Lead Cyber Security Engineer
Cyber security analyst job in Jonesboro, AR
Cyber & Infrastructure Security Lead (This is a direct hire with our customer, no 3rd party or applicants requiring a visa or on an H1B or student visa) Must be able to reside in Jonesboro, Arkansas
Location: Jonesboro, Arkansas (Full-Time / Onsite)
We're seeking a skilled and experienced Cyber & Infrastructure Security Lead to oversee cybersecurity, infrastructure security, and IT service operations across the organization. This role blends strategic leadership with hands-on execution - perfect for someone who can strengthen enterprise security posture, enhance ITSM processes, and lead incident response with confidence.
Role Overview
The Cyber & Infrastructure Security Lead will manage the full lifecycle of infrastructure and cybersecurity initiatives, including network and cloud security, endpoint protection, risk management, IT Service Management (ITSM) alignment, and Service Desk operations. You'll be the key point of accountability for ensuring operational resilience, compliance, and continuous improvement across all security domains.
Key Responsibilities
Cybersecurity Leadership
Develop and execute security strategies, policies, and standards.
Oversee secure network architectures, firewalls, VPNs, IDS/IPS, and endpoint protection.
Lead incident response, threat detection, and vulnerability management.
Conduct regular risk assessments and ensure compliance with NIST, ISO 27001, and related frameworks.
Manage vendor and third-party security evaluations.
Drive continuous improvement by identifying emerging threats and adopting modern security tools.
IT Service Management (ITSM)
Lead ITSM process integration across Incident, Problem, Change, and Configuration Management.
Ensure IT services are resilient, continuously monitored, and compliant with security standards.
Collaborate with IT teams to align change management and security operations.
Develop SLAs and performance metrics for infrastructure and security incident response.
Service Desk Leadership
Oversee day-to-day Service Desk operations with a focus on secure and efficient incident handling.
Ensure proper escalation, categorization, and prioritization of security-related tickets.
Provide training and awareness programs for service desk teams on security practices.
Maintain documentation and knowledge bases for consistent response and resolution.
Qualifications
Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience).
7-10 years of experience in cybersecurity and infrastructure security, including at least 3-5 years in a leadership role.
Proven experience managing hybrid or cloud environments (AWS, Azure, GCP).
Hands-on familiarity with ITSM frameworks such as ITIL.
Strong communication and leadership skills, with the ability to drive cross-functional initiatives.
Preferred Certifications
CISSP, CEH, CCSP, or similar credentials.
ITIL Foundation or higher certification.
Experience supporting ERP systems such as Epicor Kinetic is a plus.
Ideal Candidate
You're strategic yet hands-on - capable of leading security initiatives, managing cross-functional teams, and making smart, risk-based decisions. You thrive under pressure, communicate clearly, and have a passion for protecting systems and data through strong operational discipline.
Cyber & Infrastructure Security Lead (This is a direct hire with our customer, no 3rd party or applicants requiring a visa or on an H1B or student visa) Must be able to reside in Jonesboro, Arkansas
Cyber Security Engineer
Cyber security analyst job in Knoxville, TN
The Cybersecurity Engineer is responsible for the technical implementation and management of cybersecurity measures. This role involves extensive hands-on work with security technologies, developing and maintaining security protocols, and ensuring the protection of sensitive data. The Cybersecurity Engineer collaborates within the various IT teams to integrate security solutions into business projects and solutions, while supporting overall compliance with HIPAA regulations.
Technical Implementation:
Architect, deploy, and maintain enterprise-grade security technologies, including firewalls, intrusion detection/prevention systems, encryption platforms, and vulnerability management tools.
Implement and support security controls for network infrastructure such as routers, switches, and wireless access points.
Configure, administer, and secure Active Directory and Azure AD environments.
Deploy and oversee endpoint protection platforms and Security Information and Event Management (SIEM) solutions.
Manage Microsoft 365 security capabilities, including conditional access, data loss prevention (DLP), and advanced threat protection.
Evaluate, test, and recommend new security tools, processes, and technologies to strengthen the organization's security posture.
Security Operations:
Continuously monitor systems for security events, investigate alerts, and respond to incidents with appropriate documentation.
Perform ongoing risk assessments and vulnerability scans to identify exposures and drive remediation efforts.
Lead technical response efforts during security incidents or breaches in coordination with the incident response team.
Administer and monitor Identity and Access Management (IAM) systems to ensure secure and appropriate access.
Conduct routine vulnerability assessments and threat analysis to support continual improvement.
Perform digital forensics and incident response activities as needed.
Compliance:
Ensure adherence to HIPAA and all applicable regulatory and security standards.
Design and implement technical safeguards that protect sensitive information and support organizational objectives.
Collaboration:
Partner with IT and business teams to embed security controls into systems, applications, and workflows.
Educate and support staff on cybersecurity awareness, best practices, and evolving threats.
Documentation:
Create and maintain accurate documentation for security configurations, procedures, and incident activity.
Remain informed on current cybersecurity trends and recommend enhancements to existing controls.
Security Audits:
Plan and conduct scheduled and ad-hoc security audits to validate adherence to security policies and standards.
Security Standards and Policies:
Develop, review, and update security policies and standards in alignment with industry best practices and regulatory requirements.
Security Infrastructure Maintenance and Monitoring:
Configure, troubleshoot, and maintain security-related hardware and software.
Implement and manage monitoring tools to detect intrusions and potential security breaches.
Security Strategy Development:
Support the planning, execution, and ongoing refinement of the organization's information security strategy.
Adhere to organizational policies, procedures, and safety standards; complete required training annually; contribute to performance goals and quality improvement initiatives.
Perform additional duties as assigned.
Minimum Education:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related discipline required.
Minimum Experience:
Ten (10) years of overall IT experience, including at least five (5) years of hands-on cybersecurity leadership with demonstrated success designing, engineering, and deploying security solutions in an enterprise environment.
Certifications:
Relevant industry certifications such as CISSP, CISM, CISA, CCSP, CEH, Microsoft Azure Engineer, or equivalent are required.
CI Cyber Threat Analyst
Cyber security analyst job in Springfield, MO
Type of Requisition:
Pipeline
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret/SCI
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Cybersecurity Operations, Cyber Threat Analysis, Security Operations, Threat Analysis
Certifications:
None
Experience:
10 + years of related experience
US Citizenship Required:
Yes
Job Description:
Seize your opportunity to make a personal impact as a CI Cyber Threat Analyst supporting our intelligence customer. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career.
At GDIT, people are our differentiator. As CI Cyber Threat Analyst, you will help ensure today is safe and tomorrow is smarter. Our work depends on a TS/SCI level cleared CI Cyber Threat Analyst joining our team to support our customer.
Duties & Responsibilities:
Produce weekly actionable Technical CI (Cyber/TSCM/TEMPEST) threat reports in collaboration with teammates, the customers partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly threat reports, each report due NLT 0800 each Monday morning. Threats reports will include (as applicable):
Threat data collected and reported by the customers Technical CI team and network security personnel.
Intelligence reported by the Intelligence Community.
Fusion of all source threat analysis derived from multiple intelligence sources (INTS).
Imagery when available.
Information that can be used to inform security decisions.
