Cyber Security Analyst
Cyber security analyst job in Las Vegas, NV
We're looking for a seasoned Cybersecurity Analyst to take the fight to advanced threats. From incident response and malware analysis to threat hunting and vulnerability management, you'll be on the front lines safeguarding our systems, data, and users while contributing to the overall program maturity. If you thrive on solving complex problems and driving continuous improvement, this is your mission.
Job Responsibilities
Monitor and analyze security tools, systems, and network activity for threats or suspicious behavior.
Investigate and triage alerts, perform threat hunting, and conduct malware and phishing analysis.
Manage the full lifecycle of security incidents, from detection through resolution and documentation.
Conduct vulnerability assessments, detection validation, and regular security reviews or audits.
Maintain and optimize security monitoring platforms, infrastructure, and tooling.
Collaborate with IT and third-party partners to implement security controls, apply fixes, and support incident response.
Develop and maintain incident response playbooks, procedures, and security awareness initiatives.
Ensure compliance with internal policies, industry standards, and regulatory requirements.
Generate and maintain reports, dashboards, and metrics for ongoing security performance tracking.
Provide occasional after-hours or on-call support as part of incident response efforts.
Perform other related tasks as assigned.
Technical Requirements
Proficiency with SIEM tools and EDR platforms.
Strong understanding of network protocols, security principles, and operating systems (Windows, Linux).
Hands-on experience with firewall, IDS/IPS, and threat intelligence technologies.
Familiarity with cloud security concepts (AWS, Azure, GCP).
Knowledge of attack vectors, mitigation strategies, and incident investigation techniques.
Education & Experience
Bachelor's degree in Cybersecurity or equivalent with 2+ years of relevant experience.
2-4 years in cybersecurity operations or a similar role, ideally within a SOC environment.
Relevant certifications preferred:
CompTIA Security+, THM SAL1, HTB CJCA, Blue Team Level 1/2, Antisyphon Training
, etc.
Proven experience in incident response, risk management, and security policy development.
Strong knowledge of cybersecurity frameworks, standards, and technologies.
Required Skills
Strong analytical and problem-solving skills with attention to detail.
Excellent written and verbal communication abilities.
Ability to work independently and collaboratively in a fast-paced environment.
Skilled in documentation, reporting, and managing multiple priorities.
Highly organized, adaptable, and committed to continuous learning.
Nice to Have
Experience in retail environments or with point-of-sale systems.
Background in networking or infrastructure engineering.
Familiarity with security frameworks (NIST, ISO 27001, CIS).
Scripting skills in Python, PowerShell, or similar languages.
Senior Security Engineer
Cyber security analyst job in Las Vegas, NV
Since 2012, we've grown to become one of the leading single-family rental companies and homebuilders in the country, recently recognized as a top employer by Fortune and Great Place To Work . At AMH, our goal is to simplify the experience of leasing a home through professional management and maintenance support, so our residents can focus on what really matters to them, wherever they are in life.
The Senior Security Engineer is responsible for the research, testing, implementation, optimization, and maintenance of security products and services supported by effective change management.
Other responsibilities include cloud security and cloud risk management. Additional responsibilities can include designing, testing, and implementing secure operating systems, networks, and databases. Password auditing, network based and Web application-based vulnerability scanning, virus management, and intrusion detection. Conducting risk audits and assessments, providing recommendations for application design. Monitoring and analyzing system access logs. Planning for security backup and system disaster recovery. Managing projects/processes, working independently with limited supervision. Coaching and reviewing the work of lower-level professionals. Problems faced are difficult and sometimes complex.
Responsibilities
Research, test, implement, optimize, and maintain new security products and services to address future and current threats supported by effective change management.
Develops, maintains, and supports processes to support the IT Security Framework such as incident management, cloud risk management, and cloud security.
Act as an escalation path to Security issues and lead forensic investigations.
Identifies and investigates actual or potential information security violations. Performs follow up investigations with written reports.
Participate in application and infrastructure projects to provide security planning and implementation.
Develop dashboards and metrics that includes incident reporting and risk management reporting.
Requirements
High School Diploma or GED required
Bachelor's degree in Computer Science, Information Technology, Information Security, and/or related field preferred
Minimum of seven (7) years of experience in IT Security
Minimum of three (3) years of experience in Cloud Technologies
Experience in managing SIEM solutions
Experience in endpoint and email security solutions
Experience in Security incident management and reporting
Advanced knowledge of networking/web, phishing/cyberattacks, and incident response
CISSP, cloud security, and other security related certifications preferred
Excellent verbal and written communication, planning, analysis and organizing skills
May occasionally work evenings or weekends as this position is part of an on-call rotation.
Compensation
The anticipated pay range/scale for this position is $105,322.00 to $131,652.00 Annually. Actual starting base pay within this range will depend on factors including geographic location, education, training, skills, and relevant experience.
Additional Compensation
This position is eligible to receive a discretionary annual bonus.
Perks and Benefits
Employees have the opportunity to participate in medical, dental and vision insurance; flexible spending accounts and/or health savings accounts; dependent savings accounts; 401(k) with company matching contributions; employee stock purchase plan; and a tuition reimbursement program. The Company provides 9 paid holidays per year, and, upon hire, new employees will accrue paid time off (PTO) at a rate of 0.0577 hours of PTO per hour worked, up to a maximum of 120 hours per year.
CA Privacy Notice: To learn more about what information we collect when you apply for a job, and how we use that information, please see our CA Job Applicant Privacy Notice found at **************************************
Sr Cyber Defense Security Specialist
Cyber security analyst job in Las Vegas, NV
Boyd Gaming Corporation has been successful in gaming jurisdiction in which we operate in the United States and is one of the premier casino entertainment companies in the United States. Never content to rest upon our successes, we will continue to evolve and retain a position of leadership in our industry. Our past success, our current business philosophies and our sound business planning, combine to position Boyd Gaming Corporation to maximize value for our shareholders, our team members and our communities.
Job Description
Subject matter expert and technical leader who is passionate about complex information security technology, topics and issues. Responsible for technical and operational duties in the areas of computer network defense analysis, vulnerability assessment and management, incident response and management, threat intelligence, data loss prevention, digital forensics, and threat hunting. Provides customer service and technical support with the goal of improving the overall security posture of the organization.
Responsible for documenting, monitoring and reporting on various security related systems and processes to ensure system and data integrity, security and availability.
Creation of policy, day to day management, administration and maintenance of Information Security tool set.
Identification of any tool or visibility gap in the existing tool set.
Identification of team requirements for any given technology, documentation of the current or proposed architecture, lead any proof of concept and document results, quantify any recommendations for the use of any new security tool, process or procedure.
Cross training the team on day to day use, standard operating procedures and tuning of the security tool set.
Analyze threat intelligence and risks. Identify and document impact to Boyd and any mitigation or remediation actions required.
Lead initiatives and own the outcomes related to remediation or mitigation against identified day zero attacks. Liaise with cross functional teams to facilitate and ensure implementation of any necessary tasks to defend against the risk.
Escalation point and technical subject matter expert for Security Analysts and any third-party security providers.
Responsible for tracking all security incidents to resolution.
Leading defensive protocols and programs when attacks occur.
Simulating attacks to identify potential areas of weakness in defenses and alerting.
Writing detailed reports and providing accurate metrics.
Perform the role and duties of an internal expert on matters relating to threat detection and incident response.
Lead investigations into attacks and indicators of compromise. Provide a coordinated response to applicable complex cyber-attacks.
Contribute to the ongoing development and improvement of security monitoring and incident response processes and solutions as required to support Boyd's Information Security program and exceed team objectives.
Tracking cybersecurity news and trends for applicable systems, and reporting concerns to appropriate resources.
Documenting and updating security related policies, including participation in the periodic review process and managing policy exceptions and risk acceptances in coordination with the Boyd Risk and Compliance teams.
