IT Security and Risk Engineer
Cyber Security Analyst Job 7 miles from Newport
Encore Talent Solutions is looking for an IT Security, Risk and Compliance Engineer-
The ideal candidate will have experience in:
Creating and managing policies around HIPPA and PCI
Experience managing security awareness programs and managing security audits
Conduct reviews to measure compliance with NIST, PCI, and ISO standards, regulations and frameworks
Provides strategic risk guidance for IT projects, including evaluation and recommendation of technical controls
Cyber Security Analyst II / III
Cyber Security Analyst Job 2 miles from Newport
CompanyFederal Reserve Bank of ClevelandThe Federal Reserve Bank of Cleveland is part of the nation's central bank, and we've provided many opportunities for professional growth during our history. For twenty-five years in a row, we've been named “One of Northeast Ohio's Best Places to Work” by North Coast 99. This prestigious award honors organizations with outstanding employment practices, including compensation, benefits, training, recruitment, retention, community services, and employee communications.
Our People Make the Difference! The Federal Reserve Bank of Cleveland is seeking innovative thinkers with vision to build the framework that will carry the Bank into the future.
Follow us on LinkedIn, X, Instagram, and our YouTube channel - Cleveland Fed
The selected candidate will support the Cybersecurity Analytics Support Team (CAST) function by actively working with CAST personnel, supervisory staff and Board of Governors' staff concerning ongoing cyber incidents within supervised institutions as well as emerging threats potentially impacting the United States financial sector. This individual would have experience and/or expertise in multiple cybersecurity subject matter areas:
Cybersecurity related frameworks such as NIST 800-53, NIST Cybersecurity Framework (CSF), IS 27001, MITRE ATT&CK, etc.
Assessing cybersecurity threats, vulnerabilities, and related exploitation activity; recommending related mitigations to manage risk to computing environments.
Tracking and reporting on threat actor groups that potentially pose a threat to the United States financial sector.
Cloud services and providers such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
Incident management and response activities related to cybersecurity events.
Security architecture and design implementation to mitigate threats against confidentiality, integrity, and availability.
Essential Accountabilities
Conducts analysis and interpreting of cybersecurity threats to identify trends and emerging risks.
Provide input and insight into response activities during cyber incidents to include best practices from regulatory bodies, cybersecurity organizations, and NIST.
Conducts formal assessments to determine the severity of reported cybersecurity incidents at financial institutions.
Prepares in written form research, analysis, and assessments for key internal stakeholders as needed or requested. Analysis supports recommendations regarding cybersecurity threats, threat vectors, threat actors and threat trends.
Demonstrates knowledge of cybersecurity threats within the broader financial sector and related industries.
Assist bank supervision examination teams, the central point of contact teams, and examiners-in-charge during active cybersecurity incidents at regulated banking/financial institutions.
Build and maintain relationships with central points of contact teams, examiners, and board staff across the Federal Reserve System.
Communicate appropriate information to the Supervision & Regulation staff at the Federal Reserve Bank and Board levels to maintain a comprehensive understanding of ongoing incidents and ensure appropriate steps are taken to isolate any potential residual effects from a cyber incident.
Participates in knowledge sharing forums related to key cybersecurity risks and emerging issues.
Participates in efforts to advance Reserve Bank or System strategic initiatives.
Provides leadership, coaching, and mentoring for less experienced analysts on processes and procedures related to internal matters and the supervisory process.
Weekend on-call support is part of the position on a rotating basis (generally once every 12 weeks)
Performs other duties as assigned or requested.
Education and Experience
Analyst II: Bachelor's Degree in Computer Science, Management Information Systems or related field and 5+ years of related work experience required OR Two years of college and 7+ years of professional work experience.
Strong understanding of technology governance, technology risk management, internal audit, and vendor/third party risk management.
Knowledge of firewalls, intrusion prevention/detection systems, Linux, Windows, and Identity and Access Management concepts.
Analyst III: Bachelor's Degree in Computer Science, Management Information Systems or related field and 7+ years of related work experience required OR Master's Degree and 5+ years of professional work experience.
Advanced ability to perform independent research and provide written reports summarizing findings and analysis.
Intermediate knowledge of regulations, procedures, and practices of a specific discipline (e.g., bank examinations, information security, cyber intelligence).
Advanced problem solving and analytical thinking.
Advanced specialized operational/technical skills in cyber intelligence and information security.
Intermediate knowledge of Microsoft Office; general proficiency in Word, PowerPoint and Excel.
Intermediate knowledge of project management.
Intermediate ability to analyze information and demonstrate findings with written reports, data visualizations, graphs/charts, or presentations.
Knowledge Areas
Advanced ability to perform independent research
Advanced knowledge of regulations, procedures and practices of a specific discipline (e.g. information security, cyber intelligence)
Intermediate knowledge of Microsoft Office
Intermediate knowledge of project management
Knowledge of intelligence concepts; intelligence lifecycle, diamond method, structured analytic techniques (red team, devil's advocate, analysis of competing hypothesis)
Working knowledge of: ESRI ArcGIS 9x, DCGS-A Systems (Multi-Function Workstation), Analyst Notebook, AxisPro (Link Diagram in MFWS), Multimedia Message Manager (M3), QueryTree, Pathfinder , Maltego
General knowledge in areas of technology governance, technology risk management/GRC, internal audit, vendor/third-party management, business resiliency and fraud
Security operations concepts; perimeter defense, BYOD, data loss protection, insider threat, kill chain, risk assessment, etc
Relevant IT certifications (CISA, CISSP)
Skill Areas
Advanced problem solving and analytical
Advanced specialized operational/technical skills in cyber intelligence and information security
Advanced written and verbal communication
Intermediate presentation
Intermediate public speaking
Intermediate strategic thinking/planning
Citizenship requirements
This position requires access to confidential supervisory information and/or FOMC information, which is limited to "Protected Individuals" as defined in the U.S. federal immigration law. Protected Individuals include, but are not limited to, U.S. citizens, U.S. nationals, and U.S. permanent residents who either are not yet eligible to apply for naturalization or who have applied for naturalization within the requisite timeframe. Candidates who are not U.S. citizens or U.S. permanent residents may be eligible for the information access required for this position and sponsorship for a work visa, and subsequently for permanent residence, if they sign a declaration of intent to become a U.S. citizen and meet other eligibility requirements.
In addition, all candidates must undergo an enhanced background check and comply with all applicable information handling rules, and all non-U.S. citizens must sign a declaration of intent to become a U.S. citizen and pursue a path to citizenship.
Physical Demands and General Working Conditions
This is not necessarily an exhaustive list of all responsibilities, duties, performance standards or requirements, efforts, skills or working conditions associated with the job. While this is intended to be an accurate reflection of the current job, the Federal Reserve Bank of Cleveland reserves the right to revise this or any job description at any time.
Reasonable Accommodation Statement
-
The Federal Reserve Bank of Cleveland is committed to ensuring that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, perform essential job functions, and receive other benefits and privileges of employment. To request a reasonable accommodation for any part of the employment process, please send an email to ****************************************.
Location/in office requirements
This position is hybrid with 2-3 days in district.
Bank's Ethics Rules and Drug Testing
As a condition of employment, Federal Reserve Bank of Cleveland employees must comply with the Bank's ethics rules which generally prohibit employees, their spouses/domestic partners, and minor children from owning or controlling, directly or indirectly, any debt or equity interest in a depository institution or an affiliate of a depository institution. A "depository institution" means a bank, a trust company, or any institution that accepts deposits, including a bank chartered under the laws of a foreign country. In addition, employees (and their spouses/domestic partners, and minor children) may not own shares of mutual funds, unit investment trusts or ETFs that have a policy, as stated in the prospectus, of concentrating in the financial services industry and that have underlying investments in banks or other depository institutions. If you or your spouse/domestic partner or minor child own such securities and would not be willing or able to divest them if you accepted an offer of Bank employment, you should raise this issue with the recruiter for this posting.
In addition, as a condition of employment, candidates must undergo a background check and will be tested for all controlled substances prohibited by federal law, to include marijuana, prior to hire and for certain safety sensitive positions during employment.
Always verify and apply to jobs on
Federal Reserve System Careers
or through verified Federal Reserve Bank social media channels
Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation TechnologyWork ShiftFirst (United States of America)
The Federal Reserve Banks believe that diversity and inclusion among our employees is critical to our success as an organization, and we seek to recruit, develop and retain the most talented people from a diverse candidate pool. The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels.
Privacy Notice
Cyber Security Analyst - Entry Level
Cyber Security Analyst Job 2 miles from Newport
Entry Level Cyber Security Analyst
Cincinnati, OH
READ BEFORE YOU APPLY!
Opportunity: Per Scholas is helping to source entry-level candidates for Cyber Security Analyst positions with our employer partners in the Cincinnati region and will offer free training to candidates in need of additional upskilling in order to qualify.
Requirements:
To be successful, candidates need to possess basic literacy, math, critical thinking, and self-teaching skills, do well in fast-paced environments, and be able to learn new technologies quickly.
What we are looking for:
Must have at least a High School diploma or GED
Must be authorized to work in the US
Previous tech work experience or education preferred
Must be able to commit a Monday - Friday, 9:00am - 4:00pm
Must live in the Atlanta area
We are not currently offering visa sponsorship or transfers, but we will accept applications from individuals with work authorization.
Industrial Security Analyst/Principal Industrial Security Analyst
Cyber Security Analyst Job 2 miles from Newport
** Education** ** Disabled Veteran Resources/Benefits** Industrial Security Analyst/Principal Industrial Security Analyst Cincinnati, OH * **Category:** Security * **Clearance Type:** Top Secret
* **Shift:** 1st Shift (United States of America)
* **Travel Required:** Yes, 10% of the Time
* **Relocation Assistance:** Relocation assistance may be available
* **Positions Available:** 1
**Requisition ID: R10173958**
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
**Northrop Grumman Mission Systems (NGMS) is looking for you to join our team as an Industrial Security Analyst/ Principal Industrial Security Analyst 3 in Cincinnati, OH.** We offer flexible work arrangements, phenomenal learning opportunities, exposure to a wide variety of projects and customers, and a very friendly inclusive environment! We are looking for self-motivated, proactive, and goal-oriented people to help us grow our services and become even better at what we do.
