Post job

Cyber security analyst jobs in North Whitehall, PA - 442 jobs

All
Cyber Security Analyst
Information Security Analyst
Securities Analyst
Security System Engineer
Senior Information Security Analyst
Information Security Officer
Network Security Analyst
Cyber Security Engineer
  • Chief Information Security Officer

    Arma International 4.4company rating

    Cyber security analyst job in Princeton, NJ

    Department Information Security Office Category Information Technology Job Type Full-Time The Chief Information Security Officer (CISO) at Princeton is responsible for developing, expanding and maturing the University information security policy and strategy and draws on domain expertise, a capacity for vision and change management and communication skills to establish a high level of understanding of and attention to information security in a world-class institution of teaching, learning and research. The CISO works collaboratively with University leadership and departmental technical and administrative staff throughout campus. The CISO develops and leads outreach, communication and education efforts to raise campus-wide awareness of information security risk, requirements and solutions; provides strategic and technical guidance and assistance in the design and implementation of appropriate security processes for campus-wide information systems; directs the University IT Risk Assessment process; recommends and monitors computing practices to prevent and recover from security breaches and handles breaches when they occur; provides vision, leadership and development of robust security operations and vulnerability management; and leads the operations and success of access security requirements. The CISO reports to the Vice President for Information Technology and Chief Information Officer and collaborates with OIT senior staff and key campus business and IT leaders to shape security and business-continuity standards and action plans. The CISO also plays a leadership role in the implementation of security practices and policies through collaboration with technical staff. The CISO has dotted line responsibilities to the VP and Dean for Research, and is designated as the University Information Security Officer for federal grants and projects. The CISO also plays a key role in preparing and presenting strategic updates and recommendations to the University's Board of Trustees, ensuring transparency, accountability, and informed decision-making at the highest level of governance. Responsibilities Strategic Planning and Policy Development Provides guidance and counsel on information security to the CIO, the University's Board of Trustees, University Cabinet members, OIT senior staff and senior level University stakeholders. Works with campus leadership to develop a strategy for information security that balances Princeton's academic values with institutional attention to the risks and requirements generated by the University's increasingly information-rich environment and external regulations. Recommends strategies and practices to ensure information security and leads the design, development and implementation of the University's security and data-governance policies and procedures in consultation with University leadership, OIT and campus technical staff and IT advisory bodies. Represents the University in assessing and approving research security needs and establishes and maintains a strong partnership with Research Protections and Administration, and the Research Integrity Office. Advises University leaders on emerging information security risks and opportunities created by Princeton's role as a world-class institution of teaching, learning and research with increasing global relationships and activities. Tracks industry and higher-ed information security best practices to keep abreast of current techniques, systems and applications. Assumes responsibility for information-security policies and effective IT risk management and compliance across the University; coordinates campus-wide data governance and security initiatives. As a member of the CIO leadership team, contributes to the overall development of OIT's strategic goals, performance metrics, communication practices and culture. Management Leads the overall management and success of a robust, current and expanding information security office. Leads an annual IT Risk Assessment process and maintains the efficacy of an IT Business Continuity Plan. Maintains a close relationship with the offices of General Counsel, Audit and Compliance and Public Safety; serves as liaison between these groups and IT professionals for matters pertaining to campus IT security. Assesses hardware/software/services being considered for purchase or implementation for security strengths/risks and information security features; provides security requirements for software/services RFPs. Training and Outreach Develops and leads education and training programs on institutional policy, guidelines, federal and state laws and regulations and best practices around information security. Qualifications Essential Qualifications: At least 10 years of current experience directly related to the responsibilities of the role Demonstrated domain expertise A strategic grasp of information security at both institutional and operational levels The capacity to articulate a vision for information security that engages all constituents, satisfies internal and external requirements, and enables Princeton's ongoing pursuit of excellence and innovation in its academic and research fields Communication and collaboration skills to build support for security-related initiatives and objectives Experience in higher education or a research environment is preferred Broad knowledge of computer security issues, requirements, and trends Exceptional interpersonal and communication skills, plus the ability to achieve goals through influence, collaboration and cooperation Demonstrated ability to work effectively with an array of constituencies in a community that is both demographically and technologically diverse Skill in developing policy and procedure in a complex, decentralized, and mission-oriented environment that maintains in a department-based model of resource allocation and deployment Experience providing education and training programs on security policies and practices to a range of technical and non-technical constituents The ability to establish, implement, maintain, and modify computer and data security guidelines and procedures to achieve the compliance objectives of an organization in harmony with the principles of academic freedom that remain core to a world-class university The ability to evaluate security software products, oversee their installation and implementation, and interpret findings for practical use by law enforcement, legal counsel, and senior management as applicable Experience evaluating and providing guidance on the information-security elements of software and hardware acquisitions, IT services, cloud-based solutions, mobility, and other present and emerging dimensions of IT solutions and services in a complex environment Integrity and high standards of personal and professional conduct Education : Bachelor's degree required, preferably in computer science or information technology Graduate degree preferred in computer science or related field, or equivalent experience and relevant professional credentials Preferred Qualifications: Graduate degree in computer science or related field, or equivalent experience and relevant professional credentials Princeton University has retained Boyden Executive Search to support the recruitment of this position. Confidential inquiries, applications, and nominations should be sent by email to Sara Swisher-Anderson, Senior Associates at Boyden. Princeton University is an Equal Opportunity employer and all qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity or expression, national origin, disability status, protected veteran status, or any other characteristic protected by law. The University considers factors such as scope and responsibilities of the position, candidate's qualifications, work experience, education/training, key skills, market, collective bargaining agreements as applicable, and organizational considerations when extending an offer. The posted salary range represents the University's good faith and reasonable estimate for a full-time position; salaries for part-time positions are pro-rated accordingly. If the salary range on the posted position shows an hourly rate, this is the baseline; the actual hourly rate may be higher, depending on the position and factors listed above. The University also offers a comprehensive benefit program to eligible employees. Please see this link for more information. Standard Weekly Hours 36.25 Eligible for Overtime No Benefits Eligible Yes Probationary Period 180 days Essential Services Personnel (see policy for detail) No Physical Capacity Exam Required No Valid Drivers License Required No Experience Level Director Salary Range $265,000 to $325,000 PI279427080 #J-18808-Ljbffr
    $265k-325k yearly 3d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cyber Security

