python, bash, etc.).
Familiarity with network and systems administration and operations concepts.
Comfortable with multiple operating systems, including Windows, mac OS, and Linux.
Certifications in one or more Information Security Domains or on security platforms (Security+, GSEC, CISSP, GCIH, GCED, GDSA, etc.).
Security Engineer
Cyber security analyst job in Raleigh, NC
As part of Meta Security, our Insider Trust team is dedicated to identifying and responding to insider threats that target our data. Our mission is to detect, investigate, and mitigate damage caused by insider threats. We handle a wide range of abuse cases, including misuse of user data, intellectual property theft, and leaks of sensitive information.We are seeking an experienced Security Engineer to join the team. This role involves investigating, hunting, and automating internal signals to detect malicious activities related to insider threats.
**Required Skills:**
Security Engineer Responsibilities:
1. Develop an understanding of the problem space and provide technical guidance during investigations and threat hunts
2. Influence and align the team's mission and strategy by collaboratively prioritizing and delivering multi-year roadmaps and projects
3. Create workflows and automations to streamline signal detection, threat hunts, and investigative processes
4. Collaborate with software and production engineering teams to build scalable and adaptable solutions for insider threat investigations
5. Identify gaps in our infrastructure and work with cross-functional partners to improve visibility through logging and automation
6. Prioritize efforts to maximize impact by enhancing visibility, automating processes, and scaling investigative capabilities
7. Coach, mentor, and support team members to foster long-term career growth, job satisfaction, and success
**Minimum Qualifications:**
Minimum Qualifications:
8. Bachelor's degree in Computer Science, Engineering, or equivalent experience
9. 8+ years of experience in Detection & Response Engineering, Insider Threat, or a similar Security Engineering role
10. In-depth technical and procedural expertise in conducting security investigations, including response, forensics, and large-scale log analysis
11. Proven experience leading and managing complex cross-functional programs
12. Extensive knowledge of attacker tactics, techniques, and procedures
13. Proficiency in coding or scripting in one or more general-purpose programming languages
**Preferred Qualifications:**
Preferred Qualifications:
14. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
15. Broad knowledge across the Security domain, as well as deep focus in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Detection and/or response tool development
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Cyber Security Engineer (Splunk)
Cyber security analyst job in Raleigh, NC
Piper Companies is seeking a Cyber Security Engineer (Splunk) for a world leading technology firm in the Raleigh, NC area. The Cyber Security Engineer (Splunk) will join a world class security organization with a highly skilled team responsible for designing, developing, and managing the security services within the organization. An ideal candidate for the Cyber Security Engineer (Splunk) will be action oriented and a strong problem solver.
Responsibilities for the Cyber Security Engineer (Splunk) include:
* Manage multiple SPLUNK environments and create SPLUNK queries and dashboards as needed
* Perform penetration testing, vulnerability scanning, IR, and network security configurations
* Research, analyze, and help make decisions on new security tools and technologies
* Develop tools and automation utilizing python scripts
Requirements for the Senior Cyber Security Engineer (Splunk) include:
* Active Secret Security Clearance
* Over 5 years of cyber security engineering experience
* Experience with Splunk - configuration, management, and querying skills
* Prior experience migrating Splunk on prem to Splunk cloud
* Experience in penetration testing, vulnerability scanning, IR, and overall network security
* Python scripting experience
* Strong verbal and written communication skills
Compensation of the Senior Cyber Security Engineer (Splunk) includes:
* $115,000 - $140,000 annually with a full comprehensive benefits including Medical, Dental, Vision, 401K, PTO, Sick Leave as required by law
* Must be eligible to work in the United States
This job opens for applications on July 30, 2025. Applications for this job will be accepted for at least 30 days from the posting date.
Keywords: Splunk, Security Engineer
#LI-JA1
#LI-HYBRID
Information Security Analyst
Cyber security analyst job in Liberty, NC
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret/SCI
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Cybersecurity, Information Security, System Security
Certifications:
None
Experience:
3 + years of related experience
US Citizenship Required:
Yes
:
Job Description
Transform technology into opportunity as an Information Security Analyst with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate.
At GDIT, people are our differentiator. As an Information Security Analyst, you will help ensure today is safe and tomorrow is smarter. Our work depends on TS/SCI cleared Information Security Analysts joining our team to support our intelligence customer at Fort Liberty, NC.
HOW AN INFORMATION SECURITY ANALYST WILL MAKE AN IMPACT
The Information Assurance Analyst is primarily responsible for incident handling, incident response, intrusion analysis, threat hunting, digital forensic analysis, vulnerability scanning, Data Loss Prevention (DLP).
Tracks and handles cyber security incidents/events from initial detection to final resolution; coordinates with appropriate parties to investigate and maintain communications.
Collaborates with specialty teams to investigate and resolve complex problems.
Troubleshoots security tools on the network to ensure successful operation, compatibility with other applications, and minimal impact to the users.
Ensures ACAS vulnerability scanning mechanisms are operational and providing relevant results to the vulnerability management and admin teams.
Performs Information Systems Security Officer (ISSO) duties, and acts as the POC between parent organization and cyber security teams.
Conducts change requests, software authorizations, static code analysis, account reviews, and other Assessment & Authorization (A&A) tasks as required.
Acts as a central point of contact for all inquiries potentially regarding cyber security, and if necessary, redirects to the appropriate entities.
WHAT YOU'LL NEED TO SUCCEED
EDUCATION
Associate Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.
8570 Certification
REQUIRED EXPERIENCE:
3+ years of related experience in data security administration.