* Develops, and administers security programs and procedures for classified or proprietary materials, documents, and equipment.
* Studies and implements federal security regulations that apply to company operations.
* Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies.
* Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to restricted records and materials.
* Conducts security education classes and security audits. Investigates security violations and prepares reports specifying preventive action to be taken.
* The position will require COMSEC custodian work and prior knowledge is preferred but not required.
**This position may be filled at either a level 2 or Level 3.**
**Basic Qualifications for a level 2:**
* Active Top Secret Clearance.
* 2+ Years of Industrial Security or Contractor Program Security Officer or related experience with Bachelors; An additional 4 years of applicable work experience may be substituted for bachelor's degree.
**Basic Qualifications for a level 3:**
* Active Top Secret Clearance.
* 5+ Years of Industrial Security or Contractor Program Security Officer or related experience with Bachelors; OR 3+ years with Masters; An additional 4 years of applicable work experience may be substituted for bachelor's degree.
**Preferred Qualifications:**
* CPSO certification
* FSO certification
* Top Secret//SCI clearance
* The position will require COMSEC custodian work and prior knowledge is preferred but not required.
**Salary Range:** $65,500 - $98,300
**Salary Range 2:** $80,600 - $121,000
The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.
Employees may be eligible for a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.
The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.
Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit. U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
**Your Privacy**
**Privacy Preference Center**
** Manage Consent Preferences**
Always Active Always Active Always Active
Cyber Security Analyst III / Senior
Cyber Security Analyst Job 2 miles from Newport
Company Federal Reserve Bank of Cleveland The Federal Reserve Bank of Cleveland is part of the nation's central bank, and we've provided many opportunities for professional growth during our history. For twenty-five years in a row, we've been named "One of Northeast Ohio's Best Places to Work" by North Coast 99. This prestigious award honors organizations with outstanding employment practices, including compensation, benefits, training, recruitment, retention, community services, and employee communications.
Our People Make the Difference! The Federal Reserve Bank of Cleveland is seeking innovative thinkers with vision to build the framework that will carry the Bank into the future.
Follow us on LinkedIn, X, Instagram, and our YouTube channel - Cleveland Fed
The selected candidate will support the Cybersecurity Analytics Support Team (CAST) function by actively working with CAST personnel, supervisory staff and Board of Governors' staff concerning ongoing cyber incidents within supervised institutions as well as emerging threats potentially impacting the United States financial sector. This individual would have experience and/or expertise in multiple cybersecurity subject matter areas:
* Cybersecurity related frameworks such as NIST 800-53, NIST Cybersecurity Framework (CSF), IS 27001, MITRE ATT&CK, etc.
* Assessing cybersecurity threats, vulnerabilities, and related exploitation activity; recommending related mitigations to manage risk to computing environments.
* Tracking and reporting on threat actor groups that potentially pose a threat to the United States financial sector.
* Cloud services and providers such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
* Incident management and response activities related to cybersecurity events.
* Security architecture and design implementation to mitigate threats against confidentiality, integrity, and availability.
Essential Accountabilities
* Conducts analysis and interpreting of cybersecurity threats to identify trends and emerging risks.
* Provide input and insight into response activities during cyber incidents to include best practices from regulatory bodies, cybersecurity organizations, and NIST.
* Conducts formal assessments to determine the severity of reported cybersecurity incidents at financial institutions.
* Prepares in written form research, analysis, and assessments for key internal stakeholders as needed or requested. Analysis supports recommendations regarding cybersecurity threats, threat vectors, threat actors and threat trends.
* Demonstrates knowledge of cybersecurity threats within the broader financial sector and related industries.
* Assist bank supervision examination teams, the central point of contact teams, and examiners-in-charge during active cybersecurity incidents at regulated banking/financial institutions.
* Build and maintain relationships with central points of contact teams, examiners, and board staff across the Federal Reserve System.
* Communicate appropriate information to the Supervision & Regulation staff at the Federal Reserve Bank and Board levels to maintain a comprehensive understanding of ongoing incidents and ensure appropriate steps are taken to isolate any potential residual effects from a cyber incident.
* Participates in knowledge sharing forums related to key cybersecurity risks and emerging issues.
* Participates in efforts to advance Reserve Bank or System strategic initiatives.
* Provides leadership, coaching, and mentoring for less experienced analysts on processes and procedures related to internal matters and the supervisory process.
* Weekend on-call support is part of the position on a rotating basis (generally once every 12 weeks)
* Performs other duties as assigned or requested.
Education and Experience
Analyst III: Bachelor's degree in computer science, Management Information Systems or related field and 7+ years of related work experience required OR Master's Degree and 5+ years of professional work experience.
* Advanced ability to perform independent research and provide written reports summarizing findings and analysis.
* Intermediate knowledge of regulations, procedures, and practices of a specific discipline (e.g., bank examinations, information security, cyber intelligence).
* Advanced problem solving and analytical thinking.
* Advanced specialized operational/technical skills in cyber intelligence and information security.
* Intermediate knowledge of Microsoft Office; general proficiency in Word, PowerPoint and Excel.
* Intermediate knowledge of project management.
* Intermediate ability to analyze information and demonstrate findings with written reports, data visualizations, graphs/charts, or presentations.
Senior Analyst: Bachelor's degree in computer science, Management Information Systems or related field and 10+ years of related work experience required OR Master's Degree and 7+ years of professional work experience.
* Advanced ability to perform independent research and provide written reports summarizing findings and analysis.
* Intermediate knowledge of regulations, procedures, and practices of a specific discipline (e.g., bank examinations, information security, cyber intelligence).
* Advanced problem solving and analytical thinking.
* Advanced specialized operational/technical skills in cyber intelligence and information security.
* Intermediate knowledge of Microsoft Office; general proficiency in Word, PowerPoint and Excel.
* Intermediate knowledge of project management.
* Intermediate ability to analyze information and demonstrate findings with written reports, data visualizations, graphs/charts, or presentations.
Knowledge Areas
* Expert knowledge of regulations, procedures and practices of a specific discipline (e.g. information security, cyber intelligence).
* Advanced ability to perform independent research.
* Advanced knowledge of project management.
* Intermediate knowledge of Microsoft Office.
* Advanced knowledge of intelligence concepts; intelligence lifecycle, diamond method, structured analytic techniques (red team, devil's advocate, analysis of competing hypothesis).
* Advanced knowledge in: NIST, ITIL, COBIT, guidelines, security analytics, network architecture / perimeter security, network monitoring and analysis, threat intelligence and advanced threats, authentication, secure coding / application development, penetration testing, cyber incident response, web based attacks and mitigations, cyber risk assessment and strategic analysis, vulnerability detection and assessment, mobile device management, and digital forensics and advanced security tools (e.g. DDoS, malware, DLP, MFA, SIEM, vulnerability scanning and patching).
* Advanced knowledge in areas of technology governance, technology risk management/GRC, internal audit, vendor/third-party management, business resiliency and fraud.
* Security operations concepts; perimeter defense, BYOD, data loss protection, insider threat, kill chain, risk assessment, etc.
* Relevant IT certifications (CISA, CISSP, CGEIT, CRISC, CRMA).
Skill Areas
* Expert problem solving and analytical
* Expert specialized operational/technical skills in cyber intelligence and information security
* Advanced written and verbal communication
* Advanced presentation
* Advanced public speaking
* Advanced strategic thinking/planning
Citizenship requirements
This position requires access to confidential supervisory information and/or FOMC information, which is limited to "Protected Individuals" as defined in the U.S. federal immigration law. Protected Individuals include, but are not limited to, U.S. citizens, U.S. nationals, and U.S. permanent residents who either are not yet eligible to apply for naturalization or who have applied for naturalization within the requisite timeframe. Candidates who are not U.S. citizens or U.S. permanent residents may be eligible for the information access required for this position and sponsorship for a work visa, and subsequently for permanent residence, if they sign a declaration of intent to become a U.S. citizen and meet other eligibility requirements.
In addition, all candidates must undergo an enhanced background check and comply with all applicable information handling rules, and all non-U.S. citizens must sign a declaration of intent to become a U.S. citizen and pursue a path to citizenship.
Physical Demands and General Working Conditions
This is not necessarily an exhaustive list of all responsibilities, duties, performance standards or requirements, efforts, skills or working conditions associated with the job. While this is intended to be an accurate reflection of the current job, the Federal Reserve Bank of Cleveland reserves the right to revise this or any job description at any time.
Reasonable Accommodation Statement - The Federal Reserve Bank of Cleveland is committed to ensuring that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, perform essential job functions, and receive other benefits and privileges of employment. To request a reasonable accommodation for any part of the employment process, please send an email to ****************************************.
Location/in office requirements
This position is hybrid with 2-3 days in office at our Cleveland office
Bank's Ethics Rules and Drug Testing
As a condition of employment, Federal Reserve Bank of Cleveland employees must comply with the Bank's ethics rules which generally prohibit employees, their spouses/domestic partners, and minor children from owning or controlling, directly or indirectly, any debt or equity interest in a depository institution or an affiliate of a depository institution. A "depository institution" means a bank, a trust company, or any institution that accepts deposits, including a bank chartered under the laws of a foreign country. In addition, employees (and their spouses/domestic partners, and minor children) may not own shares of mutual funds, unit investment trusts or ETFs that have a policy, as stated in the prospectus, of concentrating in the financial services industry and that have underlying investments in banks or other depository institutions. If you or your spouse/domestic partner or minor child own such securities and would not be willing or able to divest them if you accepted an offer of Bank employment, you should raise this issue with the recruiter for this posting.
In addition, as a condition of employment, candidates must undergo a background check and will be tested for all controlled substances prohibited by federal law, to include marijuana, prior to hire and for certain safety sensitive positions during employment.
Always verify and apply to jobs on Federal Reserve System Careers or through verified Federal Reserve Bank social media channels
Full Time / Part Time
Full time
Regular / Temporary
Regular
Job Exempt (Yes / No)
Yes
Job Category
Information Technology
Work Shift
First (United States of America)
The Federal Reserve Banks believe that diversity and inclusion among our employees is critical to our success as an organization, and we seek to recruit, develop and retain the most talented people from a diverse candidate pool. The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels.
