Post job

Cyber security analyst jobs in Newburgh, NY

- 23 jobs
All
Cyber Security Analyst
Security Engineer
Securities Analyst
Information Security Analyst
Network Security Consultant
Network Security Analyst
Cyber Security Engineer
Cyber Security Specialist
Information Security Engineer
Information Systems Security Officer
Senior Security Engineer
  • Network Security Analyst

    Skadden 4.9company rating

    Cyber security analyst job in White Plains, NY

    We invite you to review our current business services professionals openings to learn about the opportunities available across the firm. About Us Skadden, Arps, Slate, Meagher & Flom LLP has forged a reputation as one of the most prestigious law firms in the world. Relying on innovation, intellect, teamwork and tenacity, our lawyers deliver the highest quality advice and novel solutions to our clients' legal issues. We are known for handling the most complex transactions, litigation/controversy issues, and regulatory matters, as well as for the strong partnerships we build with clients and each other. Our attorneys, who reflect a broad range of experiences and perspectives, work together seamlessly across 50-plus practices and 21 offices in the world's major financial centers. The Opportunity We are seeking two Network Security Analysts to join our Firm. These positions will be based in our White Plains office (hybrid), and please note the roles have different shift times, listed below. The Network Security Analysts are responsible for implementing and supporting network security solutions for the Firm and, implementing and enforcing practical solutions to secure the Firm's internal and external network infrastructure. Available Shift Times (EST- Hybrid) 1.) Saturday - Sunday: 7:00 a.m. - 8:00 p.m. EST & Monday 7:00 a.m. - 7:00 p.m. 2.) Monday - Friday: 2:00 p.m. - 10:00 p.m. Note: The scheduled hours listed may be flexible and will be discussed during the interview process. Responsibilities Performs daily review of automated security reports and escalate as necessary. Responds to system generated security alerts and coordinate responses. Assists with internal audits, vulnerability scans and risk assessments. Assists with annual penetration testing, review of findings and tracking issue resolution. Participates in evaluating new technologies or new versions of existing products. Works with project teams to implement secure network connectivity solutions. Writes and maintains technical documentation including procedures and troubleshooting guides. Demonstrates effective interpersonal, written and verbal communication skills to facilitate effective work relationships with others. Manages Firm resources responsibly. Complies with and understands Firm operation, policies and procedures. Performs other related duties as assigned. Qualifications Knowledge of relevant firm computer software programs (e.g., Outlook, Excel, PowerPoint), with the ability to learn new software and operating systems Proficient with Access, Project and Visio Thorough knowledge of network management and security technologies and approaches Thorough knowledge of security techniques, latest protocols and defenses Proficient with Microsoft Active Directory and Operating Systems Basic ability to program scripts and batch files Demonstrates effective interpersonal and communication skills, both verbally and in writing Demonstrates close attention to detail Excellent analytical, troubleshooting, organizational, and planning skills Ability to handle multiple projects and shifting priorities Ability to handle sensitive matters and maintain confidentiality Ability to organize and prioritize work Ability to work well in a demanding and fast-paced environment Ability to work well independently as well as effectively within a team Ability to use discretion and exercise independent and sound judgment Flexibility to adjust hours and work the hours necessary to meet operating and business needs Education/Experience Bachelor's degree or equivalent Minimum of two years' experience in multi-national enterprise IT Culture & Life at Skadden What makes Skadden special is our people and the culture, community and spirit of collaboration we have created. We believe in teamwork and inspiring each other to be our best in an atmosphere that promotes professionalism and excellence in all that we do. We know that inclusion and drawing on the strength of a wide spectrum of talent only make us better and is vital to the firm's success. Our goal is for everyone at the firm to enjoy a challenging career with opportunities for development and growth and to support the well-being of our attorneys and business services professionals. Benefits The overall well-being of our team is important to us. We offer generous benefits to help you achieve wellness in all areas of your life. Competitive salaries and year-end discretionary bonuses. Comprehensive health care (medical, dental, vision), savings plan/401(k) and voluntary benefits. Generous paid time off. Paid leave options, including parental. In-classroom, remote, and on-demand learning and professional development opportunities. Robust well-being classes and programs. Opportunities to give back and make an impact in local communities. For further details, please visit: ******************************************************* Skadden is an Equal Opportunity Employer (Disability/Vet/other protected categories). For more information, please visit Skadden.com/careers. The starting base salary for this position is expected to be within the range listed under Salary Details. Actual salary will be determined based on skills, experience (to the extent relevant) and other-job related factors, consistent with applicable law. Salary Details $125,000 -$140,000 EEO Statement Skadden is an Equal Opportunity Employer. It does not discriminate against applicants or employees based on any legally impermissible factor including, but not limited to, race, color, religion, creed, sex, national origin, ancestry, age, alienage or citizenship status, marital or familial status, domestic partnership status, caregiver status, sexual orientation, gender, gender identity or expression, change of sex or transgender status, genetic information, medical condition, pregnancy, childbirth or related medical conditions, sexual and reproductive health decisions, disability, any protected military or veteran status, or status as a victim of domestic or dating violence, sexual assault or offense, or stalking. Applicants who require an accommodation during the application process should contact Lara Bell at **************. Skadden Equal Employment Opportunity Policy Skadden Equal Employment Opportunity Policy Applicants Have Rights Under Federal Employment Law Applicants Have Rights Under Federal Employment Law In accordance with the Transparency in Coverage Rule, click here to review machine-readable files made available by UnitedHealthcare: Transparency in Coverage
    $125k-140k yearly Auto-Apply 35d ago
  • Specialist Director, Cyber TSA