Manage, update, modify alerts, adjust/tune event correlation rules to increase accuracy/relevance/effectiveness and create new rules based on threat changes and evolving risks.
Use creativity and innovation to automate and streamline team processes and procedures.
Perform event correlation, analysis of malicious activity indicators and appropriate response based on review and access to multiple security tools.
Qualifications
Bachelor's Degree in Information Technology or Cyber Security, and/or equivalent experience, Masters ' Degree in Computer Science or Information Security (Preferred)
7-10 years of professional Information Security Incident Response/ Forensics/ SOC experience
Proven experience with Information Security industry best practices
Proven experience with System/ Application vulnerabilities, threats and exploitation
Proven experience with malware analysis (dynamic and static) or forensic examination
Advanced knowledge and understanding of Windows, Linux, Unix and networking
Understanding of ISO 27001 / 2700 2, NIST Cybersecurity Framework, COBIT, SOX, PCI, CCPA and ITIL.
Expert level computer and IT skills.
Advanced analytical and problem-solving skills.
High levels of creativity, patience and ability to remain calm and focused in a crisis.
Highly motivated, self-starter, competitive, and attracted to challenging opportunities
Demonstrated strong decision-making skills. Having a logical and analytical approach to problem-solving, being able to assess situations and decide on the best course of action; understanding test results and developing solutions.
Demonstrated advanced organizational and time management skills. Completing tasks in a timely manner; being detail-oriented, able to perform repetitive tests in a thorough and consistent manner; being able to work on several tasks at the same time while still accomplishing goals and deadlines.
Advanced communication skills. Being able to articulate technical issues and requirements in a clear and non-technical manner.
Excellent teamwork skills. Ability to partner with the business and cross functional IT teams, working as a cohesive and effective unit.
Highest levels of honesty, integrity and objectivity. Ability to remain objective when analyzing weaknesses and proposed new solutions; being responsible and understanding the level of trust required to handle private and highly sensitive information and situations.
Additional Information
Boyd Gaming is proud to be an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Boyd Gaming is proud to be an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Principal Cyber Security Analyst - Threat Hunter
Cyber security analyst job in North Las Vegas, NV
Mission Support and Test Services, LLC (MSTS) manages and operates the Nevada National Security Site (NNSS) for the U.S. National Nuclear Security Administration (NNSA). Our MISSION is to help ensure the security of the United States and its allies by providing high-hazard experimentation and incident response capabilities through operations, engineering, education, field, and integration services and by acting as environmental stewards to the Site's Cold War legacy. Our VISION is to be the user site of choice for large-scale, high-hazard, national security experimentation, with premier facilities and capabilities below ground, on the ground, and in the air. (See NNSS.gov for our unique capabilities.) Our 2,750+ professional, craft, and support employees are called upon to innovate, collaborate, and deliver on some of the more difficult nuclear security challenges facing the world today.
+ MSTS offers our full-time employees highly competitive salaries and benefits packages including medical, dental, and vision; both a pension and a 401k; paid time off and 96 hours of paid holidays; relocation (if located more than 75 miles from work location); tuition assistance and reimbursement; and more.
+ MSTS is a limited liability company consisting of Honeywell International Inc. (Honeywell), Jacobs Engineering Group Inc. (Jacobs), and HII Nuclear Inc.
**Responsiblities**
NNSS is seeking an experienced Cyber Security Analyst to join our team as a Principal Threat Hunting Analyst. This role is responsible for managing threat hunting activities across the enterprise such as supporting and performing all phases of the incident response life cycle: preparation, analysis, containment, eradication, remediation, recovery, and post-incident activity. In addition, the analyst will ensure all incident response processes and associated threat hunting techniques are well-defined, documented, tested, and managed. The analyst will evaluate threat intel to determine potential evolving threats to the enterprise and adapt/improve threat hunting and detection techniques accordingly, conduct forensics: host-based disk and memory as well as network; analysis to determine root cause and impact, and develop of use cases mapped to common frameworks (e.g., MITRE ATT&K) for detecting new/evolving threats, including supporting content for security tools.
The ideal candidate will have at least 8 years of related experience and one or more of the preferred cyber security certifications listed below.
**Key Responsibilities**
+ Develop and manage an enterprise threat hunting program. Support and perform all phases of the incident response life cycle: preparation, analysis, containment, eradication, remediation, recovery, and post-incident activity.
+ Manage programs and oversee processes in support of cyber threat intelligence analysis.
+ Mentor and train junior analysts and assist with prioritizing and completion of tasks.
+ Identify and prioritize cyber threats using open and closed source research into suspicious activity to collect and analyze information on adversary behavior.
+ Maintain awareness of trends and risks that can affect the organization as it relates to the intersection between geopolitics, third-party risk, and the cyber threat landscape.
+ Create and deliver a range of written and verbal products that arm cyber defense teams with actionable intelligence and provide organizational leaders with curated information that influences risk-based decision-making.
+ Review current Cyber Security threat information and assist the Threat Evaluation Team with mitigating vulnerabilities identified.
+ Collaborate with other outside Cyber Security interests such as Counterintelligence, other DOE sites, US CERT, and law enforcement.
+ Assist with data calls, FISMA reporting, compliance scanning and reporting, continuous monitoring, and compiling reports for auditors.
+ Perform other duties as assigned by Management.
**Qualifications**
+ Bachelor's degree or equivalent training and experience in a computer-related field and at least 8 years of related experience.
+ Experience with structured analytic techniques (e.g., Diamond Model, Cyber Kill Chain) as well as a proven understanding of the MITRE ATT&K framework.
+ Experience with the utilization of Open-Source Intelligence (OSINT) as well as closed intelligence sources.
+ Experience analyzing raw data points from technical security controls, to include web proxy, firewalls, IPS, IDS, enterprise antivirus solutions, etc.
+ Experience with engineering security detections and response technology integration (SOAR & SIEM), as well as Threat Intelligence Platform (TIP) product ingestion to improve proactive security measures.
+ Experience with link analysis tools.
+ Familiarity with the fundamentals of agile project management.
+ Familiar with compliance frameworks, security best practices, and product security baselines.
+ Experience using configuration management tools in a production environment.
+ Strong IT background, including networking fundamentals and systems. Able to demonstrate thorough understanding of basic principles, theories, standards, practices, protocols, and procedures used in Cyber Security.
+ Possess considerable organization and project management skills.
+ Ability to maintain strict confidentiality.
+ Ability to communicate effectively in English, both verbally and in writing, sufficient to communicate with coworkers, customers, write clear and concise reports, gather and collect information.
+ Ability to use multiple electronic devices including standard office machines, cellular phones, and security appliances.
+ General understanding of cybersecurity controls used to mitigate vulnerabilities.
+ Preferred Certifications (Please upload certification(s) as an attachment when applying.):
+ Certified Information Systems Security Professional (CISSP)
+ GIAC Security Essentials (GSEC)
+ GIAC Cyber Threat Intelligence (GCTI)
+ GIAC Certified Forensic Analyst (GCFA)
+ The primary work location will be at the Losee Road facility located in North Las Vegas, Nevada.
+ Work schedule will be 4/10's Monday through Thursday (subject to change).
+ Pre-placement physical examination, which includes a drug screen, is required. MSTS maintains a substance abuse policy that includes random drug testing.
+ Must possess a valid driver's license.
MSTS is required by DOE directive to conduct a pre-employment drug test and background review that includes checks of personal references, credit, law enforcement records, and employment/education verifications. Applicants offered employment with MSTS are also subject to a federal background investigation to meet the requirements for access to classified information or matter if the duties of the position require a DOE security clearance. Substance abuse or illegal drug use, falsification of information, criminal activity, serious misconduct or other indicators of untrustworthiness can cause a clearance to be denied or terminated by DOE, resulting in the inability to perform the duties assigned and subsequent termination of employment. In addition, Applicants for employment must be able to obtain and maintain a DOE Q-level security clearance, which requires U.S. citizenship, at least 18 years of age. Reference DOE Order 472.2 (**************************************************************************************** , "Personnel Security". If you hold more than one citizenship (i.e., of the U.S. and another country), your ability to obtain a security clearance may be impacted.