Privacy Notice
Cyber Security Incident Responder
Cyber Security Analyst Job 13 miles from Newport
We are looking for an enthusiastic and experienced Cyber Security Incident Responder (IR) to join our dynamic and growing team. The role holder will play a critical role in maintaining the security and resilience of Element's digital infrastructure by effectively handling cyber incidents. This is an opportunity to join an emerging team and become a key contributor on day one. You will work closely with peers to develop what you see as a great 24/7 operational cyber defense capability. We encourage applications from those with direct experience in Digital Forensics and Incident Response (DFIR).
This position requires paid on call and overtime if there are serious cyber-attacks. This position is hybrid.
Responsibilities
* Help build Element's IR capability. Implement best practice in line with NIST, SANS and other industry frameworks
* Govern and coordinate cyber incidents. Act as the lead incident manager and technical authority for Cyber Defense. Conduct thorough investigations to reduce risk. Determine the root cause, impact, and identify remediation actions
* Collaborate with cross-functional teams including IT, Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date
* Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement
* Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis
* Work closely with the Senior Manager Incident Response to Input into the development of cyber defense metrics
* Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities
Skills / Qualifications
* A minimum of two years' experience working in cyber security. Technical experience as a Cyber Incident Responder e.g., Digital Forensics Incident Response (DFIR). Experience in managing complex cyber incidents would be great
* Experience of in working within a complex highly federated organization. A comprehensive understanding of cyber defense operations in both the public and private sectors
* A bachelor's degree in Computer Science, Information Technology, or a related field is desirable but not essential, as are other relevant certifications (e.g., CISSP, CISM, GIAC)
* Attention to detail, strong analytical skills and efficient problem solving. The ability to think critically and make sound decisions in high-pressure situations
* Cultural sensitivity and social flexibility in a global corporate environment
* Experience in proactive communication to, and direct interaction with senior staff. The ability to convey complex information to a non-technical audience
* A highly self-motivated individual with positive mindset and can-do attitude. A strong believer of security as an enabler to support business growth
* This position requires on call and overtime if there are very serious cyber attacks
* Knowledge of SIEM tooling, including experience in writing and developing advanced hunting and correlation search queries for alerts
* Must be a US Citizen or Green Card holder
#LI-SL1
#LI-SL1
Company Overview
Element is one of the fastest growing testing, inspection and certification businesses in the world. Globally we have more than 9,000 brilliant minds operating from 270 sites across 30 countries. Together we share an ambitious purpose to 'Make tomorrow safer than today'.
When failure in use is not an option, we help customers make certain that their products, materials, processes and services are safe, compliant and fit for purpose. From early R&D, through complex regulatory approvals and into production, our global laboratory network of scientists, engineers, and technologists support customers to achieve assurance over product quality, sustainable outcomes, and market access.
While we are proud of our global reach, working at Element feels like being part of a smaller company. We empower you to take charge of your career, and reward excellence and integrity with growth and development.
Industries across the world depend on our care, attention to detail and the absolute accuracy of our work. The role we have to play in creating a safer world is much bigger than our organization.
Diversity Statement
At Element, we always take pride in putting our people first. We are an equal opportunity employer that recognizes diversity and inclusion as fundamental to our Vision of becoming "the world's most trusted testing partner".
All suitably qualified candidates will receive consideration for employment on the basis of objective work related criteria and without regard for the following: age, disability, ethnic origin, gender, marital status, race, religion, responsibility of dependents, sexual orientation, or gender identity or other characteristics in accordance with the applicable governing laws or other characteristics in accordance with the applicable governing laws.
Cyber Security Incident Responder
Cyber Security Analyst Job 13 miles from Newport
We are looking for an enthusiastic and experienced Cyber Security Incident Responder (IR) to join our dynamic and growing team. The role holder will play a critical role in maintaining the security and resilience of Element's digital infrastructure by effectively handling cyber incidents. This is an opportunity to join an emerging team and become a key contributor on day one. You will work closely with peers to develop what you see as a great 24/7 operational cyber defense capability. We encourage applications from those with direct experience in Digital Forensics and Incident Response (DFIR).
This position requires paid on call and overtime if there are serious cyber-attacks. This position is hybrid.
Responsibilities
Help build Element's IR capability. Implement best practice in line with NIST, SANS and other industry frameworks
Govern and coordinate cyber incidents. Act as the lead incident manager and technical authority for Cyber Defense. Conduct thorough investigations to reduce risk. Determine the root cause, impact, and identify remediation actions
Collaborate with cross-functional teams including IT, Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date
Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement
Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis
Work closely with the Senior Manager Incident Response to Input into the development of cyber defense metrics
Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities
Skills / Qualifications
A minimum of two years' experience working in cyber security. Technical experience as a Cyber Incident Responder e.g., Digital Forensics Incident Response (DFIR). Experience in managing complex cyber incidents would be great
Experience of in working within a complex highly federated organization. A comprehensive understanding of cyber defense operations in both the public and private sectors
A bachelor's degree in Computer Science, Information Technology, or a related field is desirable but not essential, as are other relevant certifications (e.g., CISSP, CISM, GIAC)
Attention to detail, strong analytical skills and efficient problem solving. The ability to think critically and make sound decisions in high-pressure situations
Cultural sensitivity and social flexibility in a global corporate environment
Experience in proactive communication to, and direct interaction with senior staff. The ability to convey complex information to a non-technical audience
A highly self-motivated individual with positive mindset and can-do attitude. A strong believer of security as an enabler to support business growth
This position requires on call and overtime if there are very serious cyber attacks
Knowledge of SIEM tooling, including experience in writing and developing advanced hunting and correlation search queries for alerts
Must be a US Citizen or Green Card holder
#LI-SL1
#LI-SL1
Company Overview
Element is one of the fastest growing testing, inspection and certification businesses in the world. Globally we have more than 9,000 brilliant minds operating from 270 sites across 30 countries. Together we share an ambitious purpose to ‘Make tomorrow safer than today'.
When failure in use is not an option, we help customers make certain that their products, materials, processes and services are safe, compliant and fit for purpose. From early R&D, through complex regulatory approvals and into production, our global laboratory network of scientists, engineers, and technologists support customers to achieve assurance over product quality, sustainable outcomes, and market access.
While we are proud of our global reach, working at Element feels like being part of a smaller company. We empower you to take charge of your career, and reward excellence and integrity with growth and development.
Industries across the world depend on our care, attention to detail and the absolute accuracy of our work. The role we have to play in creating a safer world is much bigger than our organization.
Diversity Statement
At Element, we always take pride in putting our people first. We are an equal opportunity employer that recognizes diversity and inclusion as fundamental to our Vision of becoming “the world's most trusted testing partner”.
All suitably qualified candidates will receive consideration for employment on the basis of objective work related criteria and without regard for the following: age, disability, ethnic origin, gender, marital status, race, religion, responsibility of dependents, sexual orientation, or gender identity or other characteristics in accordance with the applicable governing laws or other characteristics in accordance with the applicable governing laws.
T&T-Cyber-D&R-AM-Presales Engineer-Gurgaon
Cyber Security Analyst Job 7 miles from Newport
Your potential, unleashed. India's impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organisations shaping the future of the region, and indeed, the world beyond.
At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters.
The team
Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient-not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks
Your work profile
As Assistant Manager in our Cyber Team you'll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: -
Key Responsibilities:
As a part of our Cyber Defense and Resilience team you'll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations.
* Experience in solutions development and responding to RFI/RFPs and managing pursuits for security services like Managed Security Services, etc.
* Awareness and understanding of technical Security Operations ,Cloud Security infrastructure
* Proven experience in managing end-to-end high value/multi-million dollar pursuits driving full lifecycle from requirements gathering, solution design and commercial fitment approach
* Experienced in developing solution design artefacts, solution collaterals, presentations, point of view and other solution / product eminence material
* Development of scope of work statement, pricing calculators, solution guidance documents
* strong presentation, documentation and articulation skills.
* Good knowledge of PowerPoint, Excel, Visio, SharePoint and other development and collaboration tools
* Excellent written and oral communication skills
* Provide team and technical leadership to support client engagements
* Experience in managing professional service engagement teams
Desired qualifications & Preferred Certifications
* BE in Computer Science/IT
* Essential: CISSP
* Desirable: TOGAF, SABSA Architecture
Location and way of working
* Base location: Gurgaon
* Professional is required to work from office
Your role as a Assistant Manager
We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society.
In addition to living our purpose, Senior Executive across our organization must strive to be:
* Inspiring - Leading with integrity to build inclusion and motivation
* Committed to creating purpose - Creating a sense of vision and purpose
* Agile - Achieving high-quality results through collaboration and Team unity
* Skilled at building diverse capability - Developing diverse capabilities for the future
* Persuasive / Influencing - Persuading and influencing stakeholders
* Collaborating - Partnering to build new solutions
* Delivering value - Showing commercial acumen
* Committed to expanding business - Leveraging new business opportunities
* Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization
* Effective communication - Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities
* Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for
the success of engagement(s)
* Managing change - Responding to changing environment with resilience
* Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision
* Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems
* Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte
* Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviours and attitudes to become more inclusive.
How you'll grow
Connect for impact
Our exceptional team of professionals across the globe are solving some of the world's most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report.
Empower to lead
You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership.
Inclusion for all
At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters.
Drive your career
At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte.
Everyone's welcome… entrust your happiness to us
Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here's a glimpse of things that are in store for you.
Interview tips
We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you're applying to. Check out recruiting tips from Deloitte professionals.
* Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices.
At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution.
In this regard, you may refer to a more detailed advisory given on our website at: **********************************************************************************
Information Security Analyst 1, Digital Technology Solution
Cyber Security Analyst Job 2 miles from Newport
Information Security Analyst 1, Digital Technology Solution University of Cincinnati Posted: December 10, 2024 Location: Cincinnati, Ohio **Current UC employees must apply internally via *SuccessFactors*** **You are invited to submit an application to be considered for one of multiple vacancies of the same position.**
****Job Overview****
Assist in performing procedures and provide technical solutions that serve to provide appropriate access to and protect systems from unauthorized users.
****Essential Functions****
* Participate in peer knowledge sharing groups.