    KPMG 4.8company rating

    Cyber security analyst job in Stamford, CT

    KPMG Advisory practice is currently our fastest growing practice. We are seeing tremendous client demand, and looking forward we do not anticipate that slowing down. In this ever-changing market environment, our professionals must be adaptable and thrive in a collaborative, team-driven culture. At KPMG, our people are our number one priority. With a wealth of learning and career development opportunities, a world-class training facility and leading market tools, we make sure our people continue to grow both professionally and personally. If you're looking for a firm with a strong team connection where you can be your whole self, have an impact, advance your skills, deepen your experiences, and have the flexibility and access to constantly find new areas of inspiration and expand your capabilities, then consider a career in Advisory. KPMG is currently seeking a Specialist Director, MAST Application Penetration Testing Lead to join our Managed Services practice. Responsibilities: * Lead the strategic delivery of Managed Application Security Testing (MAST) services, ensuring alignment with client objectives and industry best practices * Execute go-to-market (GTM) strategies for MAST offerings, collaborating with cross-functional teams to drive market penetration and revenue growth * Oversee the design and implementation of scalable security testing frameworks across diverse application environments, including cloud-native and hybrid architectures * Provide subject matter expertise in application security, guiding clients through risk assessments, remediation planning, and secure development lifecycle integration * Build and maintain strong client relationships, serving as a trusted advisor and ensuring high levels of satisfaction and retention * Mentor and lead a team of security professionals, fostering a culture of innovation, accountability, and continuous improvement * Act with integrity, professionalism, and personal responsibility to uphold KPMG's respectful and courteous work environment Qualifications: * Minimum eight years of recent experience in application security, penetration testing, or related cybersecurity domains, with at least three years in a leadership or director-level role * Master's degree from an accredited college or university in cybersecurity, computer science, or related field is preferred; Bachelor's degree from an accredited college or university is required * Deep understanding of application security testing methodologies, tools (for example, DAST, SAST, IAST), and secure SDLC practices * Proven experience developing and executing GTM strategies for security services or technology solutions * Strong client-facing skills with the ability to communicate complex technical concepts to non-technical stakeholders * Excellent verbal/written communication, presentation, and analytical skills * Ability to travel as required * Applicants must be authorized to work in the U.S. without the need for employment-based visa sponsorship now or in the future; KPMG LLP will not sponsor applicants for U.S. work visa status for this opportunity (no sponsorship is available for H-1B, L-1, TN, O-1, E-3, H-1B1, F-1, J-1, OPT, CPT or any other employment-based visa) KPMG LLP and its affiliates and subsidiaries ("KPMG") complies with all local/state regulations regarding displaying salary ranges. If required, the ranges displayed below or via the URL below are specifically for those potential hires who will work in the location(s) listed. Any offered salary is determined based on relevant factors such as applicant's skills, job responsibilities, prior relevant experience, certain degrees and certifications and market considerations. In addition, KPMG is proud to offer a comprehensive, competitive benefits package, with options designed to help you make the best decisions for yourself, your family, and your lifestyle. Available benefits are based on eligibility. Our Total Rewards package includes a variety of medical and dental plans, vision coverage, disability and life insurance, 401(k) plans, and a robust suite of personal well-being benefits to support your mental health. Depending on job classification, standard work hours, and years of service, KPMG provides Personal Time Off per fiscal year. Additionally, each year KPMG publishes a calendar of holidays to be observed during the year and provides eligible employees two breaks each year where employees will not be required to use Personal Time Off; one is at year end and the other is around the July 4th holiday. Additional details about our benefits can be found towards the bottom of our KPMG US Careers site at Benefits & How We Work. Follow this link to obtain salary ranges by city outside of CA: ********************************************************************** California Salary Range: $153700 - $319000 KPMG offers a comprehensive compensation and benefits package. KPMG is an equal opportunity employer. KPMG complies with all applicable federal, state and local laws regarding recruitment and hiring. All qualified applicants are considered for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, citizenship status, disability, protected veteran status, or any other category protected by applicable federal, state or local laws. The attached link contains further information regarding KPMG's compliance with federal, state and local recruitment and hiring laws. No phone calls or agencies please. KPMG recruits on a rolling basis. Candidates are considered as they apply, until the opportunity is filled. Candidates are encouraged to apply expeditiously to any role(s) for which they are qualified that is also of interest to them. Los Angeles County applicants: Material job duties for this position are listed above. Criminal history may have a direct, adverse, and negative relationship with some of the material job duties of this position. These include the duties and responsibilities listed above, as well as the abilities to adhere to company policies, exercise sound judgment, effectively manage stress and work safely and respectfully with others, exhibit trustworthiness, and safeguard business operations and company reputation. Pursuant to the California Fair Chance Act, Los Angeles County Fair Chance Ordinance for Employers, Fair Chance Initiative for Hiring Ordinance, and San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
    $73k-96k yearly est. 60d+ ago
  • Senior Security Engineer, Insider Threat

    Doordash 4.4company rating

    Cyber security analyst job in Washington, NY

    About the Team At DoorDash we're building the industry's most scalable and reliable delivery network to support our three-sided marketplace of consumers, merchants, and Dashers. Security is integral to the success of the business, as we secure the data and protect the privacy of our business and various stakeholders. The Security Operations team spans several capabilities, to include Threat Response, Threat Hunt, Threat Intelligence, Detection Engineering, Corporate Security, and Security Platform Engineering. Our Mission is to create a secure DoorDash environment through proactive threat preparation and rapid response. We are committed to protecting our people, partners, customers, and technologies with robust safeguards and unwavering vigilance. About the Role The Insider Threat Investigator will be a foundational member of the Internal Investigations team, Security Operations. This role will be responsible for monitoring, detecting, investigating, and responding to anomalous events and behaviors that may pose risk to the company. This is a critical role that will analyze threat intelligence, develop use cases, conduct data analysis, execute complex investigations, drive detection engineering, write reports, advise on preventative controls, and collaborate with multiple internal teams to ensure coordinated investigation and response efforts. You will report into the Director, Security Operations under the Chief Information Security Officer. You're excited about this opportunity because you will… Use monitoring and detection platforms to investigate anomalous activity for potential insider risk Advise and assist in the onboarding and implementation of custom tooling designed to alert on anomalous behaviors Create and maintain a use case library to inform detections, and develop corresponding playbooks and escalation procedures Create standard operating procedures and cross-functional processes to govern investigation and response collaboration between teams Prepare investigative reports and briefings for leadership Maintain chain-of-evidence and engage with External Law Enforcement, when required Lead training or other education and awareness opportunities for the enterprise as required We're excited about you because… 7+ years of experience in federal law enforcement, incident response, or insider threat investigations. Experience with a broad range of technologies including endpoint detection and network technologies, SOAR/SIEM platforms, User Entity Behavior Analytics (UEBA) platforms, and User Activity Monitoring (UAM), and Data Loss Prevention (DLP) tools Deep experience in conducting ethical, legal, complex investigations Understanding of cloud and distributed IT environments Familiarity with log sources, forwarders, parsing, and data pipelines Experience partnering with cross functional teams to support an investigation Excellent understanding of information security operations related frameworks and standards (e.g., MITRE Att&ck and NIST) Excellent verbal and written communication, presentation, and stakeholder management skills Relevant certifications (e.g. CDITR, SEI certs, ACFE, ATAP) Must be comfortable regularly exercising discretion and independent judgment in performing job duties, including evaluating options, making informed decisions, and determining appropriate courses of action within the scope of assigned responsibilities. We expect this position to be filled by 9/9/25. Notice to Applicants for Jobs Located in NYC or Remote Jobs Associated With Office in NYC Only We use Covey as part of our hiring and/or promotional process for jobs in NYC and certain features may qualify it as an AEDT in NYC. As part of the hiring and/or promotion process, we provide Covey with job requirements and candidate submitted applications. We began using Covey Scout for Inbound from August 21, 2023, through December 21, 2023, and resumed using Covey Scout for Inbound again on June 29, 2024. The Covey tool has been reviewed by an independent auditor. Results of the audit may be viewed here: Covey Compensation The successful candidate's starting pay will fall within the pay range listed below and is determined based on job-related factors including, but not limited to, skills, experience, qualifications, work location, and market conditions. Base salary is localized according to an employee's work location. Ranges are market-dependent and may be modified in the future. In addition to base salary, the compensation for this role includes opportunities for equity grants. Talk to your recruiter for more information. DoorDash cares about you and your overall well-being. That's why we offer a comprehensive benefits package to all regular employees, which includes a 401(k) plan with employer matching, 16 weeks of paid parental leave, wellness benefits, commuter benefits match, paid time off and paid sick leave in compliance with applicable laws (e.g. Colorado Healthy Families and Workplaces Act). DoorDash also offers medical, dental, and vision benefits, 11 paid holidays, disability and basic life insurance, family-forming assistance, and a mental health program, among others. To learn more about our benefits, visit our careers page here. See below for paid time off details: For salaried roles: flexible paid time off/vacation, plus 80 hours of paid sick time per year. For hourly roles: vacation accrued at about 1 hour for every 25.97 hours worked (e.g. about 6.7 hours/month if working 40 hours/week; about 3.4 hours/month if working 20 hours/week), and paid sick time accrued at 1 hour for every 30 hours worked (e.g. about 5.8 hours/month if working 40 hours/week; about 2.9 hours/month if working 20 hours/week). The national base pay range for this position within the United States, including Illinois and Colorado. $159,800 - $235,000 USD About DoorDash At DoorDash, our mission to empower local economies shapes how our team members move quickly, learn, and reiterate in order to make impactful decisions that display empathy for our range of users-from Dashers to merchant partners to consumers. We are a technology and logistics company that started with door-to-door delivery, and we are looking for team members who can help us go from a company that is known for delivering food to a company that people turn to for any and all goods. DoorDash is growing rapidly and changing constantly, which gives our team members the opportunity to share their unique perspectives, solve new challenges, and own their careers. We're committed to supporting employees' happiness, healthiness, and overall well-being by providing comprehensive benefits and perks including premium healthcare, wellness expense reimbursement, paid parental leave and more. Our Commitment to Diversity and Inclusion We're committed to growing and empowering a more inclusive community within our company, industry, and cities. That's why we hire and cultivate diverse teams of people from all backgrounds, experiences, and perspectives. We believe that true innovation happens when everyone has room at the table and the tools, resources, and opportunity to excel. Statement of Non-Discrimination: In keeping with our beliefs and goals, no employee or applicant will face discrimination or harassment based on: race, color, ancestry, national origin, religion, age, gender, marital/domestic partner status, sexual orientation, gender identity or expression, disability status, or veteran status. Above and beyond discrimination and harassment based on “protected categories,” we also strive to prevent other subtler forms of inappropriate behavior (i.e., stereotyping) from ever gaining a foothold in our office. Whether blatant or hidden, barriers to success have no place at DoorDash. We value a diverse workforce - people who identify as women, non-binary or gender non-conforming, LGBTQIA+, American Indian or Native Alaskan, Black or African American, Hispanic or Latinx, Native Hawaiian or Other Pacific Islander, differently-abled, caretakers and parents, and veterans are strongly encouraged to apply. Thank you to the Level Playing Field Institute for this statement of non-discrimination. Pursuant to the San Francisco Fair Chance Ordinance, Los Angeles Fair Chance Initiative for Hiring Ordinance, and any other state or local hiring regulations, we will consider for employment any qualified applicant, including those with arrest and conviction records, in a manner consistent with the applicable regulation. If you need any accommodations, please inform your recruiting contact upon initial connection.
    $159.8k-235k yearly Auto-Apply 60d+ ago
  • Cyber Security Engineer