REQUIRED TECHNICAL SKILLS:
Minimum IAT II: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, SSCP
Within 6 months of hire - CSSP Incident Responder (IR): CEH, CFR, CCNA Cyber Ops, CCNA-Security, CHFI, CySA+, GCFA, GCIH, SCYBER
Preferred certifications: GCIH, GCFA, GCIA, GNFA, Linux+, CCNA R&S, Splunk Power User
SECURITY CLEARANCE:
TS/SCI (Required)
REQUIRED SKILLS AND ABILITIES:
Proficient at navigating Windows 10/Server 2012/Server 2016 operating systems to perform intrusion analysis and systems maintenance
Proficient at navigating Linux: Ubuntu/RHEL 6/7/8 to facilitate cyber security engineering and systems maintenance
Basic scripting skills using Windows command-line, PowerShell, or BASH
Understanding of network ports, protocols, and services
Intrusion analysis via HBSS, Splunk or other SIEM tools, Windows Event Logging, Open Source Intelligence (OSINT) sources
Incident investigations via McAfee HBSS suite, SolarWinds, Cisco ISE, Cylance, Splunk, Phantom, StealthWatch, WireShark, ForeScout, ACAS, PowerShell, command-line tools
Build and maintain ACAS infrastructure; analyze vulnerability scan results and provide recommendations for remediation
PREFERRED SKILLS:
Strong desire to learn new skills, techniques, tactics, and procedures to improve knowledge and existing processes
Must be able to multi-task and adapt to changing priorities in highly stressful situations
Highly resilient and motivated to investigate unfamiliar and anomalous problems in a robust OPTEMPO environment, including follow-through to complete resolution
Critical thinking skills required to apply and correlate data from multiple sources to solve complex problems
Strong ability to quickly and clearly articulate operational impacts of cyber security incidents/events to leadership
Ability to communicate efficiently and precisely to target audience, as well as build strong rapport with other teams
Location:
On Company Site
Citizenship Required
US citizenship
GDIT IS YOUR PLACE:
● 401K with company match
● Comprehensive health and wellness packages
● Internal mobility team dedicated to helping you own your career
● Professional growth opportunities including paid education and certifications
● Cutting-edge technology you can learn from
● Rest and recharge with paid vacation and holidays
The likely salary range for this position is $76,500 - $103,500. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
25-50%
Telecommuting Options:
Onsite
Work Location:
USA NC Fort Liberty
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyInformation Security Analyst
Cyber security analyst job in Greensboro, NC
XDIN subsidiary of ALTEN Group, includes 500 employees dedicated to the automotive engineering development. ALTEN is a Leader in Engineering & Information Technology system, and operates in over 21 countries (Europe, North America, Asia, Africa and Middle East) with more than 28,000 employees of which 88% are engineers.
At XDIN, we are always looking for world-class talent to lead our global teams through commitment and dedication to our OEM and Tier I clients. We believe in quality support from concept through production, and delivering the best customer experience while at the same time attaining a great place to work!
XDIN Offers
Competitive wages, BOE.
Major health, dental insurance benefits and vision savings plan. 401k, and basic life.
Supplemental benefits such as short-term disability, accident, cancer and life insurance.
Paid company holidays and earned time off.
We place a high value on thought leadership. We want every employee to develop all the skills required to become an engineering and technology thought leader; contributing to the knowledge assets of our team and our clients. From day one, every consultant is trained and mentored to elevate their careers.
Responsibilities:
Performs network and application technical vulnerability assessments using vulnerability assessment tools.
Performs penetration testing activities to detect vulnerabilities and attack chains.
Utilizes penetration testing skills to conduct analyses to gather deeper situational awareness and provide greater security insight of the environment.
Lead the Security Awareness efforts, including facilitating presentations on topics of relevance, evaluating and implementing awareness training
Assist in network security efforts including Data Loss Prevention, Intrusion Prevention and SIEM analysis
Test security measures including OS patches, system hardening, and application configuration
Monitor, review and troubleshoot alerts
Review, interpret and adapt customer, regulatory and corporate security and compliance requirements into technical design options
Apply knowledge of technical, analytical skills to ensure the confidentiality, integrity, and availability of all information systems assets and ensure compliance with company policies, procedures, contractual, and regulatory requirements.
Produce security policies, standards, and guidelines
Perform security research
Produce security risk advisories based on newly identified threats and risk assessment
Assist in performing IT audit, third party evaluations, and risk assessment activities
Requirements:
Bachelor's degree in Information Technology, Computer Science or a related discipline
Approximately 3 years' work experience in Information Security in an enterprise network (Internships and Co-Ops can be included)
A recognized information security certification or accreditation such as Security+, CISSP, or CEH is a plus.
Fundamental understanding of penetration testing techniques and technologies
Fundamental understanding of application development security concepts such as OWASP Top 10 Vulnerabilities
Fundamental understanding of Active Directory administration and Windows authentication
Fundamental understanding of security technologies such as SIEM, IDS/IPS, Web filters, two-factor authentication, web application firewalls
Fundamental understanding of Malware detection, analysis, exploitation, containment, and eradication techniques experience
Experience with systems analysis including, but not limited to: Gathering requirements from stakeholders, Constructing RFP/RFQs, devising and planning proof-of-concepts, defining use and test cases, driving critical security infrastructure projects, creating cogent status reports for senior management, strong technical understanding of vulnerabilities, and how attackers can exploit vulnerabilities to compromise systems.