* Communicate security concepts effectively, with guidance.
* Assist with development of technical documentation (designs, specifications, processes, workflows) and communications.
* Document individual progress on assigned deliverables.
* Participate in gathering of metrics for area of responsibility.
* Carry out procedures to ensure that support departmental and university operations in the information security area.
* Maintain familiarity with information security trends and best practices.
* Participate in internal information security projects and initiatives.
* Participate in preparation and maintenance of functional documentation for assigned tasks.
* Participate in the research, design, implementation, and support of systems supporting information security tools and services.
* Participate in the development, maintenance, and utilization of standard operating procedures.
* Participate in conducting risk and vulnerability assessments of information systems to identity vulnerabilities, risks, and protection needs.
* Participate in troubleshooting processes during and outside of normal business hours.
* Assist with mentoring non-security teams regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
* Assist with information security training and awareness programs.
* Perform related duties based on departmental need. This job description can be changed at any time.
****Required Education****
* Associate's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
* Two (2) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
****Required Experience****
Possess working knowledge of commonly-used concepts, practices, and procedures and contributes through support, using established processes, methods, and systems.
****Additional Qualifications Considered****
This position will primarily work in the area of information security operations. The ideal candidate will have education or experience in the field of information security operations. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and event management (SIEM), SSL and client certificate management, vulnerability management, privileged access management, password management, system/application administration for security related technologies, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes. CISSP, CISM, GISP or similar information security certification(s) are preferred.
Technical security certifications such as Security+, GSEC or similar.
****Physical Requirements/Work Environment****
* Talking - Continuously
* Sitting - Continuously
* Hearing, listening - Continuously
* Repetitive hand motion (such as typing) - Continuously
* Bending - Seldom
* Climbing stairs/ladders - Seldom
* Crawling - Seldom
* Crouching - Seldom
* Kneeling, squatting - Seldom
* Lifting - over 50 pounds - Seldom
* Lifting - up to 20 pounds - Seldom
* Lifting - up to 50 pounds - Seldom
* Pulling, pushing - Seldom
* Reaching overhead - Seldom
* Standing - Seldom
* Stooping - Seldom
* Walking - Seldom
* Shoveling - Not Required
**Compensation and Benefits**
UC offers a wide array of complementary and affordable benefit options, to meet the financial, educational, health, and wellness needs of you and your family. Eligibility varies by position and FTE.
* Competitive salary range dependent on the candidate's experience.
* Comprehensive insurance plans including medical, dental, vision, and prescription coverage.
* Flexible spending accounts and an award-winning employee wellness program, plus an employee assistance program.
* Financial security via our life and long-term disability insurance, accident and illness insurance, and retirement savings plans.
* Generous paid time off work options including vacation, sick leave, annual holidays, and winter season days in addition to paid parental leave.
* Tuition remission is available for employees and their eligible dependents.
* Enjoy discounts for on and off-campus activities and services.
As a UC employee, and an employee of an Ohio public institution, if hired you will not contribute to the federal Social Security system, other than contributions to Medicare. Instead, UC employees have the option to contribute to a state retirement plan (OPERS, STRS) or an alternative retirement plan (ARP).
To learn more about why UC is a great place to work, please visit our careers page at .
For questions about the UC recruiting process or to request accommodations with the application, please contact Human Resources at ***********.
**The University of Cincinnati is an Equal Opportunity Employer.**
REQ: 97769
SF:OMJ SF:RM SF:HEJ, SF:INS SF:HERC SF:DIV SF:LJN SF:IHE
HISTORY IN BRIEF - The University of Cincinnati is a public urban serving research institution that was founded in 1819 and today is one of the country's largest universities offering more than 350 academic programs to more than 44,000 students. UC has many top ranked programs in areas such as Music and Arts, Medical and Human-Services, Criminal Justice and more. Located in an urban setting, UC is close to the heart of Cincinnati and allows easy access for students to enjoy all that the city offers. UC is also the alma mater of many notables such as President William Howard Taft; Albert Sabin, developer of the oral polio vaccine; Astronaut Neil Armstrong and Mary Weinberg, 2008 Olympic gold medalist. UC is classified as a Research University (Very High Research Activity) by the Carnegie Commission and is ranked as one of America's top 35 public research universities by the National Science Foundation. UC jumped 17 spots in the U.S. News & World Report rankings in the past two years alone. In addition to being named a “green university” by Princeton Review, UC has been named one of the world's most beautiful campuses by Forbes and Delta Sky magazines. Learn more at ******************** N STATEMENT - The University of Cincinnati serves the people of Ohio, the nation, and the world as a premier, public, urban research university dedicated to undergraduate, graduate, and professional education, experience-based learning, and research. We are committed to excellence and diversity in our students, faculty, staff, and all of our activities. We provide an inclusive environment where innovation and freedom of intellectual inquiry flourish. Through scholarship, service, partnerships, and leadership, we create opportunity, develop educated and engaged citizens, enhance the economy and enrich our University, city, state and global community. Show more Show less ISACA Career Center is Just One of the Benefits. Discover what else ISACA has to offer!
Cyber Engineer
Cyber Security Analyst Job 18 miles from Newport
At Cryptic Vector, we are dedicated to mission success. We take the time to understand our customers' needs, delivering products that perform when our nation needs them most. We understand that properly supporting the most unique missions of the United States government requires the nation's best. Our focus is on creating a culture where the best and brightest want to grow, learn, and stay. If coming up with out-of-the-box solutions is your specialty, then you'll feel right at home at Cryptic Vector. We are solving the country's most unique problems in an environment where problem solvers and hard workers thrive. We've replaced corporate red tape with transparency and servant leadership. Honestly, it's hard not to love this culture!
We value the individual experiences that our team members add to our culture and capabilities. Please don't hesitate to apply even if you don't meet the exact qualifications! We are interested in varying levels of experience.
Cryptic Vector is looking for Cyber Engineers with experience or interest in offensive cyber engineering. Cyber Engineering at Cryptic Vector is a research and development position spanning a variety of disciplines.
The responsibilities of the Cyber Engineer position may include the following:
Reverse Engineering (RE) of software/firmware, Vulnerability Research (VR), exploit development/productization
Design/develop post-exploitation effects in software/firmware, which can withstand scrutiny and attack
Design/develop secure, reliable, software-based communication solutions
Design/develop stealth solutions
Collaborate with engineering teams and product end users to translate customer/business/technical requirements into architectural designs and software solutions
Write unit tests, functional tests, and end-to-end tests
Provide constructive code reviews for colleagues
Programming languages:
Direct and recent experience coding in C and/or C++
Interest in new systems programming languages
Proficiency in modern scripting languages (like Python) is important but not central
An ideal candidate for these positions will have:
Experience developing user-mode applications for traditional platforms (Windows, Linux, mac OS, Android, iOS) or user/kernel-mode capabilities for non-traditional platforms (embedded/proprietary/custom firmware or operating systems)
A hacker mindset. Interest analyzing software/firmware for weaknesses.
Participation or interest in Capture the Flag (CTF)/hacking competitions
Interest in the architecture/internals of proprietary operating systems
Comfort working with assembly, machine code, hexadecimal, and binary. Familiarity with reverse engineering tools, such as IDA Pro and/or Ghidra.
Experience using, analyzing, and manipulating old/new network protocols. Interest in network/socket programming using TCP/UDP.
Working knowledge of basic cryptography functions and programming
Humble confidence, with a desire to work in a team setting (perhaps using an agile methodology)
Familiarity with software engineering methods/process. Familiarity with CI/CD pipelines and best practices.
Requirements
Preference for B.S. degree in Computer Science, Cyber Operations, Computer Engineering, Electrical Engineering, or related field
Ability to obtain/maintain a US security clearance
Willing to work in the greater Cincinnati area
Information Security Specialist II
Cyber Security Analyst Job 2 miles from Newport
Information Security Specialist II page is loaded **Information Security Specialist II** **Information Security Specialist II** locations Minneapolis, MNCincinnati, OHCharlotte, NC time type Full time posted on Posted 16 Days Ago job requisition id2024-0025301 At U.S. Bank, we're on a journey to do our best. Helping the customers and businesses we serve to make better and smarter financial decisions and enabling the communities we support to grow and succeed. We believe it takes all of us to bring our shared ambition to life, and each person is unique in their potential. A career with U.S. Bank gives you a wide, ever-growing range of opportunities to discover what makes you thrive at every stage of your career. Try new things, learn new skills and discover what you excel at-all from Day One.
****Job Description****
U.S. Bank is seeking a Senior Information Security Specialist to join the Identity and Access Management (IAM) Security Access Operations team. We are looking for candidates with demonstrated operational and technical competence and leadership experience to contribute toward the success of our security and operational initiatives. The ideal candidate will be process improvement-minded, customer and security focused, and a thought leader. This person will also be responsible for driving automation initiatives, recommending and implementing process improvements, and assisting with department project work. Also responsible for driving automation, process improvements, and projects.
***The role offers a hybrid/flexible schedule, which means there's an in-office expectation of 3 or more days per week and the flexibility to work outside the office location for the other days at one of the following locations:***
* Minneapolis, MN
* Cincinnati, Ohio
* Charlotte, NC
The primary platforms of focus will be one or more of the following: Windows, Active Directory, Unix/Linux, Mainframe, and Microsoft 365, and/or MS-Exchange.
Day-to-day responsibilities include
* Assessing and provisioning access requests
* Processing change tasks
* Trouble shooting of access-related incidents
* Providing analysis and implementation of complex project access requests
* Identifying possible solutions to satisfy customer requirements and security policy standards.
* Working with business lines to identify initial access security requirements
**This position requires participating in 7x24 on-call rotation - 1 week every 6-8 weeks**
**Basic Qualifications**
* Bachelor's degree or equivalent work experience
* At least seven years of experience with the processes, tools, techniques and practices for assuring adherence to quality standards associated with developing, enhancing and operationalizing application systems and databases
**Experience should include** :
* 2+ years Active Directory &/or UNIX administration
* 2+ years working with and understanding security principles/best practices in regard to Access Management/Windows/Active Directory.
