Cyber security analyst jobs in New London, CT - 120 jobs
All
Cyber Security Analyst
Security Engineer
Information Security Analyst
Information Security Engineer
Securities Analyst
Senior Cyber Security Analyst
Senior Information Security Analyst
Cyber Security Specialist
Defense Analyst
Information Systems Security Officer
Senior Security Analyst
Network Security Officer
Need for Cyber Security Threat Analyst/ IT Security Specialist on 1099 or C2C
Xperttech 3.8
Cyber security analyst job in Hartford, CT
Job Title: CyberSecurity Threat Analyst/ IT Security Specialist Duration: 6-12+ Months COMPLETE SKILL MATRIX : CyberSecurity Threat Analyst/ IT SecuritySecurity aspects of multiple platforms, operating systems, software, communications, and network protocols
Security CISSP or CISM certification is a plus
What are the Job Responsibilities:
Use Tanium and other tools to view data, indicators of compromise-IOCs, collect inventory to identify threats and relate them to the areas of the organization.
Use the analytical information from a diverse set of tools - Splunk, ArcSight, syslog, Tanium, to name a few- to their best advantage to identify threats and trends in addition to current state reactive behavior.
Configure components to effectively detect and report incidents & and follow escalation workflows
Work with cross functional teams to perform activities including planning, providing technical leadership, and tracking projects and key task dates.
Uses Security monitoring tools to review, investigate, and recommend appropriate corrective actions for data security incidents.
Work with engineering to assist with recommendations regarding direction of tools and applications.
Who Is Our Ideal Candidate:
Bachelor's degree in Computer Science, Engineering, or a directly related field.
Four to six years of professional IT experience.
Experience in security aspects of multiple platforms, operating systems, software, communications, and network protocols.
Requires excellent analytical ability, consultative and communication skills, and strong judgment.
Must be highly skilled and proficient in problem solving, with an aptitude to learn new technologies.
Ability to regularly exercise independent judgment and discretion.
Excellent end users support skills
Ability to multitask and handle multiple priorities
Must be resourceful, creative, innovative, results driven, and adaptable
Nice to have:
Security CISSP or CISM certification is a plus
Additional Information
$82k-117k yearly est. 60d+ ago
Looking for a job?
Let Zippia find it for you.
Cyber Defense Forensics Analyst
EY 4.7
Cyber security analyst job in Providence, RI
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all.
The exceptional EY experience. It's yours to build.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
Today's world is fuelled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value.
**The opportunity**
Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the technical team responsible for security incident response for EY. The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process.
**Your key responsibilities**
+ Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified
+ Forensically analyze end user systems and servers found to have possible indicators of compromise
+ Analysis of artifacts collected during a security incident/forensic analysis
+ Identify security incidents through 'Hunting' operations within a SIEM and other relevant tools
+ Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions
+ Provide consultation and assessment on perceived security threats
+ Maintain, manage, improve and update security incident process and protocol documentation
+ Regularly provide reporting and metrics on case work
+ Resolution of security incidents by identifying root cause and solutions
+ Analyze findings in investigative matters, and develop fact based reports
+ Be on-call to deliver global incident response
**Skills and attributes for success**
+ Resolution of security incidents by identifying root cause and solutions
+ Analyze findings in investigative matters, and develop fact-based reports
+ Proven integrity and judgment within a professional environment
+ Ability to appropriately balance work/personal priorities
**To qualify for the role you must have**
+ Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field
+ 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering;
+ Understanding of security threats, vulnerabilities, and incident response;
+ Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis;
+ Be familiar with legalities surrounding electronic discovery and analysis;
+ Experience with SIEM technologies (i.e. Splunk);
+ Deep understanding of both Windows and Unix/Linux based operating systems;
**Ideally, you'll also have**
+ Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH
+ Background in security incident response in Cloud-based environments, such as Azure
+ Programming skills in PowerShell, Python and/or C/C++ Understanding of the best security practices for network architecture and server configuration
**What we look for**
+ Demonstrated integrity in a professional environment
+ Ability to work independently
+ Have a global mind-set for working with different cultures and backgrounds
+ Knowledgeable in business industry standard security incident response process, procedures, and life cycle
+ Excellent teaming skills
+ Excellent social, communication, and writing skills
**What we offer you**
The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary range/s. At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more .
We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
**Are you ready to shape your future with confidence? Apply today.**
EY accepts applications for this position on an on-going basis.
For those living in California, please click here for additional information.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
**EY | Building a better working world**
EY is building a better working world by creating new value for clients, people, society, and the planet, while building trust in capital markets.
Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow.
EY teams work across a full spectrum of services in assurance, consulting, tax, strategy, and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.
EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
$105.2k-186.4k yearly 60d+ ago
Systems Security Analyst
Brown University Health 4.6
Cyber security analyst job in Providence, RI
The Systems SecurityAnalyst is a critical member of the Chief Information Security Officer's (CISO's) team and reports to the Manager of Information Security Operations. This is a hands-on role that requires a high level of technical and analytical expertise. Responsible for a broad range of tasks, including the day-to-day administration of information security tools, the creation of security documentation as well as second and third level support for security information and event management (SIEM) alerts. The role ensures that the healthcare organization maintains compliance with regulatory requirements, industry standards, and internal policies while proactively managing security risks.
Brown University Health employees are expected to successfully role model the organization's values of Compassion, Accountability, Respect, and Excellence as these values guide our everyday actions with patients, customers, and one another.
In addition to our values, all employees are expected to demonstrate the core Success Factors which tell us how we work together and how we get things done. The core Success Factors include:
Instill Trust and Value Differences
Patient and Community Focus and Collaborate
RESPONSIBILITIES:
Consistently applies the corporate values of respect, honesty and fairness and the constant pursuit of excellence in improving the health status of the people of the region through the provision of customer-friendly, geographically accessible and high-value services within the environment of a comprehensive, integrated academic health system. Is responsible for knowing and acting in accordance with the principles of the Brown University Health Corporate Compliance Program and Code of Conduct.
Monitors, configures and takes remediation actions surrounding, SIEM, Alerting / Detection (Network & Endpoint), Log Management, Phishing (Detection & Response), Digital Forensics, Penetration Testing, Zero-Trust architecture, threat-informed defense (MITRE ATT&CK), O365, and security automation.
Monitor and configure security controls across multi-cloud (Azure / AWS) environment as needed.
Assists in the development and documentation of security architecture, policies, standards, and procedures
Works with third party partners and services to ensure Brown University Health receives value and performance in accordance with contractual agreement
Participate in cloud / on-premises Incident Response processes, including tabletop exercises for breach scenarios
Ensure Brown University Health is prepared for external audits.
Maintains up-to-date technical knowledge by attending seminars, vendor presentations, and reading professional literature.
Attend and actively contribute to problem-management and major-incident conference calls as required.
Researches and assists in the piloting and evaluation of new tools, technologies, technical controls, and processes to support and enforce defined security policies.
Monitor emerging threats, vulnerabilities, and industry best practices to ensure security controls remain effective and aligned with the evolving threat landscape.
Provide expertise on security best practices across IT, infrastructure, and enterprise operations to support secure business strategies.
Contributes to a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices, and laws and regulations.
Ensures audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements.
Evaluates baseline security configurations for operating systems, applications, and networking and telecommunications equipment
Assists Brown University Health staff in the resolution of reported security incidents.
Assist in ensuring compliance with relevant regulatory standards, including HIPAA, HITECH, PCI-DSS, NIST, and other applicable frameworks.
Research and assess new threats and security alerts and recommends remedial actions.
Identify opportunities for improving Security Operations practices, recommending updates to processes and controls. Stay current with emerging security risks, regulatory requirements, and best practices to ensure the ongoing effectiveness of the security program.
Provides expert level guidance to IT staff and the business regarding all Information Security policies, standards, processes, and procedures.
Works with various infrastructure teams and business units to ensure policy compliance and adherence to security best practices.