Produce monthly Technical CI threat reports in collaboration with teammates, the customers partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include:
Compilation of data collected and reported in weekly products.
Intelligence reported by the Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Imagery when available.
Depiction of Technical CI threat (s) to inform security decision makers.
Produce quarterly Technical CI threat reports in collaboration with teammates, the customers partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include:
Compilation of data collected and reported in weekly and monthly products.
Intelligence reported by the Intelligence Community.
Fused all source threat analysis derived from multiple INTs.
Include imagery when available.
Depiction of Technical CI threat (s) to the customer to inform security decisions.
Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, customer partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 December. Threat studies should include:
Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
Raw and finished Intelligence reported by the Intelligence Community.
Fused all source threat analysis derived from multiple INTs.
Include imagery when available.
Analytic judgments, intelligence gaps, and overall technical threat(s) to the customer.
Produce CI Information Reports and IIRs from data collected and reported by either the Technical CI team or the cyber security personnel. Provide a minimum of 6 Reports of Inquiry and/or Requests for Information within Fiscal year. Effective IIR writing requires:
Coordination with teammates and stakeholders to ensure accuracy of reported information.
Cross referencing local information reporting with Intelligence Community reporting.
Clear and concise writing to briefly convey threat.
Responsiveness to Intelligence Community priority collections requirements.
Timeliness.
Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE or Criss Cross).
Provide Technical CI advice and expertise in support of CI inquiries, operations and issues.
Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers.
Provide high-quality, appropriate and objective conclusions from information in a timely manner.
Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
Provide current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats.)
Self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
Have proficiency in use of bottom-line-up-front (BLUF) writing.
Collaborate well internally and externally with IC/Cyber community members.
Coordinate CI Cyber activities originating from Enterprise Incident Response Events.
Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other customer Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission.
Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures.
Skills and Experience:
Required:
11+ years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations.
Meet minimum training requirements, within one calendar year of assignment, for access to DoD networks in accordance with DoDM 8140.03, by attaining and maintaining at least baseline certification for DoDM 8140.03 Information Assurance Technician Level II compliance.
Desired:
Be a credentialed graduate of an accredited federal or DoD CI training academy.
Bachelor's degree in Science, Technology, Engineering or Mathematics disciplines.
Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines.
Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov.
Experience translating Government vision into understandable and achievable measures.
Experience in using supervisory skills to coach teammates to achieve objectives
Monitor and track progress towards achievable measures.
Location: Customer Site
Clearance: Active TS/SCI with ability to obtain CI Poly
US Citizenship Required
The likely salary range for this position is $137,700 - $186,300. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
None
Telecommuting Options:
Onsite
Work Location:
USA VA Springfield
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyCI Cyber Threat Analyst IV
Cyber security analyst job in Saint Louis, MO
Job Description
Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements:
Duties:
Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable):
Threat data collected and reported by NGA Technical CI team and network security personnel.
Intelligence reported by the Intelligence Community.
Fusion of all source threat analysis derived from multiple intelligence sources (INTs).
Imagery when available.
Information that can be used to inform security decisions.
Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include:
Compilation of data collected and reported in weekly products.
Intelligence reported by the Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Imagery when available.
Depiction of Technical CI threat(s) to NGA to inform security decision makers.
Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include:
Compilation of data collected and reported in weekly and monthly products.
Intelligence reported by the Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Include imagery when available.
Depiction of Technical CI threat(s) to NGA to inform security decisions.
Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include:
Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
Raw and finished Intelligence reported by Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Include imagery when available.
Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA.
Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires:
Coordination with teammates and stakeholders to ensure accuracy of reported information.
Cross referencing local information reporting with Intelligence Community reporting.
Clear and concise writing to briefly convey threat.
Responsiveness to Intelligence Community priority collections requirements.
Timeliness.
Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross).
Provide Technical CI advise and expertise in support of CI inquiries, operations and issues.
Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers.
Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats).
Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
Display an ability to collaborate with internal NGA and external IC/Cyber community members.
Coordinate CI Cyber activities originating from Enterprise Incident Response Events.
Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission.
Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures.
Skills and Experience Required:
Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations.
Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level.
Desired:
Be a credentialed graduate of an accredited federal or DoD CI training academy.
Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines.
Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines.
Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov.
Experience translating Government vision into understandable and achievable measures.
Experience in using supervisory skills to coach teammates to achieve objectives.
Monitor and track progress toward achievable measures.
Cyber Security Analyst Tier 3
Cyber security analyst job in Saint Louis, MO
Freedom Technology Solutions Groups is looking to add a Tier 3 Cyber Security Analyst to the team. The candidate will provide CSOC Tier 3 services, which is 24x7x365 coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. When a CIRT is stood up, all contractors in support of CSOC Tier 3 services will be under the direct control of, and take direction from, the Government CIRT Commander. While not in a period of incident response, the Contractor shall conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber-incident. All Contractor personnel performing CSOC Tier 3 services shall have or obtain, within six months of start, a certification that is compliant with DoDD 8140.01 and DoD 8570.01-M IAT Level III and CSSP Incident Responder.
Job Duties:
Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cyber security incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government.
Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter intelligence personnel as required to perform advanced investigation and triage of incidents;
Collaborates with appropriate authorities in the production of security incident reports;
Categorizes incidents and events;
Coordinates with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated;
Coordinates with other contracts, organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events;
Coordinates with other contracts, organizations, activities, and services to ensure NGA recovers from an incident/event;
Builds timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions.
Documents actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken and analysis are capable of being systematically reconstructed.
Develops and when approved by the Government generates and updates reports in the Joint Incident Management System (JIMS), Incident Case Management System (ICMS), and/or other authorized reporting systems as directed;
Develops, maintains, sustains, and when properly authorized by the Government executes custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events;
Performs digital media analysis on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis;
Develops and identifies indicators of compromise to send to Cybersecurity stakeholders and other Contract Services;
Provides adversary attribution;
Performs malware analysis and signature development;
Coordinate with CSOC Tier 1 and 2 services to remediate all discrepancies and provide recommendations to prevent reoccurrence.
Job Requirements:
Bachelors Degree and or 6 years' experience in Cyber Security (CSOS)
Active security clearance.
DoDD 8140.01 and DoD 8570.01-M IAT Level II and CSSP Incident Responder. Provides input to and coordinates with all applicable stakeholders to develop and deliver the daily CSOC Significant Activity Report, the daily CSOC Operations Update, and the Weekly CSOC Status Report;
Serve as C-IRT members as required and serve under the direct control of, and take direction from, the Government C-IRT Commander;
Develop and coordinate courses of action with various Government and contract stakeholders, and when properly authorized by the Government, execute Defensive Cyberspace Operations-Internal Defensive Measures on behalf of the NGA on NGA networks and systems;
Performs digital media analysis and malware reverse engineering on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis.
