Engineer Mission Assurance 2
Cyber Security Analyst Job In West Virginia
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.The Mission Assurance/Quality Engineer will provide leadership to our Missile Products team at our Rocket Center, WV location. This position acts as a quality liaison for Operations, Program Management, customer, government agencies and various other functions.
This position is on-site at our Rocket Center, WV location. There are no remote work opportunities for this position.
Specific responsibilities include the following:
- Generate quality reports such as First Pass Yield, First Article Inspection, Cost of Quality, etc.
- Analyze data and drive process improvements
- Receive and/or develop inspection plans based upon statistical methods
- Review data and statistical analysis to assess process capability to meet required standards and specifications
- Use Lean tools such as risk assessment, 8D, DFMEA and/or PFMEA
- Build good working relationship with suppliers, conducting periodic supplier audits to make sure that they are working according to plan
- Validate and coordinate product readiness for use or delivery, including FAAT qualifications of new suppliers
- Provide and support failure analysis processes for program hardware
- Perform independent risk assessments on Mission Assurance issues and communicate issues and findings
Basic Qualifications:
• A bachelors degree with 2 years of experience or a masters degree with 0 years of experience, strong reference of a STEM Degree from an accredited college or university. Will consider 6 years of experience in lieu of a degree
• Must be a US citizen and have the ability to obtain a DOD Secret Security Clearance
Preferred Qualifications:
• Lean Six Sigma training and certification
• Proficiency in Microsoft Office Products (Excel, Word, PowerPoint, etc.)
• Able to use custom manufacturing software (i.e. Solumina) to maintain quality records, traceability, etc.
• Able to work on multiple tasks in a dynamic environment
This position falls under a Federal Explosives License issued by the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) for this location. Candidates hired into this role will be required to complete and submit an Employee Possessor Questionnaire to ATF for approval to be a possessor.
TRAVEL: Yes, 10% of the Time
Salary Range: $77,200.00 - $115,800.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit EEO. U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Cyber Security Engineer
Cyber Security Analyst Job 65 miles from Niles
We are looking for a:
Cyber Security Engineer
Working with product development teams, this role will need to understand systems and software integration, manage the cybersecurity process, prototype, and integrate solutions in the railway sector.
The resource will be responsible for:
To review, evaluate and implement Cybersecurity solutions
Knowledge of C/C++ and Linux
To design and develop cyber architecture standards
Monitoring the cyber threat landscape in order to rapidly identify potential threats and risk assessment;
Assisting in ensuring measures and procedures used at network nodes support the security integrity of the network and comply with applicable directives
Technical requirements:
Understanding of system and network security
Familiarity with Cryptography Algorithms, Security Software Libraries
Familiarity with Penetration testing and/or Fuzz testing techniques
Familiarity with information security best practices
Minimum Education Bachelor's Degree in Computer/Electrical Engineering or equivalent.
Location
: Pittsburgh, PA
Benefits offered by Teoresi, Inc.
Teoresi, Inc. provides the following company insurance policies: Health, Vision, Dental, Life, Long Term Disability (LTD) and Short Term Disability (STD).
Other benefits offered include 401(K) plan, Flexible Spending Account (FSA), Vacation, Sick paid leave and Holidays.
We are happy to receive your application! 😀
We also inform you that, by sending your application, all your data will be processed in accordance with our privacy policy, which you can view at the following link ********************************************************
Blockchain Security Engineer
Cyber Security Analyst Job 145 miles from Niles
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our work culture is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
At Coinbase, security isn't just a priority. It's the foundation of everything we do. In the fast-evolving world of digital currency, where trust is paramount, security breaches can mean the difference between success and failure. That's why we've made security a cornerstone of our mission, setting the standard for protecting millions of customers and billions of dollars in assets.
As a Blockchain Security Engineer on the Decentralized Financial Security Team, you will work closely with engineers, technical product managers and senior leadership on designing secure products from the ground up. You will be responsible for performing secure design reviews, threat modeling, vendor reviews and secure code reviews for upcoming Coinbase products or features that will be used by millions of customers. You will have an opportunity to work on the latest technology and provide leadership visibility of the current risk posture. You'll also have an opportunity to pitch, lead and participate in cross-functional initiatives that uplevel the security of all Coinbase products and services.
What you'll be doing (ie. job duties): To be completed by all business teams except Eng.
Perform design reviews, threat modeling and code reviews of upcoming features and products.
Identify top product risk areas and lead risk-reduction initiatives with cross-functional teams.
Improve and/or automate existing processes to increase efficiency.
Participate in the team on-call rotation to support engineering teams through timely design consultations, vulnerability analysis, bug fix verification, etc.
What we look for in you (ie. job requirements): To be completed by all business teams except Eng.
Bachelor's degree in Computer Science
Expertise in Application Security and fundamental knowledge of cryptography
2+ years of threat modeling/design review experience
Strong communication skills with the ability to translate technical security requirements and risks into terms that anyone can understand.
Ability to work independently and unblock yourself.
Nice to haves:
MS or PhD in Computer Science or related field.
Experience in at least one of: Go, Ruby or Python.
Experience automating manual processes or carrying out process improvements.
Experience in Blockchain, Exchange, or Decentralized Exchange Security.
ID: P69496
Pay Transparency Notice: Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include target bonus + target equity + benefits (including medical, dental, vision and 401(k)).
Pay Range:
$152,405-$179,300 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is committed to diversity in its workforce and is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the Know Your Rights notice here. Additionally, Coinbase participates in the E-Verify program in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations[at]coinbase.com to let us know the nature of your request and your contact information. For quick access to screen reading technology compatible with this site click here to download a free compatible screen reader (free step by step tutorial can be found here).
Global Data Privacy Notice for Job Candidates and Applicants
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available here. By submitting your application, you are agreeing to our use and processing of your data as required. For US applicants only, by submitting your application you are agreeing to arbitration of disputes as outlined here.
Benefits at Coinbase
Medical Plan, Dental and Vision Plan with generous employee contributions
Health Savings Account with company contributions each pay period
Disability and Life Insurance
401(k) plan with company match
Wellness Stipend
Mobile/Internet Reimbursement
Connections Stipend
Volunteer Time Off
Fertility Counseling and Benefits
Generous Time off/Leave Policy
The option of getting paid in digital currency
Learn more about our mission
Information Security Analyst (425960)
Cyber Security Analyst Job 226 miles from Niles
DR is seeking a dynamic and analytical Information Security Analyst to join one of our top clients in Mason, OH. If you are looking for an opportunity to join a large organization and work within a team-oriented culture, please apply today!