    Danbury Hospital 4.7company rating

    Cyber security analyst job in Danbury, CT

    at Nuvance Health The Cyber Security Engineer will have responsibility for incident response along with a desire to relentlessly champion best practices. This role will perform all functions required to support day-to-day data security operations, supporting and maintaining a broad suite of cyber security operations infrastructure, serving as a tier 2 escalation point during incident response and investigations and monitoring compliance with IT security policy. Participate in the planning, design, installation, maintenance and tuning of security operations systems in support of security policies and best practice. Work with Information Technology staff and business units to assess risk and address security issues. Responsibilities: • Manage security responsibilities, including firewalls, proxy systems, SIEM, EDR and other security devices. 15% • Strong skills implementing and tuning security components. 15% • Server as an escalation point during incident response and investigations. 15% • Maintain cyber security operations tool to insure detection, response and remediation of latest security threats 15% • Create and review reports on event and incidents. 10% • Stay up to date with latest security threats and assist with developing defense strategy's to combat them. 10 % • Investigate and respond to security violations 10% • Ability to maintain in depth knowledge of security and networking infrastructure utilized by the company including the management and reporting of each. 10% Education Skills Experience • Bachelor's degree in computer science field required • 2 or more years Security Operations with a minimum of 4 years IT experience. • Demonstrated experience in Incident response investigations. • Working knowledge of EDR technologies. • Working knowledge of SIEM technologies. • Working knowledge of common vulnerability management tools. • Working knowledge of enterprise firewall technologies preferred. • Working knowledge of web filtering and proxies preferred. • Working knowledge of MDM solution preferred. • Experience with DLP and IPS/IDS systems preferred. • Working knowledge of email filtering product preferred. • Working knowledge of litigation hold processing and forensic investigations preferred. • Experience participating in Red/Blue/Purple team exercises. • Experience working with information security practices, networks, software, and hardware. Other Information: • CISSP, CEH, or other equivalent certification is a plus. • Disaster recovery and business continuity experience is a plus. • Working knowledge with HIPAA regulations as they pertain to the healthcare industry. Working Conditions: Manual: Some manual skills/motor coord & finger dexterity Occupational: Little or no potential for occupational risk Physical Effort: Sedentary/light effort. May exert up to 10 lbs. force Physical Environment: Generally pleasant working conditions Company: Nuvance Health Org Unit: 1795 Department: Information Security Exempt: Yes Salary Range: $40.43 - $75.10 Hourly
    $40.4-75.1 hourly Auto-Apply 59d ago
  • Information Security Analyst

    Millenniumsoft 3.8company rating

    Cyber security analyst job in Franklin Lakes, NJ

    Information Security Analyst Duration : 12 Months Total Hours/week : 40.00 Client: Medical Device Company Job Category: Operations/Technical Level Of Experience: Senior Level Employment Type: Contract on W2 (Need US Citizens Or GC Holders Only) Job Description: Information Security Analyst, Threat and Vulnerability Management This role will focus on Tactical Intelligence and Vulnerability Management. Threat and Vulnerability Management This person has experience in risk prioritization, navigating sources for identification and assessment of threats, and conducting cross-functional awareness for addressing risk. They will have experience assisting with vulnerability scanning and analysis, threat intelligence tools and working across a matrixed environment to assess indicators and triage risk. You will leverage a broad array of threat information. Additionally, you will proactively drive hunting and analysis and conduct technical research and analysis on emerging threats. You are comfortable providing fact-based reports to various levels of the organization within a fast-paced environment. You have previous tactical intelligence or vulnerability management experience, understand the fundamentals of reducing attack surfaces, and possess effective analytical skills. You will be accountable for setting your own work direction and completing tasks. Key Responsibilities (Top Tasks & Outcomes for Which This Position Will be Accountable) Experience recognizing threats and conducting analysis on emerging threats and how they relate specifically to client Provide written analysis of findings to communicate potential risks and impact Experience in network security analysis and log-centric analysis (SIEM) Understanding and reporting of attacker Indicators of Compromise Monitoring intrusion detection systems and identifying host and network-based intrusions via intrusion detection technologies Provide attack surface management training and development Manage risk reporting and escalation to cross-functional teams in a cooperative manner Other responsibilities as necessary Perform risk identification and triage with incident management Assist with additional projects as needed Skills and Knowledge Required Strong communication and project management skills Requires a highly motivated, dynamic and customer-centric associate who thrives in a challenging and changing environment Working knowledge of crisis management communication, incident response and handling methodologies, NIST cybersecurity standards and FDA cybersecurity guidance Effective meeting management and group facilitation skills Experience: 2-3 years' experience in a security operations full-time role Educational A minimum of a bachelor's degree required. Ideal candidate will have a degree in computer science, communication, or other technical discipline. Knowledge, Skills & Abilities In-depth knowledge of computer operating systems, including Windows, IoS and Linux a plus Experience with intelligence tools and applications Knowledge of Healthcare rubrics for vulnerability scoring and threat modelling Preferred Certifications: CERT-Certified Computer Security Incident Handler Certification, CISSP, HCISSP Detail-oriented with the ability to promptly assess documents for accuracy as well as consistency Strong interpersonal skills with the ability to influence others in a positive and effective manner Ability to work in a team environment Excellent communication skills; both oral and written
    $87k-123k yearly est. 60d+ ago
  • Emergency Response Team (ERT) Security Analyst