When properly authorized by the Government, execute custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events;
Develops, documents, and provides to the Government incident investigation reports which include sufficient information to document the entire lifecycle of the incident and the response, including but not limited to adversary and friendly forces activity, host and network analysis, timelines, and recommendations for corrective actions, recommendations for new Tactics, Techniques, and Procedures (TTP) and other recommendations as appropriate, within 30 days of C-IRT stand-down;
Conduct Quality Control reviews of a percentage closed CSOC Tier 2 tickets each week to ensure proper analysis, categorization, documentation, and notification
Preferred Qualifications:
Masters degree
IAT III
Qualifications that are nice to have:
Juniper certification
What's in It for You? Flexible work environment A team mentality - work with friendly, like-minded professionals Work with innovative, cutting edge technologies Enjoy extremely competitive compensation and benefits A work-life balance you can count on Opportunities to grow and advance your career on our dime The Benefits You Get with Freedom Amazing benefits including matching 401k, fully paid medical, and more Generous paid time off - including paid site closure days Competitive salary offerings Paid training and tuition reimbursement Referral bonuses Fully paid life and disability Annual logo wear allowance Company sponsored events (game nights, holiday party, summer party, happy hours) Interested in learning more about Freedom and our culture? Contact us today! We're constantly hosting hiring events in our office and elsewhere, to help you get a sense of what life is like at Freedom before joining the team. As an Equal Opportunity Employer, we do not discriminate on the basis of race, color, religion, sex, age, marital status, disability or veteran status Applicant Federal & E-Verify Postings VEVRAA Federal Contractor Accessibility: If you need an accommodation as part of the employment process, please contact Human Resources at Phone: ************ Email: ********************* Equal Opportunity Employer, including disabled and veterans. If you want to view the EEO Law poster, please choose your language: English - Spanish - Arabic - Chinese If you want to view the EEO Law Supplement poster, please choose your language: English - Spanish - Chinese If you want to view the Pay Transparency Policy Statement, please click the link: English
Auto-ApplyCyber Security Vulnerability Analyst
Cyber security analyst job in Oak Ridge, TN
Job DescriptionEast Tennessee company is seeking a Cyber Security Vulnerability Analyst to perform defensive cyber operational tasks, respond to reported incidents, and track remediation of client system vulnerabilities to include industrial control systems. The ideal candidate will be an experienced analyst with a strong background in addressing network vulnerabilities and conducting incident response activities.
This is a full-time, hybrid position that will work onsite in Oak Ridge, TN 2-3 days each week.
Job Responsibilities:
• Join the Defensive Cyber Operations Group's multi-disciplinary team in responding to advanced Cyber threats from targeted phishing to network-based threats, ransomware, and APT-level activity in a Tier 2 role.
• Mentor the DCO's junior staff, developing their technical and incident resolution skills.
• Participate in incident response activities involving multiple teams and functions.
• Serve as primary coordinator for ORNL response to federal Binding Operational Directives and data calls.
• Leverage internal and external vulnerability scanning scan data to maintain a comprehensive view of ORNL's threat profile and risk status.
• Automate key DCO functions using Tines technology
• Partner with Emerging Threat team to remediate extant vulnerabilities identified by their intelligence activities.
• Maintain strong collaborative and data sharing relationships with DOE headquarters Cyber units, other DOE laboratories, and external entities.
• Leverage EDR, SIEM, IDS, and PCAP tools to identify and investigate cyber threats.
• Assist users with the creation, monitoring, and evaluation of policy and device exceptions.
• Assist in training and awareness activities to ensure ORNL staff are aware of Cyber Security responsibilities and requirements.
• Partner with Cyber Industrial Control System Engineers to monitor the lab's ICS enclaves for operational and security issues
Candidates must be able to obtain a federal security clearance so US citizenship is required.
Information Security Specialist
Cyber security analyst job in Kansas City, MO
CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future.
This role is responsible for modernizing the methods and procedures for performing cybersecurity risk management and assessing cybersecurity risk. This involves assessing the current approach, data, and tools to identify gaps and enhancements. It requires strong partnerships with key stakeholders and business leaders, conveying cyber risk to them in a way that allows them to make risk informed decisions and improve the Organization's security posture.
Important Information
Open to US Citizens, Green Card holders or Permanent Residents with at least 3 years of residency.
No sponsorship is available. Candidates must have valid work authorization, without an end date to be considered. No H1-B, OPT, STEM OPT, CPT, TN, J-1, etc.
This position requires working on-site with 5 days per month remote work flexibility.
Key Activities
Risk Assessment & Analysis
Modernize the current approach to cybersecurity risk management and assessments.
Research and evaluate methodologies and frameworks and subsequently apply them for use in the organization.
Identify and implement risk quantification and scoring approaches within the organization.
Perform in-depth data analysis to identify patterns, trends, and areas of focus and priority.
Incorporate threat intelligence into risk assessments to provide context-aware risk evaluations.
Conduct business impact analyses to understand how security incidents affect critical business functions.
Evaluate and quantify risks associated with third-party vendors and supply chain.
Assess specific risks related to cloud environments and services.
Program Development
Develop reports and dashboards to illustrate the organization's risk posture.
Ensure that cybersecurity risk is integrated with IT risk, and informs overall Enterprise risk.
Research and identify options to establish a risk register.
Develop and track risk treatment plans including mitigation strategies, acceptance justifications, or transfer options.
Map cybersecurity risks to relevant regulatory requirements and compliance frameworks.
Continuously improve risk management processes based on industry trends and organizational needs.
Communication & Collaboration
Meet with technical experts and business leaders to convey cybersecurity risk in a way they can understand.
Partner with incident response teams to incorporate lessons learned into risk models.
Translate complex technical risk scenarios into actionable insights for all levels of the organization.
Qualifications
Experience
Typically requires at least 6 years of relevant cybersecurity risk management experience.
Experience with risk scoring methods and risk quantification.
Experience with generating reports and dashboards to convey cybersecurity risk in a way that is easy to consume.
Experience establishing or running an Enterprise cybersecurity risk management program.
Experience with NIST SP 800-53 security standards.
Experience presenting risk information to executive leadership.
Education & Certifications
Bachelor's degree specializing in an information technology field from an accredited college or university, or equivalent combination of directly related education and/or experience.
Information Security industry certification (SSCP, CISSP, GIAC, CISM, CISA, etc.) preferred.
Technical Knowledge
Strong knowledge of and experience applying cybersecurity risk frameworks and assessment methodologies; examples may include Factor Analysis of Information Risk (FAIR), NIST Cybersecurity Framework (CSF).
Strong skills and experience with data analysis.
Experience with GRC (Governance, Risk, and Compliance) tools.
Knowledge of business impact analysis methodologies.
Familiarity with cloud security frameworks (CCSK, CCSP).
Skills & Abilities
Ability to understand technical details of cybersecurity risk.
Ability to communicate complicated technical risk scenarios to all levels of the organization.
Demonstrated self-motivation and ability to perform work independently, and also collaborate in a team environment.
Additional Information
How We Work (HWW):
On-site: 5 days per month remote work flexibility
Location: Kansas City, Denver, Oklahoma City, Omaha
Remote Eligible: No
Salary:
$98,600 - $139,000 / Senior Level
$117,300 - $165,400 / Advanced Level
Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location.
Screening: US Citizens or Green Card holders and Permanent Residents with at least 3 years of residency. This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and could take up to a couple of months to complete. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks.
Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future.
About Us
Total Rewards & Benefits
Who We Are
What We Do
Follow us on
LinkedIn
, Instagram,
X (formerly Twitter)
, and
YouTube
#KCFedIT
Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America)
The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels.