Excellent verbal, written, and presentation skills; in particular, demonstrated ability to effectively communicate technical and business issues and solutions to multiple organizational levels internally and externally as needed
Knowledge of security frameworks and governance such as NIST, ISO27000 series, HIPAA, GDPR, PCIDSS
Solid analytical and problem solving skills; ability to think strategically and turn ideas into actions
Familiarity with Project Management concepts.
Familiarity with scripting languages such as Python
Ability to work with little supervision and consistently deliver results
The Location: This opportunity is based in Greensboro, NC.
Auto-ApplyEngineer, Information Security and Risk
Cyber security analyst job in Raleigh, NC
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Sr. Security Analyst
Cyber security analyst job in Durham, NC
Procom is a leading provider of professional IT services and staffing to businesses and governments in Canada. With revenues over $500 million, the Branham Group has recognized Procom as the 3rd largest professional services firm in Canada and is now the largest “Canadian-Owned” IT staffing/consulting company.
Procom's areas of staffing expertise include:
• Application Development
• Project Management
• Quality Assurance
• Business/Systems Analysis
• Datawarehouse & Business Intelligence
• Infrastructure & Network Services
• Risk Management & Compliance
• Business Continuity & Disaster Recovery
• Security & Privacy
Specialties• Contract Staffing (Staff Augmentation)
• Permanent Placement (Staff Augmentation)
• ICAP (Contractor Payroll)
• Flextrack (Vendor Management System)
Job Description
Sr. Security Analyst
On behalf of our client, Procom Services is searching for a Sr. Security Analyst for a contract opportunity in Durham, NC.
Sr. Security Analyst Job Details
Responsible for user account administration in a multi-platform environment and ensure that administration procedures are aligned with overall Information Security policies and standards. Assist in the development of access controls to safeguard customer systems against accidental or unauthorized modification, destruction or disclosure.
Maintain user access to securable customer system resources (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) performing tasks such as: creation / configuration of user logon Ids and updating access control lists, access provisioning and access removals and access terminations.
Perform detailed analysis of access requests/processes and provide recommendations for improvement to senior team members and Information Security management.
Educate information / resource owners in the implementation of necessary information security controls.
Perform standard and non-standard processing of security authorization requests.
Work with resource owners to determine appropriate security policies for securable customer resources.
Provide on-call support for after-hours system access issues and troubleshoot system access problems and failures.
Report suspected information security misuse to manager or director.
Assist resource owners and IT staff in understanding and responding to security access exceptions.
Sr. Security Analyst Mandatory Skills
- Bachelor's degree in Computer Science.
- 2 years of security administration experience, or related technical system administration experience.
- In lieu of degree 5 years of security administration experience.
- Familiarity with audit and risk-related methodologies; such as COBIT and HIPAA.
- Systems administration experience within other aspects of IT
- Demonstrated security administration experience on two or more platforms (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange)
- Demonstrated experience working with a managed services organization.
- Demonstrated experience working with a request ticketing system, such as Triole.
- Strong analytical and problem-solving skills.
- Ability to present and discuss technical information to users with varying technical expertise.
- Proven ability to work under stress in emergencies. Flexibility to handle pressure from many directions simultaneously.
- Must be detail-oriented with a high level of accuracy.
- Excellent written and verbal communication skills.
- Demonstrated ability to develop and maintain collaborative working relationships across multiple teams.
- Strong customer focus and the ability to manage customer expectations.
- Must have strong team-oriented interpersonal skills and the ability to effectively interface with a wide variety of people.
- Demonstrated commitment to continuous process improvement.
- CISSP, CISA, or other security / audit / field related certifications a plus
Sr. Security Analyst Start Date
ASAP
Sr. Security Analyst Assignment Length
7+ months
Additional Information
All your information will be kept confidential according to EEO guidelines. Please send your resume in Word format only.
information Security Engineer
Cyber security analyst job in Greensboro, NC
Locus is a nimble, experienced consulting team specializing in information security, cloud computing, networking, and infrastructure. We have extensive experience delivering technology solutions in the Network, Cloud, and Security arenas to some of the largest companies in the world. Candidates are treated like unique individuals, not a commodity, and our career experts are committed to understanding all aspects of a candidate's wants and needs in order to find the best possible fit.
We are laser-focused on winning together and supporting both our internal team and clients alike for long-term shared success. We take a full-service approach with our process, understanding our clients and candidates needs to find the right fit from a skillset and a cultural perspective. People are at the cornerstone of what we do, and we'd love to hear from you.
Locus is currently searching for an Information Security Engineer for our client. This is a full time perm exempt role.
SUMMARY: Responsible for protecting the organization's computers, networks, and data against threats, such as security breaches, computer viruses, or attacks by cyber criminals. This position oversees the planning, development, coordination, implementation, and management of all Information Security functions and measures to regulate access and usage of Customer Information Systems in accordance with established company policies, standards and procedures. The Information Security Manager regularly interfaces with other department heads in matters pertaining to information security awareness and keeps abreast of changes in regulatory and compliance issues, which affect all phases of information security and Customer. This position is also responsible for administration of corporate Business Continuity Program.