Participates in security projects and provides expert guidance on security policy, process, and procedures for other IT projects, as required.
Participates in compliance / audit activities as requested by internal and external auditors.
Maintains work effort status within SLA's on Brown University Health's Service Desk and Task Management Platforms.
Identifies risks within the environment and performs risk register validations as required.
Requires participation in a recurring on-call schedule that includes evenings and weekends.
Performs other duties as assigned.
MINIMUM QUALIFICATIONS:
EXPERIENCE:
A minimum of 10 years of IS experience, with 5 years in an information security role.
A bachelor's degree in information systems or equivalent work experience; an M.B.A. or M.S. in information security is preferred.
Certifications Required (3 or more - CISSP, CCSP, OSCP, CISA, GIAC, CEH, Security+)
Strong understanding of authentication and authorization protocols (OAuth2, SAML, OpenID Connect)
Experience implementing and supporting phishing-resistant multi-factor authentication (e.g., FIDO2/WebAuthn, smart cards, or certificate-based authentication) to strengthen identity and access security.
Experience implementing security controls via infrastructure-as-code (Terraform, Ansible, etc.)
Familiarity with SOAR platforms or automated incident response playbooks
Experience securing cloud environments (AWS, Azure, GCP) with knowledge of cloud-native security services
Experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar) for monitoring, alerting, and correlation
Hands-on familiarity with EDR/XDR solutions (e.g., CrowdStrike, Defender for Endpoint)
Knowledge of vulnerability scanning and management tools (e.g., Nessus, Qualys, Rapid7)
Experience with cloud security posture management (CSPM) and cloud workload protection tools to identify misconfigurations, vulnerabilities, and risks across multi-cloud environments.
Experience with APIs, including integrating with RESTful or GraphQL endpoints to securely pull and push data between systems.
Proficiency in scripting and automation using Python, PowerShell, or Bash to support security operations, including tasks such as log parsing, API integration, incident response workflows, and orchestration of security tools.
Strong understanding of regulatory requirements, security frameworks, and risk management methodologies (e.g., HIPAA, HITECH, NIST, ISO 27001).
Expert level in security best practices.
Excellent written and verbal communication skills, with the ability to present complex security concepts to diverse audiences.
Intermediate level with Wireshark and/or equivalent packet capture and analysis
Experience with patch management, device hardening, configuration auditing and other end point security best practices.
Familiarity with the principles of cryptography and cryptanalysis.
Experienced in the use of virtualization technologies
Experience designing and implementing secure landing zones in both Microsoft Azure and Amazon AWS.
Understanding of Public Key Infrastructure
Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project plans.
Strong understanding of networking technologies from architecture best practices to packet analysis
In-depth knowledge of risk assessment methods and technologies.
Knowledge of network infrastructure, including routers, switches, firewalls, and the associated network protocols and concepts.
Excellent technical knowledge of mainstream operating systems [for example, Microsoft Windows and Linux] and a wide range of security technologies, such as network security appliances, identity and access management (IAM) systems, anti-malware solutions, automated policy compliance tools, and desktop security tools.
Proficiency in performing risk, business impact, control and vulnerability assessments.
Working knowledge of IT/network and cloud architectures sufficient to map controls, evidence, and risks.
Strong written and verbal communication skills.
Ability to communicate security guidance to a non-technical audience.
INDEPENDENT ACTION:
Functions independently within departmental policies and practices. Must be able to work independently in a manner to achieve goals, objectives and productivity requirements. Refers unresolved complex issues to director where clarification of department policies and procedures may be required.
SUPERVISORY RESPONSIBILITIES:
Employee functions independently within department policies and practices; refers specific complex problems to direct manager where clarification of departmental policies and procedures may be required.
Pay Range:
$102,963.22-$169,867.15
EEO Statement:
Brown University Health is committed to providing equal employment opportunities and maintaining a work environment free from all forms of unlawful discrimination and harassment.
Location:
Corporate Headquarters - 15 LaSalle Square Providence, Rhode Island 02903
Work Type:
Mon-Friday
Work Shift:
Day
Daily Hours:
8 hours
Driving Required:
Yes
$103k-169.9k yearly 52d ago
Sr. Cyber Security Analyst -40 hours Full Time
Connecticut Children's Medical Center 4.7
Cyber security analyst job in Hartford, CT
Manage and continuously improve a CyberSecurity Compliance program. This would include conducting security business and infrastructure compliance reviews, security risk assessments for internal/external information assets. Lead the Incident response and forensics program for Connecticut Children's Medical Hospital to ensure the confidentiality, integrity and availability of enterprise information resources. Provide recommendations to balance cyber risks and enable the business in a secure manner. Improve the overall security posture to meet the expanding and changing business needs of the organization.
Education and/or Experience Required:
Education Required: Bachelor's degree in Information Systems or equivalent
Experience Required: Minimum of six (6) years of enterprise security related work experience. Minimum of four (4) years incident response/forensics experience. Previous 24 x 7 operations experience
License and/or Certification Required:
Required: Certified Information Systems Security Professional (CISSP) within 1 year of hire.
Preferred: CISM, PCI QSA, GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA).
Knowledge, Skills and Abilities:
Knowledge
Experience and proficiency with: Anti-Virus, HIPS, IDS/IPS, Network Captures, Host-Based & Network Forensics.
Knowledge of Linux, UNIX, Windows OS, Active Directory and other operating systems.
Knowledge of database platforms such as MS SQL, Oracle, and MySQL.
Experience with a scripting language (e.g. Powershell, Python)
Skills:
Excellent written communication and presentation skills with the ability to present complex security issues to a variety of audiences, including senior executives
Abilities:
Must be self-directed, able to manage individual projects or act as part of a larger team
Experienced in performing security audits, risk analysis, forensics and penetration testing. Actively monitor systems and networks for potential intrusions. Lead, conduct and maintain security risk assessments, identify security vulnerabilities, develop recommendations, document findings and remediation plans. Manage remediation plans toward closure. Define security standards & incident response plans to detect, respond and recover from security incidents using a risk based methodology.
Develop and document security policies and procedures, training and awareness. Serve as a security expert reviewing and recommending security controls for network, application designs, operating systems, endpoint protection, mobile device implementations of new/updated applications and services.
Ensure business and technical requirements are aligned to security policies and are implemented within regulatory and corporate compliance. Maintain current knowledge of tools and best-practices in advanced persistent threats; tools, techniques, and procedures of attackers; related to forensics and incident response.
$67k-85k yearly est. Auto-Apply 23d ago
Senior Cyber Security Analyst (42466)
Neighborhood Health Plan of Rhode Island 4.4
Cyber security analyst job in Smithfield, RI
Senior CyberSecurityAnalyst is an experienced cybersecurity individual who maintains the security of an organization's technical environment. They study existing security hardware and software, evaluate new security options and makes recommendations for improvement. Senior CyberSecurityAnalyst also identifies weak spots in a cybersecurity system that may be breached and creates procedures to manage threats. Senior CyberSecurityAnalyst monitors networks for suspicious activity and potential cyber threats. They keep up on threat intelligence, install and maintain security software and encryption. They are responsible for aiding in the planning of security systems, implementing policy and identifying business processes that may violate intended and acceptable use policies. They monitor and remediate vulnerabilities. Senior CyberSecurityAnalyst works on advanced, complex technical projects or business issues requiring state of the art technical or industry knowledge.