Privacy Notice
Auto-ApplyTemporary- Cyber Security Analyst
Cyber security analyst job in Nashville, TN
Title: Temporary - Cyber Security Analyst
Under the directive of the Information Security Officer, the cyber security analyst will implement security strategies and best practices in accordance with regulatory standards.
ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES
Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned.
REQUIRED QUALIFICATIONS
High School Diploma or GED
One year of experience in information security and compliance regulations.
Proficiency with Microsoft applications.
PREFERRED QUALIFICATIONS
Certificate in information security, i.e., Security+, Pen+, Ethical Hacker.
Experience with SIEM (Microsoft Defender).
Experience in phishing campaign/training.
KNOWLEDGE, SKILLS AND ABILITIES
Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of Information Security Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels.
Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures.
Open Until Filled: Yes
Rate of Pay: $20.00 per hour
Work Hours: Up to 28 hours per week
Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check.
Nashville State offers flexible work arrangements for positions that qualify.
Cyber Resilience Specialist
Cyber security analyst job in Kansas City, MO
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery.
What You'll Do
* Lead and facilitate Business Impact Assessments (BIAs) across business units
* Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems
* Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience
* Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles
* Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews
* Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations
* Support program governance, metrics, training, and awareness efforts
What You'll Bring
* 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting
* Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning
* Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms)
* Experience supporting risk assessments and regulatory audits
* Excellent facilitation and stakeholder management skills
* Strong writing skills to produce clear, client-ready plans and reports
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************.
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
#LI-MS12
Easy ApplyIT Cyber Security Specialist
Cyber security analyst job in Stanton, TN
IT Cyber Security Specialist- Battery Manufacturing Introduction to BlueOval SK At BlueOval SK, we will lead the transformation of the electric vehicle (EV) battery business through partnership (Joint Venture formed by Ford and SK On) to provide products and processes to increase our customers' experience. As the future of BlueOval SK, you will help lead the battery revolution by working alongside our teams as we build the batteries required for electric vehicle business excellence.
Ford and SK On are investing billions in Kentucky and Tennessee including building three state-of-the art battery manufacturing facilities between the two campuses at BlueOval City in Tennessee and Blue Oval SK Battery Park in Kentucky. These brand-new advanced manufacturing facilities will use Ford's 100-years of automobile manufacturing expertise and SK On's 30+ years of electric vehicle battery expertise to become the world's best battery manufacturer.
The IT Cyber Security Specialist at Blue Oval SK - Blue Oval City in Stanton, Tennessee will work as a part of a team to protect important information assets from cyber-attacks and maintain sensitive and confidential information.
Key Areas of Responsibility:
* Safeguards information system assets by identifying and solving potential and actual security problems.
* Protects system by defining access privileges, control structures, and resources.
* Recognizes problems by identifying abnormalities; reporting violations.
* Implements security improvements by assessing current situation; evaluating trends; anticipating requirements.
* Determines security violations and inefficiencies by conducting period audits.
* Upgrades system by implementing and maintaining security controls.
* Keeps users informed by preparing performance reports; community system status.
* Maintains quality service by following organization standards.
* Maintains technical knowledge by attending educational workshops; reviewing publications.
* Contributes to team effort by accomplishing related results as needed.
* Security systems operation/management
* Security systems trouble shooting
* Test new security IT system.
* Install security system.
* Maintain security IT system
* Basic knowledge of cyber security
* Knowledge of networking fundamentals (TCP/IP, Network Layers, etc.)
* Knowledge of windows and Linux command skill
Minimum Requirements
* Bachelor's degree in computer science or closely related field
* 3 + years direct hands-on experience with incident management and response
* Proficiency in problem-solving, analytical thinking, and penetration testing methodologies
* Advanced certifications such as SANS GIAC/GCIA/GCIH, CISSP or CASP and / or SIEM - specific training and certification.
* Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.
* Hands-on experience analyzing high volumes of logs, network data (e.g. netflow, FPC), and other attack artifacts in support of incident investigations
* Experience with vulnerability scanning solutions
* Proficiency with any of the following; Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security.
* In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Nitro/McAfee Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk).
* Experience developing and deploying signatures (e.g. YARA, Snort, Suricata, HIPS)
* Understanding of mobile technology and OS (i.e. Android, iOS, Windows), VMware technology, and Unix and basic Unix commands.
* Experience in IT security solution operation
* Experience in IT Network operation
* Experience in operating endpoint security solutions.
Preferred Qualifications
* Bachelor's degree in Computer Science or cybersecurity related field.
* Master's degree in cybersecurity, or related field is a plus.
* Holds certifications such as: CISSP, CISA, ISO 27001
* Up to date on current cybersecurity trends, threat landscape and security solutions.
About BlueOval SK
At BlueOval SK, we will lead the transformation of the electric vehicle (EV) battery business through partnership (Joint Venture formed by Ford and SK On) to provide products and processes to increase our customers' experience. As the future of BlueOval SK, you will help lead the battery revolution by working alongside our teams as we build the batteries required for electric vehicle business excellence. We have a wide variety of opportunities for you to accelerate your career.
The Opportunity
Ford and SK On are investing billions in Kentucky and Tennessee including building three state-of-the art battery manufacturing facilities between the two campuses at BlueOval City in Tennessee and BlueOval SK Battery Park in Kentucky. These brand-new advanced manufacturing facilities will use Ford's 100-years of automobile manufacturing expertise and SK On's 30+ years of electric vehicle battery expertise to become the world's best battery manufacturer.
For more information about BlueOval SK plans, please Follow this link.
What you'll receive in return:
As part of the BlueOval SK family, you'll enjoy excellent compensation and a comprehensive benefits package that includes generous paid time off (PTO), retirement contributions, incentive compensation and much more. You'll also experience exciting opportunities for professional and personal growth and recognition. If you have what it takes to help us lead the transformation of the EV battery business, we'd love to have you join us.
Benefits Include:
* 401k plan with retirement planning services
* 401k company matching after completing three months of service
* Medical and prescription drug coverage
* Dental and vision coverage
* Preventative Care
* Eligibility for great ancillary benefits including: Flexible Spending Accounts (FSAs), Short-Term Disability (STD) and Long-Term Disability (LTD), Employee Basic Life and Accidental Death Dismemberment (AD&D) insurance, and Employee Supplemental Life Insurance
* Access to Paid Time Off (PTO) after completing probationary period and Emergency PTO
* Parental Leave
* Access to Ford Vehicle Discount Program
* Climate-controlled working environment
* For a full list of benefits, visit our website:
* ************************************
Candidates for positions with BlueOval SK must be legally authorized to work in the United States. BlueOval SK does not sponsor employment VISAs for candidates at this time. Verification of employment eligibility will be required at the time of hire.
We are an Equal Opportunity Employer committed to a culturally diverse workforce. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status.
Auto-ApplyIT Cyber Security Specialist
Cyber security analyst job in Stanton, TN
IT Cyber Security Specialist- Battery Manufacturing
Introduction to BlueOval SK
At BlueOval SK, we will lead the transformation of the electric vehicle (EV) battery business through partnership (Joint Venture formed by Ford and SK On) to provide products and processes to increase our customers' experience. As the future of BlueOval SK, you will help lead the battery revolution by working alongside our teams as we build the batteries required for electric vehicle business excellence.