    Forhyre

    Cyber security analyst job in Philadelphia, PA

    Job Description Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients. Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time. Responsibilities: Engineer, implement and monitor security measures for the protection of computer systems, networks and information Develop and implement security policies and controls to support the Cyber Security framework Manage the existing cyber security training program across global, multilingual business Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity Continuous improvement in the areas of Information Security technologies, techniques and processes Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard Ability to interpret penetration test results and describe issues and fixes to non-security expert Responsible for leading an accurate & comprehensive status reporting to the executive steering committee Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap Skills & Experience Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree. Certified Information Systems Security Professional (CISSP) 8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology. Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment. Vulnerability Assessment testing and/or Penetration Testing (preferred) Robotic Process Automation/Intelligent Automation (preferred) Business case development supporting security technology solutions (preferred) Additional certifications demonstrating cybersecurity/technical mastery (preferred)
    $73k-100k yearly est. 21d ago
  • Network Security Analyst

    Integrated Resources 4.5company rating

    Cyber security analyst job in Newark, NJ

    A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing. Job Description: Network Security Analyst 6 months CTH • 3+ years of designing, implementing and supporting CISCO ISE is required Responsibilities: Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions. • Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect • Perform Cisco ISE Authentication and Authorization • Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE • Deploy Cisco ISE Profiling and client provisioning services • Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE • Provide Reports, Monitoring, Troubleshooting, and Security Work with vendor on problem resolution Create policies and reports to meet the business requirements Participate in Planning, Design, and Tests Perform security audits, scan and monitor servers Investigate and report on security alerts and perform security incident reporting Requirements: Expert-level knowledge and experience with design, implementation and support of Cisco ISE 3-5 year of experience working with Network Security applications Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus) Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption Knowledge of Directory Services including Active Directory, LDAP, and TDS Knowledge of F5 load balancers Knowledge of IT security principles, HIPAA, SOX and PCI regulations Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus) Business Analysis skills and ability to translate business requirements into technical requirements Excellent oral/written communication and organizational skills Security certification a plus such as CISSP, CEH or CISA Qualifications Bachelor's Degree in Computer Science, Programming, or IT required Additional Information Contact- 732-549-2030 ext 242 Harshad
    $92k-125k yearly est. 60d+ ago
  • Information Security Specialist (US)