Duties and Responsibilities
Responsibilities include, but are not limited to the following:
* Assist in developing, operating, and evolving Cloud Access Security solutions and capabilities
* Performs system security administration on designated technology platforms, including operating systems, applications and network security devices, in accordance with the defined policies, standards and procedures of the organization, as well as with industry best practices and vendor guidelines
* Performs installation and configuration management of security systems and applications, including policy assessment and compliance tools, network security appliances and host-based security systems
* Performs threat and vulnerability assessments, followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Research, recommend, and implement streamlined automation processes
* Develops and maintains documentation for security systems and procedures
* Conducts network monitoring and intrusion detection analysis using various computer network defense tools, such as intrusion detection/prevention systems, firewalls and host-based security systems
* Provide support to one or more projects simultaneously. Delivers projects on schedule
* Deploys cloud-centric detection to detect threats related to cloud environments and services used by the organization
* Assists and trains junior team members in the use of security tools, the preparation of security reports and the resolution of security issues
* Applies patches where appropriate and, removes or otherwise mitigates known control weaknesses, such as unnecessary services or applications or redundant user accounts, as a means of hardening systems in accordance with security policies and standards Correlates activity across assets (endpoint, network, apps) and environments (on-premises, cloud) to identify patterns of anomalous activity
* Using threat intelligence information research emerging threats and vulnerabilities to aid in the identification of incidents
* Job Knowledge - Remains up-to-date in assigned area of responsibility: possesses skills and knowledge to perform job effectively; efficiently and safely; acquires, understands, and applies technical and professional information and skills; understands and adheres to policies and procedures
* Supports the creation of security incident response, business continuity/disaster recovery plans, including conducting tests, publishing test results and making changes necessary to address deficiencies
* Analyzes problems and alternative solutions and takes appropriate timely action to achieve desired business results. Seeks unique and novel solutions to problems and considers impact of final resolution
* Perform security standards testing against computers before implementation to ensure security
* Provide Key Performance Metrics to our Risk Management team to help coordinate risk tracking.
* Educate internal teams on information security best practices.
* Assist in technical audits of IT Systems and controls.
* Other duties as assigned.
* Corporate Compliance Responsibility - As an essential function, responsible for complying with Neighborhood's Corporate Compliance Program, Standards of Business Conduct, applicable contracts, laws, rules and regulations, policies and procedures as it applies to individual job duties, the department, and the Company. This position must exercise due diligence to prevent, detect and report unlawful and/or unethical conduct by fellow co-workers, professional affiliates and/or agents
$79k-103k yearly est. 27d ago
Product Security Engineer, Instagram
Meta 4.8
Cyber security analyst job in Providence, RI
The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform.
**Required Skills:**
Product Security Engineer, Instagram Responsibilities:
1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products
2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code
3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities
4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage
5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience
8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP)
9. Extensive, proven experience in threat modeling and secure systems design
10. Experience with exploiting common security vulnerabilities
**Preferred Qualifications:**
Preferred Qualifications:
11. Product software engineering or product management experience
12. Experience in security consulting or other leadership-facing security advisory roles
13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response
14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.)
**Public Compensation:**
$184,000/year to $257,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
$184k-257k yearly 60d+ ago
Principal Security Engineer - Hardware Security
Oracle 4.6
Cyber security analyst job in Providence, RI
The Oracle Cloud Infrastructure (OCI) team can provide you the opportunity to build and operate a suite of massive scale, integrated cloud services in a broadly distributed, multi-tenant cloud environment. OCI is committed to providing the best in cloud products that meet the needs of our customers who are tackling some of the world's biggest challenges.
We offer unique opportunities for smart, hands-on security engineers with the expertise and passion to solve difficult problems in distributed highly available services and virtual infrastructure. At every level, our engineers have a significant technical and business impact designing and building innovative new systems to power our customer's business critical applications. Our customers run their businesses on our cloud, and our mission is to provide them with the most secure cloud services.
The OCI Hardware Security group conducts Security assessments of the production hardware that runs our cloud, and develops the requirements for future Networking, Storage, Compute components. We work closely across Oracle, with third party vendors, and with standards organization to influence the next generation of hardware platform security. In addition to defining the best hardware, OCI HW Security knows that platform security also depends on how that hardware is used. To that end, HW Security also works closely with OCI's operations and engineering teams, constantly striving to improve Oracle Cloud's overall operational security posture by defining the supply chain and operational requirements to establish best practices for managing security for every device in our data centers.
A security-focused engineer at any level can have significant technical and business impact. Come shape the future of one of the largest clouds on earth with us. Overall, the OCI Security Architecture team performs a variety of work ranging from cloud security, application security, vulnerability analysis, threat modeling, and hacking/enterprise network penetration.
The biggest challenges for the team are the dynamic and fast growth of the business, driving us to improve our systems, tools, and automation to scale to our security expertise several orders of magnitude greater than what we can support today. We understand that software is living and needs investment. The challenge is making the right tradeoffs, communicating those decisions effectively, and crisp execution.
**Responsibilities**
Career Level - IC4
+ Develop and communicate requirements for new vendors and hardware (compute, storage, networking)
+ Perform architectural reviews, penetration testing, vulnerability analysis of compute infrastructure hardware such as
o Servers (Intel, AMD and ARM)
o Baseboard Management Controllers such as Oracle's ILOM
o UEFI and platform firmware
o Smart NICS
o Storage devices
o Network controllers and other peripherals
Network hardware/firmware, topology, and security expertise
+ Provide consulting on security risk associated with compute hardware and firmware in the context of cloud usage.
+ Provide consulting and review of device sanitization as per NIST-800-88 R1 standards.
+ Provide standard operating procedures for safe use of compute hardware through its lifecycle i.e., provisioning, operations and reuse/decommission.
Skills
+ Engage with Oracle Hardware Division and third-party vendors to understand their roadmaps.
+ Create planning roadmaps to drive multi-year security improvements across the OCI Infrastructure
+ Review or assess engineering changes, or revisions of, an existing component. E.g.: new firmware for a device, vendor revision of an existing device Identify and participate in external standards groups to drive improvements across the industry
+ Consult development teams and third-party vendors in design and architecture of secure systems.
+ Champion and consult on secure development life cycle practices.
+ Communicate and educate Senior Management on key Security topics and directions.
Disclaimer:
**Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.**
**Range and benefit information provided in this posting are specific to the stated locations only**
US: Hiring Range in USD from: $109,200 to $223,400 per annum. May be eligible for bonus and equity.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
Career Level - IC4
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
At CVS Health, we're building a world of health around every consumer and surrounding ourselves with dedicated colleagues who are passionate about transforming health care. As the nation's leading health solutions company, we reach millions of Americans through our local presence, digital channels and more than 300,000 purpose-driven colleagues - caring for people where, when and how they choose in a way that is uniquely more connected, more convenient and more compassionate. And we do it all with heart, each and every day.
**POSITION SUMMARY**
The Staff Security Engineer of IAM will be architect and lead engineer for SailPoint ISC implementation at CVS Health. This position will include working on multiple projects simultaneously and providing hands-on engineering of IAM solutions. The Staff Security Engineer, IAM, will serve as the architect and lead engineer for SailPoint Identity Security Cloud (ISC) implementation at CVS Health. This role involves hands-on engineering of IAM solutions, leading multiple projects, and providing technical direction for SailPoint ISC initiatives. You will play a critical role in shaping the company's identity and access management strategy, ensuring robust security and compliance across the enterprise. As a trusted advisor, you will collaborate with cross-functional teams to deliver scalable, secure, and innovative IAM solutions that support business objectives and regulatory requirements. Your expertise will drive the adoption of best practices, continuous improvement, and the successful integration of emerging technologies within our IAM ecosystem.
**_What we expect of you -_**
- Lead team-members through various initiatives and features for SailPoint ISC implementations.
- Provide technical leadership on foundational IGA capabilities examples include Application Onboarding, RBAC, Access Request Configuration, Access Reviews & Lifecycle Events.
- Evaluate new product offerings and implement selected use cases, examples include NERM, CIEM, Machine Identities, AI Access Review Recommendation, etc.
- Ensure platform health and provide leadership for day-to-day maintenance and upkeeping of the platform.
- Provide technical leadership for migration efforts for Legacy IAM platforms.
- Building of customizations and API integrations for the SailPoint ISC platform.
- Manage implementations and releases via CI/CD strategies.