ESSENTIAL JOB FUNCTIONS:
Develops Information Security (IS) architecture/designs, plans, controls, processes, standards, policies, and procedures to ensure alignment with IS standards and overall IS security strategy
Develop, implement, and manage security measures for information systems to regulate access to computer data files and prevent unauthorized modification, destruction, or disclosure of information
Determines user requirements, plans projects, establishes priorities, and monitors progress
Manages the evaluation and testing of hardware, firmware, and software for possible impact on systems security
Maintains and monitors user access control for bank systems
Coordinates with other managers to integrate IS project components with other projects including application delivery, network, server, and hosted solutions
Manages and coordinates the enterprise Vendor Risk Management Program
Manages and coordinates Corporate Business Continuity Program
Communicate best practices and risks to Customer
Perform a risk assessment of Customer's vulnerabilities in the cybersecurity landscape and develop Customer's risk appetite for Information Security
Develop key risk indicators and dashboard metrics reporting to both the management team and the Board of Directors
JOB REQUIREMENTS:
Bachelor's Degree from an accredited university in the field of Audit, MIS, Computer Science or related field of study
Prior Information Security experience at a Financial Services company
Familiarity with Financial Services regulations
Familiarity with Federal Financial Institution Examination Council (FFIEC) guidance
Prior management experience
Certified Secure Software Lifecycle Professional (CSSLP) and/or Certified Information Security Manager (CISM) certification
KNOWLEDGE/SKILLS REQUIRED:
Knowledge of financial services industry and all applicable regulations and industry standards
Advanced ability to engineer security solutions
Intermediate relationship management skills
Intermediate knowledge of cybersecurity strategy management
Advanced cybersecurity monitoring and reporting skills
Advanced knowledge of security incident handling
Advanced knowledge of security risk assessment methodologies
Excellent customer service skills
Strong verbal and written communication skills
High level of attention to detail, with strong problem solving & organizational skills
Ability to perform effectively in fast-paced environment
PHYSICAL AND MENTAL QUALIFICATIONS:
Standing, walking, bending and stooping required
Must be able to sit at a desk for long periods of time and use a computer
Must be able to occasionally move or lift up to 10 pounds
May be asked to work supplemental hours periodically
Limited travel required during and after business hours
The above statements are intended to describe the general nature and level of work being performed by the incumbent assigned to this classification. They are not intended to be construed as an exhaustive list of all responsibilities, duties, and/or skills required of all personnel so classified. NOT A CONTRACT
Lead Information Security Architect / Engineer
Cyber security analyst job in Durham, NC
EmTacq specializes in EMployer Talent ACQuisitions, matching the most qualified candidates with the most competitive positions available. We pride ourselves on not just putting bodies in seats, rather matching professionals to their careers. We are headquartered in the Raleigh / Durham, NC area. However, as a recruiting agency we service companies and candidates across the United States. We are your best source for professional, value driven low cost recruitment services.
Job Description
The Lead Information Security Engineer will be responsible for designing and implementing a process to analyze the design of technology solutions for threats, attacks, and vulnerabilities that could affect the control environment. Must be a subject matter expert (SME) with strong collaboration skills to work with cross functional teams to ensure the design of technology solutions complies with information security policies, and regulatory obligations.
The Lead Information Security Engineer must have the ability to identify, document, and recommend security safeguards and configurations in a highly complex environment with a demonstrated ability to recognize, and appropriately incorporate layered security safeguards within the network, application, and data layers from a defender's perspective. In this role you must be a positive professional, adaptable, pragmatic, and who is comfortable in delivering clear and concise information at both a technical and managerial level.
Responsibilities:
Design and implement a process to analyze the design of technology solutions for threats, attacks, and vulnerabilities that could affect the client's control environment. Review and approve security configuration checklists (e.g., hardening or lockdown guides) for technology platforms and solutions (e.g., operating systems, databases, firewalls, etc.) Provide security consulting services internally to the engineering organization by giving guidance and functioning as an information security SME. Must have the ability to identify, document, and recommend security safeguards and configurations in a highly complex environment with a demonstrated ability to recognize, and appropriately incorporate layered security safeguards within the network, application, and data layers from a defender's perspective.
Qualifications
Required Experience
*5+ years of experience in one or more of the following information security domains: access management, cryptography, data loss prevention (DLP), emerging technologies (i.e., cloud, mobile, etc.), endpoint security, incident response, malware analysis and protection, network and perimeter security, or web and mobile application security.
*5+ years of experience analyzing the design of technology solutions using common industry frameworks such as DREAD, SSE-CMM (ISO/IEC 21827), STRIDE, or other risk assessment models.
*5+ years of working knowledge of various industry security standards and frameworks including: ISO 27001, ISF Standard of Good Practice (SoGP), NIST Special Publications, etc.
*5+ years of working knowledge of modern enterprise and security architectures, their challenges, common approaches to overcome their challenges, and their inherent security strengths and weaknesses.
*Teamwork and communication skills, both written and verbal.
Preferred Experience
*Bachelor's degree in Computer Science, Information Systems, or related field. 8+ years of equivalent work experience required in lieu of degree is acceptable.
*Professional certifications such as: CISSP, CISA, CISM, GIAC, CGEIT, CRISC, CEH, or other relevant industry certification strongly preferred.
Additional Information
Equal Employment Opportunity
Our client is proud to be an equal opportunity/affirmative action employer. We are committed to attracting, retaining and maximizing the performance of a diverse and inclusive workforce. It is their policy to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, creed, religion, national origin, alienage or citizenship status, age, sex, sexual orientation, gender identity or expression, marital or domestic/civil partnership status, disability, veteran status, genetic information or any other basis protected by law.