* 1+ years experience creating and executing PowerShell scripts
* Professional verbal and written communication skills
* 2+ years experience with MS-Office using the advanced functions Excel
**Preferred Skills/Experience/Certifications**
* 6+ months experience in Cloud Provisioning
* 6+ months experience using ServiceNow for ticketing
* ISACA Certified Information Security Manager (CISM, CRISC, CISA)
* Cloud Certifications (Azure)
* Certified Information System Security Professional (CISSP)
If there's anything we can do to accommodate a disability during any portion of the application or hiring process, please refer to our .
**Benefits:**
Our approach to benefits and total rewards considers our team members' whole selves and what may be needed to thrive in and outside work. That's why our benefits are designed to help you and your family boost your health, protect your financial security and give you peace of mind. Our benefits include the following (some may vary based on role, location or hours):
* Healthcare (medical, dental, vision)
* Basic term and optional term life insurance
* Short-term and long-term disability
* Pregnancy disability and parental leave
* 401(k) and employer-funded retirement plan
* Paid vacation (from two to five weeks depending on salary grade and tenure)
* Up to 11 paid holiday opportunities
* Adoption assistance
* Sick and Safe Leave accruals of one hour for every 30 worked, up to 80 hours per calendar year unless otherwise provided by law
**EEO is the Law**
U.S. Bank is an equal opportunity employer committed to creating a diverse workforce. We consider all qualified applicants without regard to race, religion, color, sex, national origin, age, sexual orientation, gender identity, disability or veteran status, among other factors. Applicants can learn more about the company's status as an equal opportunity employer by viewing the federal EEO poster.
**E-Verify**
U.S. Bank participates in the U.S. Department of Homeland Security E-Verify program in all facilities located in the United States and certain U.S. territories. The E-Verify program is an Internet-based employment eligibility verification system operated by the U.S. Citizenship and Immigration Services. Learn more about the .
The salary range reflects figures based on the primary location, which is listed first. The actual range for the role may differ based on the location of the role. In addition to salary, U.S. Bank offers a comprehensive benefits package, including incentive and recognition programs, equity stock purchase 401(k) contribution and pension (all benefits are subject to eligibility requirements). Pay Range: $105,400.00 - $124,000.00 - $136,400.00U.S. Bank will consider qualified applicants with arrest or conviction records for employment. U.S. Bank conducts background checks consistent with applicable local laws, including the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act as well as the San Francisco Fair Chance Ordinance. U.S. Bank is subject to, and conducts background checks consistent with the requirements of Section 19 of the Federal Deposit Insurance Act (FDIA). In addition, certain positions may also be subject to the requirements of FINRA, NMLS registration, Reg Z, Reg G, OFAC, the NFA, the FCPA, the Bank Secrecy Act, the SAFE Act, and/or federal guidelines applicable to an agreement, such as those related to ethics, safety, or operational procedures.
Applicants must be able to comply with U.S. Bank policies and procedures including the Code of Ethics and Business Conduct and related workplace conduct and safety policies.
Job postings typically remain open for approximately 20 days of the posting date listed above, however the job posting may be closed earlier should it be determined the position is no longer required due to business need. Job postings in areas with a high volume of applicants, such as customer service, contact center, and Financial Crimes investigations, remain open for approximately 5 days of the posting listed date. At U.S. Bank, we're on a journey to do our best. Helping the customers and businesses we serve to make better and smarter financial decisions and enabling the communities we support to grow and succeed. We believe it takes all of us to bring our shared ambition to life, and each person is unique in their potential. A career with U.S. Bank gives you a wide, ever-growing range of opportunities to discover what makes you thrive at every stage of your career. Try new things, learn new skills and discover what you excel at-all from Day One.
Merger and Acquisition Security Analyst - Erlanger, KY @ ADM
Cyber Security Analyst Job 7 miles from Newport
**Merger & Acquisition Security Analyst - ADM Global Primary Locations** . Under general supervision, analyze, architect, engineer, implement, integrate and maintain effective methods to protect ADM systems and data during Merger, Acquisition, Divestiture, and Joint Venture (MADJV) process. Use established process, procedures and standards, while recommending process improvements through experience and leading practices. Interface with IT and MADJV Leads to operationalize security requirements to enable the business and maintain the security posture to appropriate risk levels.
Must display enthusiasm and interest in Information Security and draw recommendations based on real world experience.
**Job Responsibilities:**
* Under guidance of the Global Information & Cyber Security (GICS) MADJV Manager, represent GICS for MADJV related activities.
* Work with GICS Directors and GICS MADJV Lead on recommending plans on all MADJV related activity. Use established process, procedures and standards, while recommending process improvements through experience and best practice.
* Assess security posture, identify risks, and develop strategies to mitigate / manage risks through MADJV projects.
* Interface with IT and other MADJV stakeholders to operationalize security requirements to enable the business and maintain the security posture to appropriate risk levels. Collaborate within the broader Information Security function, and MADJV leads to help design and implement security improvements and requirements.
* Perform functions in a timely manner and with extreme level of attention to detail, urgency and thoroughness.
* Anticipate problems and identify long-term implications of decisions and actions.
**Job Requirements:**
* “Full Professional Proficiency” (Inter-agency Language Round-table [IRL] level 4, or equivalent) or greater written & verbal capability in English.
* 3+ years' experience in Information Technology, demonstrating work with Information Security, Security Governance, Audit or Risk and Control .
* Experience with security principles and defense-in-depth techniques.
* Bachelors' degree or equivalent work experience.
* Understanding of Information Security Layers.
* Security experience related to concepts of least privilege, risk management, vulnerability management, identity and access management, access controls, and segmentation.
* Experience executing large global projects with slim timelines and schedules.
* Understanding and knowledge of Sarbanes-Oxley and IT General Controls.
* Knowledge of third party auditing, such as cloud, and risk assessment methodologies.
* Ability to communicate and collaborate effectively with other team members in a geographic and culturally diverse workforce.
* Expected to complete projects within specified deadlines.
* Expected to work occasional nights, weekends, holidays, and overtime.
* Occasional travel may be required.
* Strong sense of professionalism and ethics.
**Desired Skills:**
* Current holder of CISSP and / or other industry certifications a plus.
* Security project management experience preferred.
* Additional language skills a plus.
Before applying for an exempt, non-exempt or hourly job opportunity, you are expected to initiate position for more than 18 months, supervisor approval is not required. a discussion and share your intentions with your supervisor. * If you've been in your current * If you've been in your current position for less than 18 months, verbal supervisor approval is required.
Hiring Manager- Arthur Avart
Recruiter- Alisa Koster
**City**
Erlanger
**State**
KY - Kentucky
**Location Country**
United States
About ADM
At ADM, we unlock the power of nature to provide access to nutrition worldwide. With industry-advancing innovations, a complete portfolio of ingredients and solutions to meet any taste, and a commitment to sustainability, we give customers an edge in solving the nutritional challenges of today and tomorrow. We're a global leader in human and animal nutrition and the world's premier agricultural origination and processing company. Our breadth, depth, insights, facilities and logistical expertise give us unparalleled capabilities to meet needs for food, beverages, health and wellness, and more. From the seed of the idea to the outcome of the solution, we enrich the quality of life the world over. Learn more at ************
**Explore more career opportunities**
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Cyber Security Engineer - Information System Security Officer
Cyber Security Analyst Job 50 miles from Newport
Share If you are unable to complete this application due to a disability, contact this employer to ask for an accommodation or an alternative application process. **Cyber Security Engineer - Information System Security Officer** 30+ days ago Requisition ID: 1132 **Location and Travel Details:** Dayton, OH - hybrid
The key responsibilities of the **Cyber Security Engineer -** **Information System Security Officer (ISSO)** include:
* Provide support for implementing and enforcing information systems security policies, standards, and methodologies
* Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types of information
* Analyze threats and develop and implement best practice methodologies for incident detection, reporting, and vulnerability remediation
* Maintain records on systems, applications, hardware, etc. to include system upgrades
* Evaluate security solutions to ensure they meet security requirements for processing information
* Maintain operational security posture for information systems
* Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system/program/enclave
* Develop and maintain documentation for Certification & Accreditation in accordance with specified policies
* Develop and update system security plans and other IA documentation
* Provide CM for security-relevant information system software, hardware, and firmware
* Develop system security policy and ensure compliance
**Key skills for this position include:**
* Demonstrated knowledge of and experience with several of the following: current security tools; hardware/software security implementation; communication protocols; encryption techniques/tools
* Experience completing security evaluations of software systems or architectures to ensure they meet security requirements
* Experience preparing and maintaining SSPs and other security related documentation
* Experience proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies, preferably on a large software or IT program
* Demonstrated experience performing day-to-day security operations of large, complicated information and information processing systems
* Must be committed to developing and adhering to best practices
* Must be a solutions-oriented team player and must possess a high level of self-initiative
* Must have excellent interpersonal skills
* Must possess a Security+ certification
* Minimum education: Bachelor's degree in Computer Science, Cybersecurity, or comparable academic discipline
* Minimum experience requirements: five years of experience required
* Must have or be willing to obtain Secret Clearance (this requires US Citizenship)
* Acceptable candidates must successfully pass a drug test and background screen
**Desired Experience:**
* Knowledge of DoD security requirements
* Experience with Cloud
* Knowledge of DoD systems, data and processes
At Illumination Works, we know data, and we should, we've been doing it since we started in 2006! We specialize in everything data from big data to data science, software engineering, data management, AR/IoT, and cloud development. Illumination Works is a trusted technology partner in user-centered digital transformation-delivering impactful business results to clients. We partner with customers to solve their unique technology and data challenges, and stay on top of modern technologies and advancements leveraging our Innovation Lab.
We invest in our employees in all aspects of their life and we value family. We offer market competitive salary, a generous PTO package, and comprehensive medical, dental, vision and life insurance plans. We also offer 401K, short/long-term disability insurance, a fun and engaging culture, and training opportunities to keep you up to speed on the latest technologies.
Illumination Works is committed to hiring and retaining a diverse workforce. We are an Equal Opportunity Employer, making decisions without regard to race, color, religion, sexual orientation, gender identity or national origin, age, veteran status, disability, or any other protected class. Acceptable candidates must successfully pass a drug test and background screen.