Ford and SK On are investing billions in Kentucky and Tennessee including building three state-of-the art battery manufacturing facilities between the two campuses at BlueOval City in Tennessee and Blue Oval SK Battery Park in Kentucky. These brand-new advanced manufacturing facilities will use Ford's 100-years of automobile manufacturing expertise and SK On's 30+ years of electric vehicle battery expertise to become the world's best battery manufacturer.
The IT Cyber Security Specialist at Blue Oval SK - Blue Oval City in Stanton, Tennessee will work as a part of a team to protect important information assets from cyber-attacks and maintain sensitive and confidential information.
Key Areas of Responsibility:
Safeguards information system assets by identifying and solving potential and actual security problems.
Protects system by defining access privileges, control structures, and resources.
Recognizes problems by identifying abnormalities; reporting violations.
Implements security improvements by assessing current situation; evaluating trends; anticipating requirements.
Determines security violations and inefficiencies by conducting period audits.
Upgrades system by implementing and maintaining security controls.
Keeps users informed by preparing performance reports; community system status.
Maintains quality service by following organization standards.
Maintains technical knowledge by attending educational workshops; reviewing publications.
Contributes to team effort by accomplishing related results as needed.
Security systems operation/management
Security systems trouble shooting
Test new security IT system.
Install security system.
Maintain security IT system
Basic knowledge of cyber security
Knowledge of networking fundamentals (TCP/IP, Network Layers, etc.)
Knowledge of windows and Linux command skill
Minimum Requirements
Bachelor's degree in computer science or closely related field
3 + years direct hands-on experience with incident management and response
Proficiency in problem-solving, analytical thinking, and penetration testing methodologies
Advanced certifications such as SANS GIAC/GCIA/GCIH, CISSP or CASP and / or SIEM - specific training and certification.
Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.
Hands-on experience analyzing high volumes of logs, network data (e.g. netflow, FPC), and other attack artifacts in support of incident investigations
Experience with vulnerability scanning solutions
Proficiency with any of the following; Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security.
In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Nitro/McAfee Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk).
Experience developing and deploying signatures (e.g. YARA, Snort, Suricata, HIPS)
Understanding of mobile technology and OS (i.e. Android, iOS, Windows), VMware technology, and Unix and basic Unix commands.
Experience in IT security solution operation
Experience in IT Network operation
Experience in operating endpoint security solutions.
Preferred Qualifications
Bachelor's degree in Computer Science or cybersecurity related field.
Master's degree in cybersecurity, or related field is a plus.
Holds certifications such as: CISSP, CISA, ISO 27001
Up to date on current cybersecurity trends, threat landscape and security solutions.
About BlueOval SK
At BlueOval SK, we will lead the transformation of the electric vehicle (EV) battery business through partnership (Joint Venture formed by Ford and SK On) to provide products and processes to increase our customers' experience. As the future of BlueOval SK, you will help lead the battery revolution by working alongside our teams as we build the batteries required for electric vehicle business excellence. We have a wide variety of opportunities for you to accelerate your career.
The Opportunity
Ford and SK On are investing billions in Kentucky and Tennessee including building three state-of-the art battery manufacturing facilities between the two campuses at BlueOval City in Tennessee and BlueOval SK Battery Park in Kentucky. These brand-new advanced manufacturing facilities will use Ford's 100-years of automobile manufacturing expertise and SK On's 30+ years of electric vehicle battery expertise to become the world's best battery manufacturer.
For more information about BlueOval SK plans, please Follow this link.
What you'll receive in return:
As part of the BlueOval SK family, you'll enjoy excellent compensation and a comprehensive benefits package that includes generous paid time off (PTO), retirement contributions, incentive compensation and much more. You'll also experience exciting opportunities for professional and personal growth and recognition. If you have what it takes to help us lead the transformation of the EV battery business, we'd love to have you join us.
Benefits include:
401k plan with retirement planning services
401k company matching after completing three months of service
Medical and prescription drug coverage
Dental and vision coverage
Preventative Care
Eligibility for great ancillary benefits including: Flexible Spending Accounts (FSAs), Short-Term Disability (STD) and Long-Term Disability (LTD), Employee Basic Life and Accidental Death Dismemberment (AD&D) insurance, and Employee Supplemental Life Insurance
Access to Paid Time Off (PTO) after completing probationary period and Emergency PTO
Parental Leave
Access to Ford Vehicle Discount Program
Climate-controlled working environment
For a full list of benefits, visit our website:
************************************
Candidates for positions with BlueOval SK must be legally authorized to work in the United States. BlueOval SK does not sponsor employment VISAs for candidates at this time. Verification of employment eligibility will be required at the time of hire.
We are an Equal Opportunity Employer committed to a culturally diverse workforce. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status.
Auto-ApplyPhysical Security Systems Engineer
Cyber security analyst job in Memphis, TN
xAI's mission is to create AI systems that can accurately understand the universe and aid humanity in its pursuit of knowledge. Our team is small, highly motivated, and focused on engineering excellence. This organization is for individuals who appreciate challenging themselves and thrive on curiosity. We operate with a flat organizational structure. All employees are expected to be hands-on and to contribute directly to the company's mission. Leadership is given to those who show initiative and consistently deliver excellence. Work ethic and strong prioritization skills are important. All engineers are expected to have strong communication skills. They should be able to concisely and accurately share knowledge with their teammates.
About the Role
As a Physical Security Systems Engineer at xAI, you'll design, implement, and maintain advanced security systems to safeguard our facilities, assets, and personnel. Working onsite in Memphis, Tennessee, you'll tackle complex challenges, leveraging your deep expertise in security technologies to strengthen our infrastructure at a fast-scaling company. Expect to dive into system optimization, ensure robust protection, and travel regularly to xAI sites to support our mission of accelerating human scientific discovery through AI.
This is an in-person role based in Memphis, Tennessee, with regular travel required to all xAI sites.
Responsibilities
Develop detailed design plans for the installation of physical security systems including access control, surveillance cameras, intrusion detection, and alarm systems.
Collaborate with InfoSec, IT and facility management teams to integrate security hardware with existing systems across locations.
Manage health and configuration of security network infrastructure
Regularly assess the performance of installed security systems and make necessary adjustments or upgrades.
Conduct preventive maintenance to ensure all security equipment is in optimal working condition.
Diagnose and resolve hardware issues promptly to minimize downtime and security risks.
Keep detailed records of all service and maintenance activities.
Participate in or lead security audits to identify vulnerabilities in physical security measures.
Recommend and implement solutions to address identified security gaps.
Liaise with vendors for procurement of security hardware, ensuring compliance with organizational standards and budget constraints.
Manage relationships with external contractors for installation and maintenance services.
Train security and facility staff on the use of new security systems.
Ensure all security hardware installations meet local, state, and federal regulations.
Maintain up-to-date documentation on system configurations, maintenance schedules, and security incident responses.
Required Qualifications
Minimum of 5 years in a role focused on physical security systems design.
Proven experience with CCTV, access control, and intrusion detection systems.
Experience using CAD software and reading architectural drawings
Experience using Bluebeam software
Preferred Qualifications
Bachelor's degree in Electrical Engineering, Computer Science, or related field; or equivalent experience in security systems.