Junior Security Analyst - 3rd Shift
Cyber security analyst job in Morrisville, NC
Description Junior Security Analyst- 3rd Shift The Company: Varonis (Nasdaq: VRNS) is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. Thousands of organizations worldwide trust Varonis to defend their data wherever it lives - across SaaS, IaaS, and hybrid cloud environments. Customers use Varonis to automate a wide range of security outcomes, including data security posture management (DSPM), data classification, data access governance (DAG), data detection and response (DDR), data loss prevention (DLP), and insider risk management. Varonis protects data first, not last. Learn more at **************** The Role: We are seeking a driven MDDR Security Analyst to join the forefront of our data security mission- working 24x7 to monitor, triage, investigate, and escalate incidents where data is at risk and to ensure we meet operational SLAs. Data is the #1 target of attackers, and Varonis' Managed Data Detection and Response (MDDR) customers entrust our team with the security of their data. They will develop a deep understanding of the Varonis platform and related technologies. This role demands knowledge of security ecosystems (ex. SIEM, SOAR, ITSM, EDR, IPS/IDS, Active Directory, DNS, IAM/PAM, etc.) and enterprise security operations. The Location: We are considering candidates who are located within physical proximity to Raleigh, North Carolina. The Requirements:
1-3 years of experience in cybersecurity
Degree or certification(s) in cybersecurity and/or proven ability to execute across cyber security operations disciplines, including monitoring, detection, investigation, and incident response.
Proven success in contributing to a team-oriented environment.
Strong analytical and creative problem-solving skills.
Excellent communication skills (written and oral) and interpersonal skills (colleagues and customers).
Attention to detail and the capability to deliver outcomes autonomously.
Knowledge of common security technologies and tools including network-based (firewall and IDS), host-based (EDR and AV), data-based (DLP and DSPM), and identity-based (PAM and IAM), gained through experience or study.
Knowledge of operational information security disciplines including alert monitoring, threat detection, incident response, security infrastructure management, and system and architecture hardening, gained through experience or study.
Demonstrated ability to learn new skills and technologies swiftly.
Proficiency in critical thinking and problem-solving for complex issues.
The Responsibilities:
Monitor and respond to detections within the Varonis platform.
Conduct thorough triage of Varonis detections through critical analysis and investigative methodologies.
Validate findings and coordinate investigative and response efforts with customers and internal teams.
Document and communicate investigative findings effectively, including tracking in CRM and related systems.
Assist in the development, documentation, analysis, testing, and modification of Varonis' threat detection systems, playbooks, and runbooks.
Logistics:
Shifted Schedule: Sunday to Wednesday, or Wednesday to Saturday.
12-hour shifts with one 1-hour break and two 30-minute breaks.
Night shift (9pm to 9am EST).
6 weeks of dedicated new hire training.
MDDR Security Analysts are expected to complete Sec+ and CySA+ training within their first year.
Work visa sponsorship is not available.
We invite you to check out our Instagram Page to gain further insight into the Varonis culture!
@VaronisLife
Varonis is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, and other legally protected characteristics
Auto-ApplySecurity Engineer - IAM
Cyber security analyst job in Raleigh, NC
If you are motivated and believe in the credit union philosophy of "People Helping People," join our team!
The Security Engineer - IAM is a mid-level role responsible for enhancing and evolving SECU's IAM practices, processes, and solutions.
This individual will serve as a key technical resource, providing operational support, management, implementation, and strategic development of IAM solutions, including Privileged Access Management (PAM), Single Sign-On (SSO), Identity Governance and Administration (IGA), Multi-Factor Authentication (MFA), Active Directory (AD), Customer Identity and Access Management (CIAM), and other IAM technologies.
The engineer will provide input and have some responsibility with designing and optimizing IAM frameworks, driving automation, and ensuring alignment with security best practices and compliance requirements.
Additionally, they will actively collaborate with cross-functional teams, mentor junior engineers, and work closely with key stakeholders to strengthen the adoption of IAM controls and solutions while contributing to the overall cybersecurity strategy.
Responsibilities:
(30%) Perform operational support and maintenance of technical security solutions to enhance SECU's security posture.
(20%) Assist in the configuration and tuning of security tools and integrations with enterprise controls and tools.
(20%) Participate in identification of service quality, documentation, and operational efficiency and improvement opportunities.
(10%) Participate in on-call rotation and serve as a resource for technical support of information security technologies.
(10%) Mentor and collaborate with junior engineers.
(10%) Pursue and maintain additional skills and certifications commensurate with the role to remain current on advancing cyber security trends.
Responsibilities will include participation in special assignments and cross-functional initiatives as required.
Required Education & Experience (Knowledge, Skills, & Abilities):
Candidate must live in North Carolina or contiguous state.
Bachelors degree in Computer Science, Information Technology, Cyber Security, or related field.
Additional 2 years of relevant experience can be considered in lieu of degree.
Minimum 2 year of experience in related field.
General IAM Solutions
Experience supporting one or more IAM solutions such as PAM, SSO, Directory Services, IGA, CIAM, and MFA
Understanding of IAM Concepts
Demonstrated experience and understanding of core IAM principles, such as authentication, authorization, provisioning, and access control.
Demonstrated experience and understanding of identity lifecycle management (creation, modification, and deletion of user accounts).
Basic Programming/Scripting Skills
Ability to leverage and understand scripting languages such as Python, PowerShell, or Bash for automating tasks.
User and Role Management
Experience in managing user accounts, groups, roles, and permissions within an IAM system.
Security Awareness
Understanding of security principles, including least privilege, segregation of duties, and access reviews.
Incident Response and Troubleshooting
Ability to investigate and resolve access-related issues and incidents.
Experience with IAM-related logs and monitoring tools for diagnosing and fixing issues.
Ability to identify discrepancies or potential security risks in access control settings.
Communication Skills
Ability to document processes, policies, and procedures clearly and concisely.
Skills in communicating technical concepts to non-technical stakeholders.