API Security Engineer Company Hidden Finance Cincinnati, OH 1 Opening 2 months ago $1,500 reward per hire
Cyber Security Analyst Job 2 miles from Newport
**API Security Engineer** Company Hidden Finance Cincinnati, OH Base pay $12,345 - $678,910 or to view salary and company information Other Contract 1 Opening $1,500 reward per hire **About this Role** Agility Partners is seeking a qualified API Security Engineer to fill an open position with one of our banking clients. In this exciting opportunity, you will play a crucial role in securing APIs, leading technical conversations, and establishing an API management strategy.
**Responsibilities:**
* Lead technical discussions to determine API security items and define API patterns.
* Write best practices and create business and security requirements with a focus on threat modeling.
* Collaborate with stakeholders to determine control criticality and work with application owners to create patterns.
* Address Information Security risks, ensuring alignment with business objectives and regulatory requirements.
* Provide expertise on decisions and priorities regarding the enterprise's Information Security strategy.
**Benefits and Perks**
***Reasons to Love It:***
Work within a collaborative team environment where ideas and creativity are welcomed! Family and Work Life balance are important to this organization and valued for the employees.
* Working for an organization that focuses on company culture, inclusion and diversity
* 50% medical coverage for you and your entire family, short/long term disability and life insurance options
* 401(k)
* Life Insurance
* Disability coverage
**The Ideal Candidate**
**Qualifications:**
* Bachelor's degree in a relevant technology field or equivalent combination of education and work experience.
* 8+ years of engineering or IT/Security work experience.
* 5+ years of interdisciplinary experience in Access Control Systems, Application Security, Application SDLC, Operating Systems, Cryptographic Controls, API Security, and Networking.
* Excellent communication skills and the ability to build effective relationships with business leaders.
* Strong organizational skills with the ability to manage multiple tasks simultaneously.
* Solid understanding of IT security best practices.
* Skilled in designing, implementing, and supporting complex technical solutions.
* Experience in API security testing, architecture, design, and lifecycle management.
* Proficient in integrating security-focused API initiatives with other development teams.
* Ability to provide clear and concise documentation on delivered code and customer onboarding.
**Additional Preferred Skills:**
* Experience with Jenkins pipelines and automating security controls within CI/CD pipelines.
* Extensive development experience with different API capabilities.
* Previous microservice development and application vulnerability remediation experience.
* Knowledge of serverless solutions within AWS.
Share this job. Make $1,500.
When a friend applies to this position and gets hired, you'll get credited with a referral reward!*
*Reward paid upon hire of your candidate according to our Recruiting Agreement Policy (see right).
Information Security Analyst 1, Digital Technology Solution
Cyber Security Analyst Job 2 miles from Newport
Current UC employees must apply internally via SuccessFactors You are invited to submit an application to be considered for one of multiple vacancies of the same position. Founded in 1819, the University of Cincinnati ranks among the nation's best urban public research universities. Home to 53,235 students, more than 11,000 faculty and staff and 350,000+ living alumni, UC combines a Top 35 public research university with a physical setting The New York Times calls "the most ambitious campus design program in the country."
With the launch of Next Lives Here, the Cincinnati Innovation District, a $100 million JobsOhio investment, three straight years of record enrollment, worldwide leadership in cooperative education, a dynamic academic health center and entry into the Big 12 Conference, UC's momentum has never been stronger. UC's annual budget stands at $1.85 billion, and its endowment totals nearly $1.8 billion.
Job Overview
Assist in performing procedures and provide technical solutions that serve to provide appropriate access to and protect systems from unauthorized users.
Essential Functions
* Participate in peer knowledge sharing groups.
* Communicate security concepts effectively, with guidance.
* Assist with development of technical documentation (designs, specifications, processes, workflows) and communications.
* Document individual progress on assigned deliverables.
* Participate in gathering of metrics for area of responsibility.
* Carry out procedures to ensure that support departmental and university operations in the information security area.
* Maintain familiarity with information security trends and best practices.
* Participate in internal information security projects and initiatives.
* Participate in preparation and maintenance of functional documentation for assigned tasks.
* Participate in the research, design, implementation, and support of systems supporting information security tools and services.
* Participate in the development, maintenance, and utilization of standard operating procedures.
* Participate in conducting risk and vulnerability assessments of information systems to identity vulnerabilities, risks, and protection needs.
* Participate in troubleshooting processes during and outside of normal business hours.
* Assist with mentoring non-security teams regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
* Assist with information security training and awareness programs.
* Perform related duties based on departmental need. This job description can be changed at any time.
Required Education
* Associate's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
* Two (2) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
Required Experience
Possess working knowledge of commonly-used concepts, practices, and procedures and contributes through support, using established processes, methods, and systems.
Additional Qualifications Considered
This position will primarily work in the area of information security operations. The ideal candidate will have education or experience in the field of information security operations. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and event management (SIEM), SSL and client certificate management, vulnerability management, privileged access management, password management, system/application administration for security related technologies, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes. CISSP, CISM, GISP or similar information security certification(s) are preferred.
Technical security certifications such as Security+, GSEC or similar.
Physical Requirements/Work Environment
* Talking - Continuously
* Sitting - Continuously
* Hearing, listening - Continuously
* Repetitive hand motion (such as typing) - Continuously
* Bending - Seldom
* Climbing stairs/ladders - Seldom
* Crawling - Seldom
* Crouching - Seldom
* Kneeling, squatting - Seldom
* Lifting - over 50 pounds - Seldom
* Lifting - up to 20 pounds - Seldom
* Lifting - up to 50 pounds - Seldom
* Pulling, pushing - Seldom
* Reaching overhead - Seldom
* Standing - Seldom
* Stooping - Seldom
* Walking - Seldom
* Shoveling - Not Required
Compensation and Benefits
UC offers a wide array of complementary and affordable benefit options, to meet the financial, educational, health, and wellness needs of you and your family. Eligibility varies by position and FTE.
* Competitive salary range dependent on the candidate's experience.
* Comprehensive insurance plans including medical, dental, vision, and prescription coverage.
* Flexible spending accounts and an award-winning employee wellness program, plus an employee assistance program.
* Financial security via our life and long-term disability insurance, accident and illness insurance, and retirement savings plans.
* Generous paid time off work options including vacation, sick leave, annual holidays, and winter season days in addition to paid parental leave.
* Tuition remission is available for employees and their eligible dependents.
* Enjoy discounts for on and off-campus activities and services.
As a UC employee, and an employee of an Ohio public institution, if hired you will not contribute to the federal Social Security system, other than contributions to Medicare. Instead, UC employees have the option to contribute to a state retirement plan (OPERS, STRS) or an alternative retirement plan (ARP).
To learn more about why UC is a great place to work, please visit our careers page at ********************************
For questions about the UC recruiting process or to request accommodations with the application, please contact Human Resources at ***********.
The University of Cincinnati is an Equal Opportunity Employer.
REQ: 97769
SF:OMJ SF:RM SF:HEJ, SF:INS SF:HERC SF:DIV SF:LJN SF:IHE
Information Security Analyst 1, Digital Technology Solution
Date: Jan 7, 2025
Location:
Cincinnati, OH, US
Facility: Main Campus
T&T- Cyber- CST- ISMS & GRC Delhi
Cyber Security Analyst Job 7 miles from Newport
Your potential, unleashed. India's impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond.
At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters.
The team
Technology & Transformation is about much more than just the numbers. It's about attesting to accomplishments and challenges and helping to assure strong foundations for future aspirations. Deloitte exemplifies what, how, and why of change so you're always ready to act ahead. Learn more about Technology & Transformation Practice
Your work profile
As a Deputy Manager in our Cyber Team you'll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: -
* Working knowledge in one or more security and privacy domains such as: security governance policies and procedures, risk management, compliance, access control, network security, security architecture, security incident response, disaster recovery, business continuity management, privacy and data protection
* Experience in leveraging industry standards and frameworks such as ISO/IEC 17799, ISO/IEC 27001, COBIT, ITIL, etc.
* Demonstrates in-depth knowledge of security and privacy controls and risk management process
* Experience in data protection technologies such as encryption, data discovery, data masking, data redaction, etc.
* Possesses certifications such as ISO27001 LA/ LI, ISO22301 LA/LI, CISSP, CISA, CISM certification- preferred
Desired qualifications
* Responsible for ISO 27001 based Information Security Management System implementation and sustenance
* Responsible for advising clients on Business Continuity Planning, IT Disaster Recovery planning
* Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk
* Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling
* Responsible to assist client in developing information assets inventory and classification
* Responsible for conducting clients vendors risk assessment and providing a holistic view of clients risk exposure due to outsourcing
* Responsible for advising and assisting clients to develop and implement Information classification framework
* Conduct Information Systems audits covering IT infrastructure assets
* Advice clients on data privacy, data leakage prevention, identity and access management
* Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions
* Demonstrates ability to work independently on projects with limited supervision
* Demonstrates understanding of complex business and information technology management processes
* Demonstrates working knowledge of firm tools and methodologies that may be suitable for the engagement
* Manages day-to-day client relationships at mid and lower levels.
* Participates in proposal development efforts to sell "add-on" work to clients
* Identifies opportunities to improve engagement economics
* Plays substantive role in designing and implementing business development plan for the service line
* Plays substantive/lead role in retention of professionals and in building staff complement, mix, and recruiting
* Undertakes initiatives in people and practice development
* B.E / B.Tech (Tier 1/2) in Computer Science, Information Technology or related fields
* ISO 27001 LA/LI, ISO 31000 LA/LI, ISO 22301 LA/LI, CISA, ITIL, or equivalent certification preferred
* CISSP, GSEC, GCIH, CEH, LPT, CCSK, eGRC tools like Archer, OpenPages or functional certifications would be preferred
Location and way of working
* Base location: Delhi
* This profile involves frequent / occasional travelling to client locations OR this profile does not involve extensive travel for work.
* Hybrid is our default way of working. Each domain has customised the hybrid approach to their unique needs.
Your role as a Deputy Manager
We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society.