**Department of Energy Q Clearance** (position will be cleared to this level). Reviews and tests for the absence of any illegal drug as defined in 10 CFR Part 707.4 (*************************************************************************************************************** , "Workplace Substance Abuse Programs at DOE Sites," will be conducted. Applicant selected will be subject to a Federal background investigation, required to participate in subsequent reinvestigations, and must meet the eligibility requirements for access to classified matter. Successful completion of a counterintelligence evaluation, which may include a counterintelligence-scope polygraph examination, may also be required. Reference 10 CFR Part 709 (************************************************************************************ , "Counterintelligence Evaluation Program."
MSTS is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, national origin, disability, veteran status or other characteristics protected by law. MSTS is a background screening, drug-free workplace.
Annual salary range for this position is: **$116,001.60 - $176,904.00.**
Starting salary is determined based on the position market value, the individual candidate education and experience and internal equity.
Principal Cyber Security Analyst - Threat Hunter
Cyber security analyst job in North Las Vegas, NV
Mission Support and Test Services, LLC (MSTS) manages and operates the Nevada National Security Site (NNSS) for the U.S. National Nuclear Security Administration (NNSA). Our MISSION is to help ensure the security of the United States and its allies by providing high-hazard experimentation and incident response capabilities through operations, engineering, education, field, and integration services and by acting as environmental stewards to the Site's Cold War legacy. Our VISION is to be the user site of choice for large-scale, high-hazard, national security experimentation, with premier facilities and capabilities below ground, on the ground, and in the air. (See NNSS.gov for our unique capabilities.) Our 2,750+ professional, craft, and support employees are called upon to innovate, collaborate, and deliver on some of the more difficult nuclear security challenges facing the world today.
MSTS offers our full-time employees highly competitive salaries and benefits packages including medical, dental, and vision; both a pension and a 401k; paid time off and 96 hours of paid holidays; relocation (if located more than 75 miles from work location); tuition assistance and reimbursement; and more.
MSTS is a limited liability company consisting of Honeywell International Inc. (Honeywell), Jacobs Engineering Group Inc. (Jacobs), and HII Nuclear Inc.
Bachelor's degree or equivalent training and experience in a computer-related field and at least 8 years of related experience.
Experience with structured analytic techniques (e.g., Diamond Model, Cyber Kill Chain) as well as a proven understanding of the MITRE ATT&K framework.
Experience with the utilization of Open-Source Intelligence (OSINT) as well as closed intelligence sources.
Experience analyzing raw data points from technical security controls, to include web proxy, firewalls, IPS, IDS, enterprise antivirus solutions, etc.
Experience with engineering security detections and response technology integration (SOAR & SIEM), as well as Threat Intelligence Platform (TIP) product ingestion to improve proactive security measures.
Experience with link analysis tools.
Familiarity with the fundamentals of agile project management.
Familiar with compliance frameworks, security best practices, and product security baselines.
Experience using configuration management tools in a production environment.
Strong IT background, including networking fundamentals and systems. Able to demonstrate thorough understanding of basic principles, theories, standards, practices, protocols, and procedures used in Cyber Security.
Possess considerable organization and project management skills.
Ability to maintain strict confidentiality.
Ability to communicate effectively in English, both verbally and in writing, sufficient to communicate with coworkers, customers, write clear and concise reports, gather and collect information.
Ability to use multiple electronic devices including standard office machines, cellular phones, and security appliances.
General understanding of cybersecurity controls used to mitigate vulnerabilities.
Preferred Certifications (Please upload certification(s) as an attachment when applying.):
Certified Information Systems Security Professional (CISSP)
GIAC Security Essentials (GSEC)
GIAC Cyber Threat Intelligence (GCTI)
GIAC Certified Forensic Analyst (GCFA)
The primary work location will be at the Losee Road facility located in North Las Vegas, Nevada.
Work schedule will be 4/10's Monday through Thursday (subject to change).
Pre-placement physical examination, which includes a drug screen, is required. MSTS maintains a substance abuse policy that includes random drug testing.
Must possess a valid driver's license.
MSTS is required by DOE directive to conduct a pre-employment drug test and background review that includes checks of personal references, credit, law enforcement records, and employment/education verifications. Applicants offered employment with MSTS are also subject to a federal background investigation to meet the requirements for access to classified information or matter if the duties of the position require a DOE security clearance. Substance abuse or illegal drug use, falsification of information, criminal activity, serious misconduct or other indicators of untrustworthiness can cause a clearance to be denied or terminated by DOE, resulting in the inability to perform the duties assigned and subsequent termination of employment. In addition, Applicants for employment must be able to obtain and maintain a DOE Q-level security clearance, which requires U.S. citizenship, at least 18 years of age. Reference DOE Order 472.2, “Personnel Security”. If you hold more than one citizenship (i.e., of the U.S. and another country), your ability to obtain a security clearance may be impacted.
Department of Energy Q Clearance (position will be cleared to this level). Reviews and tests for the absence of any illegal drug as defined in 10 CFR Part 707.4, “Workplace Substance Abuse Programs at DOE Sites,” will be conducted. Applicant selected will be subject to a Federal background investigation, required to participate in subsequent reinvestigations, and must meet the eligibility requirements for access to classified matter. Successful completion of a counterintelligence evaluation, which may include a counterintelligence-scope polygraph examination, may also be required. Reference 10 CFR Part 709, “Counterintelligence Evaluation Program.”
MSTS is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, national origin, disability, veteran status or other characteristics protected by law. MSTS is a background screening, drug-free workplace.
Annual salary range for this position is: $116,001.60 - $176,904.00.
Starting salary is determined based on the position market value, the individual candidate education and experience and internal equity.
NNSS is seeking an experienced Cyber Security Analyst to join our team as a Principal Threat Hunting Analyst. This role is responsible for managing threat hunting activities across the enterprise such as supporting and performing all phases of the incident response life cycle: preparation, analysis, containment, eradication, remediation, recovery, and post-incident activity. In addition, the analyst will ensure all incident response processes and associated threat hunting techniques are well-defined, documented, tested, and managed. The analyst will evaluate threat intel to determine potential evolving threats to the enterprise and adapt/improve threat hunting and detection techniques accordingly, conduct forensics: host-based disk and memory as well as network; analysis to determine root cause and impact, and develop of use cases mapped to common frameworks (e.g., MITRE ATT&K) for detecting new/evolving threats, including supporting content for security tools.
The ideal candidate will have at least 8 years of related experience and one or more of the preferred cyber security certifications listed below.
Key Responsibilities
Develop and manage an enterprise threat hunting program. Support and perform all phases of the incident response life cycle: preparation, analysis, containment, eradication, remediation, recovery, and post-incident activity.
Manage programs and oversee processes in support of cyber threat intelligence analysis.
Mentor and train junior analysts and assist with prioritizing and completion of tasks.
Identify and prioritize cyber threats using open and closed source research into suspicious activity to collect and analyze information on adversary behavior.
Maintain awareness of trends and risks that can affect the organization as it relates to the intersection between geopolitics, third-party risk, and the cyber threat landscape.
Create and deliver a range of written and verbal products that arm cyber defense teams with actionable intelligence and provide organizational leaders with curated information that influences risk-based decision-making.
Review current Cyber Security threat information and assist the Threat Evaluation Team with mitigating vulnerabilities identified.
Collaborate with other outside Cyber Security interests such as Counterintelligence, other DOE sites, US CERT, and law enforcement.
Assist with data calls, FISMA reporting, compliance scanning and reporting, continuous monitoring, and compiling reports for auditors.