**REQUIRED QUALIFICATIONS**
+ Over 7 years of progressive experience in Identity and Access Management (IAM), delivering secure and scalable solutions.
+ 5+ years of hands-on technical engineering expertise in IAM, with a proven track record of architecting and implementing advanced security frameworks.
+ Minimum 2 years of direct, in-depth experience with SailPoint Identity Security Cloud (ISC) / IdentityNow-this is essential.
+ 3+ years of demonstrated leadership in guiding technical teams and resources through complex IAM initiatives.
+ 5+ years of proficiency in one or more of the following: Java, PowerShell, REST API integration, BeanShell, and database technologies.
**PREFERRED QUALIFICATIONS**
+ SailPoint Identity Security Engineer & CISSP certification is a huge plus
+ Experience in RBAC and Mainframe is preferred.
+ Strong team player that works well horizontally and vertically with others of varying skill levels and experience
+ Ability to clearly define and present solution development ideas in a team environment
+ Product/Project management experience
+ Extensive experience executing complex, large-scale Identity Governance and Administration (IGA) implementations, including integrations and customizations.
**EDUCATION**
Bachelor's degree from accredited university or equivalent work experience (HS diploma + 4 years relevant experience).
**BUSINESS OVERVIEW**
Bring your heart to CVS Health Every one of us at CVS Health shares a single, clear purpose: Bringing our heart to every moment of your health. This purpose guides our commitment to deliver enhanced human-centric health care for a rapidly changing world. Anchored in our brand - with heart at its center - our purpose sends a personal message that how we deliver our services is just as important as what we deliver. Our Heart At Work Behaviors support this purpose. We want everyone who works at CVS Health to feel empowered by the role they play in transforming our culture and accelerating our ability to innovate and deliver solutions to make health care more personal, convenient and affordable. We strive to promote and sustain a culture of diversity, inclusion and belonging every day. CVS Health is an affirmative action employer, and is an equal opportunity employer, as are the physician-owned businesses for which CVS Health provides management services. We do not discriminate in recruiting, hiring, promotion, or any other personnel action based on race, ethnicity, color, national origin, sex/gender, sexual orientation, gender identity or expression, religion, age, disability, protected veteran status, or any other characteristic protected by applicable federal, state, or local law. We proudly support and encourage people with military experience (active, veterans, reservists and National Guard) as well as military spouses to apply for CVS Health job opportunities.
**Pay Range**
The typical pay range for this role is:
$130,295.00 - $260,590.00
This pay range represents the base hourly rate or base annual full-time salary for all positions in the job grade within which this position falls. The actual base salary offer will depend on a variety of factors including experience, education, geography and other relevant factors. This position is eligible for a CVS Health bonus, commission or short-term incentive program in addition to the base pay range listed above. This position also includes an award target in the company's equity award program.
Our people fuel our future. Our teams reflect the customers, patients, members and communities we serve and we are committed to fostering a workplace where every colleague feels valued and that they belong.
**Great benefits for great people**
We take pride in our comprehensive and competitive mix of pay and benefits - investing in the physical, emotional and financial wellness of our colleagues and their families to help them be the healthiest they can be. In addition to our competitive wages, our great benefits include:
+ **Affordable medical plan options,** a **401(k) plan** (including matching company contributions), and an **employee stock purchase plan** .
+ **No-cost programs for all colleagues** including wellness screenings, tobacco cessation and weight management programs, confidential counseling and financial coaching.
+ **Benefit solutions that address the different needs and preferences of our colleagues** including paid time off, flexible work schedules, family leave, dependent care resources, colleague assistance programs, tuition assistance, retiree medical access and many other benefits depending on eligibility.
For more information, visit *****************************************
We anticipate the application window for this opening will close on: 01/31/2026
Qualified applicants with arrest or conviction records will be considered for employment in accordance with all federal, state and local laws.
We are an equal opportunity and affirmative action employer. We do not discriminate in recruiting, hiring, promotion, or any other personnel action based on race, ethnicity, color, national origin, sex/gender, sexual orientation, gender identity or expression, religion, age, disability, protected veteran status, or any other characteristic protected by applicable federal, state, or local law.
$130.3k-260.6k yearly 60d+ ago
Information System Security Officer
Eliassen Group 4.7
Cyber security analyst job in Hartford, CT
**Anywhere** **Type:** Contract-to-Hire **Category:** Security **Industry:** Government **Workplace Type:** Remote **Reference ID:** JN -092025-103788 **Shortcut:** ****************************** OjSE + Description + Recommended Jobs
**Description:**
The Information System Security Officer (ISSO) serves as the principal advisor to system owners on all matters related to cybersecurity compliance, risk management, and operational security. This role is critical in ensuring that systems maintain their Authorization to Operate (ATO) and comply with Departmental and federal cybersecurity standards.
The ISSO will lead efforts across the full lifecycle of the Risk Management Framework (RMF), ensuring systems are secure, compliant, and resilient against evolving threats.
**Location:** Washington DC
**Pay Rate:** $60 - $70 / hr
_This is a contract-to-hire opportunity. Applicants must be willing and able to work on a W2 basis and convert to FTE following contract duration. For our W2 consultants, we offer a great benefits package that includes Medical, Dental, and Vision benefits, 401k with company matching, and life insurance._
**Responsibilities:**
**Key Responsibilities**
· Implement and document security controls in alignment with NIST SP 800-53 and the Risk Management Framework (RMF).
· Manage the entire RMF lifecycle, including security categorization, control selection and implementation, security testing and evaluation, and continuous monitoring.
· Develop and maintain comprehensive security documentation: System Security Plans (SSPs), Security Assessment Reports (SARs), and Plans of Action and Milestones (POA&Ms).
· Conduct regular security scans, vulnerability assessments, and compliance testing.
· Support internal and external audits by preparing and submitting required documentation and evidence.
· Identify, document, and track system vulnerabilities and coordinate remediation efforts.
· Serve as the central point of contact for system-level cybersecurity issues and inquiries.
**Experience Requirements:**
**Required Qualifications**
· 5+ years of experience in an ISSO or equivalent cybersecurity role.
· Strong understanding of NIST RMF, FISMA, and CISA directives.
· Hands-on experience with vulnerability management and risk assessment tools.
· Excellent technical writing, documentation, and reporting skills.
· Ability to work independently and collaboratively in a remote environment.
**Preferred Skills**
· Experience supporting federal agencies or working in regulated environments.
· Familiarity with cloud security (AWS, Azure, etc.).
· Knowledge of GRC tools and SIEM platforms.
**Education Requirements:**
· A bachelor's degree is required
· A Secret or Top Secret security clearance is required
_Skills, experience, and other compensable factors will be considered when determining pay rate. The pay range provided in this posting reflects a W2 hourly rate; other employment options may be available that may result in pay outside of the provided range._
_W2 employees of Eliassen Group who are regularly scheduled to work 30 or more hours per week are eligible for the following benefits: medical (choice of 3 plans), dental, vision, pre-tax accounts, other voluntary benefits including life and disability insurance, 401(k) with match, and sick time if required by law in the worked-in state/locality._
_Please be advised- If anyone reaches out to you about an open position connected with Eliassen Group, please confirm that they have an Eliassen.com email address and never provide personal or financial information to anyone who is not clearly associated with Eliassen Group. If you have any indication of fraudulent activity, please contact ********************._
_About Eliassen Group:_
_Eliassen Group is a leading strategic consulting company for human-powered solutions. For over 30 years, Eliassen has helped thousands of companies reach further and achieve more with their technology solutions, financial, risk & compliance, and advisory solutions, and clinical solutions. With offices from coast to coast and throughout Europe, Eliassen provides a local community presence, balanced with international reach. Eliassen Group strives to positively impact the lives of their employees, clients, consultants, and the communities in which they operate._
_Eliassen Group is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status._
_Don't miss out on our referral program! If we hire a candidate that you refer us to then you can be eligible for a $1,000 referral check!_
$60-70 hourly 2d ago
Senior Analyst, Security Compliance (SOX IT)
Coinbase 4.2
Cyber security analyst job in Providence, RI
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program.