Position Overview/Responsibilities for the Information Security Analyst:
Manages, configures, and updates security systems, including SIEM, IDS/IPS, firewalls, endpoint protection, proxies, email security, web portals, and Data Loss Prevention (DLP).
Investigates phishing emails and malware threats, coordinating with support teams for containment, remediation, and recovery.
Safeguards confidential data, systems, and facilities to ensure security and compliance.
Develops and enforces IT security policies, procedures, and best practices.
Stays informed on emerging cyber threats and vulnerabilities, adapting security procedures as needed.
Maintains expertise in core operating systems, applications, networking, and security frameworks.
Ensures compliance with regulations such as ADA, HIPAA, HITECH, PCI, PII, HITRUST, and ISO 27002.
Executes approved IT security service requests in accordance with standard protocols.
Promotes IT security awareness and best practices across the organization.
Required Skills for Sales Analyst:
2-5 years of experience in IT or IS
Experience with major standards such as: SOC 1-2, ISO 27001/2, PCI DSS, HITRUST, SANS, NIST
Demonstrated experience in implementing compliance frameworks for financial services organization or organizations with similar information security needs and requirements
Familiarity and understanding of broad range of IT hardware and software products
Strong project management skills
Experience managing typical enterprise security and intrusion detection systems
Bachelor's degree computer science, IT or equivalent
What's in it for you?
- Competitive compensation package
- Full Benefits; Medical, Vision, Dental, and more!
- Opportunity to get in with an industry-leading organization
- Close-knit and team-oriented culture
Why IDR?
- 25+ Years of Proven Industry Experience in 4 major markets
- Employee Stock Ownership Program
- Medical, Dental, Vision, and Life Insurance
- ClearlyRated's Best of Staffing Client and Talent Award winner 11 years in a row
Chief Information Security Officer
Cyber Security Analyst Job 291 miles from Niles
in ONSITE in Pennsylvania. There is no relocation for the role.
Our client is looking for a Chief Information Security Officer (CISO) to lead and elevate their cybersecurity program. This is a high-impact role for a seasoned leader who can balance strategic vision with hands-on execution.
What You'll Do:
Create and Lead enterprise-wide information security strategy, policies, and governance.
Manage cybersecurity risk across infrastructure, cloud, applications, and third-party vendors.
Partner with IT, legal, compliance, and executive leadership to align security with business goals.
Ensure compliance with regulatory requirements and industry standards.
Develop and lead incident response plans, threat assessments, and recovery efforts.
What You Bring:
10+ years of progressive experience in cybersecurity, including 5+ years in a senior leadership role.
Proven success in a retail or consumer goods environment
Deep understanding of cloud security, threat intelligence, and regulatory frameworks (e.g., PCI-DSS, NIST, ISO).
Ability to lead teams, influence across the organization, and communicate risk to non-technical stakeholders.
Relevant certifications such as CISSP, CISM, or CISA strongly preferred.
Cyber Security SME
Cyber Security Analyst Job 196 miles from Niles
Abacus Technology is seeking a Cyber Security SME to provide security expertise for Wright-Patterson AFB. This is a full-time position.
Responsibilities
Maintain and support of DoD and Air Force computing systems and networks.
Perform system trusted downloads, burn classified CDs, maintain and update host system patches, implement mandated system vulnerability mitigations and set up user accesses and accounts.
Support the Systems Engineer with program engineering milestone reviews, test planning, and certification and accreditation packages.
Assist the ISSM and provide multi-discipline expertise covering project management, system security engineering, system administration, and network administration.
Provide cybersecurity support to assigned systems and assist in developing, modifying, reviewing, or coordinating items that include, but are not limited to PIT determination package, cybersecurity strategy, System Security Plan (SSP), system controls traceability matrix, risk assessment report, plan of action and milestones, security assessment plan, artifacts for program review and RFP.
Review required program office artifacts and make recommendations to support cybersecurity RMF analysis.
Assist in managing, planning, documenting, and conducting Independent Verification and Validation (IV&V) of security requirements for weapon systems.
Perform cybersecurity site audits to verify architecture analysis, cybersecurity requirements, and controls, verify mitigation actions, witness cybersecurity testing, and evaluation, and to support final approval for Interim Authority to Test (IATT), Interim Authority to Operate (IATO), Authority to Operate (ATO), and/or Authority to Connect (ATC).
Qualifications
15 years experience in cyber security. Bachelor's degree in a related field required; Master's degree preferred. Must be CISSP certified (or an equivalent certification in compliance with DoD 8570 IAT Level III) or able to obtain within six months of hire. In-depth understanding of cybersecurity policy, tools, threat mitigation, network topologies, intrusion detection, PKI, and secured networks is preferred. Knowledge of the Systems Security Engineering disciplines to include: Anti-Tamper, Trusted Systems & Networks, Cybersecurity, Hardware/Software/Firmware Assurance, Supply Chain Risk Management, Acquisition Security, Cyber Resiliency, and Information Protection. Must demonstrate proficiency in currently utilized Windows OS, Windows group policy objects, DoD Cybersecurity, NIST RMF, STIGs, Endpoint Security System (SS)/Host-based Security System (HBSS) and DoD Public Key Infrastructure (PKI). Able to clearly present and communicate technical approaches and findings. Understands DoD, AF, and common engineering/scientific principles, processes, and procedures to improve performance and sustainability of existing and future AF and joint service weapon systems. Must be a US citizen and hold a Top Secret clearance with SCI access (TS/SCI).
Applicants selected will be subject to a U.S. government security investigation and must meet eligibility requirements for access to classified information.
EOE/M/F/Vet/Disabled
Cyber Security Analyst
Cyber Security Analyst Job 40 miles from Niles
Provide support for data and information security technology at the University. Collaborate with relevant constituents to increase the security, reliability, and resiliency of the data and information assets of the University. Assist with the development and implementation of policies, procedures, standards, and guidelines to ensure the security of the University technology environments. Advocate the use of emerging information security best practices and technologies.
35% Handle day-to-day security operations activities including vulnerability scanning, security monitoring and alerting, and incident handling. Work with system owners to ensure patches are kept up to date or implemented in a timely manner when critical vulnerabilities are identified. Assist with incident handling and response.
25% Design and implement security monitoring solutions and make changes when needed to improve visibility and relevancy of
alerts. Work with the University community to foster a culture of shared security responsibility.
20% Assist with the development and administration of a University-wide Technology Security plan and program and in the development of priorities and requirements for Information Security in academic and administrative departments.
10% Provide assistance with the design and implementation of the Technology disaster recovery plan. Assist with regular
exercises to test and refine this disaster recovery plan.