Ability to interpret security objectives, develop project schedules and manage adherence to established timetables.
Familiarity with Genetec software is a plus.
Proficiency in hardware troubleshooting and system diagnostics.
Experience configuring security and network architecture in integrated security systems.
Familiarity with current security technology trends and innovations.
Certifications such as CPP (Certified Protection Professional) or PSP (Physical Security Professional) are highly desirable.
Excellent problem-solving abilities and attention to detail.
Strong communication skills for effective collaboration with team members and stakeholders.
Ability to work under pressure in a dynamic environment on highly condensed timelines.
Regular sitting at a desk or computer for extended periods, typing and writing. Occasionally walking, around the facility and standing.
xAI is an equal opportunity employer.
California Consumer Privacy Act (CCPA) Notice
Network/Security Operations Center Analyst (17591)
Cyber security analyst job in Oak Ridge, TN
Job Title: Network/Security Operations Center Analyst Career Level From: Associate Career Level To: Senior Associate Job Specialty: Network Administration What You'll Do NOC/SOC serves as the first line of defense against network disruptions and cybersecurity threats. We serve a critical function in the organization to identify, investigate and resolve issues while minimizing the business impact. We are looking for a positive attitude, esprit de corps, and skills to join our team.
Due to the sensitive nature of this position, NOC/SOC Analysts must work in an office environment 100% of the time.
Job Specific Responsibilities:
Network Operations Center / Security Operations Center (NOC / SOC) Analysts are hard charging, analytical thinkers who enjoy solving problems. We thrive in a high-pressure environment with shifting priorities. NOC / SOC Analysts are able to assess a situation, determine tactical steps forward, and can implement a strategic plan. We support multiple technical teams in a 24 x 7 x 365 operational environment with high uptime requirements. In addition to these general skills and personality traits, CNS is seeking candidates with the following skills.
Core Skills & Job Requirements:
* Interact positively with peers, other departments, internal / external customers, and vendors to identify operational issues
* Prolonged or irregular hours required - 12 hour rotating shifts (compensated by shift differential pay)
* On-site requirement to support the network and cyber infrastructure
* Collecting and reviewing performance reports for various systems, and reporting trends in performance to senior technical personnel to help them predict future issues or outages
* Strong ability to diagnose server or network alerts, events or issues
* General understanding of TCP/IP Networking and Server infrastructure
* Understanding of common information architecture frameworks
* General understanding and/or experience with Information Security and Incident Response
* Understanding of Disaster Recovery plans and related technologies
* General understanding of common firewalls
* Excellent time management and organizational skills, and ability to handle multiple concurrent tasks and projects with minimal supervision
* Good oral and written communication skills, and ability to address conflict with others constructively
* Cross-team coordination and collaboration
What You Can Expect
* Meaningful work and unique opportunities to support missions vital to national and global security
* Top-notch, dedicated colleagues
* Generous pay and benefits with a stable organization
* Career advancement and professional development programs
* Work-life balance fostered through flexible work options and wellness initiatives
Minimum Job Requirements
* Bachelor's degree in engineering/science/information technology discipline
* OR Eight or more years of relevant education, training, and/or progressive experience may be considered to satisfy educational and years-of-experience requirements for this posting
Preferred Job Requirements
* Prior helpdesk and/or field support experience
* Prior NOC / SOC experience
* Security Incident and Event Management (SIEM)
* Common Intrusion Detection/Prevention Systems (IDS/IPS) (Snort, Cisco, FortiGate, Firepower)
* Experience with Disaster Recovery plans and related technologies
* Server hardware experience (e.g., Cisco UCS, and HP blade systems)
* Server Administration experience with Linux and/or Windows
* Prior Server / Network Administration experience
* Experience working in a large, geographically distributed environments
* Experience with SolarWinds, System Center Operations Manager, or other monitoring tools
* Operational analysis and development skills, such as scripting, to deploy DevOps solutions
* Knowledge of packet analysis and packet capture tools
* Working knowledge of large network and server infrastructures
* Experience with Penetration Testing or similar training environments
* Preferred certifications: Network+ and/or Security+, SPLUNK
Why Y-12?
You get #morethanajob. We encourage employees to achieve a healthy personal balance among home, work and the community. One of the ways we embrace work-life balance is by offering flexible work arrangements that provide alternatives to the traditional workweek, while still meeting business needs. Top talent and personal commitment mean more to our success than any other factors, so we reward our people with the kinds of benefits that make a positive difference in the quality of their lives. Benefits such as: medical plan, prescription drug plan, vision plan, dental plan, employer matched 401(k) savings plan, disability coverage, education reimbursement and many more. Want to stay healthy and fit but hate the cost of a gym membership? Take advantage of one of our onsite workout facilities and eat healthy in our onsite cafeterias. Much more than a workplace, at Y-12, you can build a career that lasts a lifetime.
Notes
The minimum education and experience for the lowest career level in the job posting range are listed under Minimum Job Requirements. Successful candidates hired into a higher career level than the minimum in the range must meet the requirements listed in the job leveling charts for the career level into which they are being hired.
If a range of Career Levels is posted, i.e., Senior Associate to Senior Specialist, internal applicants already in one of the Career Levels would come across at their current Career Level. Internal applicants currently in a lower level Career Level would move to the lowest posted Career Level.
Requires a Q clearance; however all qualified candidates will be considered regardless of their current clearance status. The ability to obtain and maintain a Department of Energy Q clearance is required.
This position may require entry into the Material Access Areas (MAA) and participation in the Human Reliability Program (10 C.F.R. Part 712), which requires successful competition of a DOE counterintelligence evaluation and may include a counterintelligence-scope polygraph examination.
This position may be categorized as a "designated position" identified by 10 C.F.R. Part 709, requiring successful completion of a DOE counterintelligence evaluation that may include a counterintelligence-scope polygraph examination.
CNS is a drug-free workplace. Candidates accepting a job offer will be required to pass a pre-placement physical, drug screening and background investigation. As an employee, you may be required to receive and maintain a security clearance from the United States Department of Energy in order to meet eligibility requirements for access to sensitive information or matter. U.S. citizenship is a requirement for security clearance applicants. All employees are subject to being randomly selected for drug testing without advance notification.
CNS is an equal opportunity employer. All qualified applicants will receive consideration for employment based on merit and without regard to race, color, religion, sex, sexual orientation, national origin, protected veteran status or disability.
Senior Security Analyst-Application
Cyber security analyst job in Ridgeland, MS
Are you looking for a great team environment? Southern Farm Bureau Casualty Insurance Company is currently seeking a Senior Security Analyst-Application.
Southern Farm Bureau is a great company and an excellent place to work. The Company offers a family-oriented work environment and a rich benefit package including paid time off, company matched 401(k), pension/retirement, medical, dental, vision, group life, accidental death and dismemberment, employee assistance program, a continued education program, and a hybrid home/office work schedule. This position is located in Ridgeland, MS.
Under limited supervision, responsible for comprehensive range of tasks, including everyday management of information security tools and devices, along with responsibilities for information security administration of a wide diversity of Farm Bureau IT systems. This position will have a primary focus on Application Security. This position is charged with ensuring the integrity and security of applications deployed or being developed at our organization. This position will serve as the bridge between the development team(s) and the security team.