Perform other duties as assigned by Management.
Auto-ApplyCyber Security Specialist
Cyber security analyst job in Las Vegas, NV
About CSG
Consulting Services Group (CSG) is a premier provider of support services, bringing a new and unique level of subject matter expertise to our clients. Our innovation-led services provides comprehensive solutions to our clients who face high-stake challenges related to managing essential programs, growth and transformation, critical communications, and logistics. Our people bring unparalleled expertise and dedication and we are always looking to expand our team.
Position Overview:
The Cyber Security Specialist will be responsible for, but not limited to, managing and maintaining Ubuntu desktop and server systems in a large-scale, geographically dispersed enterprise environment. The role includes cybersecurity monitoring, incident response, threat and vulnerability management, compliance management, and support for security infrastructure. The analyst will also contribute to policy, compliance, technical documentation, data analysis, and cross-functional collaboration with an agile focus. This is a full-time, on-site position in Las Vegas, NV, requiring a Top-Secret clearance and a strong background in Linux and cybersecurity tools.
Duties/Tasks and Responsibilities:
Manage and Maintain Ubuntu Desktop and Server Systems
Administer and maintain Ubuntu desktops and servers in a large-scale, geographically dispersed enterprise environment.
Troubleshoot and resolve complex technical issues related to Ubuntu systems, network infrastructure, and virtualization environments.
Cybersecurity Monitoring and Incident Response
Participate in incident response efforts to detect, contain, respond to, and remediate cyber threats.
Support forensic investigations and incident response activities, including monitoring IDS/IPS, SIEM tools, endpoint protection platforms, email gateways, firewalls, and network infrastructure.
Threat and Vulnerability Management
Review, identify, report, and assist in the remediation of cybersecurity threats and vulnerabilities.
Scan network devices for vulnerabilities and compliance with configuration baselines; document and report findings.
Validate the functionality and effectiveness of security tools in the environment.
Security Infrastructure Support
Support the design, deployment, and maintenance of new and existing security infrastructure capabilities.
Assist software developers with CI/CD pipeline processes, focusing on automated security and compliance scanning and remediation.
Policy Compliance and Governance
Conduct cybersecurity compliance activities, including unauthorized device discovery, site surveys for policy violations, and enforcement of network access controls.
Assist with the coordination, management, and reporting of Plan of Action and Milestones (POA&M) and Corrective Action Plans (CAPs).
Technical Documentation and Process Development
Document system configurations, processes, change management activities, and Standard Operating Procedures (SOPs).
Create and maintain knowledge-sharing resources and peer training materials.
Data Analysis and Reporting
Research, compile, and analyze technical and cybersecurity data to support informed decision-making.
Use established standards and technical knowledge to solve problems and complete assigned projects.
Cross-Functional Support and Collaboration
Assist the Information System Security Manager (ISSM), Information System Security Officer (ISSO), and Program Manager for Engineering with the execution of their duties.
Take direction from senior staff while working independently and with minimal supervision; proactively analyze and communicate needs.
Perform additional responsibilities as directed by management in support of team objectives and organizational goals.
Task and Ticket Management
Manage, update, and monitor technical tasks and service tickets within Jira and related systems.
Qualifications:
Required:
U.S. citizenship. Sponsorship for employment-based visas (e.g., H-1B, OPT, Green Card) is not available.
Active DoD Top Secret clearance required at time of hire.
Minimum 2 years of relevant experience in Cybersecurity.
Education: Bachelor's degree or higher equivalent in a computer-related field.
Demonstrate an understanding of principles, theories, standards, practices, protocols, and procedures used in Cybersecurity and Linux Administration.
Demonstrate critical thinking and adaptability in a dynamic, agile environment, effectively balancing leadership responsibilities with the ability to follow directives and execute tasks as assigned by management with minimal supervision.
Knowledge equivalent to Linux Professional Institute (LPIC-2).
Ability to use network scanning and vulnerability tools and interpret the results.
Working-level knowledge of networking, virtualization, Storage Area Networks (SANs), Cloud, and related technologies.
Enterprise working knowledge of Ubuntu Products such as:
Ansible Tower/Automation Platform
Apache/Nginx Web Server
Database systems such as Oracle, MySQL/MariaDB, Postgres
Docker/Kubernetes
RAID 1+0 Storage
Landscape
Networking
Ubuntu Satellite/Update Server
Ability to communicate effectively in English, both verbally and in writing, sufficient to communicate with co-workers, customers (technical and non-technical audiences), write clear and concise reports including highly technical processes, and collect information.
Ability to use multiple electronic devices including standard office machines, cellular phones, and security appliances.
Knowledge of Cybersecurity vulnerabilities, mitigation strategies, network architecture, and how to apply security controls.
Ability to understand policies, procedures, laws, regulations, and other directives and maintain strict confidentiality.
Ability to meet the physical requirements necessary to safely and effectively perform all assigned duties.
Preferred:
GIAC Security Essentials (GSEC)
GIAC Critical Controls Certification (GCCC)
Certified Information Security Manager (CISM)
Systems Security Certified Practitioner (SSCP)
Certified Information Systems Security Professional (CISSP)
Splunk Certifications:
Splunk Core Certified Advanced Power User
Splunk Certified Cybersecurity Defense Analyst
Splunk Cloud/Enterprise Certified Admin
Splunk Enterprise Security Certified Admin
Understanding of two-factor and multi-factor authentication including RSA
Work Environment:
This is a full-time, on-site position in Las Vegas, Nevada. Remote telework is not available unless stated otherwise.
Occasional short-term travel required, as directed by management.
Standard schedule: Monday-Friday, normal duty hours (7:00 AM to 3 PM PST) (subject to change).
Some weekend/holiday or travel may be required depending on mission needs.
Requires ability to walk, climb, stand, carry materials, stoop, kneel, and bend at waist.
Requires capability to do maximum unassisted lift = 50 lbs. Average lift less than 35 lbs.
The candidate is expected to work in data center environment, and will have to move, upgrade, install telecom/server equipment.
Compensation and Benefits:
We provide compensation commensurate with experience and qualifications.
We are proud of the benefits that we offer! In addition to a competitive salary, we provide no cost health, dental, and vision insurance options for our employees. Our paid time off is a generous accrual program with additional time off for sick leave for you or your dependents wellbeing and paid military leave. Our 14 holidays allow our staff the flexibility to take alternative days off throughout the year. Employees also benefit from a retirement plan with immediate match and vesting. Additionally, we offer life and disability insurance, tuition reimbursement, and a rich employee referral program.
We are honored to have been recognized as a USA TODAY Top Workplace for 2025. The strong culture that we have built - one that prioritizes work life balance, employee appreciation, strong values, and meaningful work, contributes to an environment where CSG employees feel valued and supported.
Application and Accommodations:
Please let us know if you require accommodation during the application or interview process by reaching us at ************.
Equal Employment Opportunity(EEO) Statement:
Consulting Services Group, LLC is an Affirmative Action and Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, or protected veteran status. For more information, see Equal Employment Opportunity. CSG job descriptions are intended to outline the primary responsibilities and qualifications for each role. Equivalent combinations of education, experience, and training may be considered. Candidates are encouraged to apply even if they do not meet every listed qualification.
Auto-ApplySenior Analyst Info Security
Cyber security analyst job in Las Vegas, NV
The Senior Analyst Info Security is responsible for leading and supporting both short-term and long-term cybersecurity initiatives across the enterprise. This includes managing and maintaining secure systems, data, and network infrastructure, as well as conducting enterprise-wide security gap assessments, vulnerability remediation, and implementation of security controls. The role also encompasses the development and enforcement of compensating controls and exception management processes to ensure the organization's security posture remains resilient and compliant with industry standards. This role promotes a security-first mindset across the organization and contributes to the continuous improvement of the enterprise's security posture through proactive monitoring, technical support, and training initiatives.