    Radware

    Cyber security analyst job in Mahwah, NJ

    What you need: · At least 1 year experience in application security or Master's degree in Cyber Security · Good understanding of network design (e.g. LAN/WAN, switches/routers, routing protocols such as BGP and OSPF) and protocols (e.g., IPv4, TCP/IP, VPN, IPSec, HTTP, DNS) · Good understanding of and experience with security · Wireshark, Kali Linux · Customer and service oriented · Good troubleshooting and diagnosis capabilities · Willing to be on alert during off-work hours · Excellent communication skills and team work · Excellent time management, multi-tasking, and prioritization skills · Perceptive, fast learner, and able to perform well under pressure How can you stand out: · Experience in similar positions/companies · BSc/BA in Computer Science or equivalent · Knowledge in scripting language · Graduated Networking or Security courses Why you should join us: Employees from more than 40 countries have chosen Radware as a place where they can belong. Radware has been recognized by Glassdoor and BDI as one of the World's Best Places to Work, ranking among the top 100 companies across the globe in the IT category. Radware has also been named a Gold Winner for Application Security in the 2023 Globee Cybersecurity Awards, by Forrester a Leader in DDoS Protection, and has been named a Leader in WAF Market by Quadrant Knowledge Solutions. We are equally committed to our people. We strive to create a dynamic work environment that celebrates diversity, promotes equality, and thrives on the unique contributions of each individual. If you are ready to be part of a global-minded company that is inspired to create a better, safer future; and if and want to fight for the good guys and be at the forefront of helping companies protect their most critical assets from today's cyber adversaries, then you've found the right fit at Radware. Salary Range\: $93k-$118k #LI-TM1 Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. At Radware, we live and breathe cybersecurity. It is our passion. Each day, our international team works to earn the trust of more than 12,500 organizations around the globe. Keeping them safe is our mission. To that end, we go head-to-head with politically motivated hacktivists, dangerous nation-state threat actors and other notorious cyber attackers - these are not your average adversaries. Backed by nearly 30 years of experience, Radware is best known for its technical excellence and innovative network and application security solutions. That is why it is so important that we build our team with bold and bright talent. About the Team\: The Security Analyst will join the Emergency Response Team in Radware's Managed Services business unit. The ERT Team provides immediate and direct security support for customers under attack, ensuring the continued functioning of protected services and, ultimately, customer satisfaction. What is the job\: The Emergency Response Team (ERT) Security Analyst fuels the success of customers by serving as the primary contact when timely assistance is needed the most. If you are an energetic, upstart engineer who enjoys working in a fast-paced environment and interacting with people under pressure, this could be the position for you.
    $93k-118k yearly Auto-Apply 60d+ ago
  • Emergency Response Team (ERT) Security Analyst

    Radware Ltd.

    Cyber security analyst job in Mahwah, NJ

    Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. At Radware, we live and breathe cybersecurity. It is our passion. Each day, our international team works to earn the trust of more than 12,500 organizations around the globe. Keeping them safe is our mission. To that end, we go head-to-head with politically motivated hacktivists, dangerous nation-state threat actors and other notorious cyber attackers - these are not your average adversaries. Backed by nearly 30 years of experience, Radware is best known for its technical excellence and innovative network and application security solutions. That is why it is so important that we build our team with bold and bright talent. About the Team: The Security Analyst will join the Emergency Response Team in Radware's Managed Services business unit. The ERT Team provides immediate and direct security support for customers under attack, ensuring the continued functioning of protected services and, ultimately, customer satisfaction. What is the job: The Emergency Response Team (ERT) Security Analyst fuels the success of customers by serving as the primary contact when timely assistance is needed the most. If you are an energetic, upstart engineer who enjoys working in a fast-paced environment and interacting with people under pressure, this could be the position for you. What you need: * At least 1 year experience in application security or Master's degree in Cyber Security * Good understanding of network design (e.g. LAN/WAN, switches/routers, routing protocols such as BGP and OSPF) and protocols (e.g., IPv4, TCP/IP, VPN, IPSec, HTTP, DNS) * Good understanding of and experience with security * Wireshark, Kali Linux * Customer and service oriented * Good troubleshooting and diagnosis capabilities * Willing to be on alert during off-work hours * Excellent communication skills and team work * Excellent time management, multi-tasking, and prioritization skills * Perceptive, fast learner, and able to perform well under pressure How can you stand out: * Experience in similar positions/companies * BSc/BA in Computer Science or equivalent * Knowledge in scripting language * Graduated Networking or Security courses Why you should join us: Employees from more than 40 countries have chosen Radware as a place where they can belong. Radware has been recognized by Glassdoor and BDI as one of the World's Best Places to Work, ranking among the top 100 companies across the globe in the IT category. Radware has also been named a Gold Winner for Application Security in the 2023 Globee Cybersecurity Awards, by Forrester a Leader in DDoS Protection, and has been named a Leader in WAF Market by Quadrant Knowledge Solutions. We are equally committed to our people. We strive to create a dynamic work environment that celebrates diversity, promotes equality, and thrives on the unique contributions of each individual. If you are ready to be part of a global-minded company that is inspired to create a better, safer future; and if and want to fight for the good guys and be at the forefront of helping companies protect their most critical assets from today's cyber adversaries, then you've found the right fit at Radware. Salary Range: $93k-$118k #LI-TM1
    $93k-118k yearly 60d+ ago
  • Workday Application Security Analyst

    Us Tech Solutions 4.4company rating

    Cyber security analyst job in White Plains, NY

    **Duration: 12 months contract (with possible extension)** ***Note: Open to candidates who are willing to relocate at their own expense.** + The Workday Application Security Analyst is responsible for ensuring the confidentiality, integrity, and availability of data within the Workday system. + They design, implement, and maintain security configurations, including roles, permissions, and access controls, to protect organizational data and comply with company policies, industry standards, and regulatory requirements. **Job Functions & Responsibilities** + Develop and implement security roles, domain security policies, data and business process security within Workday + Ensure secure integration with other on‐premise and cloud applications like GRC tools + Configure and manage access permissions to ensure users have the appropriate level of access to data and functionality + Ensure compliance with company policies, industry standards (like SOC 2), and regulatory requirements (like GDPR) + Conduct regular security audits and assessments to identify vulnerabilities and areas for improvement + Assist in investigating and responding to security incidents, identifying root causes, and implementing preventive measures + Collaborate with IT, HR, and other stakeholders to align security efforts with business needs and ensure effective communication of security policies and procedures + Create and maintain documentation for security policies, procedures, and configurations, and provide training to users on security best practices + Stay abreast of Workday updates, industry trends, and emerging security threats to continuously improve security configurations and processes + Familiarity with other ERPs like SAP is preferred + Familiarity with GRC and Workday SoD (Segregation of Duties) management is desired **Skills** + SAP ERP (S/4 HANA is a plus) + Workday + Active Directory group management + GRC AC 10.1 and above + Microsoft Clienture + SuccessFactors + Applicable functional knowledge for SAP security areas like Finance, MM, ISU billing, etc. + SAP audit & compliance **Education & Certifications** + Bachelor's degree in engineering, IT, or related field + 7-10 years of hands‐on industry experience in Workday Security implementation and administration + Strong ITGC compliance knowledge for Workday + Familiarity with Workday risk management and GRC integration + Ability to identify, analyze, and resolve complex security and compliance issues + Strong interpersonal and communication skills, with the ability to effectively collaborate with diverse teams ** About US Tech Solutions:** US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit *********************** (*********************************** . US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
    $77k-108k yearly est. 60d+ ago
  • Information Security Engineer Cmdb