Essential Functions
•
Perform and/or assist with internal application security assessments as needed.
•
Scan web applications for vulnerabilities and exploits & work with other staff members to remediate issues.
•
Work closely with developers to ensure that security is an integral part of the software development lifecycle
•
Coordinate and work closely with 3rd party testing teams performing application assessments.
•
Develop application security training documentation.
•
Develop the security components of application project plans in coordination with developers and other business units/departments
•
Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
•
Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
•
May assist in training and development of other personnel when and where required.
•
Enterprise Risk Management (ERM) risk ownership responsibilities to be conducted as assigned.
Additional Responsibilities
•
Additional hours and on call may be required.
•
Other duties and responsibilities as assigned.
•
Regular and predictable attendance is required.
Education Level
Education Details
Req
Pref
Bachelor's Degree
Majoring in Computer Science, Management Information Systems, or related field
X
And
Other
Certifications: CISSP, SSCP, Security+, CEH, CISA or CISM in good standing
X
Sr. Security Engineer
Cyber security analyst job in Memphis, TN
Our client, a large international Information Security Consulting organization, has asked to find a Senior-Level security expert to lead a major SIEM migration. This is a highly visible role with mission critical responsibilities because you will play an integral part of a major multi-year SOC transformation. STRONG SPLUNK UNDERSTANDING IS CRITICAL FOR THIS ROLE.
Responsibilities of the SIEM Security Engineer:
· Architect and manage SIEM technologies, specifically with ArcSight
· Lead a s major SIEM migration into a Splunk environment (complete data migration).
· Develop, tune, and maintain tools to automate analysis capabilities with host and log-based security event analysis
· optimize event ingestion, reporting and alerting
· Create signatures, rule sets, and content analysis definitions for a variety of security detection capabilities
· Manage project tasks, reporting, and customer meetings
Requirements
Requirements of the SIEM Security Engineer:
· Splunk Web Framework (reports/dashboards/etc.)
· Command line and console-based troubleshooting
· Custom parser creation for events in Syslog, ODBC, ad flat file formats
· Splunk App creation and scripting experience (Python)
· Relevant certifications such as CCNP, CCNA, SANS, CISSP, etc.
· Experience supporting large scale SIEM migrations and project task management
· Expert level knowledge of installing, deploying, documenting, and troubleshooting network perimeter security technologies such as firewalls, proxy servers, intrusion prevention/detection (IDS/IPS), antivirus, antimalware, anti-spam and unified threat management (UTM).
· A solid understanding of networking/distributed computing environment concepts; understands principles of routing, client/server programming, the design of consistent network-wide file system layouts.
Benefits A full and competitive benefits package is available with this role.
Information Security Specialist
Cyber security analyst job in Saint Louis, MO
Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers.
Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations.
For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US.
Job Description
Responsibilities:
Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios.
Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization
Qualifications
Required Skills/Experience
• 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role
• Knowledge of quantitative and qualitative risk evaluation methods
• An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance
• Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
• An ability to effectively influence others to modify their opinions, plans, or behaviors
• An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
• Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part
• An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization
• Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement
Additional Information
To set up an inerview for this position, feel free to contact:
Imran Malek
************
*******************************
Easy ApplyAnalyst, Information Security
Cyber security analyst job in Maryville, TN
Build an Aviation Career You're Proud Of
At StandardAero, we use our ingenuity and know-how to find solutions for the simple to the most complex challenges in aviation. Together, we get the job done and done well. Our stability, resources, and respectful culture supports you in building a solid career with a great team you can count on day in and day out for the long term.
Summary:
As an IT Security Analyst position is a critical role in protecting StandardAero's business and technology operations. In this role you will be accountable in securing the enterprise technology and operations against an ever evolving and growing threat landscape. The role is an integral position in supporting StandardAero's global cyber-security defenses, providing tactical cyber security objectives and implementing the security strategy across the organization.
What you'll do:
Conduct risk and security assessments through vulnerability analysis and reporting
Perform mitigation support for both internal and external security audits
Investigate, analyze and document security incidents to identify and document the root cause
Provides incident response support including mitigating actions to contain activity and facilitating forensics analysis when necessary
Partner with IT Operation teams to remediate system vulnerabilities
Participates in the production of documentation and management reporting
Research security enhancements and make recommendations for improved policy and process
Analyze IT requirements and provide objective advice on the use of new IT security offerings
Stay up-to-date on information technology and cybersecurity trends and standards
Other IT Security-related duties as required
Capable of identifying, evaluating and mitigating significant risks within an enterprise.
Strong working experience with Microsoft Office Suite.
Strong oral and written communication skills and the ability to work well with people from many different disciplines with varying degrees of technical experience.
Possess strong analytical skills attention to detail.
Ability to prioritize assignments while working on multiple projects
Ability to work independently and proactively to meet assigned objectives
Flexible with the ability to multi-task, effectively prioritize and work under pressure
Basic project management
Design, implement, administer, support and maintain cybersecurity technology systems (Endpoint Protection, IDS/IPS, Web and Email Security, SIEM, Multi-Factor Authentication, Network Access Controls, DLP, etc.)
Analyze, report and respond to security alerts within the various IT technologies and global locations
Proactively remediate information technology security threats as a member of the security team
Assist in the designing, documenting, architecting and implementing IT security measures and controls
Provide support through ‘Threat Hunting' against anomalous behavior within the enterprise. Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity
Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources
Threat mitigation; malicious code detection, response and prevention; operating system security oversight
Minimum Qualifications:
Bachelor's degree in Information Security, Computer Science, or a related field; equivalent experience may be considered.
5+ years of progressive experience in cybersecurity and IT, including hands-on security operations, threat detection, or engineering.
5+ years of experience in SIEM Administration, endpoint protection, vulnerability management tools, and security automation.
5+ years of experience of network and application security, threat actor tactics (MITRE ATT&CK), and incident response frameworks.
5+ years of experience working in regulated environments or with industry frameworks (e.g., NIST, ISO 27001, CIS, or CMMC).
Preferred Qualifications:
IT Security Certification, specifically GSEC, CEH, CISSO, CISA or CISSP, GCIA, OSCP and ITIL
SDLC, and understand application security.
Containerization and Development Security Operations
Benefits that make life better:
Comprehensive Healthcare
401(k) with 100% company match; up to 5% vested
Paid Time Off starting on day one
Bonus opportunities
Health- & Dependent Care Flexible Spending Accounts
Short- & Long-Term Disability
Life & AD&D Insurance
Learning & Training opportunities
Raising the Standard of Excellence since 1911
With over a century of proven excellence, StandardAero has become an industry leader in MRO services and customized solutions in the aerospace field. Our shared values and learning-based culture inspire our team to exceed their potential and power our customers' missions worldwide. With on-the-job training, advancement opportunities, and excellent benefits, StandardAero invites you to experience a fulfilling and meaningful career with us.
Inclusivity Is Our Standard
It is StandardAero's policy to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information. Our supportive environment celebrates diversity with no room for harassment or discrimination of any kind. We invite you to bring your authentic self to our team and experience our welcoming culture.