Essential Functions & Responsibilities:
Manage the full lifecycle of cybersecurity toolsets, including planning, acquisition, deployment, administration, monitoring, and decommissioning.
Provide incident response and issue management for security investigations, including intrusion detection, malware, denial of service attacks, and privileged account misuse.
Develop and maintain standard operating procedures and training materials.
Monitor security alerts and logs to identify and investigate potential threats, reducing incident response time and improving detection accuracy.
Collaborate with IT and business units to ensure security controls are implemented and maintained across enterprise systems.
Provide high-level technical support, including configuration changes, policy recommendations, and diagnostics of network security issues.
Maintain awareness of regulatory gaming requirements, internal control standards (MICS), and enterprise policies related to information security.
Manages and maintains PCI compliance. This includes implementing PCI policy, standards, and procedures, assigning training and tracking to completion, and working with PCI assessors in assuring compliance.
Participate in operational planning and contribute to strategic security initiatives.
Promote a culture of security awareness and operational excellence across departments.
Emergency on-call to support after-hours security incidents and operational support.
Perform other duties as assigned to support the efficient operation of the department.
Required Qualifications:
Ability to secure and maintain a Nevada Gaming Registration.
High School diploma or GED required.
Bachelor's degree in information technology, Information Security, or a related field preferred.
Minimum of 6 years of experience in information security or related roles.
Experience in casino environments is strongly preferred.
Familiarity with the following technologies and practices:
Data Loss Protection
Forensic Software Suites
Network Infrastructure
Virtualization Platform Security
Operating Systems Security
Access Management and Privileged Access Management
Security Information and Event Monitoring (SIEM)
Incident Response Programs
PCI (Payment Card Industry)
Strong communication and presentation skills.
Ability to troubleshoot using the OSI model and analyze network traffic.
Understanding of standards, policies, procedures, and operational effectiveness.
Ability to work in a fast-paced, high-demand environment.
Certifications from organizations such as ISC2, CompTIA, ISACA, GIAC, or equivalent preferred (e.g., CISSP, Security+, CISM).
Physical Demands & Work Environment:
The physical demands and working environment described here are representative of those that an employee encounters and must be met by an employee to successfully perform the essential functions of this job.
Primary work environment is in a climate-controlled office setting.
Work requires travel to attend meetings, trade shows, and conferences.
Incumbents may be required to work evening, weekend and holiday shifts.
Must be able to work in a fast-paced, high-demand environment.
Strength sufficient to exert up to 10 pounds of force occasionally and/or a negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects and/or move up to 40 pounds occasionally.
Sedentary work: involves sitting most of the time. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine, and computer printer.
Physical activities that apply to the essential functions of the position are balancing, stooping, kneeling, crouching, reaching, pushing, pulling, lifting, grasping, talking, hearing, and repetitive motions.
Hearing sufficient to hear conversational levels in person, via videoconference and over the telephone.
Speech sufficient to make oneself heard and understood in person, in front of groups, in meetings, via videoconference and over the telephone.
Visual acuity that meets the requirements of the position: The worker is required to have close visual acuity to perform an activity such as preparing and analyzing data and figures; transcribing; viewing a computer terminal; expansive reading and visual inspection of employees, visitors or facility.
Mobility sufficient to safely move in an office environment, walk, stoop, bend and kneel, and enter, exit and operate a motor vehicle in the course of travel to promotional events, meetings, conferences, trade shows and San Manuel properties.
Endurance sufficient to sit, walk and stand for extended periods, and maintain efficiency throughout the entire work shift and during extended work hours.
The employee may be exposed to fumes or airborne particles including secondhand smoke.
Equal Opportunity Employer:
Palms Casino Resort provides equal employment opportunities to all team members and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
Palms Casino Resort, its affiliates and subsidiaries, will make reasonable accommodations in compliance with applicable law.
We are committed to creating a work environment where the growth and well-being of our team members is the top priority. Join our team today!
Auto-ApplyInformation Security Engineer - Black Lotus Labs Threat Researcher (APT)
Cyber security analyst job in Carson City, NV
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
Black Lotus Labs is seeking a Principal Security Engineer on the Research & Analysis team. This team leverages Lumen's global visibility of one of the world's largest and most interconnected IP backbones and a petabyte-scale compute cluster to perform cutting edge threat research, hunting and tracking advanced persistent threat actors (APTs) and emerging criminal activity as the threat actors traverse the internet. They empower customers to stay ahead of the evolving threat landscape.
**The Main Responsibilities**
+ Serve as Threat Research Subject Matter Expert, offering guidance and support to the Black Lotus Labs team on threat hunting activities, such as identifying knowledge gaps, troubleshooting technical challenges, developing solutions, and mentoring team members in overcoming obstacles. Set priorities for what threats to analyze to maximize team's impact.
+ Conduct threat research across technical data sets, fusing Black Lotus Labs telemetry with third party data sets, to automate detection of the latest threat attacker tools, techniques and procedures (TTPs) with a goal of automating detection.
+ Use industry-leading technical knowledge of adversary capabilities and infrastructure and define, develop, and implement techniques to lead the team in tracking sophisticated adversaries, delivering actionable threat intelligence data to Lumen customers.
+ Lead and enhance threat hunting operations by actively engaging with other research teams, building strong partnerships to achieve shared goals, exploring new data sources, and mentoring team members in executing workflows and solving complex challenges.
+ Provide expert analysis and strategic insights on emerging threats and vulnerabilities, translating complex technical information into actionable intelligence for executive leadership and external stakeholders.
+ Spearhead thought leadership initiatives by leading Black Lotus Lab's voice at security conferences and internal executive briefings.
**What We Look For in a Candidate**
+ Proven experience in threat hunting and in-depth technical security research, demonstrating a strong track record of successfully identifying, tracking, and disrupting nation-state and cybercriminal threat actors.
+ Deep understanding of advanced threat hunting methodologies, attacker tactics, techniques, and procedures (TTPs), and the ability to derive actionable threat hunts from complex data sets.
+ Demonstrated experience building prototype threat hunting solutions and large data analysis tools with Python (or other equivalent languages).
+ Proven experience initiating and coordinating technical projects focused on telemetry collection, TTP based threat hunting, or developing threat hunt tools that have cross-organization impact on threat visibility, including leading private-public partnerships and multi-company collaborations.
+ 5+ years of experience in the IC, DoD or similar tracking and defending against nation state threat activity.
+ Exceptional communication and presentation skills, including the ability to clearly and concisely convey complex technical information to both technical and non-technical audiences, ranging from executives and board members to conference attendees and internal stakeholders.
+ Experience presenting at industry conferences and in the media.
+ Highly organized with the ability to manage multiple tasks, prioritize effectively, and triage competing demands in a fast-paced environment.
+ Proven ability to lead and manage complex technical projects, effectively driving them to successful completion.
+ Active TS/SCI clearance with poly
**Well-experienced candidates may also have the following skills: **
+ Proficiency in malware reverse engineering and incident response.
+ 5+ years of experience leading teams of technical threat discovery professionals.
+ Software development experience in Docker and big data technologies like Hadoop, Spark, and Tensor Flow.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
**What to Expect Next**
\#LI-JS1
Requisition #: 339093
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
**Application Deadline**
12/09/2025
Security Engineer
Cyber security analyst job in Carson City, NV
Meta Platforms, Inc. (Meta), formerly known as Facebook Inc., builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps and services like Messenger, Instagram, and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology. To apply, click "Apply to Job" online on this web page.
**Required Skills:**
Security Engineer Responsibilities:
1. Build tools that enable connectivity to our infrastructure only from Meta owned and managed devices.
2. Build machine attestation and secure certificate storage solutions to enable strong client trust.
3. Deploy systems that help mitigate security risks by understanding and controlling what software is allowed to execute on our client devices.