    Montefiore 4.5company rating

    Cyber security analyst job in Yonkers, NY

    Montefiore is ranked among the top hospitals nationally and regionally by U.S. News & World Report. For more than 100 years we have been innovating new treatments, procedures, and approaches to patient care, producing stellar outcomes and raising the bar for academic medical centers in the region and around the world. Our work to improve health outcomes in underserved communities is unparalleled in the United States. Our workforce is among the most diverse in the US: Montefiore associates speak 60+ languages. This is a hybrid position requiring being on-site as needed. ________________________________________ We are seeking a skilled and detail-oriented CMDB Engineer to join our IT team. This role will be responsible for developing, managing, and optimizing our ServiceNow Configuration Management Database (CMDB), supporting Discovery, service graph connectors, third-party data integrations, and IRE configuration. This role is critical to ensuring visibility, accuracy, and reliability of Configuration Items (CIs) throughout their lifecycle using the ServiceNow platform. ________________________________________ Responsibilities include: • Manage and enhance the ServiceNow CMDB, ensuring accuracy, completeness, and alignment with ITIL standards. • Configure and extend ServiceNow Patterns to improve data ingestion and normalization. • Deep knowledge of how to troubleshoot ServiceNow Discovery-related issues. • Maintain and enhance the ServiceNow CMDB following the Common Service Data Model (CSDM) framework. • Collaborate with infrastructure, network, and application teams to ensure proper CI identification and relationships. • Manage integration with other technologies (e.g., SCCM, vCenter, SolarWinds, etc.) feeding the CMDB. • Create and maintain CMDB documentation, architecture diagrams, and training materials. • Manage and maintain the Identification and Reconciliation Engine (IRE) rules. • Monitor and improve the CMDB Health Dashboard, ensuring ongoing health and governance of the “3 C's” - Completeness, Correctness, and Compliance. • Audit and validate CI data regularly to ensure appropriate CI class assignments, relationships, and attributes. • Oversee and optimize MID server health and ensure discovery schedules are accurate and up to date by liaising with the Network team. • Support audits, compliance, and risk initiatives by ensuring the integrity and traceability of CMDB data. Requirements include: • 7+ years of experience in an enterprise IT organization • Minimum of 3-5 years of hands-on experience with ServiceNow CMDB and Discovery • ServiceNow Certified System Administrator (CSA) certification is required to be eligible for this role. • Strong knowledge and practical experience with ServiceNow CSDM framework and the IRE configuration. • Experience with CI data normalization, reconciliation, and health reporting • Experience with third-party integrations like AWS, SCCM and JAMF • Proficiency in CMDB data modeling, CI class categorization, and relationship mapping. • Strong analytical and troubleshooting skills to manage data quality and Discovery issues. • Experience configuring and maintaining MID Servers and Discovery Schedules. • Bachelor's degree or equivalent experience. Preferred: • Other ServiceNow certifications such as Certified Implementation Specialist - CMDB, Discovery Fundamentals, is a plus. Department: Montefiore Information Technology Bargaining Unit: Non Union Campus: YONKERS Employment Status: Regular Full-Time Address: 3 Odell Plaza, Yonkers Shift: Day Scheduled Hours: 8:30 AM-5 PM Req ID: 224883 Salary Range/Pay Rate: $112,500.00 - $150,000.00 For positions that have only a rate listed, the displayed rate is the hiring rate but could be subject to change based on shift differential, experience, education or other relevant factors. To learn more about the “Montefiore Difference” - who we are at Montefiore and all that we have to offer our associates, please click here. Montefiore is an equal employment opportunity employer. Montefiore will recruit, hire, train, transfer, promote, layoff and discharge associates in all job classifications without regard to their race, color, religion, creed, national origin, alienage or citizenship status, age, gender, actual or presumed disability, history of disability, sexual orientation, gender identity, gender expression, genetic predisposition or carrier status, pregnancy, military status, marital status, or partnership status, or any other characteristic protected by law. SF-DICE-MIT; LI-SC1-REDIRECT
    $112.5k-150k yearly 60d+ ago
  • Cyber Palo Alto Networks Security Operations Senior Consultant

    Deloitte 4.7company rating

    Cyber security analyst job in Stamford, CT

    Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success. Recruiting for this role ends on 12/31/25 The team Our Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions. Work You'll Do + Lead the design and deployment of Next-Generation SOC platforms, like Cortex XSIAM, including advanced detection rules and SOAR playbooks, and SIEM ingestion. + Integrate diverse log and telemetry sources, ensuring data quality and normalization. + Develop and optimize automated response workflows for incident containment and remediation. + Advise clients on advanced use cases, threat detection, and automation strategies. + Collaborate with cross-functional teams for solution enhancements and threat intelligence integration. + Present technical findings and recommendations to stakeholders. Required Qualifications + BA/BS degree in a technical field (e.g., Computer Science, Cyber Security) + 4-6 years of progressively responsible experience in cloud, network, or identity security domains, demonstrating increasing levels of responsibility, technical depth, and leadership over time + 3-4 years of experience with Security Operations tools and platforms including Cortex XSIAM, Cortex XDR, Splunk, or similar SIEM technologies + 3-4 years of Security Operations Center experience demonstrating expertise in detection engineering, automation and playbook development, or SOC maturity methodologies + 3-4 years of experience with one or more cloud service providers (AWS, GCP, Azure) and native security tools + 3-4 years of experience with management of log sources, data normalization, ingestion and manipulation of data + 3-4 years of experience working with detection and response platforms (EDR) like Microsoft Defender, Cortex XDR, CrowdStrike + 3-4 years of experience with governance, risk, or compliance initiatives involving common frameworks + Certifications including Palo Alto Networks' PCNSE or Certified Cybersecurity Associate or equivalent and/or similar cybersecurity certifications + Ability to travel up to 50%, on average, based on the work you perform and the clients and industries/sectors you serve. + Limited immigration sponsorship may be available Preferred Qualifications + Experience with Palo Alto Networks' platform of solutions including, but not limited to, next-generation firewalls, Cortex & Prisma Cloud, and Prisma Access, XDR, etc. + Strong understanding of vendor competitive analysis within Security Operations (e.g., competitive differences between competing SIEM solutions) + Proficiency with advanced scripting, playbook development within a SIEM, SOAR or Security platform + Basic proficiency with network routing protocols (e.g., BGP, ECMP) and network architecture concepts (e.g., network segmentation), in support of on-premise and secure cloud infrastructure use cases + Ability to communicate and advise on solution design based on client use-cases, requirements, or other success criteria + Previous consulting or "Big 4" experience + Relevant advanced cybersecurity or related network engineering certifications (e.g., CISSP, CEH, CCSP) Information for applicants with a need for accommodation: ************************************************************************************************************ The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500 - $188,900. You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
    $102.5k-188.9k yearly 60d+ ago
  • Information Security Analyst