*What you'll be doing (ie. job duties):*
* Lead Security and IT initiatives to support the SOX roadmap and advance program maturity
* Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit
* Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion
* Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders
* Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management
* Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities
* Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership
* Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates
* Work closely with internal and external auditors to educate them about a complex technology control environment
* Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members
* Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry
* Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation
*What we look for in you (ie. job requirements):*
* Minimum of 5+ years of security/IT compliance or equivalent experience
* Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance
* Prior experience at a big 4 accounting firm
* Experience leading compliance initiatives from start to finish
* Proven understanding and audit experience of cloud technologies, AWS preferred
* Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision
* Strong oral and written communication skills
* Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment
* Ability to communicate with technical / non-technical stakeholders to align on shared outcomes
* Experience in Financial services, Big Tech, or FinTech
*Nice to haves:*
* BA or BS in a technical field or equivalent experience
* Security certifications e.g. CISA, CISSP, CISM or other relevant certifications
* Experience auditing in Crypto space
Position ID: P73675
\#LI-Remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$167,280-$196,800 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
$167.3k-196.8k yearly 60d+ ago
Information Security Sr Specialist
Citizens 2.9
Cyber security analyst job in Johnston, RI
This role is for a Data Protection Analyst working in the Data Discovery and Protection Program. The Analyst is responsible for supporting, developing, and enhancing the Data at Rest Protection Program for both on-premise and cloud environments. The colleague will engage with Business Units across the organization, produce metrics and documentation, and implement and support tools related to the data protection program.
A successful candidate will:
+ Assess existing scanning program to implement cloud scanning capabilities
+ Assist in deployment and maintenance of data scanning tools
+ Partner with other groups within the organization to identify and remediate data at rest access risk.
+ Work with risk partners to identify controls, determine control adequacy, and identify control monitoring opportunities and areas for improvement/enhancement
+ Assist in collecting, analyzing, and interpreting data access information and remediate permission compliance issues based on company security standards
+ Discern patterns of complex threat actor behavior, communicate an understanding of current and developing Cyber threats to key stakeholders, and stay current with emerging trends and threats in the field of insider threat
Qualifications
Required:
+ Understanding of information security concepts, best practices, and regulations related to data loss prevention
+ Understanding of enterprise security and networking technology and how the technology relates to the prevention, detection, and response of data loss
+ Advanced understanding of the Microsoft Office suite (e.g., Outlook, Word, Excel, PowerPoint, etc)
+ Excellent verbal and written communication skills (including but not limited to: correct English usage, grammar, spelling, punctuation, vocabulary, etc.).
+ Ability to execute work independently and as a team member with good interpersonal skills - using tact, patience and courtesy.
+ Experience as a security consultant
+ Working knowledge of cloud topology
+ Knowledge of file share security and Windows ACL administration
+ Familiarity with the Financial Services Industry
+ Knowledge of varying cloud platforms
+ Familiarity with cloud security at major cloud service providers
+ Certifications: Associate of (ISC)^2, CISSP, or similar.
Education:
+ Bachelor's degree in Information Security, Computer Science or a related field OR
+ Bachelor's degree in Business or other field + 3 years relevant experience
+ Equivalent years: BA/BA = HS + 5 years of experience
Pay Transparency
The salary range for this position is $97,049 - $145,574 per year. Actual pay is based on various factors including but not limited to the work location, and relevant skills and experience.
We offer competitive pay, comprehensive medical, dental and vision coverage, retirement benefits, maternity/paternity leave, flexible work arrangements, education reimbursement, wellness programs and more. Note, Citizens' paid time off policy exceeds the mandatory, paid sick or paid time-away policy of every local and state jurisdiction in the United States. For an overview of our benefits, visit ************************************** .
Some job boards have started using jobseeker-reported data to estimate salary ranges for roles. If you apply and qualify for this role, a recruiter will discuss accurate pay guidance.
Equal Employment Opportunity
Citizens, its parent, subsidiaries, and related companies (Citizens) provide equal employment and advancement opportunities to all colleagues and applicants for employment without regard to age, ancestry, color, citizenship, physical or mental disability, perceived disability or history or record of a disability, ethnicity, gender, gender identity or expression, genetic information, genetic characteristic, marital or domestic partner status, victim of domestic violence, family status/parenthood, medical condition, military or veteran status, national origin, pregnancy/childbirth/lactation, colleague's or a dependent's reproductive health decision making, race, religion, sex, sexual orientation, or any other category protected by federal, state and/or local laws. At Citizens, we are committed to fostering an inclusive culture that enables all colleagues to bring their best selves to work every day and everyone is expected to be treated with respect and professionalism. Employment decisions are based solely on merit, qualifications, performance and capability.
Why Work for Us
At Citizens, you'll find a customer-centric culture built around helping our customers and giving back to our local communities. When you join our team, you are part of a supportive and collaborative workforce, with access to training and tools to accelerate your potential and maximize your career growth
Background Check
Any offer of employment is conditioned upon the candidate successfully passing a background check, which may include initial credit, motor vehicle record, public record, prior employment verification, and criminal background checks. Results of the background check are individually reviewed based upon legal requirements imposed by our regulators and with consideration of the nature and gravity of the background history and the job offered. Any offer of employment will include further information.
$97k-145.6k yearly 29d ago
Cyber Security Specialist II
Zachry Holdings, Inc. 4.7
Cyber security analyst job in Stonington, CT
Position Synopsis: Individual will be relied upon to perform a variety of cybersecurity implementation and/or assessment activities involving power plant upgrades and/or new power plant projects. The individual will assist with planning, organizing, and preparing all activities related to cybersecurity when modifications are made at nuclear power facilities.
This includes the development of DA/CDA lists, CDA assessments, performance of cybersecurity walkdowns, cybersecurity testing, and CyberSecurity Assessment Team (CSAT) presentations.
The individual will become familiar with codes and standards applicable to the nuclear power industry as well as possess a working knowledge of applicable NRC regulations.
Typical activities include developing specifications and/or modification packages, defining design scope, developing design criteria documents, identifying, and selecting equipment, and configuration and testing of digital devices.
The individual must be able to work on project teams with other engineers to evaluate conditions as well as proposed modifications which will improve plant performance, safety, and reliability.
The individual will receive close supervision on unusual or difficult problems and general review of all aspects of work.
$65k-90k yearly est. Auto-Apply 60d+ ago
Cyber Security Specialist II
Zachry Group 4.5
Cyber security analyst job in Stonington, CT
Position Synopsis: Individual will be relied upon to perform a variety of cybersecurity implementation and/or assessment activities involving power plant upgrades and/or new power plant projects. The individual will assist with planning, organizing, and preparing all activities related to cybersecurity when modifications are made at nuclear power facilities. This includes the development of DA/CDA lists, CDA assessments, performance of cybersecurity walkdowns, cybersecurity testing, and CyberSecurity Assessment Team (CSAT) presentations. The individual will become familiar with codes and standards applicable to the nuclear power industry as well as possess a working knowledge of applicable NRC regulations. Typical activities include developing specifications and/or modification packages, defining design scope, developing design criteria documents, identifying, and selecting equipment, and configuration and testing of digital devices. The individual must be able to work on project teams with other engineers to evaluate conditions as well as proposed modifications which will improve plant performance, safety, and reliability. The individual will receive close supervision on unusual or difficult problems and general review of all aspects of work.
Other Required Qualifications (minimum): All applicants must possess excellent verbal and written communication skills and can effectively present technical topics. Proficient with Microsoft Office software; Word, Excel, Visio, PowerPoint, etc. as well as competency in software applications for email and databases. Effective time management skills are required. Ability to pass security and drug screening and maintain unescorted nuclear plant access is required. Successful candidate will be required to understand and comply with company policies, procedures and processes. Overtime work is required. Travel is required to client sites with occasional periods of field/office work.