4. Develop, validate, and enforce our client security policies.
5. Build and deploy tools and automation that proactively detect and respond to security risks and threats to internal corporate services.
6. Advise and collaborate with other teams.
7. Telecommuting from anywhere in the U.S. allowed.
**Minimum Qualifications:**
Minimum Qualifications:
8. Requires Bachelor's Degree (or foreign equivalent) in Computer Science, Engineering or a related field and 1 year of experience in the job offered or a computer-related occupation
9. Requires 12 months of experience involving the following:
10. PHP, Golang, Python, C/C++, Rush, or Ruby
11. Designing and deploying security infrastructure such as PKI, key management, and certificate management
12. Endpoint Security & Management
13. Certificate Lifecycle
14. Devices & OS hardening and security policies
15. Identity & Access Management (Authentication & Authorization, SSO)
16. Network Security and
17. Programming and Code Review
**Public Compensation:**
$178,041/year to $200,200/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Engineer, Information Security and Risk
Cyber security analyst job in Carson City, NV
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Cloud Security Engineer
Cyber security analyst job in Las Vegas, NV
Cloud Security Engineer to help design, implement, and maintain secure cloud environments across our AWS, Azure, and/or Google Cloud platforms. You will work closely with infrastructure, DevOps, and application teams to ensure our cloud workloads meet industry security standards, comply with regulatory requirements, and support business objectives.
* Implement and manage cloud security controls, including IAM, encryption, key management, and network security.
* Monitor cloud environments for security events, misconfigurations, and vulnerabilities using tools like AWS Security Hub, Azure Defender, Prisma Cloud, or similar.Develop and enforce security policies and automation (IaC security, CI/CD
pipeline security, compliance checks).
* Support incident response activities, including investigation, remediation, and post-incident reviews.
* Collaborate with DevOps and engineering teams to implement secure-by-design practices.
* Conduct threat modeling and risk assessments for cloud-based applications and infrastructure.
Ensure compliance with standards such as CIS Benchmarks, ISO 27001, SOC 2, NIST, or GDPR as applicable.
* Participate in security architecture reviews and contribute to continuous improvement initiatives.
Preferred: AWS Certified Security - Specialty, Azure Security Engineer Associate, CCSP, CISSP or Security +, CISSP Required: None
Security Analyst, IT
Cyber security analyst job in Las Vegas, NV
YOUR MISSION (The Job Description):
This job is located on-site at Virgin Hotels Las Vegas. Remote work is not available for this position.
The Security Analyst will play a vital role in keeping all IT-related security, safety issues, and the day-to-day functionality of all network-related hardware and software secure. The Security Analyst will be responsible for generating reports for IT administrators and business managers to evaluate the efficacy of the security policies in place. Security Analyst will help make necessary changes for a more secure network and may also create training programs and modules to educate employees and users on proper security protocols.
Security Engineer IT- Information Technology
Cyber security analyst job in Reno, NV
Come join Team Atlantis! This position is responsible for ensuring that sensitive data is kept confidential. Document and report security threats. Make sure the right software and hardware are in place, supervise IT projects that guarantee the safety of valuable information as well as our internet and intranet infrastructure. Ensures compliance with policies, procedures, and compliance frameworks required by regulatory bodies.
Responsibilities
Engineering, implementing and monitoring security measures to protect computer systems, networks, applications, and information.
Assists with development of organizational policies, procedures, and best practices supporting information security and compliance initiatives.
Monitors, reviews, and analyzes log and alert data from company systems, network, and security devices for potential security and compliance events.
Identifying and defining system security requirements.
Designing computer security architecture and developing detailed cyber security designs.
Preparing and documenting standard operating procedures and protocols.
Configuring and troubleshooting security infrastructure devices.
Developing technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks.
Ensuring that the company knows as quickly as possible about security incidents.
Writing comprehensive reports, including assessment-based findings, outcomes, and propositions for further system security enhancement.
Working with and providing reports for compliance audits.
Other assignments as assigned my management.
The incumbent in this position works on-site at all properties and interfaces with external/internal customers, Team Members, and vendors on a regular basis. The position's work schedule varies and may include Saturday/Sunday and evening work depending on the needs of the operation.
While performing the duties of this job, the employee is occasionally required to stand; walk; sit; use hands to finger, handle or feel objects, tools or controls; reach with hands and arms; climb stairs; balance; stoop, kneel crouch or crawl; talk, and hear. The employee must occasionally lift and/or move up to 75 pounds. Specific vision abilities required by the job include close vision, distance vision, color vision, peripheral vision, depth perception and the ability to focus.
Qualifications
CERTIFICATES AND LICENSES:
CISM
GSEC
CCNA
CEH
OSCP
CISSP
Nevada Gaming Registration
Colorado Gaming License
Qualifications:
At least three (3) years of education, training, and/or experience in IT security monitoring and analysis, vulnerability analysis, risk analysis, or similar cybersecurity-related fields preferred.
Proven track record of successfully implementing IT projects in a medium to large network environment.
Knowledge and understanding of enterprise networking protocols and concepts, server operating systems (including Windows, Linux, and VMWare), and core security principles.
Hands on experience with common information security solutions, including firewalls, IDS/IPS, SIEM, endpoint protection, and data leakage protection.
Strong analytical and problem-solving skills.
Attention to detail in both analysis and documentation.
***Must adhere to all grooming standards, no "visible" tattoos/piercings or unnatural hair colors***
Atlantis Casino Resort Spa fosters a team working environment and an environment that is focused on Team Member recognition and appreciation. Some of the ways in which we accomplish this is by offering the following:
Comprehensive benefits (medical, dental, vision, supplemental coverage)
401K retirement savings plan + discretionary match
Education Tuition Reimbursement Program
Paid Vacation
Holiday Pay
Weekly Resort Prizes
Career Development and Training Workshops
FREE daily meal
Internal Advancement
We can recommend jobs specifically for you! Click here to get started.
Auto-ApplySenior Security Engineer
Cyber security analyst job in Las Vegas, NV
Since 2012, we've grown to become one of the leading single-family rental companies and homebuilders in the country, recently recognized as a top employer by Fortune and Great Place To Work . At AMH, our goal is to simplify the experience of leasing a home through professional management and maintenance support, so our residents can focus on what really matters to them, wherever they are in life.
The Senior Security Engineer is responsible for the research, testing, implementation, optimization, and maintenance of security products and services supported by effective change management.
Other responsibilities include cloud security and cloud risk management. Additional responsibilities can include designing, testing, and implementing secure operating systems, networks, and databases. Password auditing, network based and Web application-based vulnerability scanning, virus management, and intrusion detection. Conducting risk audits and assessments, providing recommendations for application design. Monitoring and analyzing system access logs. Planning for security backup and system disaster recovery. Managing projects/processes, working independently with limited supervision. Coaching and reviewing the work of lower-level professionals. Problems faced are difficult and sometimes complex.
Responsibilities:
Research, test, implement, optimize, and maintain new security products and services to address future and current threats supported by effective change management.
Develops, maintains, and supports processes to support the IT Security Framework such as incident management, cloud risk management, and cloud security.
Act as an escalation path to Security issues and lead forensic investigations.
Identifies and investigates actual or potential information security violations. Performs follow up investigations with written reports.
Participate in application and infrastructure projects to provide security planning and implementation.
Develop dashboards and metrics that includes incident reporting and risk management reporting.
Requirements:
High School Diploma or GED required
Bachelor's degree in Computer Science, Information Technology, Information Security, and/or related field preferred
Minimum of seven (7) years of experience in IT Security
Minimum of three (3) years of experience in Cloud Technologies
Experience in managing SIEM solutions
Experience in endpoint and email security solutions
Experience in Security incident management and reporting
Advanced knowledge of networking/web, phishing/cyberattacks, and incident response
CISSP, cloud security, and other security related certifications preferred
Excellent verbal and written communication, planning, analysis and organizing skills
May occasionally work evenings or weekends as this position is part of an on-call rotation.