    Crestron 4.8company rating

    Cyber security analyst job in Rockleigh, NJ

    The Information Security Analyst plays a key role in advancing the company's Governance, Risk & Compliance (GRC) program by protecting enterprise information assets and ensuring compliance with regulatory, contractual, and ethical standards. This position offers hands-on experience across multiple security domains including policy governance, risk management, AI governance, and data security, making it an excellent opportunity for early career professionals or recent graduates passionate about cybersecurity and emerging technology risks. In this role, you will collaborate with teams across Information Security, IT, and Legal to drive initiatives that safeguard sensitive data, maintain compliance obligations, and promote responsible use of artificial intelligence and other advanced technologies. Responsibilities Governance & Policy Management Assist in developing, maintaining, and aligning information security policies with frameworks such as NIST CSF, ISO 27001, SOC 2, CIS, and the NIST AI RMF. Contribute to documentation and control mapping for new or updated regulations related to AI, privacy, and data protection (e.g., GDPR, CCPA, NIST 800-53 Rev 5). Support internal policy review cycles, ensuring consistent version control and executive approval. Risk Management Participate in enterprise risk assessments, including third-party, application, and AI model risk reviews. Help identify, document, and track remediation of security and privacy risks within the GRC platform (e.g., Drata, ServiceNow GRC, OneTrust, Vanta, etc.). Support the development of risk metrics and dashboards for leadership reporting. Learn to evaluate AI-related risks such as model bias, data leakage, data lineage, model transparency, and unintended data exposure. Data Governance & Data Security Assist with data classification, retention, and handling standards, ensuring sensitive data is appropriately protected. Support data inventory and mapping efforts to improve visibility where critical data resides. Help review access controls, encryption standards, and secure data transfer processes in coordination with IT teams. Collaborate with the IT team to ensure alignment between data quality, privacy, and security controls. Compliance & Audit Support Gather and organize evidence for internal and external audits (ISO 27001, PCI, HIPAA, etc.). Maintain control documentation and track audit remediation activities. Support continuous monitoring of compliance requirements and updates to regulatory obligations, including emerging AI governance and data-related laws. AI Governance Support Contribute to inventories of AI tools and use cases across the enterprise. Assist in risk assessments for AI systems, ensuring they align with responsible AI principles such as fairness, accountability, and transparency. Collaborate with IT and legal teams to ensure that AI use complies with company policies. Security Awareness & Communication Help design and distribute training materials related to cybersecurity, data protection, and responsible AI practices. Support internal campaigns promoting secure data handling and ethical technology usage. Prepare metrics, dashboards, and presentations for leadership briefings. Continuous Improvement Participate in projects that automate or streamline GRC processes, such as policy lifecycle management or risk scoring. Stay informed about new threats, regulatory trends, and AI governance frameworks. Engage in ongoing professional development and certification opportunities. Qualifications Bachelor's degree in Cybersecurity, Computer Science, Information Systems, Data Science, or a related field is preferred 0-2 years of experience in cybersecurity, risk management, compliance, or data governance (internship or coursework acceptable). Understanding of cybersecurity principles, risk management, and data privacy fundamentals. Basic familiarity with AI systems, data governance concepts, or information security practices. Strong analytical, communication, and documentation skills. Ability to manage multiple priorities in a fast-paced environment. Proficient in Microsoft Excel, PowerPoint, and data analysis or GRC tools. Exposure to frameworks such as NIST CSF, ISO 27001, SOC 2, NIST AI RMF, or COBIT. Must be able to work in the U.S. without sponsorship Per applicable state requirements, the annual pay range for this position ($60,500 - $84,000) which consists of base salary (subject to performance), reflects the hiring range for candidates. Also note, an individual's offer may vary from this range as it may be impacted by additional factors, including but not limited to the candidate's hiring location, qualifications, experience, and market factors.
    $60.5k-84k yearly 26d ago
  • McAfee Endpoint Security Engineer

    Hi-Tech Solutions 3.6company rating

    Cyber security analyst job in Franklin Lakes, NJ

    One of the fastest growing technology companies in the world - even during the depths of the economic downturn. A micro-vertical strategy, built on strong domain expertise, ensures that no matter how complex a company's business problem, we can offer a solution that is sustainable and innovation-driven. Job Description Managing and implementing McAfee Anti-Virus and other security systems. Qualifications • Must have 7+ years' experience with McAfee anti-Virus Management and implementation • Good hands on exposure on McAfee end point DLP and HIPS • Experience in Symantec End point Encryption -PGP • Must have team management and customer interaction skills • Must have exposure in defining SLAs • Must have expertise in defining Standard Operating Procedures • Must have expertise in Remote Infrastructure management for network and information security • Basic Understanding of network and security concepts • Should have good understanding on Incident Management & Change Management and ticketing tools Primary Skill Set: Symantec/Mcafee antivirus, Symantec HIPS and Mcafee end point DLP, End Point Encryption • Should have good communication skills (verbal and written). • Should be comfortable working in 24*7 environments. • Should have team management skills Additional Information Ed Grajo Technical Recruiter -------------------------------------------------------------------- Hi-Tech Solutions, Inc. | Information Technology Consulting Two Mid America Plaza, Suite 630 | Oakbrook Terrace, IL 60181 Direct Phone: ************ ********************* Lets connect on LinkedIn - *********************************************************************************
    $96k-129k yearly est. 10h ago
  • ACTIVE DIRECTORY ENGINEER with Security Background

    Sonsoft 3.7company rating

    Cyber security analyst job in Tarrytown, NY

    SonSoft , Inc. is a USA based corporation duly organized under the laws of the Commonwealth of Georgia. SonSoft Inc is growing at a steady pace specializing in the fields of Software Development, Software Consultancy and Information Technology Enabled Services. Job Description LENGTH: 12 MONTHS, OPTION TO HIRE JOB ID: 1912185274 JOB TITLE: ACTIVE DIRECTORY ENGINEER - SME GC/EAD OR CITIZEN - OPTION TO HIRE POSITION SUMMARY: MUST HAVE a Security Background. Responsible for supporting and maintaining Microsoft Active Directory. Familiar with the Microsoft Windows Server Operating system, , and VMWare Virtualization technologies in the environment. This includes planning for and responding to service outages and other problems, and being a Tier 3 escalation point for moderately complex Active Directory problems beyond the knowledge of other technical support staff. Ensures customer satisfaction by advising customers on preventative maintenance and configurations which may impact product performance. Takes responsibility for potential or desired follow-up services or problem escalation. Fully qualified server engineer. High degree of troubleshooting. Self-starter needing little to no guidance. Additional Information NOTE : ONLY GCEAD , GC AND CITIZEN
    $91k-128k yearly est. 60d+ ago
  • Forefront Identity Management Security (FIMS) Analyst

    Lancesoft 4.5company rating

    Cyber security analyst job in Franklin Lakes, NJ

    Energy. It defines LanceSoft. Consider our unique ‘keep apace' operational culture, the spirited lot of hand-picked professionals, our ‘up-to-the-minute' knowledge base, together they form a dynamic mix of value-generating characteristics that help us delve into the heart of a problem to deliver precise services and solutions - repeatedly. In business since 2000, LanceSoft is a reputed and credible Contingent Workforce Management Services firm that has established itself as a pioneer in providing highly scalable workforce solutions and exceptionally competent global IT services to a diverse set of customers across various industries around the globe. LanceSoft is headquartered out of the Washington DC Metropolitan (Herndon, VA) and operates out of various locations in the US, Canada and India Job Description The associate would join a project team responsible for critical Identity and Access Management projects utilizing Forefront Identity Manager to facilitate process automation. - The team member would be responsible for: o Quickly learning BD's onboarding and termination automated procedures. o Providing End User Training and Support for Forefront Identity Manager processes. o Documenting and training IT staff on Forefront Identity Manager processes. o Facilitate and execute testing of new ForeFront Identity Manager functionality (additional source systems, workflows, roles and permissions). o Facilitate global Active Directory data integrity remediation of User and Group objects. Qualifications Strong Identity and Access Management foundation in Active Directory and Forefront Identity Manager. SAP GRC and ABAP security design is a nice to have. - Excellent Powershell, LDAP or equivalent scripting and reporting skills including heavy Microsoft Excel and CSV based Extract, Transform and Load operations. - Excellent verbal and written communication skills. - Must have hands on experience implementing large FIM projects - Must have strong technical writing capabilities related to FIM Additional Information Looking for a candidate who has strong Active Directory Reporting. BD is doing a massive clean up in Active Directory . Also this candidate must be able to do training for new customers and have good communication skills.
    $66k-84k yearly est. 10h ago
  • Firewall Security Engineer