Additional Position Information:
Education:
Relevant bachelor's degree..
Licenses/Certifications/Requirements:
Current security certification, such as CISSP, CISA, Security+, or GIAC preferred.
Experience:
Requires a minimum of 2 years of experience in Security, System or Network administration. Technical understanding of a broad range of security concepts including those related to application security, operating system security, network security, and cryptography is required. Must have extensive knowledge of application, infrastructure, and networking operations. Working knowledge of requirements for organizational compliance with multiple laws, regulations, and standards such as PCI-DSS, HIPAA, FISMA, GLBA, FERPA, and DMCA preferred. Knowledge of common attack methodologies, malware, and incident response is required. Experience with vulnerability management tools and open source penetration testing tools is preferred. Experience with Workday security preferred. Experience with cloud infrastructure/security services and an EDR product preferred.
Leadership:
Responsible for directing and monitoring the work of student and/or temporary workers.
Physical Requirements:
Job is physically comfortable; individual is normally seated and has discretion about walking, standing, etc. May occasionally lift very lightweight objects.
Working Conditions:
Standard working environment with possible minor inconveniences due to occasional noise, crowded working conditions and/or minor heating/cooling or ventilation problems. Near continuous use (>70% of the time) of a video display terminal.
Application Instructions:
In order to be considered for this position, please, complete the online application and attach your resume, cover letter and a list of three professional references.
Application Deadline:
Review of applicants will begin on May 14, 2025.
Compensation:
The compensation for this position is commensurate with experience and qualifications.
FLSA Status (exempt/nonexempt):
United States of America (Exempt)
Union Affiliation (if applicable):
For assistance with your application or attachments, please contact the Human Resources representative listed:
Sena Jodoin
Email:
******************
________________________________________________________________________
Background Check Statement
The University of Akron is committed to providing a safe environment for all students and employees. The University endeavors to protect the health, welfare and safety of all students, employees and visitors on our campus. As such, all offers of employment with The University of Akron are contingent upon verification of credentials, and satisfactory completion of a criminal background check. Some positions may require additional credit investigation and a pre-employment driving record search.
Non-Discrimination Statement
The University of Akron is an Equal Education and Employment Institution. View our Non-Discrimination Statement for more information. Equal Opportunity Employer, including disability/veterans.
State of Residence Statement
It is the expectation of the University of Akron that all work performed as an employee of the University will be performed in Ohio.
Sr Audit Analyst, Info & Cyber Security Risk Mgmt
Cyber Security Analyst Job 40 miles from Niles
****Candidate must be able to work in the PST timezones. ***** This position will execute the Information and Cybersecurity Risk Management programs, concentrating on internal and third-party risk assessments and audits. Assessment and compliance activities include validating controls in the IT department, managing risk findings, and verifying their remediation. Must have excellent written and verbal communication skills and a strong understanding of IT risks, cloud security, application systems security, and third-party security. Must be results-oriented with the ability to collaborate with multiple process owners and stakeholders simultaneously.
**ESSENTIAL FUNCTIONS**
**Duties and Responsibilities**
+ Lead, plan, and conduct periodic cyber and information security risk assessments and audits of third parties enterprise-wide.
+ Identify, assess, and document cybersecurity risks for Molina and its suppliers.
+ Partner with internal and external auditors to facilitate compliance audits and mitigate findings.
+ Manage documentation (e.g., requesting, reviewing, preparing) for regulatory and compliance audits & assessments.
+ Ensure compliance with applicable regulations (e.g., HIPAA, NYS DFS) and industry standards (e.g., NIST).
+ Develop and maintain security policies, plans, charters, standards, and procedures.
+ Promote security awareness through communication, training, and documentation.
+ Develop and maintain dashboards to manage and communicate risk to relevant stakeholders.
+ Develop and monitor metrics and prepare reports for senior management.
+ Monitor the inventory for vendors and suppliers.
+ Identify risks and recommend process improvements in the third-party risk management and supply chain program.
+ Build strong partnerships and collaborate with cross-functional teams.
+ Lead and execute third-party risk mitigation strategies and corrective action plans.
+ Monitor and manage third-party risks using GRC and security tools.
+ Stay current on developments in the industry and within the company.
**Qualifications**
+ Bachelor's degree in Information Systems/Security, Computer Science, Cybersecurity, or related field.
+ Minimum 5 years relevant experience in cybersecurity with a focus on governance, risk and compliance.
+ Professional certification(s) such as Certified Information Systems Auditor (CISA), Certified Information Systems
+ Security Professional (CISSP), or Certified in Risk and Information Systems Control (CRISC) required.
+ Adaptable to fast-changing environments and comfortable with ambiguity.
+ Excellent verbal, written, and interpersonal skills.
+ Big 4 or consulting experience.
+ Strong proficiency in regulations and industry frameworks (e.g., HIPAA, NIST, HITRUST)
+ Experience with GRC and security performance monitoring tools (e.g., Lockpath, ServiceNow, Prevalent, BitSight).
+ Ability to travel approximately 10%
To all current Molina employees: If you are interested in applying for this position, please apply through the intranet job listing.
Molina Healthcare offers a competitive benefits and compensation package. Molina Healthcare is an Equal Opportunity Employer (EOE) M/F/D/V.
Pay Range: $77,969 - $137,000 / ANNUAL
*Actual compensation may vary from posting based on geographic location, work experience, education and/or skill level.
Cyber Analyst
Cyber Security Analyst Job 201 miles from Niles
Radiance Technologies is an employee-owned company serving the defense and intelligence community with cutting-edge solutions and innovation. We offer a comprehensive benefits package that includes a competitive salary, generous 401(k) contributions, full health, dental, vision, and life insurance, and educational reimbursement to support your continued development.
The candidate will support all-source scientific and technical intelligence (S&TI) analysis supporting NASIC, United States Air Force, Department of Defense (DoD) and National Level intelligence efforts. The candidate will interface with other Intelligence Community (IC) members, including both U.S. and foreign partners, and DoD agencies, within and external to NASIC in support of production activities.
Job Duties
Provide software reverse engineering and cyber vulnerability analysis of Government-provided software and datasets, including triage of provided datasets and vulnerability analysis of identified software
Triage tasks will include reconstruction of file structures and identification/resolution of missing dependencies which prevent software from reaching a state where vulnerability analysis can be conducted
Vulnerability analysis tasks include rehosting software to enable analysis, employment of translation software, fuzzers, hex editors, debuggers, forensic analyzers, and varying programing languages to discover and quantify vulnerabilities.