Compensation
The anticipated pay range/scale for this position is $105,322.00 to $131,652.00 Annually. Actual starting base pay within this range will depend on factors including geographic location, education, training, skills, and relevant experience.
Additional Compensation
This position is eligible to receive a discretionary annual bonus.
Perks and Benefits
Employees have the opportunity to participate in medical, dental and vision insurance; flexible spending accounts and/or health savings accounts; dependent savings accounts; 401(k) with company matching contributions; employee stock purchase plan; and a tuition reimbursement program. The Company provides 9 paid holidays per year, and, upon hire, new employees will accrue paid time off (PTO) at a rate of 0.0577 hours of PTO per hour worked, up to a maximum of 120 hours per year.
CA Privacy Notice: To learn more about what information we collect when you apply for a job, and how we use that information, please see our CA Job Applicant Privacy Notice found at **************************************
#LI-PH1
Auto-ApplySecurity Analyst
Cyber security analyst job in Las Vegas, NV
Job DescriptionSalary: $31.25/hr
Who We Are:
Headquartered in Canada with locations across the United States and around the globe with a footprint on six continents, Bulletproof, a GLI company has decades of technology, security, and compliance expertise. Bulletproofs work in the security space has been recognized nationally and globally with Microsofts global Security Partner of the Yearin 2021 and the Microsoft Security Trail-Blazer Award in 2024.
At Bulletproof, our vision is to serve, secure, and empower the world through people and technology; one customer at a time. We believe everyone has the right to feel safe and secure. Our mission is to serve and protect organizations to ensure their success.
What we have to offer:
Challenging Work - We love solving highly complex problems. Across our teams and in all roles, every employee is empowered to bring their best ideas forward and to jump in and solve the problems they're passionate about.
Great People - We are stronger, together, when we are open, honest, and above all, real. Every person is valued here and plays an important role in our shared success.
Global Impact - As a global team spanning continents, boundaries, and cultures, every day we are inspired by the impact our work has on our colleagues, our customers, our communities, and the world at large.
Diversity, Equity and Inclusion - We celebrate each others differences, continuously strive for equality and recognize that inclusion makes us stronger as individuals, a company and a global citizen.
Position Summary:
Provide security support an on shift 24X7X365 basis. This involves handling events such as identifying user security issues, extensive troubleshooting, and coordinating resolution or restore using a variety of applications and testing tools. The events can include hardware/software failures as well as security breaches, threats, or network connectivity issues. Regularly provide high-level proactive technical support, including security configurations, security policy modification recommendation, and diagnostics of remote network issues.
Duties:
Perform the detailed and repeatable execution of all operational tasks as documented in SOC processes and subordinate procedures.
Monitor the SOC main event tools for security events.
Close or escalate security events as necessary.
Update all relevant documentation such as shift logs and tickets, procedures.
Identify impact of incidents on systems, and using available tools determine if data was infiltrated.
Document and maintain a knowledge base of alarms (false positives and false negatives, blacklists, whitelists) that IDS and IPS encounter.
Serve as work area experts for security/information assurance policy recommendations.
Gather intelligence from sources outside the SOC (both internal and external sources) and leverage for operations.
Escalate incidents to applicable Bulletproof entities and or Bulletproof Customers for remediation.
Build relationships with other Bulletproof operations units to strengthen customer security posture.
Ensure security events and incidents are detected and escalated in a timely manner.
Provide analysis and investigation to determine if alerts or security events warrant incident classification.
Track incidents through to final resolution.
Perform incident triage to include determining scope, urgency, and potential impact.
Drive the Information Fusion Procedure where various data inputs are gathered, analyzed and presented in a meaningful, actionable manner.
Responsible for long term analysis and investigation into our customers network activity, and the creation of custom logic to detect unique or previously undetectable attacks on our customer information assets.
Required Education/Credentials/Qualifications:
Bachelors degree in Computer Science or equivalent experience relevant to network security with relevant industry certifications.
2-4 years of related experience in a Network support and or Network operations role; or any combination of education and experience, which would provide an equivalent background.
Background in networking or security to include intrusion detection/prevention.
Excellent written, verbal communication and organizational skills.
Knowledge and experience with PCs, LAN topologies, routers, hubs, switches, and terminal servers.
Knowledge of security applications such as IDS, IPS, SEM, SIEM and anomaly detection tools.
Knowledge of trouble ticketing systems or CRM systems.
Understanding of the operation of test and analysis equipment such as protocol analyzers, LAN/WAN Sniffers, etc.
Ability to read and interpret network diagrams.
Ability to read and understand packet captures.
Basic understanding of the OSI model
Strong interpersonal and user service skills.
Knowledge of Unix and Windows operating Systems.
Experience with processes in functional area (i.e., trouble management, fault management, and incident management).
Understanding of network management concepts and software, including SNMP
Security +, SSCP and other technical security certifications (e.g. Information Systems Security Architecture Professional, Information Security Engineering Professional, Certification and Accreditation Professional, or equivalent certifications) (Preferred but not required)
Benefits:
Comprehensive Health, Dental, and Vision Insurance
Optional Health
100% Employer Paid Health and Dental Plan
Vacation Time
401k Plan
Annual Discretionary Bonus
Anniversary Reward Bonus
Educational Assistance Program
Additional Mental Health Benefits through our Employee Assistance Program
Equal Opportunity Statement:
Bulletproof is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. Bulletproof is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
Security Engineer
Cyber security analyst job in Nellis Air Force Base, NV
Serco is seeking an Information Systems Security Officer (ISSO) to support the Immersive Missions and Training Solutions teams SAP Programs at Nellis Air Force Base, Joint Integrated Test and Training Center - Nellis.
This position will support the ISSM in securing systems that support SAP business operations at the Nellis AFB facility. You will lead cybersecurity policy implementation, conduct risk assessments, and support system certification and accreditation activities.
This position is contingent upon your ability to maintain/transfer your TS/SCI Clearance
In this role, you will:
Conduct system and network assessments to identify security deviations from policy or acceptable configurations.
Perform compliance audits and vulnerability assessments to support cybersecurity objectives.
Support program control processes to ensure risk mitigation and accreditation readiness.
Assist in the implementation of DoD security policy (e.g., NIST 800-53 Rev. 4, JSIG, CNSSI No. 1253) and recommend process enhancements.
Validate security requirements and recommend safeguards.
Support Security Test and Evaluation (ST&E) activities and document results.
Prepare and maintain Security Plans and Plans of Action and Milestones (POA&M).
Oversee periodic reviews of system audits and ensure corrective actions are completed.
GET TO KNOW YOUR RECRUITER!
Qualifications
To be successful in this role, you will have:
Must have an active DoD TS/SCI clearance
U.S Citizenship Required
Current IAM Level 1 Certification
Bachelor's degree with cybersecurity experience and tools below
Or a HS diploma or GED with cybersecurity experience and tools below
A foundation in security audits, system assessments, and policy compliance
Experience supporting cybersecurity documentation and accreditation processes
Ability to translate security requirement to technical requirements
Experience with vulnerability scanning (ACAS, Nessus, etc.)
Experience with STIG/Compliance scanning (SCAP, ACAS, GPOs)
Ability to work on-site at Nellis AFB
Ability to travel as needed (up to 10% of the time)
Additional desired experience and skills:
Utilizing Splunk to perform security audits/dashboard configuration
Powershell, Windows Server, Linux Knowledge
If you are interested in supporting and working with passionate Serco team- then submit your application now for immediate consideration. It only takes a few minutes and could change your career!
In compliance with state and local laws regarding pay transparency, the salary range for this role is $67,889.77 to $101,500.00; however, Serco considers several factors when extending an offer, including but not limited to, the role and associated responsibilities, a candidate's work experience, education/training, and key skills.