    Comprehensive Resources

    Cyber security analyst job in Stamford, CT

    Duration: 6+ Months Experienced Firewall administrator for operational implementation, maintenance and configuration of firewalls. Key Responsibilities: Performs maintenance and changes in firewalls as required. Implementation of new firewalls as required Assists with troubleshooting network connectivity as it relates to firewalls Utilizes change management, request, and ticketing systems, documents status updates and problem resolutions Complete All assignments in a timely manner with an acceptable level of quality Maintains documentation related to work area Completes network change requests Follows documented processes, procedures and policies Performs customer service duties and responds to customer and project requests as defined by management Other related duties assigned as needed. Qualifications/Requirements: Bachelor's degree and with 3 to 4 years of operational experience administering Firewalls 4 or more years networking/firewall background Must have networking TCP/IP routing protocol experience Desired Characteristics: In-depth experience in security aspects of multiple platforms, operating systems, software, communications and network protocols is desired Competency in verbal, written, and presentation communications and interpersonal understanding Ability to understand customer's business needs. Leadership of work teams/groups Ability to work with all levels of employees Highly motivated and able to work effectively under minimal supervision in a fast-paced environment Team-oriented, placing priority on quality and the successful completion of team goals Organization and planning skills that include: time management, project coordination and management, and the ability to handle multiple deadlines and associated pressures. Competency in developing effective solutions to business problems Ability to analyze problems and to make decisions REQUIRED SKILLS YEARS OF EXPERIENCE WHEN THE SKILL WAS LAST USED Expert knowledge of Cisco Security products, ASA and Firepower Expert knowledge of NSX Expert knowledge of Palo Alto systems Security Certifications a Plus Must have networking TCP/IP routing protocol experience Networking/firewall background Operational experience administering Firewalls Additional Information All your information will be kept confidential according to EEO guidelines.
    $83k-114k yearly est. 10h ago
  • Data Security Engineer

    Cloud Peritus

    Cyber security analyst job in Stamford, CT

    What you'll do • Design and implement comprehensive data security architectures, with particular focus on database platforms (primarily SQL Server) • Develop and maintain enterprise-wide encryption strategies for securing structured and unstructured data both in transit and at rest, both and both on-premise and in the cloud • Enhance logging, monitoring and SecOps capabilities of enterprise databases and other data stores • Configure and optimize Identity and Access Management (IAM) solutions across data platforms and repositories to align to least privilege principles • Implement Data Loss Prevention (DLP) strategies and controls • Implement and maintain Information Rights Management (IRM) and Digital Rights Management (DRM) solutions • Design and implement data tokenization strategies where appropriate • Secure data processing pipelines and ensure appropriate controls for data workflows • Create and maintain data security documentation, including policies, procedures, and standards • Collaborate with development teams to ensure security best practices in data handling • Conduct vulnerability assessments of the firm's database architecture and associated data storage and processing systems • Assist in monitoring and managing security patching and upgrade processes for database platforms What's required • Bachelor's degree in computer science, cybersecurity, or related technical field • 6+ years of experience in data/database security engineering and governance • Deep expertise in database security, particularly SQL Server • Comprehensive understanding of data warehouse/data lake architectures and tools, particularly Databricks (required) • Subject matter expertise in Object Storage (eg: S3, Azure Blob, etc) and related security • Understanding of Active Directory Delegation (constrained vs. unconstrained) and associated best practices • Experience with 3rd-party SQL Server security governance and monitoring products (eg: Idera, Solarwinds) • Extensive knowledge of encryption technologies for both structured and unstructured data • Broad knowledge of secure data/file sharing solutions and ETL workflows • Experience designing and implementing data tokenization solutions • Experience with data classification and DLP technologies • Scripting/automation capabilities (eg: SQL, PowerShell, Python) • Commitment to the highest ethical standards Qualifications Ivy league colleges education preferred or huge plus. Additional Information All your information will be kept confidential according to EEO guidelines.
    $83k-114k yearly est. 10h ago
  • OT Security Engineer

    Crane Co 4.3company rating

    Cyber security analyst job in Stamford, CT

    The OT Security Engineer, Global Information Security (GIS) will have primary responsibility for Crane's Operational Technology security solutions that protect Crane's manufacturing environments. You will implement OT and IoT security solutions throughout the enterprise and ensure that OT/IoT security solutions identify threats, uncover vulnerabilities, and measure risks of operational equipment. Coordinating with both IT and OT teams at all manufacturing sites, you will define and develop security standards and technical solutions. As a subject matter expert in the hardening and defense of OT, you will work with business units to implement security standards, securely modify systems, and implement secure network architectures during implementations of OT related projects to ensure secure system deployments. You will work closely with other GIS functional areas, supporting security engineering, administration, operations, and incident response. You will integrate the OT/IoT security solutions with other GIS and business unit tools such as SIEM, SOAR, AD, and other tools to gain a unified view of security events and respond more effectively to security incidents both for OT and IT. Responsibilities and Duties: * Support and maintain OT/IoT security tool set and associated integrations with other systems * Collaborate with the manufacturing function across lines of business to develop and define security requirements * Design OT security controls for architectures, systems and networks ensuring that alerting to threats is efficient and effective. * Identify and implement supporting security technologies for the identification of threats and defense of OT systems and provide secure methods for remote access. * Work directly with plant leaders, process engineers, and support/system vendors to ensure OT security controls are implemented * Develop and implement standard work supporting the Global OT security function and supporting solutions * Develop and maintain security models, templates, standards and procedures that can be used to leverage security capabilities in projects and operations * Assist in the identification, response, investigation, and remediation of OT security events and incidents as needed * Ensure security best practices are identified and integrated into all approaches and methodologies. * Define requirements and design standards to protect Crane's OT solutions from security threats and for mitigating the impacts of these threats. * Define reference network architectures based on industry best practices and work with business units to implement for OT solutions * Consult on business unit OT projects and provide cybersecurity expertise Qualifications and Competencies: * 2yrs experience with securing Operational Technology and related systems environments * Strong understanding and prior experience with the application of securing OT and related systems * Current deep technical understanding of common OT systems such as PCS, SCADA, PLCs, RTUs, HMIs, CNC * Deep technical understanding of TCP/IP Networking and Firewalls * Deep technical understanding of system integration methods including API's and authentication methods * Knowledgeable in NIST CSF, NIST 800-82, Purdue Model, IEC 62443 standards * Solid foundation cybersecurity domains such as network security, EDR, anomaly detection * Understanding of common OT communications protocols such as MQTT, MODBUS, DNP3, S7, G-code * Comfortable with designing and overseeing the implementation of secure OT architectures * Prior experience in the direct remediation of vulnerabilities or compensating controls within OT environments * Commitment to security training and earning corresponding certifications * Highly motivated with passion for solving complex problems * Excellent verbal and written communication skills, comfortable with presenting to Operational Teams * Flexibility to work outside regularly scheduled/normal business hours as required * Ability and desire to travel both domestically and internationally * Required: Degree in a related field or at least 4 years relevant professional experience * Required: Mobility and ability to be on your feet for long periods in a manufacturing setting * Required: Technical professional security certification such as GICSP, GRID, OSCP, CEH or similar * US Person as defined under EAR PART 772 AND ITAR 120.15 This description has been designed to indicate the general nature and level of work being performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job. Crane Company. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, gender, sexual orientation, general identity, national origin, disability or veteran status.
    $64k-91k yearly est. Auto-Apply 16d ago
  • Emergency Response Team (ERT) Security Analyst