Research potential tests and tools to utilize associated with the discovered vulnerabilities
Maintain all-source awareness of intelligence reporting for topics relevant to exploited software
Prepare documents, reports, and studies which pertain to Government selected topics of interest
Required Skills and Qualifications:
Active TS/SCI clearance
Bachelor's Degree in STEM field (Electrical Engineering, Computer Engineering, or another relevant technical field)
Effective interpersonal skills including the ability to collaborate successfully with other internal and external stakeholders
Strong written and verbal communication skills with an ability to succinctly describe complex technical scenarios in simple, easily understood terms
Strong analytic, critical thinking, and creative problem-solving skills
Desired Skills and Qualifications:
Experience supporting US Government Scientific & Technology Intelligence Centers
EOE/Minorities/Females/Vet/Disabled
Cyber SDC- M365 Security Operations Lead Engineer - Senior - Consulting - Location OPEN
Cyber Security Analyst Job 40 miles from Niles
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all.
The exceptional EY experience. It's yours to build.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
We are seeking a skilled and motivated Microsoft Purview and Defender for Office Operations Engineer to join our cybersecurity team. The ideal candidate will be responsible for the administration, management, and optimization of Microsoft Purview and Microsoft Defender for Office platforms. This role requires a strong understanding of data governance, compliance, and security best practices, along with the ability to work collaboratively with cross-functional teams to enhance our information protection posture.
**Key Responsibilities:**
1. **Platform Administration:**
1. Administer and support Microsoft Purview and Microsoft Defender for Office, ensuring optimal performance and availability of the platforms.
2. Configure and manage security settings, policies, and compliance features within Microsoft Purview and Defender for Office.
2. **Data Governance and Compliance:**
1. Implement and maintain data governance policies and procedures to ensure compliance with regulatory requirements and organizational standards.
2. Monitor and report on compliance metrics, data classification, and data loss prevention (DLP) policies.
3. **User Support:**
1. Provide technical support to end-users regarding Microsoft Purview and Defender for Office tools and best practices.
4. **Collaboration and Communication:**
1. Work closely with IT, security, and compliance teams to integrate Microsoft Purview and Defender for Office with existing systems and workflows.
2. Communicate effectively with stakeholders to report on security incidents, compliance metrics, and recommendations for improvement.
5. **Continuous Improvement:**
1. Stay updated on the latest features, updates, and best practices related to Microsoft Purview and Defender for Office.
2. Identify opportunities for process improvements and automation within the operations of Microsoft Purview and Defender for Office.
3. Automate activities through scripting (PowerShell, Python) and automation (Tines, PowerAutomate, etc.)
6. **Documentation and Reporting:**
1. Maintain accurate documentation of configurations, processes, and procedures related to Microsoft Purview and Defender for Office operations.
2. Generate reports on platform performance, security incidents, and compliance metrics for management review.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
+ Proven experience in managing and supporting Microsoft Purview and Microsoft Defender for Office.
+ Strong understanding of data governance, compliance frameworks, and information security best practices.
+ Excellent problem-solving skills and attention to detail.
+ Strong communication and interpersonal skills.
+ Scripting experience, including PowerShell, Python, etc.
+ Ticket and change management experience in ServiceNow
+ Relevant certifications (e.g., Microsoft Certified: Security, Compliance, and Identity Fundamentals, Microsoft Certified: Azure Security Engineer Associate) are a plus.
**Preferred Skills:**
+ Experience with data loss prevention (DLP) technologies and strategies.
+ Familiarity with compliance regulations (e.g., GDPR, HIPAA) and data protection laws.
+ Knowledge of cloud security concepts and technologies.
**Work Environment:**
This position may require occasional after-hours support and on-call availability. The Microsoft Purview and Defender for Office Operations Engineer will work in a collaborative team environment, contributing to the overall security and compliance posture of the organization.
**What we offer**
We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $73,100 to $132,900. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $87,600 to $151,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
+ **Continuous learning:** You'll develop the mindset and skills to navigate whatever comes next.
+ **Success as defined by you:** We'll provide the tools and flexibility, so you can make a meaningful impact, your way.
+ **Transformative leadership:** We'll give you the insights, coaching and confidence to be the leader the world needs.
+ **Diverse and inclusive culture:** You'll be embraced for who you are and empowered to use your voice to help others find theirs.
EY accepts applications for this position on an on-going basis. **If you can demonstrate that you meet the criteria above, please contact us as soon as possible.**
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
For those living in California, please click here (********************************************************************************************************************************************************************** for additional information.
EY is an equal opportunity, affirmative action employer providing equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at **************************
Cyber Security Analyst
Cyber Security Analyst Job 40 miles from Niles
Provide support for data and information security technology at the University. Collaborate with relevant constituents to increase the security, reliability, and resiliency of the data and information assets of the University. Assist with the development and implementation of policies, procedures, standards, and guidelines to ensure the security of the University technology environments. Advocate the use of emerging information security best practices and technologies.
35% Handle day-to-day security operations activities including vulnerability scanning, security monitoring and alerting, and incident handling. Work with system owners to ensure patches are kept up to date or implemented in a timely manner when critical vulnerabilities are identified. Assist with incident handling and response.
25% Design and implement security monitoring solutions and make changes when needed to improve visibility and relevancy of
alerts. Work with the University community to foster a culture of shared security responsibility.
20% Assist with the development and administration of a University-wide Technology Security plan and program and in the development of priorities and requirements for Information Security in academic and administrative departments.
10% Provide assistance with the design and implementation of the Technology disaster recovery plan. Assist with regular
exercises to test and refine this disaster recovery plan.
Additional Position Information:
Education:
Relevant bachelor's degree..
Licenses/Certifications/Requirements:
Current security certification, such as CISSP, CISA, Security+, or GIAC preferred.
Experience:
Requires a minimum of 2 years of experience in Security, System or Network administration. Technical understanding of a broad range of security concepts including those related to application security, operating system security, network security, and cryptography is required. Must have extensive knowledge of application, infrastructure, and networking operations. Working knowledge of requirements for organizational compliance with multiple laws, regulations, and standards such as PCI-DSS, HIPAA, FISMA, GLBA, FERPA, and DMCA preferred. Knowledge of common attack methodologies, malware, and incident response is required. Experience with vulnerability management tools and open source penetration testing tools is preferred. Experience with Workday security preferred. Experience with cloud infrastructure/security services and an EDR product preferred.
Leadership:
Responsible for directing and monitoring the work of student and/or temporary workers.
Physical Requirements:
Job is physically comfortable; individual is normally seated and has discretion about walking, standing, etc. May occasionally lift very lightweight objects.