Desired Qualifications: MS in Computer Science, Computer Information Systems, or Computer Engineering. Holds a current qualification to write cybersecurity assessments [e.g., CyberSecurity Specialist (CSS)] with an existing licensed nuclear facility. Currently badged and is a member of a critical group of an existing licensed nuclear facility.
Education Required (minimum): BS in Computer Science or equivalent. Cyber Certifications with additional experience will also be considered.
Experience Required (minimum): Minimum 3 years of experience in an engineering environment. Knowledge of cybersecurity concepts in the nuclear industry is required.
Submittal Requirements: Resume and cover letter are to be emailed to ***********************************.
Posting Requirements: This posting will be available from the Posted Date to the Removal Date period. Resumes received after the Removal Date (noted above) will not be considered.
Note: Relocation assistance is not available for this position
.
$63k-85k yearly est. Auto-Apply 60d+ ago
AI Security Analyst
PPL Corporation 4.8
Cyber security analyst job in Providence, RI
Company Summary Statement As one of the largest investor-owned utility companies in the United States, PPL Corporation (NYSE: PPL), is committed to creating long-term, sustainable value for our 3.5 million customers, our shareowners and the communities we serve. Our high-performing regulated utilities - PPL Electric Utilities, Louisville Gas and Electric, Kentucky Utilities and Rhode Island Energy - provide an outstanding experience for our customers, consistently ranking among the best utilities in the nation. PPL's companies are also addressing challenges head-on by investing in new infrastructure and technology that is creating a smarter, more reliable and resilient energy grid. We are committed to doing our part to advance a cleaner energy future and drive innovation that enables us to achieve net-zero carbon emissions by 2050 while maintaining energy reliability and affordability for the customers and communities we serve. PPL is a positive force in the cities and towns where we do business, providing support for programs and organizations that empower the success of future generations by helping to build and maintain strong, diverse communities today.
Overview
**NOTE: This is a hybrid position requiring on-site presence three days per week at one of our local offices in: Allentown, PA (Lehigh Valley); Louisville, KY or Providence, RI.** **LI-Hy #INDPPL**
PPL is seeking a passionate and technically skilled Junior to Mid-Level AI SecurityAnalyst to join our Product Security team. This role is ideal for someone with a strong foundation in cybersecurity and a growing expertise in AI/ML systems. You will implement and maintain security guardrails for AI solutions including Traditional ML, Generative AI, and Agentic AI. You'll work within our established AI Security Controls framework, which tailors' controls by AI type and emphasizes observability, traceability, risk management, and specialized safeguards for Generative and Agentic AI. You will collaborate with the Data & AI and Product Teams to ensure that AI-driven applications adhere to enterprise security standards and policies. You will help shape and secure the future of AI technologies across our enterprise, ensuring responsible and resilient adoption of AI in alignment with our security modernization goals.
Responsibilities
+ Collaborate with product teams to embed security into AI/ML models, pipelines, and applications throughout the SDLC.
+ Conduct security reviews for AI systems, including LLMs, generative models, and data pipelines.
+ Support the development of AI security policies, standards, and controls aligned with NIST, ISO, and emerging AI regulations.
+ Define and implement AI-specific risk controls, including model validation, bias mitigation, and explainability.
+ Collaborate with legal, compliance, and data privacy teams to ensure adherence to evolving AI regulations.
+ Assist in evaluating and implementing AI security tools for observability, model scanning, and data protection.
+ Help build awareness and training materials for secure AI development practices across agile teams.
+ All other duties and projects as assigned.
Qualifications
**Required Experience** :
+ Bachelor's degree in Computer Science, Information Security, or a related field.
+ 2+ years of experience in cybersecurity, with exposure to AI/ML technologies.
+ Familiarity with secure coding practices, threat modeling, and cloud-native environments.
+ Understanding of AI/ML concepts such as model training, inference, data labeling, and adversarial attacks.
+ Knowledge of common AI risks (such as prompt injection, data poisoning, model misuse, etc.) and cybersecurity concepts (authentication, encryption, network security) is required.
+ Strong communication and collaboration skills in agile environments (SAFe experience a plus).
+ Strong analytical skills to assess risks and vulnerabilities in complex systems.
**Preferred Qualifications** :
+ Professional certifications such as CCSK, CEH, or AI-specific credentials are highly desirable.
+ Experience with Microsoft AI security tools (MS Defender for Cloud, MS Defender for Cloud Apps, Azure AI Content Safety, MS Purview).
+ Experience with AI security tools (e.g., Zenity, HiddenLayer).
+ Exposure to Power Platform, Power BI, or other low-code tools, especially any experience implementing data governance or DLP (Data Loss Prevention) on those, is a plus.
+ Experience specifically in AI security or ML model governance is a strong plus.
+ Proficiency in scripting and automation for security testing is a plus.
**Required Experience** :
+ Bachelor's degree in Computer Science, Information Security, or a related field.
+ 2+ years of experience in cybersecurity, with exposure to AI/ML technologies.
+ Familiarity with secure coding practices, threat modeling, and cloud-native environments.
+ Understanding of AI/ML concepts such as model training, inference, data labeling, and adversarial attacks.
+ Knowledge of common AI risks (such as prompt injection, data poisoning, model misuse, etc.) and cybersecurity concepts (authentication, encryption, network security) is required.
+ Strong communication and collaboration skills in agile environments (SAFe experience a plus).
+ Strong analytical skills to assess risks and vulnerabilities in complex systems.
**Preferred Qualifications** :
+ Professional certifications such as CCSK, CEH, or AI-specific credentials are highly desirable.
+ Experience with Microsoft AI security tools (MS Defender for Cloud, MS Defender for Cloud Apps, Azure AI Content Safety, MS Purview).
+ Experience with AI security tools (e.g., Zenity, HiddenLayer).
+ Exposure to Power Platform, Power BI, or other low-code tools, especially any experience implementing data governance or DLP (Data Loss Prevention) on those, is a plus.
+ Experience specifically in AI security or ML model governance is a strong plus.
+ Proficiency in scripting and automation for security testing is a plus.
+ Collaborate with product teams to embed security into AI/ML models, pipelines, and applications throughout the SDLC.
+ Conduct security reviews for AI systems, including LLMs, generative models, and data pipelines.
+ Support the development of AI security policies, standards, and controls aligned with NIST, ISO, and emerging AI regulations.
+ Define and implement AI-specific risk controls, including model validation, bias mitigation, and explainability.
+ Collaborate with legal, compliance, and data privacy teams to ensure adherence to evolving AI regulations.
+ Assist in evaluating and implementing AI security tools for observability, model scanning, and data protection.
+ Help build awareness and training materials for secure AI development practices across agile teams.
+ All other duties and projects as assigned.
Remote Work
The company reserves the right to determine if this position will be assigned to work on-site, remotely, or a combination of both. Assigned work location may change. In the case of remote work, physical presence in the office/on-site may be required to engage in face-to-face interaction and coordination of work among direct reports and co-workers.
Equal Employment Opportunity
Our company is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, age, religion, sex, national origin, protected veteran status, sexual orientation, gender identify, genetic information, disability status, or any other protected characteristic.
$67k-81k yearly est. 36d ago
Information Security Specialist
Connecticut, Inc. 4.1
Cyber security analyst job in Wallingford, CT
Community Health Network of Connecticut, Inc. (CHNCT) is currently seeking an Information Security Specialist. This is a full-time, hybrid position requiring 2 days per week onsite in our Wallingford, CT office.
Primary Responsibilities:
Under the direction of the Director of Information Security, the Information Security Specialist is responsible for operations, auditing, and technical monitoring of CHNCT's Information Security and related activities.
These activities include but are not limited to implementing and maintaining Information Security related systems, policies and processes in compliance with applicable security regulations (i.e., HIPAA and State of CTSecurity laws), and establishing and developing security-related operating procedures and standards.