Auto-ApplyData Security Analyst
Cyber security analyst job in Saint Louis, MO
Join our dynamic and thriving company as a Data Security Analyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning.
What You'll Be Doing
Monitor security service performance and availability: Provide recommendations on security equipment, software, and services
On-going investigation: Inspect information security alarms and events to determine vulnerability and impact
Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk
Participate in architecture reviews: Ensure adherence to information security architecture
Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to information security incidents
Design and deliver programs: Create education and training programs on information security and privacy matters
The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* *************************
"Delivering quality solutions through quality people"
Easy ApplyPrincipal Information Security Engineer (Security Product Owner)
Cyber security analyst job in OFallon, MO
Our Purpose Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential.
Title and Summary
Principal Information Security Engineer (Security Product Owner)
Who is Mastercard?
Mastercard is a global technology company in the payments industry. Our mission is to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart, and accessible. Using secure data and networks, partnerships and passion, our innovations and solutions help individuals, financial institutions, governments, and businesses realize their greatest potential.
Our decency quotient, or DQ, drives our culture and everything we do inside and outside of our company. With connections across more than 210 countries and territories, we are building a sustainable world that unlocks priceless possibilities for all.
Overview:
The Security Threat & Response Management (STRM) program within Mastercard's Corporate Security organization is looking for a Security Product Owner to lead execution of our preventative security control strategy. The ideal candidate is driven, proactive about security, analytical, and brings strong technical cyber security expertise. This role is central to shaping and executing the roadmap and strategy for our program's primary security tools and defenses. We are looking for a technically proficient and forward-thinking professional who proactively monitors evolving security trends, modern modern defenses, and leverages advanced knowledge of security tools to foster innovation and strengthen resilience throughout our environments.
Role
* Define and drive the roadmap for the 'Defend' product, which covers preventative and detective security controls and configurations across dozens of security tools and platforms including SIEM, SOAR, DLP, Application Control, XDR, NGFW, UEBA, NDR, and more.
* As the Defend product owner, you will be the team lead ensuring the Defend product feature team's work is prioritized, aligned to strategy, and properly road mapped.
* Partner with stakeholders from engineering, endpoint, identity, and cloud teams to deploy and optimize security technologies and controls.
* Translate security requirements, risk policies, and threat models into actionable work items and initiatives.
* Lead capability assessments and recommend technologies aligned with business needs and program strategies.
* Configure, integrate, and optimize security tools (e.g., EDR/XDR, NGFW, IDS, DLP, Application Control) in accordance with strategic objectives and initiatives.
* Monitor control effectiveness and continuously tune policies to reduce friction and increase coverage.
* Ensure alignment with internal standards, regulatory frameworks, and industry best practices.
All About You
The ideal candidate for this position should:
* Be an advanced technical expert with hands-on experience across multiple SecOps teams and functions such as Security Operations Center, Security Engineering, Incident Response, Detection Engineering, Threat Hunting, and Insider Threat for a large, global enterprise.
* Understand modern agile methodologies and how to define, assign, and track work for product feature teams and partner engineering teams.
* Be skilled at translating complex security requirements into clear, actionable technical plans in accordance with relevant security strategies and objectives.
* Be confident in how to approach complex security tooling and dependencies such as configuring access controls, tuning detection policies, and integrating tools into detection models and lifecycles.
* Be a strong communicator, able to articulate vision and strategy to technical and non-technical stakeholders at all levels.
Additional capabilities that will set you apart:
* Experience with proactive security strategies and security technology products, platforms, and key technology.
* Expertise in successfully integrating and leveraging threat intelligence data into security controls and tools for proactive, targeted security prevention.
* Deep understanding of modern SecOps concepts and strategies such as 'SOC 3.0', posture management domains, attack surface reduction, adaptive protections, automated triage and response, zero trust, cloud-native security, etc.
* Familiarity with regulatory compliance standards and frameworks (e.g., NIST, ISO, ATT&CK, D3FEND, PCI).
* Ability to collaborate effectively with SOC, IR, Engineering, and other key stakeholders.
* Passion for innovation and continuous improvement in security technology optimization.
Corporate Security Responsibility:
Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must:
* Abide by Mastercard's security policies and practices;
* Ensure the confidentiality and integrity of the information being accessed;
* Report any suspected information security violation or breach;
* Complete all periodic mandatory security training in accordance with Mastercard's guidelines.
Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly.
Corporate Security Responsibility
All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must:
* Abide by Mastercard's security policies and practices;
* Ensure the confidentiality and integrity of the information being accessed;
* Report any suspected information security violation or breach, and
* Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more.
Pay Ranges
O'Fallon, Missouri: $165,000 - $264,000 USD
Auto-ApplySenior Security Analyst - Camden, AR
Cyber security analyst job in East Camden, AR
Country:
United States of America Onsite
U.S. Citizen, U.S. Person, or Immigration Status Requirements:
Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
Security Clearance:
Secret - Current
At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Our Security team is seeking a Senior Security Analyst to support our team 100% onsite at our facilities in Camden, Arkansas. This person will serve as Alternate Facility Security Officer (AFSO), Designated Government Representative (DGR) and COMSEC hand receipt holder.
What You Will Do
Ensure adherence to the provisions of the National Industrial Security Program Operating Manual (NISPOM) and National Security Administration 3-16 (NSA/CSS 3-16).
Serve as the DGR for foreign sales maintaining US State Department Licenses, communicating with Defense Counterintelligence Security Agency (DCSA) and Foreign DGR's to coordinate classified exports and imports.
Report to the FSO for ensuring the open storage areas are properly maintained assist in reviewing articles and documents for appropriate classification markings.
Assist the FSO in working with the lead guard to ensure cleared guard scheduling is achieved.
Serve as the COMSEC hand receipt holder under supervision of the Facility Security Officer to conduct inventories, receive, transfer, destroy and inventory COMSEC material.
Maintain the visitor control program.
Follow specialized procedures for the transmission of classified and/or proprietary material/information.
Participate in security audits, semi-annual alarms tests, and UL certification.
Complete the DCSA SPeD training courses for Facility Security Officer - Possessing Facilities within one year of start date.
Qualifications You Must Have
Typically requires a University Degree or equivalent experience and minimum 2 years of prior relevant experience, or an Advanced Degree in a related field.
Experience scheduling Guard Rotations.
Experience with administrative requirements for classified areas.
Perform physical tasks such as climbing ladders, conducting alarm tests and performing escort duties for uncleared visitors.
Qualifications We Prefer
Completion of FSO for Possessing Facilities from DCSA SPeD.
Certified First Aid, AED and CPR to serve as a First Responder.
Certified Industrial Security Professional or similar related certification or Certified DoD Security Manager.
Excellent written, verbal, and presentation skills.
Must be able to complete required NSA training for DIAS
Ability to understand and safeguard Personal Identifiable Information (PII).
Self-starter with minimal supervision and the ability to solve routine problems of moderate complexity.
What We Offer
Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation.
Relocation Non-Eligible - Relocation assistance not available
Please consider the following role type definition as you apply for this role:
Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintenance employees, as they are essential to the development of our products.
We are RTX
#LI-Onsite
The salary range for this role is 66,000 USD - 130,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
Auto-Apply