Working Conditions:
Standard working environment with possible minor inconveniences due to occasional noise, crowded working conditions and/or minor heating/cooling or ventilation problems. Near continuous use (>70% of the time) of a video display terminal.
Application Instructions:
In order to be considered for this position, please, complete the online application and attach your resume, cover letter and a list of three professional references.
Application Deadline:
Review of applicants will begin on May 14, 2025.
Compensation:
The compensation for this position is commensurate with experience and qualifications.
FLSA Status (exempt/nonexempt):
United States of America (Exempt)
Union Affiliation (if applicable):
For assistance with your application or attachments, please contact the Human Resources representative listed:
Sena Jodoin
Email:
******************
________________________________________________________________________
Background Check Statement
The University of Akron is committed to providing a safe environment for all students and employees. The University endeavors to protect the health, welfare and safety of all students, employees and visitors on our campus. As such, all offers of employment with The University of Akron are contingent upon verification of credentials, and satisfactory completion of a criminal background check. Some positions may require additional credit investigation and a pre-employment driving record search.
Non-Discrimination Statement
The University of Akron is an Equal Education and Employment Institution. View our Non-Discrimination Statement for more information. Equal Opportunity Employer, including disability/veterans.
State of Residence Statement
It is the expectation of the University of Akron that all work performed as an employee of the University will be performed in Ohio.
Information Security Analyst III
Cyber Security Analyst Job 47 miles from Niles
Are you interested in being part of an innovative team that supports Westinghouse's mission to provide clean energy solutions? At Westinghouse, we recognize that our employees are our most valuable asset and we seek to identify, attract and recruit the most qualified talent while recognizing and encouraging the value of diversity in the global workplace.
If this sounds like an environment you would thrive in, we have an exciting opportunity for a Information Security Analyst III.
Your Day-to-Day:
The primary function for the analyst is the identification, investigation, and resolution of security breaches detected by security solutions. Secondary tasks may include involvement in the implementation of new security solutions, enhancing monitoring capabilities within existing security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and assessments.The Information Security Analyst III will bridge the gap between IT, Information Security, and the business with respect to analyzing the security of the organization. They will engage with business leaders and users to understand the security impacts to the organization of changes to process, products, and services. Will act as expert knowledge resource of specific discipline in coordination with IT, Legal, Data Privacy, and HR representatives.
Investigate problematic activity within the enterprise that is being reported through security solutions and teams such as HR, Legal, Data Privacy, and IT.
Maintain operational configurations of all in-place security solutions as per the established.
Monitor all in-place security solutions for efficient and appropriate operations.
Maintain cases of investigations of problematic activity.
Provide on-call support for end users for all in-place security solutions.
Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the Incident Response Supervisor, where appropriate.
Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.
Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
Who You Are:
As a successful candidate, you will bring the following to the team:
Bachelor's degree in IT, related technical discipline, or equivalent preferred.
Minimum of 6 years of relevant Cybersecurity work experience
Certifications related to specific technical areas of competency preferred. (For example, CCNP, MCSA, MCSD, SSCP, CISSP, GSEC, GCIH, etc.)
Ability to define highly complex and specialized projects, perform analysis, and make sound decisions.
Knowledge base on Microsoft security tools and applications to include Microsoft Defender and Microsoft Sentinel.
Capable of managing varied assignments and work independently as well as instruct and coach other professionals.
Strong practical knowledge in the creation of SIEM signature creation based on threat intelligence.
Strong communication skills with all levels of the business (from User to Executives levels) and the ability to leverage knowledge of the appropriate approach and degree of detail for each.
Strong Practical fundamental knowledge of IT and Information Security principles and techniques, business unit products and services, industry standards and government regulations. Requires use of advanced techniques, procedures and criteria used for carrying out a sequence of discipline tasks.
Why Westinghouse?
Westinghouse Electric Company is the global nuclear energy industry's first choice for safe, clean, and efficient energy solutions. We enable our delivery of this vision by living our value system:
Safety and Quality
Integrity and Trust
Customer Focus and Innovation
Speed and Passion to Win
Teamwork and Accountability
Westinghouse offers competitive benefits to all our employees around the globe to keep them healthy and enhance their well-being. In the U.S. the following are representative of what we offer:
Competitive Salary
Comprehensive Health, Wellness and Income Protection Benefits
401(k) Savings Plan with Company Match
Paid Vacations and Holidays
Opportunities for Flexible Work Arrangements
Educational Reimbursement Program
Employee Referral Program
While our Global Headquarters are located in Cranberry Township, PA, we have over 9,000 employees working at locations in 19 different countries. You can learn more by visiting ***********************************
EOE of Minorities / Females / Vets / Disability.
Get connected with Westinghouse on social media:
Twitter | Facebook | LinkedIn| YouTube
Cyber Security Analyst - DLP
Cyber Security Analyst Job 196 miles from Niles
:** Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
**Primary Responsibilities**
+ Oversee the implementation and management of data protection strategies within an organization
+ Lead a team focused on DLP by providing guidance and support to ensure effective data protection measures
+ Create and enforce policies to prevent data breaches and ensure data security
+ Continuously monitor data movement and usage to detect and respond to potential data loss incidents
+ Manage and respond to data loss incidents, coordinating with other departments to mitigate risks
+ Continuously monitor network traffic for security incidents and anomalies
+ Configure firewalls, intrusion detection\protection systems (IDS\IPS), and data encryption programs
**Minimum Qualifications**
+ High school diploma or equivalent
**Preferred Qualifications**
+ Bachelor's degree in Cyber Security or Computer Science
+ Experience with Palo Alto Network Security Solutions like Prisma Access, Strata Cloud Manager, and DLP\CASB solutions
+ Familiarity with Cisco FirePower\FMC & Dell SecureWorks security solutions
+ IT Security certifications (e.g. CISSP, CISM, CRISC, CISA, or SANS)
+ Excellent written and oral, written, deductive reasoning, and analytical trouble shooting skills
+ Good interpersonal skills and facilitate positive relations between business groups
**Work Authorization:**
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
**Compensation and Benefits:**
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities
Information Security Analyst
Cyber Security Analyst Job 286 miles from Niles
At Customers Bank, we believe in working hard, working smart, working together to deliver memorable customer experiences and having fun. Our vision, mission, and values guide us along our path to achieve excellence. Passion, attitude, creativity, integrity, alignment, and execution are cornerstones of our behaviors. They define who we are as an organization and as individuals. Everyone is encouraged to have personal development plans. By doing so, our team members are on their way to achieve their highest potential and be successful in their personal and professional lives.