Works directly with contracted vendors for the implementation and maintenance of security hardware, software and services.
Assists with the selection and evaluation of security related state-of-the-art systems.
Tasks Performed:
Monitors and maintains all aspects of the information security program.
As a COMPUTER SECURITY INCIDENT RESPONSE TEAMS (CSIRT) member, logs and responds to incidents including communication of potential violations of the company's information security policies to CHNCT's Chief Information Security Officer.
Independently acts to prevent or deter security breaches or intrusions that threaten the integrity of mission critical data or applications.
Monitors email and Data Loss Prevention logs and responds to potential policy or regulatory violations.
Monitors Phishing alerts and end user notifications.
Audits network and file permissions structure and password and account maintenance.
Assists in the development and testing of the Disaster Recovery and Business Continuity Plans.
Processes exception requests and performs risk analysis on these and other customer requests.
Actively reviews threat alerts and determines relevance and criticality to the organization.
Contributes to project activities as a project team member or ad-hoc as requested.
Other duties as assigned.
Essential Functions:
Implementation and maintenance of Information security related software, hardware and systems.
Systems include but are not limited to phishing identification and prevention, Internet content filtering, Data Loss Prevention (DLP), Intrusion Detection/Prevention (IDS/IPS), Endpoint Detection and Response (EDR), Log Management, and Advanced Threat Mitigation.
Duties include information security policy administration and configuration, security related server management, Disaster Recovery Planning, proactively identifying or rapidly responding to customer security issues and security events.
Desired Education: 2 years post-secondary schooling
Desired Degree: Associate's degree
Desired Major: Computer Assurance or Computer Science
Desired Job Experience: 3+ years' direct information security experience, preferably in healthcare
Other Qualifications: Security+ or other security-related certification. Hands on exposure to providing information security operational support in a medium to large scale healthcare organization preferred. Knowledgeable in the management and setup of security related software and hardware Working knowledge of security administration, DLP, or other information security systems. Knowledge of EDR, EPP, IDS/IPS, AD and network infrastructure. Detail oriented, with meticulous attention to system and procedure documentation.
CHNCT Offers Great Benefits:
Medical, dental and vision coverage options
Flexible spending and health savings accounts
Group term life insurance
A 401(k) plan with company-match and immediate vesting
Voluntary accidental injury coverage
Tuition reimbursement and continuing education opportunities
A generous paid-leave bank and company holidays
Wellness program
We are dedicated to having a workplace where everyone feels valued, respected, and empowered to succeed. We embrace a wide range of perspectives and backgrounds, ensuring fair treatment and opportunities for all employees. We value our team's rich array of experiences and viewpoints, which contribute to our innovative and collaborative environment.
$87k-120k yearly est. Auto-Apply 27d ago
Information Security Specialist
Community Health Network of Connecticut, Inc. 4.3
Cyber security analyst job in Wallingford, CT
Community Health Network of Connecticut, Inc. (CHNCT) is currently seeking an Information Security Specialist. This is a full-time, hybrid position requiring 2 days per week onsite in our Wallingford, CT office.
Primary Responsibilities:
Under the direction of the Director of Information Security, the Information Security Specialist is responsible for operations, auditing, and technical monitoring of CHNCT's Information Security and related activities.
These activities include but are not limited to implementing and maintaining Information Security related systems, policies and processes in compliance with applicable security regulations (i.e., HIPAA and State of CTSecurity laws), and establishing and developing security-related operating procedures and standards.
Works directly with contracted vendors for the implementation and maintenance of security hardware, software and services.
Assists with the selection and evaluation of security related state-of-the-art systems.
Tasks Performed:
Monitors and maintains all aspects of the information security program.
As a COMPUTER SECURITY INCIDENT RESPONSE TEAMS (CSIRT) member, logs and responds to incidents including communication of potential violations of the company's information security policies to CHNCT's Chief Information Security Officer.
Independently acts to prevent or deter security breaches or intrusions that threaten the integrity of mission critical data or applications.
Monitors email and Data Loss Prevention logs and responds to potential policy or regulatory violations.
Monitors Phishing alerts and end user notifications.
Audits network and file permissions structure and password and account maintenance.
Assists in the development and testing of the Disaster Recovery and Business Continuity Plans.
Processes exception requests and performs risk analysis on these and other customer requests.
Actively reviews threat alerts and determines relevance and criticality to the organization.
Contributes to project activities as a project team member or ad-hoc as requested.
Other duties as assigned.
Essential Functions:
Implementation and maintenance of Information security related software, hardware and systems.
Systems include but are not limited to phishing identification and prevention, Internet content filtering, Data Loss Prevention (DLP), Intrusion Detection/Prevention (IDS/IPS), Endpoint Detection and Response (EDR), Log Management, and Advanced Threat Mitigation.
Duties include information security policy administration and configuration, security related server management, Disaster Recovery Planning, proactively identifying or rapidly responding to customer security issues and security events.
Desired Education: 2 years post-secondary schooling
Desired Degree: Associate's degree
Desired Major: Computer Assurance or Computer Science
Desired Job Experience: 3+ years' direct information security experience, preferably in healthcare
Other Qualifications: Security+ or other security-related certification. Hands on exposure to providing information security operational support in a medium to large scale healthcare organization preferred. Knowledgeable in the management and setup of security related software and hardware Working knowledge of security administration, DLP, or other information security systems. Knowledge of EDR, EPP, IDS/IPS, AD and network infrastructure. Detail oriented, with meticulous attention to system and procedure documentation.
CHNCT Offers Great Benefits:
Medical, dental and vision coverage options
Flexible spending and health savings accounts
Group term life insurance
A 401(k) plan with company-match and immediate vesting
Voluntary accidental injury coverage
Tuition reimbursement and continuing education opportunities
A generous paid-leave bank and company holidays
Wellness program
We are dedicated to having a workplace where everyone feels valued, respected, and empowered to succeed. We embrace a wide range of perspectives and backgrounds, ensuring fair treatment and opportunities for all employees. We value our team's rich array of experiences and viewpoints, which contribute to our innovative and collaborative environment.
$76k-108k yearly est. Auto-Apply 25d ago
Information Security Sr Specialist
Citizens Financial Group 4.3
Cyber security analyst job in Johnston, RI
This role is for a Data Protection Analyst working in the Data Discovery and Protection Program. The Analyst is responsible for supporting, developing, and enhancing the Data at Rest Protection Program for both on-premise and cloud environments. The colleague will engage with Business Units across the organization, produce metrics and documentation, and implement and support tools related to the data protection program.
A successful candidate will:
Assess existing scanning program to implement cloud scanning capabilities
Assist in deployment and maintenance of data scanning tools
Partner with other groups within the organization to identify and remediate data at rest access risk.
Work with risk partners to identify controls, determine control adequacy, and identify control monitoring opportunities and areas for improvement/enhancement
Assist in collecting, analyzing, and interpreting data access information and remediate permission compliance issues based on company security standards
Discern patterns of complex threat actor behavior, communicate an understanding of current and developing Cyber threats to key stakeholders, and stay current with emerging trends and threats in the field of insider threat
Qualifications
Required:
Understanding of information security concepts, best practices, and regulations related to data loss prevention
Understanding of enterprise security and networking technology and how the technology relates to the prevention, detection, and response of data loss
Advanced understanding of the Microsoft Office suite (e.g., Outlook, Word, Excel, PowerPoint, etc)
Excellent verbal and written communication skills (including but not limited to: correct English usage, grammar, spelling, punctuation, vocabulary, etc.).
Ability to execute work independently and as a team member with good interpersonal skills - using tact, patience and courtesy.
Experience as a security consultant
Working knowledge of cloud topology
Knowledge of file share security and Windows ACL administration
Familiarity with the Financial Services Industry
Knowledge of varying cloud platforms
Familiarity with cloud security at major cloud service providers
Certifications: Associate of (ISC)^2, CISSP, or similar.