Company Overview
Serco Inc. (Serco) is the Americas division of Serco Group, plc. In North America, Serco's 9,000+ employees strive to make an impact every day across 100+ sites in the areas of Defense, Citizen Services, and Transportation. We help our clients deliver vital services more efficiently while increasing the satisfaction of their end customers. Serco serves every branch of the U.S. military, numerous U.S. Federal civilian agencies, the Intelligence Community, the Canadian government, state, provincial and local governments, and commercial clients. While your place may look a little different depending on your role, we know you will find yours here. Wherever you work and whatever you do, we invite you to discover your place in our world. Serco is a place you can count on and where you can make an impact because every contribution matters.
To review Serco benefits please visit: ************************************************************ If you require an accommodation with the application process please email: ******************** or call the HR Service Desk at ************, option 1. Please note, due to EEOC/OFCCP compliance, Serco is unable to accept resumes by email.
Candidates may be asked to present proof of identify during the selection process. If requested, this will require presentation of a government-issued I.D. (with photo) with name and address that match the information entered on the application. Serco will not take possession of or retain/store the information provided as proof of identity. For more information on how Serco uses your information, please see our Applicant Privacy Policy and Notice.
Serco does not accept unsolicited resumes through or from search firms or staffing agencies without being a contracted approved vendor. All unsolicited resumes will be considered the property of Serco and will not be obligated to pay a placement or contract fee. If you are interested in becoming an approved vendor at Serco, please email *********************.
Serco is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other legally protected characteristics.
Auto-ApplySecurity Engineer II
Cyber security analyst job in Carson City, NV
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Security Engineer Investigator, Insider Trust
Cyber security analyst job in Carson City, NV
As part of Meta Security, our Insider Trust team is dedicated to identifying and responding to insider threats that target our data. Our mission is to detect, investigate, and mitigate damage caused by insider threats. We handle a wide range of abuse cases, including misuse of user data, intellectual property theft, and leaks of sensitive information.We are seeking an experienced Security Engineer to join the team. This role involves investigating, hunting, and automating internal signals to detect malicious activities related to insider threats.
**Required Skills:**
Security Engineer Investigator, Insider Trust Responsibilities:
1. Perform analysis, and threat hunting from a variety of log sources (e.g., individual host logs, network traffic logs) to identify potential insider threats
2. Create workflows and automations to streamline signal detection, threat hunts, and investigative processes
3. Collaborate with software and production engineering teams to build scalable and adaptable solutions for insider threat investigations
4. Identify gaps in our infrastructure and work with cross-functional partners to improve visibility through logging and automation
5. Build operational workflows and actions to auto-resolve false positives and provide context, scaling investigation capabilities
6. Prioritize efforts to maximize impact by enhancing visibility, automating processes, and scaling investigative capabilities
7. Coach, mentor, and support team members to foster long-term career growth, job satisfaction, and success
**Minimum Qualifications:**
Minimum Qualifications:
8. Bachelor's degree in Computer Science, Engineering, or equivalent experience
9. 5+ years of experience in Detection & Response Engineering, Insider Threat, or a similar Security Engineering role
10. Technical and procedural expertise in conducting security investigations, including response, forensics, and large-scale log analysis
11. Experience with attacker tactics, techniques, and procedures
12. Proficiency in coding or scripting in one or more general-purpose programming languages
**Public Compensation:**
$147,000/year to $208,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Engineer, Information Security and Risk
Cyber security analyst job in Carson City, NV
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Journeyman Cloud Security Engineer - Top Secret/Q Cleared
Cyber security analyst job in Las Vegas, NV
Zachary Piper Solutions is seeking a Journeyman Cloud Security Engineer to support the NNSA in safeguarding the nation's nuclear security infrastructure. This is a contract-to-hire opportunity based out of Las Vegas, Nevada for cleared senior professionals to lead proactive, AI-augmented defense of mission-critical hybrid cloud environments on multi-million-dollar federal contracts. As a Journeyman Cloud Security Engineer, you'll drive RMF compliance, automate NIST controls, and mentor teams within operations at the NNSA.
Responsibilities for the Journeyman Cloud Security Engineer include:
* Lead RMF package development in eMASS for Azure/AWS/GCP migrations and continuous ATO monitoring.
* Automate STIG/SCAP compliance and policy-as-code enforcement using Python/Boto3, Terraform, and OPA.
* Conduct proactive threat hunting with AI/ML tools (e.g., AWS Macie, Azure Sentinel) and zero-downtime vuln remediation.
* Secure DevSecOps pipelines (GitHub Actions, SonarQube, CloudFormation) and harden VMware VCF per NIST 800-161.
Required qualifications for the role include:
* 5+ years in federal cloud cybersecurity or related high-assurance environments
* Expert-level RMF implementation, NIST 800-53 controls, and FISMA audit leadership
* Advanced scripting/automation (Python/Bash, Boto3, Terraform) and policy-as-code (OPA)
* BA/BS degree (Computer Science, Cybersecurity, or equivalent)
Clearance: Active DOE "Q" or Top Secret (TS) Clearance (must be current and transferable).
* Skills:
RMF/eMASS/POA&M mastery in cloud migrations
AI/ML-driven threat hunting (Macie, Sentinel)
Zero-downtime patching (SCCM/GPO, blue-green)
DevSecOps shift-left (SonarQube, IaC)
VMware VCF hardening (NIST 800-161 supply chain)
Compensation for the Senior Cloud Security Engineer includes:
* Target salary: $120,000 (full-time equivalent)
* Full Standard Benefits: PTO, Paid Holidays, Medical, Dental, Vision, 401k plan, Sick leave as required by law
This job opens for applications on 11/13/25. Applications for this job will be accepted for at least 30 days from the posting date.
#LI-AD1
#LI-Onsite
DOE Q clearance, Top Secret clearance, TS/SCI, active clearance, Nevada National Security Site, NNSS, NNSA, National Nuclear Security Administration, Las Vegas onsite, 5 days onsite, contract-to-hire, RMF, Risk Management Framework, eMASS, POA&M, NIST 800-53, AU-2, audit logging, Azure security, AWS security, GCP security, cloud migration, ATO, Authority to Operate, FISMA audit, NIST CSF, policy-as-code, OPA, Open Policy Agent, Terraform, CloudFormation, IaC, Infrastructure as Code, STIG, SCAP compliance, Tenable.io, vulnerability assessment, vulnerability management, prioritization, remediation scripting, Python automation, Bash scripting, Boto3, error handling, AI/ML threat hunting, AWS Macie, Azure Sentinel, anomaly detection, proactive security, zero-downtime patching, SCCM, GPO, blue-green deployment, DevSecOps, GitHub Actions, SonarQube, shift-left security, VMware VCF, VMware Cloud Foundation, hybrid cloud, NIST 800-161, supply chain risk, federal SOC, ESOC, Enterprise Security Operations Center, Deloitte partnership, SIEM architecture, cyber engineering, SOC analysts, incident response, mentorship, team leadership, cloud vuln assessment, continuous monitoring, compliance automation, federal cybersecurity, high-assurance environments, nuclear deterrence, stockpile stewardship, mission-critical systems, proactive AI threats, Q-cleared experience, cybersecurity leadership, cloud security engineer, senior cloud security, RMF implementation, FISMA compliance, security infrastructure, scripting proficiency, automation tools, security tools integration, network security, system security, federal security standards, multi-million-dollar contracts, Zachary Piper Solutions, Zen Prasertsin, Mike Ewell, Chief Growth Officer, PwC alumni, cyber ops expert, exclusive search, 24-hour feedback, technical interview panel, phone screen, resume review, offer turnaround, 120k salary, BA/BS degree, computer science degree, cybersecurity degree, onsite requirement, 24-hour notice, interview availability