Must be eligible to work in the U.S. without sponsorship.
Who is Customers Bank?
Founded in 2009, Customers Bank is a super-community bank with over $22 billion in assets. We believe in dedicated personal service for the businesses, professionals, individuals, and families we work with.
We get you further, faster.
Focused on you: We provide every customer with a single point of contact. A dedicated team member who's committed to meeting your needs today and tomorrow.
On the leading edge: We're innovating with the latest tools and technology so we can react to market conditions quicker and help you get ahead.
Proven reliability: We always ground our innovation in our deep experience and strong financial foundation, so we're a partner you can trust.
What you'll do:
Customers Bank is looking for an Information Security Analyst who is Analytical, detailed orientated, and adaptive to support the strategy of the company's Security Operation's Team. Utilizing enterprise security tools, the Information Security Analyst will be required to detect, triage, and prevent security incidents, protect sensitive information, aid in the penetration testing of network environments, collaborate with of teams to identify and mitigate vulnerabilities, and help drive security best practices across the organization. Participation in the on-call rotation is mandatory.
The Information Security Analyst is responsible for Tier 1 Incident Response, Cyber Security Investigations, Malware Analysis, and Threat Hunting within the Security Operations Center. Participating in a team rotation program, the Analyst will aid and support the Advanced Operations, and Vulnerability Management programs within the Security Operations Team.
Responsibility:
Perform initial investigations on all alerts and tickets generated by security tools and close investigations or escalate as necessary.
Monitor all business assets for irregularities and anomalies.
Report and/or escalate all high and critical level incidents to leadership.
Support the development of the Security Operations team by providing insight into changes and enhancements to procedures, tools, and techniques.
Follow all guidelines and procedures to ensure task and responsibilities are completed within the defined standards and regulations.
Utilize the provided educational training programs and external resources to expand knowledge base around information security topics, trends, requirements, and best practices.
Supporting the Incident Response Program
Review, Investigate, and Respond to all security related alerts in a timely manner.
Manage and Maintain the Abuse Mailbox per SLA's
Participate in regularly scheduled trainings, tabletops, and Blue Team exercises.
Provide monthly metrics on workflow and severity of the work done.
Must haves:
Bachelor's degree in computer science, Cybersecurity, or similar work experience in a related field
2+ years of cybersecurity experience in operational or tactical cyber threat analysis; experience can include one or more of the following cyber-security functions: Intrusion Detection/Prevention, Monitoring, Incident Response, Digital Forensics, Vulnerability Management
2+ years of experience as a security analyst (or related) subject matter expert that has worked across organizational boundaries to analyze cyber threats to their organization's infrastructure and services.
Working knowledge of EDR, SIEM, Azure Cloud etc. technologies
Nice to haves:
Financial industry experience
Knowledge of advanced cyber threats, threat vectors, attacker methodology to include, tools, tactics, and procedures and how they tie into the Cyber Kill Chain or Miter ATT&CK framework.
Experience with premium threat intelligence tooling and/or open-source intelligence techniques.
Experience in malware detection and analysis using static and dynamic malware analysis methods.
Knowledge of cloud services and their attack surface.
Related industry certifications (Sec+, CTIA, CISSP)
Customers Bank is an equal opportunity employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
We also provide “reasonable accommodations”, upon request, to qualified individuals with disabilities, in accordance with the Americans with Disabilities Act and applicable state and local laws.
Diversity Statement:
At Customers Bank, we believe in working smart, working together, and having fun while delivering innovative solutions and memorable experiences for our customers. We are committed to the continual advancement of a culture which reflects the value we place on diversity, equity, and inclusion. We honor the diverse experiences, perspectives, and identities of our team members, and we recognize that it is their passion, creativity, and integrity that drives our success. Step into your future with us! Let's take on tomorrow.
Information Security Analyst
Cyber Security Analyst Job 290 miles from Niles
East Stroudsburg University is hiring an Information Security Analyst! Located in the beautiful Pocono Mountains of Pennsylvania, ESU's proximity to New York City and Philadelphia provides convenient access to internships, careers and social activities. Just minutes from campus are the country's largest water parks, scenic Delaware Water Gap Recreation Area, Appalachian Trail, and other opportunities for recreational fun.
As the Information Security Analyst, you will need to think creatively and be comfortable implementing preventative security measures to ensure ESU network & system safety. You will be an active member of the Computing & Communication Services team and will work closely with the Associate Director of Academic Computing to protect the confidentiality, integrity, and availability of authorized access to ESU information assets. You will thrive in this role if you like combining your Information Systems background and professional cybersecurity experience all while optimizing the ESU information technology infrastructure. To be successful in this role the applicant must possess excellent critical thinking skills when responding to events, have strong decision-making skills, and comprehensive working knowledge of the cybersecurity life cycle.
Your normal hours will be Monday to Friday 8:00 am to 4:30 pm, but you may have to flex your schedule to work from time to time based on the needs of the business to be a true Information Security Analyst. When our team shows up for work, they are energized and motivated to succeed all while being the most crucial piece to keeping the ESU operations humming.
What Will I Do At ESU? (AKA Essential Duties)
* Identify potential security weaknesses in systems, networks, and applications.
* Develop and enforce security policies and procedures to protect sensitive information.
* Investigate and respond to security incidents, such as malware infections or data breaches.
* Monitor network traffic and systems for suspicious activity, using tools like SIEM (Security Information and Event Management).
* Ensure compliance with relevant Higher ED regulations and standards (e.g., GLBA, FERPA, PA Breach Act).
* Educate employees about security threats and best practices.
* Keep up-to-date with the latest security threats and technologies.
* Work with other IT professionals and business stakeholders to identify and address security issues.
What We're Looking For (AKA Qualifications)
* A Bachelor's degree in computer information systems, management information science, or related field.
* A minimum of three (3) years of cybersecurity experience.
* Able to read, write, and comprehend English; able to follow verbal instructions.
Experience with Word, Excel, Teams required.
Preferred Qualifications:
* Analytical Skills: The ability to systematically evaluate information, identify patterns, and draw conclusions.
* Technical Skills: Knowledge of operating systems, networking, security technologies (firewalls, intrusion detection systems), and security tools.
* Certifications: Industry certifications like Security+, Ethical hacking.
* Demonstrated success in working with Internal Audit, System Auditors, and outside consultants in a lead capacity to coordinate representation of institutional technology systems and practices.
* Demonstrated experience in computing and information security, network security issues, and security incident response and recovery in a higher education environment.