Education:
Bachelor's degree in Information Security, Computer Science or a related field OR
Bachelor's degree in Business or other field + 3 years relevant experience
Equivalent years: BA/BA = HS + 5 years of experience
Pay Transparency
The salary range for this position is $97,049 - $145,574 per year. Actual pay is based on various factors including but not limited to the work location, and relevant skills and experience.
We offer competitive pay, comprehensive medical, dental and vision coverage, retirement benefits, maternity/paternity leave, flexible work arrangements, education reimbursement, wellness programs and more. Note, Citizens' paid time off policy exceeds the mandatory, paid sick or paid time-away policy of every local and state jurisdiction in the United States. For an overview of our benefits, visit ************************************** .
$97k-145.6k yearly Auto-Apply 30d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Hartford, CT
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 41d ago
Systems Security Analyst/Cyber Defense Analyst
Actionet 4.7
Cyber security analyst job in Newport, RI
DecisiveInstincts, LLC has an immediate opportunity for a Systems SecurityAnalyst / Cyber Defense Analyst in Newport, RI. This position requires a Top Secret/SCI clearance.
Immediate Opportunity: Systems SecurityAnalyst / Cyber Defense Analyst
Location: Newport, RI
Clearance Required: Top Secret/SCI
Key Responsibilities
Analyze, document, and develop integration, testing, operations, and maintenance for system security.
Utilize cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to monitor and mitigate threats.
Apply defensive measures to identify, analyze, and report security events.
Coordinate threat and mitigation strategies across the enterprise.
Required Experience
Network & Security Operations:
Install, configure, and maintain security devices on EDU, SIPRNET, DMZ, and commercial ISP networks.
Ensure compliance with DoD security and information assurance policies.
Support unclassified and classified information security services.
Security Tools & Technologies:
Operate ACAS, McAfee HBSS, Corelight, and Cortex for threat detection and management.
Implement SOAR orchestration and SIEM event correlation & analysis.
Manage cloud security systems for DLP, email security, and threat prevention.
Perform vulnerability scanning, penetration testing, and firewall administration.
Cybersecurity Expertise:
Analyze network alerts and identify causes of security incidents.
Conduct security reviews, gap analysis, and risk mitigation.
Apply knowledge of cyber threats, attack vectors, and mitigation strategies.
Understand TCP/IP, DHCP, DNS, and OSI Model.
Perform packet-level analysis and collect data from cyber defense resources.
Education & Certifications
Degree Requirement:
Bachelor's in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science (ABET-accredited or CAE-designated institution).
Certifications may be considered in lieu of a degree.
************Direct Applicants Only - No Agencies or Third-Party Recruiters***********
$70k-97k yearly est. Auto-Apply 60d+ ago
Risk Management Security Analyst
Connecticut Health Insurance
Cyber security analyst job in Hartford, CT
Full-time Description
The Risk Management SecurityAnalyst is responsible for assisting Access Health CT (AHCT) with its Information Security Risk Management Program, satisfying both regulatory compliance requirements and managing security risk to an acceptable level. This role is a hands-on role that will be responsible for actively identifying, detecting, monitoring, maintaining, analyzing, advising, and responding to ongoing IT security and compliance needs under the guidance of the Associate Director, IT Security & Compliance.
The individual selected for this role will collaborate with various cross-functional teams inclusive of partners and vendors in identifying, evaluating, categorizing, tracking and monitoring enterprise IT security risk and will assist with development and maintenance of IT security controls in adherence with federal and other government required cybersecurity frameworks.
Furthermore, the individual in this role will be responsible for assisting with development, automation, and ongoing maintenance of end-to-end risk register and related risk management work streams and processes (i.e., risk assessments, risk mitigation strategies, etc.) by utilizing existing Archer Governance, Risk, and Compliance (GRC) platform and other state-of-the-art security tools. This role reports to the Associate Director of IT Security and Compliance and has no direct reports.
*Please note that this position is available to individuals authorized to work in the U.S. without the need for sponsorship
.
Responsibilities
Conduct third-party security risk assessments and security reviews in accordance with regulatory requirements.
Collaborate with IT, Legal, product owners, and business teams to ensure appropriate IT Security and Compliance requirements are incorporated into new and ongoing engagements and initiatives.
Support development, maintenance, and operation of a centralized enterprise cyber risk register and associated activities in Archer GRC platform.
Define and report on key risk metrics to Management on regular basis.
Liaise with IT, Legal, product owners, and business teams to provide accurate and timely responses to internal and external IT Security and Compliance inquiries and related activities.
Assist with technical vulnerability assessments and security reviews of infrastructure, network, applications, and databases, utilizing Nessus scanning software and other state- of- the- art security tools.
Facilitate, track, and manage vulnerability remediation based on risk categorization, with timely assessing and communicating risk, documenting, and reporting on mitigation status.
Actively monitor, analyze, and generate reports on company's security landscape utilizing SIEM and other state- of- the- art security tools.
Provide guidance, technical expertise, and training to the enterprise to ensure optimal use of the Archer GRC platform.
Develop and maintain technical documentation, such as security control implementations, System Security Plan (SSP), user guides, process documentation, and configuration details.
Identify opportunities for process optimization, automation, and streamlining tasks.
Participate actively in frequent regulatory submissions and inquiries.
Manage and continuously monitor remediation plans for compliance and mitigation of risk.
Assist with responding to information system security incidents, including investigation of, countermeasures to, and recovery from computer-based attacks, unauthorized access, and policy breaches.
Bridge information security requirements with business processes and IT systems and projects.
Analyze and recommend security controls and procedures in business processes related to use of information systems and assets, and monitor for compliance.
Develop, administer, and provide advice, evaluation, and oversight for information security training and awareness programs.
Maintain a current and comprehensive understanding of relevant industry standards to incorporate into the risk management strategy, framework, and program.
Completes other tasks, as assigned.
Requirements
Qualifications
Bachelor's degree in Management Information Systems, Cybersecurity, Computer Science or related Information Technology field and/or equivalent industry experience.
A minimum of 3-5 years of combined hands-on experience in Information Security, Information Technology, Audit, or Governance, Risk, and Compliance.
One or more of the following security certifications is preferred or in process:
Certified Information Systems Auditor (CISA)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Global Information Assurance Certification (GIAC)
Working knowledge of common Cybersecurity Frameworks including the National Institute of Standards and Technology Cybersecurity Framework (NIST-CSF), NIST SP 800-53, FedRAMP, and Center for Internet Security (CIS) Critical Security Controls.
Hands-on experience with GRC platforms and other state-of-the-art security tools.
Experience with development and management of metrics and reporting.
Applied knowledge with data mapping, risk assessments, third-party risk management, audits, compliance tracking, and security controls management.
Solid understanding of cybersecurity best practices and how to implement and apply at a business setting.
Demonstrated success in problem solving, project management, business analysis, and data analysis.
Solid organizational and excellent verbal and written communication skills.
Detail oriented and highly organized, with the ability to thrive in a fast-paced environment and prioritize accordingly.
Ability to successfully multi-task while working independently or within a group environment.
Ability to collaborate with internal and external stakeholders in an effective manner that produces desired results.
Physical Demands: the physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is frequently required to sit, stand, hear, use hands to type data, and utilize a phone or other electronic communication devices. This employee may occasionally have to operate business machines. Specific vision abilities required in this job include close vision and the ability to adjust focus.
Work Environment: this is an in-office role on Tuesdays and Wednesdays and a remote role 3 days per week. The noise level in the work environment is usually low to moderate. The role requires the ability to work offsite with stakeholders at their locations, e.g., BITS, DSS. Requires fast-paced deadlines and has a high stress at times. Occasional local travel and some travel within the U.S.
Affirmative Action and Equal Opportunity Employer
Salary Description $79,000 to $88,000 DOE
How much does a cyber security analyst earn in New London, CT?
The average cyber security analyst in New London, CT earns between $69,000 and $124,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in New London, CT