Preferred Education & Experience (Knowledge, Skills, & Abilities):
Bachelors degree in Computer Science, Information Technology, Cyber Security, or related field.
Preferred 2-5 direct years of experience.
Ability to manage role-based access control (RBAC) policies.
Experience working in cross-functional teams, including IT, security, and compliance.
Ability to collaborate with stakeholders to understand access requirements and implement them effectively.
Experience working within a DevOps environment.
Professional certifications such as: CISSP, CISA, CISM, GIAC, CGEIT, CRISC, OSCE, or other relevant industry certification and/or desire to obtain such certifications.
Work Environment & Physical Requirements:
*Note: “Working Conditions” or “ADA” - open to other language
Computer for prolonged periods
SECU provides equal employment opportunity to all qualified persons regardless of race, color, religion, age, sex, sexual orientation, gender identity, national origin, genetic information, disability, veteran status, or other classification protected by law.
Disclaimer
State Employees' Credit Union reserves the right to fill this role at a higher/lower level based on business need.
Auto-ApplySr. Information Security Engineer
Cyber security analyst job in Raleigh, NC
Who We Are:
Bandwidth, a prior “Best of EC” award winner, is a global software company that helps enterprises deliver exceptional experiences through voice, messaging, and emergency services. Reaching 65+ countries and over 90 percent of the global economy, we're the only provider offering an owned communications cloud that delivers advanced automation, AI integrations, global reach, and premium human support. Bandwidth is trusted for mission-critical communications by the Global 2000, hyperscalers, and SaaS builders!
At Bandwidth, your music matters when you are part of the BAND. We celebrate differences and encourage BANDmates to be their authentic selves. #jointheband
What We Are Looking For:
The mission of the Security Operations team is to build, deploy, and operate information security systems, infrastructure, and tools. The Senior Security Engineer will act as a leader in monitoring, administration, ticketing and support. In addition, mentoring other security team members in operations functions, as well as assisting management in growing and maturing security detection, monitoring and response. As a Senior Security Engineer, you will work closely with not only other Information Security teams but also partner with the IT, development and architecture organizations. You will be part of a talented team of security professionals who demonstrate superb technical competency, delivering mission critical infrastructure and ensuring the highest levels of availability, performance and security across the enterprise.
What You'll Do:
Provide technical and operational leadership for aspects of security operations, security architecture and security tools administration.
Serve as an escalation point in incident response scenarios; acting as the incident lead and conducting investigations and forensics as needed.
Actively engages in the performance of Incident Response activities, including but not limited to, triage, escalation, conducting post-mortem and lessons learned, as well as remediation tracking.
Displays a strong knowledge and understanding of the utilization of various security tools include SIEM, SOAR, vulnerability scanners, CSPM, and EDR
Advanced understanding of securing both cloud-based (AWS, GCP) and on-prem workloads including traditional architecture design and containerized environments.
Identify gaps in current monitoring or operational processes and workflows, and recommend changes or enhancements to improve efficiency through security best practices..
Provide security consulting on medium to large scale projects for internal clients to ensure conformity with corporate information, security policy and standards
Drive vulnerability management and remediation efforts - prioritizing issues, implementing mitigations, and designing strategic preventative and compensating controls
Drives process improvement and control implementation projects in coordination with the other Enterprise teams
Engages with neighboring Bandwidth technology teams to drive awareness and compliance to security policies and standards
Participate in security on-call rotation, supporting off-hours general security incidents and production systems.
Maintain working relationships with business partners to understand business processes, and the impact of implementing security controls in their ability to do business
Train and mentor team members for security operations, support, and/or administration tasks
What You Need:
Education:
Degree in an IT or Information Security discipline or other equivalent combination of education and/or experience that is focused on IT Security and Technology Operations.
One or more of the following certifications:
GIAC Information Security Professional (GISP)
Certified Information Systems Security Professional (CISSP)
AWS Certified Security Specialty
Experience:
5 or more years of specific Security Operations experience required.
5 or more years SIEM, SOAR and vulnerability management experience, including integrating endpoints
3 or more years of incident response experience across a variety of environments and resource types: on-prem, cloud, endpoints, servers, containers, etc.
Knowledge:
Familiarity with cutting-edge security technologies such as Zero-Trust Network Access, SSO, Endpoint Detection and Response (EDR), and Security Incident and Event Management required (SIEM).
Experience working in multi-cloud organizations utilizing cloud security posture management (CSPM) and cloud-native security tools with a “shift-left” DevSecOps mentality
Experience working with a third-party Managed Security Service Provider (MSSP)
Skills:
Proficient in Windows and Linux operating systems.
Ability to analyze a complex technical environment and quickly build a conceptual understanding of how the pieces all fit together
Proficient in automation and scripting languages (Python, Bash, etc)
Ability to analyze and correlate information from multiple sources to determine and articulate potential risk to the business in non-technical terms.
Team player with strong communication skills, ability to collaborate with highly technical colleagues and non-technical end-users at a level they can understand.
Bonus Points:
Experience:
Hands-on experience with Wiz and CrowdStrike - cloud security and container security .
Hands-on experience with AWS / cloud security tools (Guard Duty, Amazon Inspector, AWS Shield,Wiz, Lacework, etc.)
Strong knowledge of SIEM tools and logging (Splunk, Sumo Logic, Data Dog, Qualys)
Understanding of maintaining and administering endpoint detection response tools (CrowdStrike, FireEye, etc)
Foundational knowledge of Ai - LLMs (language learning models), MCP (model context protocol) and the impacts of these on securing organizational resources.