* Knowledge and experience working with one or more of the following Cybersecurity Frameworks: NIST Cybersecurity Framework; ISO 27001; CIS Critical Security Controls.
What We Offer
* Outstanding benefits package including benefits such as medical from date of hire, retirement contributions, employee wellness program, and paid leave
* Salary: Based on Experience
* Living by the Warrior Code:
* Accountable for One's Actions
* Committed to Self-Growth
* Willing to Sacrifice for the Greater Good
* Positive, Honest, and Loyal
* Respectful of the Environment and Community
* Dedicated to Empowering Others
And yes, legal made us spell this out…
Must be at least 18 years old and be able to read and write English. Employment with ESU is contingent on the selected candidate passing a thorough background check that includes: FBI fingerprinting, PA Child Abuse, and employment. We are proud ESU is an equal opportunity employer. For more information on President Long's 10-point plan, click here: ************************************************
Information Security Analyst
Cyber Security Analyst Job 40 miles from Niles
The Security Analyst is responsible for supporting information security operations in compliance with the company's information security policy. ESSENTIAL DUTIES AND RESPONSIBILITIES * Configure and maintain security and audit software systems * Provide first-tier incident response support
* Assist with audits and risk assessments
* Analyze and respond to security incidents, conduct forensic investigations and document findings.
* Prepare and maintain critical documentation such as policies, procedures, standards, baselines, guidelines, incident reports, and audit responses
* Coordinate third-party service provider and vendor risk assessments
* Perform vulnerability scanning and coordinate penetration testing utilizing third-party tools and services
* Contribute to disaster recovery and business continuity planning efforts
* Contribute to data classification, data retention, and data loss prevention efforts
* Report key metrics to management
* Stay informed of industry best practices and information security frameworks
* Identify vulnerabilities, assess potential risks, and recommend security measures to mitigate threats.
* Meet department attendance requirements, including being prompt and available during scheduled shift
* Performs other related duties and tasks as needed.
Qualifications
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
* A bachelor's degree in computer science or a related discipline is preferred, but not required. A minimum of five years of experience in an information security role is necessary.
* Knowledge of Microsoft and Mac operating systems, SQL Server user administration, networking devices, and security systems such as firewalls, IDS and IPS, SIEM, endpoint protection, encryption, and multifactor authentication
* Knowledge of common security frameworks (ISO, NIST, etc.) and regulatory compliance (PCI, SOX, HIPAA, NYDFS, CCPA)
* Ability to build relationships with all levels within the organization via in person, virtual and written communication.
SUPERVISORY RESPONSIBILITIES
* None
CERTIFICATES, LICENSES, REGISTRATION
* While a current information security certification (such as Security+, CISSP, or similar) is not required at the time of hire, the individual must obtain the certification within 15 months of starting the role.
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Small Motor Skills: Picking, pinching, typing or otherwise working primarily with fingers rather than with whole hand or arm, as in handling.
Speaking: Expressing or exchanging ideas by means of spoken word. Those activities in which require detailed or important spoken instructions must be conveyed to other workers accurately and quickly.
Hearing: Ability to receive detailed information through oral communication with or without correction.
Repetitive Motion: Substantial movement (motions) of the wrist, hands and fingers.
WORK ENVIRONMENT
This Hybrid Remote / In-office role provides the opportunity to gain knowledge while collaborating with co-workers while also considering a life work balance.
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Normal office environment with controlled temperature.
ADDITIONAL REQUIREMENTS
The company reserves the right to determine if this position will be assigned to work on-site, remotely, or a combination of both. Assigned work location may change. In the case of remote work, physical presence in the office/on-site may be required to engage in face-to-face interaction and coordination of work among co-workers.
COMPUTER PROGRAMS USED ON A DAILY BASIS
Microsoft Office
Asana
BOX
Trend Micro
Acunetix
Arctic Wolf
Barracuda
Cloudflare
Wordfence / WordPress
Wiz
Jamf / Apple Business Manager
KnowBe4
Information Security Specialist (Hybrid)
Cyber Security Analyst Job 65 miles from Niles
Job Type: Full Time / Contract
Work Authorization: No Sponsorship
The A.C.Coy company has an immediate opening for an Information Security Specialist. Ideal candidates must have 5+ years of experience in information technology and 3+ years of information security experience. The following technical experience is also required: Report generation/data analysis, ITSM tools/SharePoint, using Active Directory for user provisioning/deprovisioning, customer follow up to resolve outstanding issues/escalation.
Responsibilities
Ability to use Excel and other Microsoft Office tools to generate reports, conduct data analysis
Familiarity with different tools for managing work, ITSM Tools (Cherwell, ServiceNow, etc), SharePoint, etc.
Ability to review reports and determine actions required for follow up based on defined processes
Ability to work independently with appropriate guidance
Ability to follow up with customers to resolve outstanding issues and escalate as needed
Prior experience with Active Directory user provisioning/deprovisioning
Experience with Sailpoint, Varonis, and Delinea (FKA Thycotic) preferred but not required
Experience with IT auditing and/or access certifications preferred
Qualifications
Education:
Bachelor's degree or equivalent experience
Experience Required:
Active Directory user provisioning/deprovisioning -3+ years
ITSM tool (ServiceNow, Cherwell), SharePoint - 3+ years
MS Office/Excel to generate reports and conduct data analysis - 3+ years
Sailpoint, Varonis and Deli (FKA Thycotic) - Preferred
Information Security Analyst
Cyber Security Analyst Job 145 miles from Niles
Directly accountable for safeguarding the organization's information assets. The role involves designing, implementing, and enforcing security protocols and procedures that mitigate risks and ensure compliance. With heavy focus in information security operations, including vulnerability management, incident/event management, compliance management, policy/procedure development and information security awareness.
This responsibility will be carried out through the development of information security requirements, planning, design, implementation, and periodic audit/validation of effectiveness of all security controls.
Accountabilities:
+ Determine information security requirements by evaluating and researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; and identifying integration issues.
+ Design, and implement security controls for our infrastructure and critical systems.
+ Verify information security systems effectiveness by developing and implementing testing and validation processes to periodically audit systems.
+ Collaborate with managed security service provider (MSSP) to ensure their services are effectively delivered to our organization and validate that alerts are properly acted upon to mitigate identified threats.
+ Support security incident response activities utilizing security tools (SIEM/SOAR)
+ Collaborate in the development of a Business Continuity and Disaster Recovery plan.
+ Prepare system security reports by collecting, analyzing, and summarizing data and trends.
+ Track and understand emerging security practices and threats. Leverage this knowledge to improve security configurations across the enterprise and hunt for potential or active threats.