In addition to living our purpose, DM across our organization must strive to be:
* Inspiring - Leading with integrity to build inclusion and motivation
* Committed to creating purpose - Creating a sense of vision and purpose
* Agile - Achieving high-quality results through collaboration and Team unity
* Skilled at building diverse capability - Developing diverse capabilities for the future
* Persuasive / Influencing - Persuading and influencing stakeholders
* Collaborating - Partnering to build new solutions
* Delivering value - Showing commercial acumen
* Committed to expanding business - Leveraging new business opportunities
* Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization
* Effective communication - Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities
* Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s)
* Managing change - Responding to changing environment with resilience
* Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision
* Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems
* Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte
* Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviours and attitudes to become more inclusive.
How you'll grow
Connect for impact
Our exceptional team of professionals across the globe are solving some of the world's most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report.
Empower to lead
You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership.
Inclusion for all
At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters.
Drive your career
At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte.
Everyone's welcome… entrust your happiness to us
Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here's a glimpse of things that are in store for you.
Interview tips
We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you're applying to. Check out recruiting tips from Deloitte professionals.
Information Security Analyst 3, Digital Technology Solutions
Cyber Security Analyst Job 2 miles from Newport
Information Security Analyst 3, Digital Technology Solutions University of Cincinnati Posted: December 10, 2024 Location: Cincinnati, Ohio * Assist with developing strategies to achieve organizational goals; understand organization's strengths and weaknesses; analyze potential risks and opportunities; adapt recommendations to changing conditions and aligns with best practices.
* Help facilitate large collaborative teams to achieve organizational goals.
* Support community communication efforts, presenting security insights to leadership.
* Develop technical documentation (designs, specifications, processes, workflows) and communications.
* Develop and validate baseline security configurations for operating systems, applications, networking, and telecommunications equipment.
* Participate in multiple, moderate- to high-risk projects.
* Work with a team to advance project goals and provide technical help and subject matter expertise. Actively engage in project support and solutioning.
* Share technical knowledge with teammates and help solve more complex problems.
* Document individual progress on assigned deliverables.
* Gather, maintain, and validate metrics for area of responsibility.
* Mentor student workers and junior employees.
* Carry out procedures to ensure that all systems, products, and services meet organization security standards. Recommend procedural improvements.
* Research information security trends to maintain technical understanding of the latest vulnerabilities and threats.
* Assist with providing artifacts to Governance, Risk & Compliance in relation to internal & external audits.
* Independently work with business units to achieve security objectives and identifies, reports, and resolves security risks and violations.
* Perform cyber investigations through forensic fact gathering with a focus on e-discovery.
* Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations.
* Provide guidance and technical expertise as needed for information security training and awareness programs.
* Participate in troubleshooting processes during and outside of normal business hours and participate in change management and root cause analysis.
* Mentor others regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
* Serve as an expert resource to others.
* Perform related duties based on departmental need. This job description can be changed at any time.
****Required Education****
Bachelor's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
Eight (8) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
****Required Experience****
* Two (2) years of related experience
* Advanced knowledge of security tool administration.
* Moderate project management skills.
* Experience with system administration.
* Experience with network architecture or some level of related technical training.
* Advanced understanding of risk and vulnerability management.
* Experience with incident response.
* Advanced knowledge of industry standard security and compliance frameworks.
****Additional Qualifications Considered****
This position will primarily work in the area of information security risk management. The ideal candidate will have experience in the field of information security risk. Responsibilities may include, but are not limited to: assessing information security reviews to identify business risk, make recommendations for implementation of security controls, performing gap analysis of contracts and ensuring appropriate data security verbiage is included in contracts, documenting excessive risk via institutional risk acceptance processes, participating on projects with data security concerns to represent the office of information security and ensure appropriate documentation is in place, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes, and supervision/mentorship of co-op and student workers.2. CISSP, CISM, GISP or similar information security certification(s) are preferred.
****Physical Requirements/Work Environment****
* Sitting - Continuously
* Repetitive hand motion (such as typing) - Continuously
* Hearing, listening - Continuously
* Talking - Continuously
* Standing - Seldom
* Walking - Seldom
* Bending - Seldom
* Stooping - Seldom
* Climbing stairs/ladders - Seldom
* Kneeling, squatting - Seldom
* Crouching - Seldom
* Crawling - Seldom
* Reaching overhead - Seldom
* Pulling, pushing - Seldom
* Lifting - up to 20 pounds - Seldom
* Lifting - up to 50 pounds - Seldom
* Lifting - over 50 pounds - Seldom
Competitive salary range dependent on the candidate's experience. HISTORY IN BRIEF - The University of Cincinnati is a public urban serving research institution that was founded in 1819 and today is one of the country's largest universities offering more than 350 academic programs to more than 44,000 students. UC has many top ranked programs in areas such as Music and Arts, Medical and Human-Services, Criminal Justice and more. Located in an urban setting, UC is close to the heart of Cincinnati and allows easy access for students to enjoy all that the city offers. UC is also the alma mater of many notables such as President William Howard Taft; Albert Sabin, developer of the oral polio vaccine; Astronaut Neil Armstrong and Mary Weinberg, 2008 Olympic gold medalist. UC is classified as a Research University (Very High Research Activity) by the Carnegie Commission and is ranked as one of America's top 35 public research universities by the National Science Foundation. UC jumped 17 spots in the U.S. News & World Report rankings in the past two years alone. In addition to being named a “green university” by Princeton Review, UC has been named one of the world's most beautiful campuses by Forbes and Delta Sky magazines. Learn more at ******************** N STATEMENT - The University of Cincinnati serves the people of Ohio, the nation, and the world as a premier, public, urban research university dedicated to undergraduate, graduate, and professional education, experience-based learning, and research. We are committed to excellence and diversity in our students, faculty, staff, and all of our activities. We provide an inclusive environment where innovation and freedom of intellectual inquiry flourish. Through scholarship, service, partnerships, and leadership, we create opportunity, develop educated and engaged citizens, enhance the economy and enrich our University, city, state and global community. Show more Show less ISACA Career Center is Just One of the Benefits. Discover what else ISACA has to offer!
Information Security Analyst 3, Digital Technology Solutions
Cyber Security Analyst Job 2 miles from Newport
Current UC employees must apply internally via SuccessFactors Founded in 1819, the University of Cincinnati ranks among the nation's best urban public research universities. Home to 53,235 students, more than 11,000 faculty and staff and 350,000+ living alumni, UC combines a Top 35 public research university with a physical setting The New York Times calls "the most ambitious campus design program in the country."
With the launch of Next Lives Here, the Cincinnati Innovation District, a $100 million JobsOhio investment, three straight years of record enrollment, worldwide leadership in cooperative education, a dynamic academic health center and entry into the Big 12 Conference, UC's momentum has never been stronger. UC's annual budget stands at $1.85 billion, and its endowment totals nearly $1.8 billion.
Job Overview
Assist in performing procedures and provides technical solutions that serve to provide appropriate access to and protect systems from unauthorized users.
Essential Functions
* Assist with developing strategies to achieve organizational goals; understand organization's strengths and weaknesses; analyze potential risks and opportunities; adapt recommendations to changing conditions and aligns with best practices.
* Help facilitate large collaborative teams to achieve organizational goals.
* Support community communication efforts, presenting security insights to leadership.
* Develop technical documentation (designs, specifications, processes, workflows) and communications.
* Develop and validate baseline security configurations for operating systems, applications, networking, and telecommunications equipment.
* Participate in multiple, moderate- to high-risk projects.
* Work with a team to advance project goals and provide technical help and subject matter expertise. Actively engage in project support and solutioning.
* Share technical knowledge with teammates and help solve more complex problems.
* Document individual progress on assigned deliverables.
* Gather, maintain, and validate metrics for area of responsibility.
* Mentor student workers and junior employees.
* Carry out procedures to ensure that all systems, products, and services meet organization security standards. Recommend procedural improvements.
* Research information security trends to maintain technical understanding of the latest vulnerabilities and threats.
* Assist with providing artifacts to Governance, Risk & Compliance in relation to internal & external audits.
* Independently work with business units to achieve security objectives and identifies, reports, and resolves security risks and violations.
* Perform cyber investigations through forensic fact gathering with a focus on e-discovery.
* Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations.
* Provide guidance and technical expertise as needed for information security training and awareness programs.
* Participate in troubleshooting processes during and outside of normal business hours and participate in change management and root cause analysis.
* Mentor others regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
* Serve as an expert resource to others.
* Perform related duties based on departmental need. This job description can be changed at any time.
Required Education
Bachelor's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
Eight (8) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
Required Experience
* Two (2) years of related experience
* Advanced knowledge of security tool administration.
* Moderate project management skills.
* Experience with system administration.
* Experience with network architecture or some level of related technical training.
* Advanced understanding of risk and vulnerability management.
* Experience with incident response.
* Advanced knowledge of industry standard security and compliance frameworks.
Additional Qualifications Considered
This position will primarily work in the area of information security risk management. The ideal candidate will have experience in the field of information security risk. Responsibilities may include, but are not limited to: assessing information security reviews to identify business risk, make recommendations for implementation of security controls, performing gap analysis of contracts and ensuring appropriate data security verbiage is included in contracts, documenting excessive risk via institutional risk acceptance processes, participating on projects with data security concerns to represent the office of information security and ensure appropriate documentation is in place, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes, and supervision/mentorship of co-op and student workers.2. CISSP, CISM, GISP or similar information security certification(s) are preferred.
Physical Requirements/Work Environment
* Sitting - Continuously
* Repetitive hand motion (such as typing) - Continuously
* Hearing, listening - Continuously
* Talking - Continuously
* Standing - Seldom
* Walking - Seldom
* Bending - Seldom
* Stooping - Seldom
* Climbing stairs/ladders - Seldom
* Kneeling, squatting - Seldom
* Crouching - Seldom
* Crawling - Seldom
* Reaching overhead - Seldom
* Pulling, pushing - Seldom
* Lifting - up to 20 pounds - Seldom
* Lifting - up to 50 pounds - Seldom
* Lifting - over 50 pounds - Seldom
Compensation and Benefits
UC offers a wide array of complementary and affordable benefit options, to meet the financial, educational, health, and wellness needs of you and your family. Eligibility varies by position and FTE.
* Competitive salary range dependent on the candidate's experience.
* Comprehensive insurance plans including medical, dental, vision, and prescription coverage.
* Flexible spending accounts and an award-winning employee wellness program, plus an employee assistance program.