    Radware

    Cyber security analyst job in Mahwah, NJ

    Emergency Response Team (ERT) Security Analyst - (250000AB) Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. At Radware, we live and breathe cybersecurity. It is our passion. Each day, our international team works to earn the trust of more than 12,500 organizations around the globe. Keeping them safe is our mission. To that end, we go head-to-head with politically motivated hacktivists, dangerous nation-state threat actors and other notorious cyber attackers - these are not your average adversaries. Backed by nearly 30 years of experience, Radware is best known for its technical excellence and innovative network and application security solutions. That is why it is so important that we build our team with bold and bright talent. About the Team: The Security Analyst will join the Emergency Response Team in Radware's Managed Services business unit. The ERT Team provides immediate and direct security support for customers under attack, ensuring the continued functioning of protected services and, ultimately, customer satisfaction. What is the job: The Emergency Response Team (ERT) Security Analyst fuels the success of customers by serving as the primary contact when timely assistance is needed the most. If you are an energetic, upstart engineer who enjoys working in a fast-paced environment and interacting with people under pressure, this could be the position for you. What you need: · At least 1 year experience in application security or Master's degree in Cyber Security· Good understanding of network design (e.g. LAN/WAN, switches/routers, routing protocols such as BGP and OSPF) and protocols (e.g., IPv4, TCP/IP, VPN, IPSec, HTTP, DNS)· Good understanding of and experience with security · Wireshark, Kali Linux· Customer and service oriented· Good troubleshooting and diagnosis capabilities· Willing to be on alert during off-work hours· Excellent communication skills and team work· Excellent time management, multi-tasking, and prioritization skills· Perceptive, fast learner, and able to perform well under pressure How can you stand out:· Experience in similar positions/companies· BSc/BA in Computer Science or equivalent· Knowledge in scripting language· Graduated Networking or Security courses Why you should join us:Employees from more than 40 countries have chosen Radware as a place where they can belong.Radware has been recognized by Glassdoor and BDI as one of the World's Best Places to Work, ranking among the top 100 companies across the globe in the IT category.Radware has also been named a Gold Winner for Application Security in the 2023 Globee Cybersecurity Awards, by Forrester a Leader in DDoS Protection, and has been named a Leader in WAF Market by Quadrant Knowledge Solutions.We are equally committed to our people. We strive to create a dynamic work environment that celebrates diversity, promotes equality, and thrives on the unique contributions of each individual.If you are ready to be part of a global-minded company that is inspired to create a better, safer future; and if and want to fight for the good guys and be at the forefront of helping companies protect their most critical assets from today's cyber adversaries, then you've found the right fit at Radware.Salary Range: $93k-$118k#LI-TM1Primary Location: US-NJ-MahwahWork Locations: Radware US, New Jersey Mahwah 575 Corporate Drive Lobby 1 Mahwah 07430Job: Cloud and ManagementRefer a friend for this job Tell us about a friend who might be interested in this job. All privacy rights will be protected.Refer a friend
    $93k-118k yearly Auto-Apply 60d+ ago
  • Forefront Identity Management Security (FIMS) Analyst

    Lancesoft 4.5company rating

    Cyber security analyst job in Franklin Lakes, NJ

    Energy. It defines LanceSoft. Consider our unique ‘keep apace' operational culture, the spirited lot of hand-picked professionals, our ‘up-to-the-minute' knowledge base, together they form a dynamic mix of value-generating characteristics that help us delve into the heart of a problem to deliver precise services and solutions - repeatedly. In business since 2000, LanceSoft is a reputed and credible Contingent Workforce Management Services firm that has established itself as a pioneer in providing highly scalable workforce solutions and exceptionally competent global IT services to a diverse set of customers across various industries around the globe. LanceSoft is headquartered out of the Washington DC Metropolitan (Herndon, VA) and operates out of various locations in the US, Canada and India Job Description The associate would join a project team responsible for critical Identity and Access Management projects utilizing Forefront Identity Manager to facilitate process automation. - The team member would be responsible for: o Quickly learning BD's onboarding and termination automated procedures. o Providing End User Training and Support for Forefront Identity Manager processes. o Documenting and training IT staff on Forefront Identity Manager processes. o Facilitate and execute testing of new ForeFront Identity Manager functionality (additional source systems, workflows, roles and permissions). o Facilitate global Active Directory data integrity remediation of User and Group objects. Qualifications Strong Identity and Access Management foundation in Active Directory and Forefront Identity Manager. SAP GRC and ABAP security design is a nice to have. - Excellent Powershell, LDAP or equivalent scripting and reporting skills including heavy Microsoft Excel and CSV based Extract, Transform and Load operations. - Excellent verbal and written communication skills. - Must have hands on experience implementing large FIM projects - Must have strong technical writing capabilities related to FIM Additional Information Looking for a candidate who has strong Active Directory Reporting. BD is doing a massive clean up in Active Directory . Also this candidate must be able to do training for new customers and have good communication skills.
    $66k-84k yearly est. 60d+ ago
  • Data Security Engineer

    Cloud Peritus

    Cyber security analyst job in Stamford, CT

    What you'll do • Design and implement comprehensive data security architectures, with particular focus on database platforms (primarily SQL Server) • Develop and maintain enterprise-wide encryption strategies for securing structured and unstructured data both in transit and at rest, both and both on-premise and in the cloud • Enhance logging, monitoring and SecOps capabilities of enterprise databases and other data stores • Configure and optimize Identity and Access Management (IAM) solutions across data platforms and repositories to align to least privilege principles • Implement Data Loss Prevention (DLP) strategies and controls • Implement and maintain Information Rights Management (IRM) and Digital Rights Management (DRM) solutions • Design and implement data tokenization strategies where appropriate • Secure data processing pipelines and ensure appropriate controls for data workflows • Create and maintain data security documentation, including policies, procedures, and standards • Collaborate with development teams to ensure security best practices in data handling • Conduct vulnerability assessments of the firm's database architecture and associated data storage and processing systems • Assist in monitoring and managing security patching and upgrade processes for database platforms What's required • Bachelor's degree in computer science, cybersecurity, or related technical field • 6+ years of experience in data/database security engineering and governance • Deep expertise in database security, particularly SQL Server • Comprehensive understanding of data warehouse/data lake architectures and tools, particularly Databricks (required) • Subject matter expertise in Object Storage (eg: S3, Azure Blob, etc) and related security • Understanding of Active Directory Delegation (constrained vs. unconstrained) and associated best practices • Experience with 3rd-party SQL Server security governance and monitoring products (eg: Idera, Solarwinds) • Extensive knowledge of encryption technologies for both structured and unstructured data • Broad knowledge of secure data/file sharing solutions and ETL workflows • Experience designing and implementing data tokenization solutions • Experience with data classification and DLP technologies • Scripting/automation capabilities (eg: SQL, PowerShell, Python) • Commitment to the highest ethical standards Qualifications Ivy league colleges education preferred or huge plus. Additional Information All your information will be kept confidential according to EEO guidelines.
    $83k-114k yearly est. 60d+ ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Newburgh, NY?

The average cyber security analyst in Newburgh, NY earns between $68,000 and $124,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Newburgh, NY

$92,000
Job type you want
Full Time
Part Time
Internship
Temporary