+ This role will be responsible for monitoring Healthcare industry and regulatory trends to ensure prompt and complete action plans are developed and implemented to address such requirements.
+ Serve as the liaison for audit activities related to the areas of information security.
+ This will also include maintaining ongoing cybersecurity risk profile using the recommended industry tools, and being certain that activities which keep us aligned with our target levels are implemented.
+ Demonstrable expertise in implementing, managing, and fine-tuning security controls using a variety of security tools and frameworks. Specific experience with Palo Alto firewalls and Palo Alto suite of security tools, Fortinet Fortigate Firewalls, Meraki, Active Directory and other infrastructure tools as identified.
+ In-depth experience with Identity and Access Management (IAM), specifically in designing and implementing IAM solutions for provisioning, de-provisioning, and role-based access controls within the organization. Familiarity with industry standard IAM solutions and best practices is a must.
+ Familiarity with monitoring and managing security incidents, including the use of Security Information and Event Management (SIEM) tools.
+ Proven track record in working with cross-functional teams to address security and compliance challenges, specifically in a Healthcare environment.
+ Experience in developing and implementing security policies and procedures that align with industry regulations such as PCI and HIPPA.
+ Previous involvement in handling external and internal audits related to information security, along with remediation of identified issues.
+ A high level of problem-solving skills and the ability to communicate in a clear, concise manner.
+ Must be able to communicate effectively in both oral and written form and explain technical concepts in non-technical terms to staff and prepare clear and concise written communications.
+ Must be able to manage multiple projects/tasks concurrently; and prioritize requests and complete assignments within an estimated timeframe; and organize, schedule, and coordinate a variety of activities and projects.
+ Must have the ability to learn new software and hardware packages and adapt to changes in technology.
Qualifications:
+ Bachelor's Degree in computer science or Equivalent work experience
+ At least 5 years of experience in information security preferred
+ Excellent written communication skills.
+ Strong organizational and planning skills.
+ Demonstrates a high degree of personal integrity and practices ethical standards. Must remain objective and independent when completing assignments, and consistently demonstrate the ability to hold information in confidence.
+ Demonstrated proactiveness and an ability to work independently and self-directed in managing multiple concurrent projects.
+ Excellent analytical and problem-solving skills.
**Anticipated salary range:** $79,700 - $119,490
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 5/28/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Sr. Systems Security Analyst
Cyber Security Analyst Job 145 miles from Niles
Formed in 1934, Telhio began as a credit union for Columbus Telephone Company (now AT&T) employees. Telhio now serves over 70,000 member-owners throughout central and southwest Ohio. Telhio's mission is to be a trusted financial partner, committed to serving our community with integrity, care and commitment. Every interaction with our members is guided by these core values. We foster a culture of accountability, respect, and inclusivity-embracing diverse perspectives and actions to strengthen our organization, Board of Directors, staff, and membership. Summary: The Senior Systems Security Analyst is a new capability for Telhio Credit Union and will report to the VP of Information Security. The primary goal of this position is to ensure delivery of best-in-class cybersecurity, risk management, and compliance for Telhio Members. The Information Security Risk Analyst will be responsible for day-to-day activities in implementing the corporate information security risk program. The individual will be a front-line partner to technical teams and business leaders across the organization to deliver security and compliance initiatives aligning to Information Security policies, standards, procedures, business continuity, and support audit activities. Success in the role will be measured by the effectiveness of the implementation of information security risk management and InfoSec compliance directives. This role will work with various IT and business teams to drive both information security and InfoSec compliance and business continuity initiatives. The individual will assist with internal and external Informational security compliance monitoring activities and reporting, review and manage InfoSec pre and post audit activities, Support Information Security control reviews, architecture reviews, threat modeling, and security risk assessments. Good interpersonal and relationship-building skills are essential for success. Job Responsibilities Include:
Maintain compliance with the Information Security Program by providing required risk reviews, supporting all Business Continuity activities and managing the BIA process.
Serve as liaison to other Telhio teams to ensure knowledge share and best practices.
Partner with the Information Security Engineering, IT, and Information Security operations teams to ensure delivery of infrastructure reviews and threat models supporting InfoSec security requirements.
Monitor security trends and drive security best practices throughout the organization via risk analysis and reporting.
Evaluate, design, test, and recommend new or improved controls.
Work with Vendor Management to perform Information Security Third-Party reviews, identifying and tracking
After Action Items that are identified through the review process. Consult with internal stakeholders to conduct independent security reviews, work with IT partners to remediate and report results of vulnerability scans, and any internal or external penetration tests.
Partner with internal or external developers to validate the use of secure coding and compliance with SDLC security practices, assist in defining test cases, and ensure appropriate testing is completed, remediations are tracked to mitigations.
Investigate, assist in driving resolution, and document security incidents.
Qualifications:
Bachelor's Degree in a related field, or equivalent work experience leading cybersecurity or information security initiatives. - Required
1-5 years of information security-related work experience, preferably within the financial industry. - Required
Experience with network and infrastructure, security, and ideally cloud security. - Preferred
Experience in vulnerability management programs, vulnerability assessments, and advanced understanding of risk management. - Required
Familiarity with at least one common programming language, software development pipelines, scripting, and system lifecycles. - Preferred
Familiarity with standards such as CIS NIST, PCI, NCUA, and OWASP. - Preferred
Professional security certification (Network+, A+, Security+, CISA, CISM, or CISSP).- Preferred
Experience advising and mentoring diverse teams where you do not have direct authority. - Required
Strong written and verbal communication skills. - Required
What you will earn:
Competitive pay
Benefits: several medical plan options, dental, free vision, free life insurance and free disability insurance
Additional financial incentive programs for employees enrolled in our insurance
6% matching and immediately vested 401(k) plan
Generous schedule for paid holidays, vacation and personal time for a healthy work-life balance
Opportunity for personal career growth and continued education
Volunteer opportunities impacting the local community
Physical Demands:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
This position requires sitting; some reaching; frequent standing and walking; some stooping or kneeling. The employee must occasionally lift and move up to 50 pounds.
This is a Non-Collective Bargaining Unit
Telhio is an Equal Opportunity Employer
Information Security Expert
Cyber Security Analyst Job 145 miles from Niles
Title: Information Security SME/Developer with .NET development Duration : 5 Months contract (High possibility of Extension) Interview Type: Both iLinc Web Cam and In Person Interview Skills Required Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
.NET development experience Required 5 Years
Thanks
Naimesh Solanki
Sr. Technical Recruiter
Phone: ************ x 6578
Qualifications
Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
Additional Information
All your information will be kept confidential according to EEO guidelines.