Knowledge:
Understanding of authentication and authorization mechanisms.
Familiar with data classification, data protection, and secure data handling practices.
Understanding of regulatory requirements (SOX, GDPR, HIPAA … )
The Whole Person Promise:
At Bandwidth, we're pretty proud of our corporate culture, which is rooted in our “Whole Person Promise.” We promise all employees that they can have meaningful work AND a full life, and we provide a work environment geared toward enriching your body, mind, and spirit. How do we do that? Well…
100% company-paid Medical, Vision, & Dental coverage for you and your family with low deductibles and low out-of-pocket expenses.
All new hires receive four weeks of PTO.
PTO Embargo. When you take time off (of any kind!) you're embargoed from working. Bandmates and managers are not allowed to interrupt your PTO - not even with email.
Additional PTO can be earned throughout the year through volunteer hours and Bandwidth challenges.
“Mahalo moments” program grants additional time off for life's most important moments like graduations, buying a first home, getting married, wedding anniversaries (every five years), and the birth of a grandchild.
90-Minute Workout Lunches and unlimited meetings with our very own nutritionist.
Are you excited about the position and its responsibilities, but not sure if you're 100% qualified? Do you feel you can work to help us crush the mission? If you answered ‘yes' to both of these questions, we encourage you to apply! You won't want to miss the opportunity to be a part of the BAND.
Applicant Privacy Notice
Auto-ApplyNetwork Security Analyst
Cyber security analyst job in Durham, NC
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network Security Analyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta
Engineer, Information Security and Risk
Cyber security analyst job in Raleigh, NC
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Sr. Security Analyst
Cyber security analyst job in Durham, NC
Procom is a leading provider of professional IT services and staffing to businesses and governments in Canada. With revenues over $500 million, the Branham Group has recognized Procom as the 3rd largest professional services firm in Canada and is now the largest “Canadian-Owned” IT staffing/consulting company.
Procom's areas of staffing expertise include:
• Application Development
• Project Management
• Quality Assurance
• Business/Systems Analysis
• Datawarehouse & Business Intelligence
• Infrastructure & Network Services
• Risk Management & Compliance
• Business Continuity & Disaster Recovery
• Security & Privacy
Specialties• Contract Staffing (Staff Augmentation)
• Permanent Placement (Staff Augmentation)
• ICAP (Contractor Payroll)
• Flextrack (Vendor Management System)
Job Description
Sr. Security Analyst
On behalf of our client, Procom Services is searching for a Sr. Security Analyst for a contract opportunity in Durham, NC.
Sr. Security Analyst Job Details
Responsible for user account administration in a multi-platform environment and ensure that administration procedures are aligned with overall Information Security policies and standards. Assist in the development of access controls to safeguard customer systems against accidental or unauthorized modification, destruction or disclosure.
Maintain user access to securable customer system resources (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) performing tasks such as: creation / configuration of user logon Ids and updating access control lists, access provisioning and access removals and access terminations.
Perform detailed analysis of access requests/processes and provide recommendations for improvement to senior team members and Information Security management.
Educate information / resource owners in the implementation of necessary information security controls.
Perform standard and non-standard processing of security authorization requests.
Work with resource owners to determine appropriate security policies for securable customer resources.
Provide on-call support for after-hours system access issues and troubleshoot system access problems and failures.
Report suspected information security misuse to manager or director.
Assist resource owners and IT staff in understanding and responding to security access exceptions.
Sr. Security Analyst Mandatory Skills
- Bachelor's degree in Computer Science.
- 2 years of security administration experience, or related technical system administration experience.
- In lieu of degree 5 years of security administration experience.
- Familiarity with audit and risk-related methodologies; such as COBIT and HIPAA.
- Systems administration experience within other aspects of IT
- Demonstrated security administration experience on two or more platforms (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange)
- Demonstrated experience working with a managed services organization.
- Demonstrated experience working with a request ticketing system, such as Triole.
- Strong analytical and problem-solving skills.
- Ability to present and discuss technical information to users with varying technical expertise.
- Proven ability to work under stress in emergencies. Flexibility to handle pressure from many directions simultaneously.
- Must be detail-oriented with a high level of accuracy.
- Excellent written and verbal communication skills.
- Demonstrated ability to develop and maintain collaborative working relationships across multiple teams.
- Strong customer focus and the ability to manage customer expectations.
- Must have strong team-oriented interpersonal skills and the ability to effectively interface with a wide variety of people.
- Demonstrated commitment to continuous process improvement.
- CISSP, CISA, or other security / audit / field related certifications a plus
Sr. Security Analyst Start Date
ASAP
Sr. Security Analyst Assignment Length
7+ months
Additional Information
All your information will be kept confidential according to EEO guidelines. Please send your resume in
Word
format only.
Lead Information Security Architect / Engineer
Cyber security analyst job in Durham, NC
EmTacq specializes in EMployer Talent ACQuisitions, matching the most qualified candidates with the most competitive positions available. We pride ourselves on not just putting bodies in seats, rather matching professionals to their careers. We are headquartered in the Raleigh / Durham, NC area. However, as a recruiting agency we service companies and candidates across the United States. We are your best source for professional, value driven low cost recruitment services.
Job Description
The Lead Information Security Engineer will be responsible for designing and implementing a process to analyze the design of technology solutions for threats, attacks, and vulnerabilities that could affect the control environment. Must be a subject matter expert (SME) with strong collaboration skills to work with cross functional teams to ensure the design of technology solutions complies with information security policies, and regulatory obligations.