* Financial security via our life and long-term disability insurance, accident and illness insurance, and retirement savings plans.
* Generous paid time off work options including vacation, sick leave, annual holidays, and winter season days in addition to paid parental leave.
* Tuition remission is available for employees and their eligible dependents.
* Enjoy discounts for on and off-campus activities and services.
As a UC employee, and an employee of an Ohio public institution, if hired you will not contribute to the federal Social Security system, other than contributions to Medicare. Instead, UC employees have the option to contribute to a state retirement plan (OPERS, STRS) or an alternative retirement plan (ARP).
To learn more about why UC is a great place to work, please visit our careers page at ********************************
For questions about the UC recruiting process or to request accommodations with the application, please contact Human Resources at ***********.
The University of Cincinnati is an Equal Opportunity Employer.
REQ: 97772
SF:OMJ SF:RM SF:HEJ, SF:INS SF:HERC SF:DIV SF:LJN SF:IHE
Information Security Analyst 3, Digital Technology Solutions
Date: Jan 7, 2025
Location:
Cincinnati, OH, US
Facility: Main Campus
Information Security Analyst 3, Digital Technology Solutions
Cyber Security Analyst Job 2 miles from Newport
Information Security Analyst 3, Digital Technology Solutions University of Cincinnati Posted: December 10, 2024 Location: Cincinnati, Ohio **Current UC employees must apply internally via *SuccessFactors*** Assist in performing procedures and provides technical solutions that serve to provide appropriate access to and protect systems from unauthorized users.
****Essential Functions****
* Assist with developing strategies to achieve organizational goals; understand organization's strengths and weaknesses; analyze potential risks and opportunities; adapt recommendations to changing conditions and aligns with best practices.
* Help facilitate large collaborative teams to achieve organizational goals.
* Support community communication efforts, presenting security insights to leadership.
* Develop technical documentation (designs, specifications, processes, workflows) and communications.
* Develop and validate baseline security configurations for operating systems, applications, networking, and telecommunications equipment.
* Participate in multiple, moderate- to high-risk projects.
* Work with a team to advance project goals and provide technical help and subject matter expertise. Actively engage in project support and solutioning.
* Share technical knowledge with teammates and help solve more complex problems.
* Document individual progress on assigned deliverables.
* Gather, maintain, and validate metrics for area of responsibility.
* Mentor student workers and junior employees.
* Carry out procedures to ensure that all systems, products, and services meet organization security standards. Recommend procedural improvements.
* Research information security trends to maintain technical understanding of the latest vulnerabilities and threats.
* Assist with providing artifacts to Governance, Risk & Compliance in relation to internal & external audits.
* Independently work with business units to achieve security objectives and identifies, reports, and resolves security risks and violations.
* Perform cyber investigations through forensic fact gathering with a focus on e-discovery.
* Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations.
* Provide guidance and technical expertise as needed for information security training and awareness programs.
* Participate in troubleshooting processes during and outside of normal business hours and participate in change management and root cause analysis.
* Mentor others regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
* Serve as an expert resource to others.
* Perform related duties based on departmental need. This job description can be changed at any time.
****Required Education****
Bachelor's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
Eight (8) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
****Required Experience****
* Two (2) years of related experience
* Advanced knowledge of security tool administration.
* Moderate project management skills.
* Experience with system administration.
* Experience with network architecture or some level of related technical training.
* Advanced understanding of risk and vulnerability management.
* Experience with incident response.
* Advanced knowledge of industry standard security and compliance frameworks.
****Additional Qualifications Considered****
This position will primarily work in the area of information security operations. The ideal candidate will have experience in the field of information security operations. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and event management (SIEM), SSL and client certificate management, vulnerability management, privileged access management, password management, system/application administration for security related technologies, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes, and supervision/mentorship of co-op and student workers.2. CISSP, CISM, GISP or similar information security certification(s) are preferred.
****Physical Requirements/Work Environment****
* Sitting - Continuously
* Repetitive hand motion (such as typing) - Continuously
* Hearing, listening - Continuously
* Talking - Continuously
* Standing - Seldom
* Walking - Seldom
* Bending - Seldom
* Stooping - Seldom
* Climbing stairs/ladders - Seldom
* Kneeling, squatting - Seldom
* Crouching - Seldom
* Crawling - Seldom
* Reaching overhead - Seldom
* Pulling, pushing - Seldom
* Lifting - up to 20 pounds - Seldom
* Lifting - up to 50 pounds - Seldom
* Lifting - over 50 pounds - Seldom
**Compensation and Benefits**
UC offers a wide array of complementary and affordable benefit options, to meet the financial, educational, health, and wellness needs of you and your family. Eligibility varies by position and FTE.
* Competitive salary range of $76,000 - $86,000 dependent on the candidate's experience.
* Comprehensive insurance plans including medical, dental, vision, and prescription coverage.
* Flexible spending accounts and an award-winning employee wellness program, plus an employee assistance program.
* Financial security via our life and long-term disability insurance, accident and illness insurance, and retirement savings plans.
* Generous paid time off work options including vacation, sick leave, annual holidays, and winter season days in addition to paid parental leave.
* Tuition remission is available for employees and their eligible dependents.
* Enjoy discounts for on and off-campus activities and services.
For questions about the UC recruiting process or to request accommodations with the application, please contact Human Resources at ***********.
**The University of Cincinnati is an Equal Opportunity Employer.**
REQ: 97767
HISTORY IN BRIEF - The University of Cincinnati is a public urban serving research institution that was founded in 1819 and today is one of the country's largest universities offering more than 350 academic programs to more than 44,000 students. UC has many top ranked programs in areas such as Music and Arts, Medical and Human-Services, Criminal Justice and more. Located in an urban setting, UC is close to the heart of Cincinnati and allows easy access for students to enjoy all that the city offers. UC is also the alma mater of many notables such as President William Howard Taft; Albert Sabin, developer of the oral polio vaccine; Astronaut Neil Armstrong and Mary Weinberg, 2008 Olympic gold medalist. UC is classified as a Research University (Very High Research Activity) by the Carnegie Commission and is ranked as one of America's top 35 public research universities by the National Science Foundation. UC jumped 17 spots in the U.S. News & World Report rankings in the past two years alone. In addition to being named a “green university” by Princeton Review, UC has been named one of the world's most beautiful campuses by Forbes and Delta Sky magazines. Learn more at ******************** N STATEMENT - The University of Cincinnati serves the people of Ohio, the nation, and the world as a premier, public, urban research university dedicated to undergraduate, graduate, and professional education, experience-based learning, and research. We are committed to excellence and diversity in our students, faculty, staff, and all of our activities. We provide an inclusive environment where innovation and freedom of intellectual inquiry flourish. Through scholarship, service, partnerships,
Information Security Analyst 3, Digital Technology Solutions
Cyber Security Analyst Job 2 miles from Newport
* Assist with developing strategies to achieve organizational goals; understand organization's strengths and weaknesses; analyze potential risks and opportunities; adapt recommendations to changing conditions and aligns with best practices. * Help facilitate large collaborative teams to achieve organizational goals.
* Support community communication efforts, presenting security insights to leadership.
* Develop technical documentation (designs, specifications, processes, workflows) and communications.
* Develop and validate baseline security configurations for operating systems, applications, networking, and telecommunications equipment.
* Participate in multiple, moderate- to high-risk projects.
* Work with a team to advance project goals and provide technical help and subject matter expertise. Actively engage in project support and solutioning.
* Share technical knowledge with teammates and help solve more complex problems.
* Document individual progress on assigned deliverables.
* Gather, maintain, and validate metrics for area of responsibility.
* Mentor student workers and junior employees.
* Carry out procedures to ensure that all systems, products, and services meet organization security standards. Recommend procedural improvements.
* Research information security trends to maintain technical understanding of the latest vulnerabilities and threats.
* Assist with providing artifacts to Governance, Risk & Compliance in relation to internal & external audits.
* Independently work with business units to achieve security objectives and identifies, reports, and resolves security risks and violations.
* Perform cyber investigations through forensic fact gathering with a focus on e-discovery.
* Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations.
* Provide guidance and technical expertise as needed for information security training and awareness programs.
* Participate in troubleshooting processes during and outside of normal business hours and participate in change management and root cause analysis.
* Mentor others regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
* Serve as an expert resource to others.
* Perform related duties based on departmental need. This job description can be changed at any time.
****Required Education****
Bachelor's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
Eight (8) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
****Required Experience****
* Two (2) years of related experience
* Advanced knowledge of security tool administration.
* Moderate project management skills.
* Experience with system administration.
* Experience with network architecture or some level of related technical training.
* Advanced understanding of risk and vulnerability management.
* Experience with incident response.
* Advanced knowledge of industry standard security and compliance frameworks.
****Additional Qualifications Considered****
This position will primarily work in the area of information security risk management. The ideal candidate will have experience in the field of information security risk. Responsibilities may include, but are not limited to: assessing information security reviews to identify business risk, make recommendations for implementation of security controls, performing gap analysis of contracts and ensuring appropriate data security verbiage is included in contracts, documenting excessive risk via institutional risk acceptance processes, participating on projects with data security concerns to represent the office of information security and ensure appropriate documentation is in place, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes, and supervision/mentorship of co-op and student workers.2. CISSP, CISM, GISP or similar information security certification(s) are preferred.
****Physical Requirements/Work Environment****
* Sitting - Continuously
* Repetitive hand motion (such as typing) - Continuously
* Hearing, listening - Continuously
* Talking - Continuously
* Standing - Seldom
* Walking - Seldom
* Bending - Seldom
* Stooping - Seldom
* Climbing stairs/ladders - Seldom
* Kneeling, squatting - Seldom
* Crouching - Seldom
* Crawling - Seldom
* Reaching overhead - Seldom
* Pulling, pushing - Seldom
* Lifting - up to 20 pounds - Seldom
* Lifting - up to 50 pounds - Seldom
* Lifting - over 50 pounds - Seldom
Competitive salary range dependent on the candidate's experience. ** Information Security Analyst 3, Digital Technology Solutions**
Date: Dec 9, 2024 Location: Cincinnati, OH, US
Facility: Main Campus
**Job Segment:** Information Security, Developer, Computer Science, Risk Management, Technology, Finance, Security