The Lead Information Security Engineer must have the ability to identify, document, and recommend security safeguards and configurations in a highly complex environment with a demonstrated ability to recognize, and appropriately incorporate layered security safeguards within the network, application, and data layers from a defender's perspective. In this role you must be a positive professional, adaptable, pragmatic, and who is comfortable in delivering clear and concise information at both a technical and managerial level.
Responsibilities:
Design and implement a process to analyze the design of technology solutions for threats, attacks, and vulnerabilities that could affect the client's control environment. Review and approve security configuration checklists (e.g., hardening or lockdown guides) for technology platforms and solutions (e.g., operating systems, databases, firewalls, etc.) Provide security consulting services internally to the engineering organization by giving guidance and functioning as an information security SME. Must have the ability to identify, document, and recommend security safeguards and configurations in a highly complex environment with a demonstrated ability to recognize, and appropriately incorporate layered security safeguards within the network, application, and data layers from a defender's perspective.
Qualifications
Required Experience
*5+ years of experience in one or more of the following information security domains: access management, cryptography, data loss prevention (DLP), emerging technologies (i.e., cloud, mobile, etc.), endpoint security, incident response, malware analysis and protection, network and perimeter security, or web and mobile application security.
*5+ years of experience analyzing the design of technology solutions using common industry frameworks such as DREAD, SSE-CMM (ISO/IEC 21827), STRIDE, or other risk assessment models.
*5+ years of working knowledge of various industry security standards and frameworks including: ISO 27001, ISF Standard of Good Practice (SoGP), NIST Special Publications, etc.
*5+ years of working knowledge of modern enterprise and security architectures, their challenges, common approaches to overcome their challenges, and their inherent security strengths and weaknesses.
*Teamwork and communication skills, both written and verbal.
Preferred Experience
*Bachelor's degree in Computer Science, Information Systems, or related field. 8+ years of equivalent work experience required in lieu of degree is acceptable.
*Professional certifications such as: CISSP, CISA, CISM, GIAC, CGEIT, CRISC, CEH, or other relevant industry certification strongly preferred.
Additional Information
Equal Employment Opportunity
Our client is proud to be an equal opportunity/affirmative action employer. We are committed to attracting, retaining and maximizing the performance of a diverse and inclusive workforce. It is their policy to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, creed, religion, national origin, alienage or citizenship status, age, sex, sexual orientation, gender identity or expression, marital or domestic/civil partnership status, disability, veteran status, genetic information or any other basis protected by law.
Varonis Careers - Junior Security Analyst - 1st Shift
Cyber security analyst job in Morrisville, NC
Junior Security Analyst- 1st Shift The Company: Varonis (Nasdaq: VRNS) is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
Thousands of organizations worldwide trust Varonis to defend their data wherever it lives - across SaaS, IaaS, and hybrid cloud environments. Customers use Varonis to automate a wide range of security outcomes, including data security posture management (DSPM), data classification, data access governance (DAG), data detection and response (DDR), data loss prevention (DLP), and insider risk management.
Varonis protects data first, not last. Learn more at ****************
The Role: We are seeking a driven MDDR Security Analyst to join the forefront of our data security mission- working 24x7 to monitor, triage, investigate, and escalate incidents where data is at risk and to ensure we meet operational SLAs. Data is the #1 target of attackers, and Varonis' Managed Data Detection and Response (MDDR) customers entrust our team with the security of their data. They will develop a deep understanding of the Varonis platform and related technologies. This role demands knowledge of security ecosystems (ex. SIEM, SOAR, ITSM, EDR, IPS/IDS, Active Directory, DNS, IAM/PAM, etc.) and enterprise security operations.
The Requirements:
* 1-3 years of experience in cybersecurity
* Degree or certification(s) in cybersecurity and/or proven ability to execute across cyber security operations disciplines, including monitoring, detection, investigation, and incident response.
* Proven success in contributing to a team-oriented environment.
* Strong analytical and creative problem-solving skills.
* Excellent communication skills (written and oral) and interpersonal skills (colleagues and customers).
* Attention to detail and the capability to deliver outcomes autonomously.
* Knowledge of common security technologies and tools including network-based (firewall and IDS), host-based (EDR and AV), data-based (DLP and DSPM), and identity-based (PAM and IAM), gained through experience or study.
* Knowledge of operational information security disciplines including alert monitoring, threat detection, incident response, security infrastructure management, and system and architecture hardening, gained through experience or study.
* Demonstrated ability to learn new skills and technologies swiftly.
* Proficiency in critical thinking and problem-solving for complex issues.
The Responsibilities:
* Monitor and respond to detections within the Varonis platform.
* Conduct thorough triage of Varonis detections through critical analysis and investigative methodologies.
* Validate findings and coordinate investigative and response efforts with customers and internal teams.
* Document and communicate investigative findings effectively, including tracking in CRM and related systems.
* Assist in the development, documentation, analysis, testing, and modification of Varonis' threat detection systems, playbooks, and runbooks.
Logistics:
* Shifted Schedule:
* Wednesday to Saturday (7:00AM - 5:00PM EST)
* Wednesday to Saturday (11:00AM - 9:00PM EST)
* Monday to Friday (11:00AM - 7:00PM EST)
* 6 weeks of dedicated new hire training.
* MDDR Security Analysts are expected to complete Sec+ and CySA+ training within their first year.
* Work visa sponsorship is not available.
We invite you to check out our Instagram Page to gain further insight into the Varonis culture!
@VaronisLife
Varonis is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, and other legally protected characteristics
Please review our Notice of E-Verify Participation and our Right to Work Statements.
Auto-Apply