    TDI 4.1company rating

    Cyber security analyst job in Mount Laurel, NJ

    Hours: 40 Pay Details: $98,160 - $159,270 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs. As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role. Line of Business: Technology Solutions Job Description: The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area. Depth & Scope: Participates on complex, comprehensive or large projects and initiatives Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors Has advanced knowledge of organization, technology controls / security/ risk issues Education & Experience: Bachelor's degree preferred Information security certification / accreditation an asset 7+ years of relevant experience Expert knowledge of IT security and risk disciplines and practices Preferred Qualifications 5+ years of experience in vulnerability management, security operations, or related fields. 2+ years of experience in a leadership or management role. Technical Skills: Expertise in vulnerability scanning tools (e.g., Qualys, Nessus, Rapid7). Knowledge of CVSS (Common Vulnerability Scoring System) and threat modeling. Strong understanding of operating systems, cloud platforms, networks, and application security. Familiarity with compliance frameworks (e.g., ISO 27001, NIST, PCI-DSS). Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience). Physical Requirements: Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100% Domestic Travel - Occasional International Travel - Never Performing sedentary work - Continuous Performing multiple tasks - Continuous Operating standard office equipment - Continuous Responding quickly to sounds - Occasional Sitting - Continuous Standing - Occasional Walking - Occasional Moving safely in confined spaces - Occasional Lifting/Carrying (under 25 lbs.) - Occasional Lifting/Carrying (over 25 lbs.) - Never Squatting - Occasional Bending - Occasional Kneeling - Never Crawling - Never Climbing - Never Reaching overhead - Never Reaching forward - Occasional Pushing - Never Pulling - Never Twisting - Never Concentrating for long periods of time - Continuous Applying common sense to deal with problems involving standardized situations - Continuous Reading, writing and comprehending instructions - Continuous Adding, subtracting, multiplying and dividing - Continuous The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes. Who We Are: TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues. TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you. Our Total Rewards Package Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more Additional Information: We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home. Colleague Development If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals. Training & Onboarding We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role. Interview Process We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call. Accommodation TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law. If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
    $98.2k-159.3k yearly Auto-Apply 2d ago
  • Cyber Security Engineer

    Microbac 4.0company rating

    Cyber security analyst job in Cranberry, PA

    Come join our family! Microbac Laboratories is an essential business offering competitive pay and benefits including medical, dental, vision, life insurance, disability, generous paid time off including vacation, holidays and flex-time, a wellness program, referral bonus, tuition reimbursement and more! Whether you are just starting your career in science or looking to further it, Microbac will put you on the path of an exciting career with room to grow. Quality, safety, giving back to our communities, diversity and inclusion, customer success and employee wellbeing are part of our core culture. We are looking for motivated individuals to join our family as a Cybersecurity Engineer. ABOUT MICROBAC Microbac Laboratories, Inc. is a premier commercial laboratory testing firm that partners with clients worldwide, offering laboratory solutions to the life science, food and nutrition, and environmental industries and serves our clients with the utmost expertise and respect for their market requirements, constraints, and challenges. We embody a company-wide commitment to exceptional customer experience, which has been refined over nearly 50 years of trusted, analytical and measurement experience. Through our network of laboratories, offices, and field services, we have the flexibility to meet the unique requirements for each client, project, and scope. As a privately held third-party testing company, Microbac operates with a commitment to safety, quality, and compliance. Our diverse work portfolio includes broad accreditation offerings and tested insights across the environmental, food and nutrition and life science markets. JOB SUMMARY We are seeking a hands-on Cybersecurity Engineer to own day-to-day security operations and incident response across our network of 30+ laboratories. This role is execution-focused and ideal for a candidate who enjoys working in lean environments, partnering closely with Infrastructure and Quality teams, and directly configuring and operating security controls. You will serve as the primary escalation point for security incidents while helping mature the organization's security posture as the business grows. Essential Functions: Own daily cybersecurity operations, monitoring alerts and responding to incidents Act as the primary escalation point for security events Lead incident response from detection through remediation and root cause analysis Configure and maintain security controls across business platforms Manage identity, access controls, MFA, Conditional Access, and privileged access models Perform hands-on investigations Develop, test, and maintain incident response playbooks and escalation paths Create security policies and translate them into enforceable technical controls Partner closely with Infrastructure on architecture, network changes, cloud services, and new tools Continuously assess risk, identify gaps, and implement practical security improvements Partner with Quality to ensure compliance with industry standard regulations Set a positive example through high standards and professional conduct. Continuously monitor emerging cybersecurity threats, regulatory changes, and industry best practices to keep organizational security strategies current and effective. Other duties as assigned. Minimum Requirements: Bachelor's degree in Computer Science, Information Systems or related field. 3+ years of experience in cybersecurity related positions Willingness to travel to lab locations as needed to provide on-site IT support. Preferred Qualifications: Certifications: CompTIA Security+, CompTIA CySA+, GSEC, CompTIA PenTest+, CCSP, CISSP, CISM Knowledge of advanced persistent threats (APTs) and their tactics, techniques, and procedures (TTPs) Fundamental understanding of Windows, Mac OSX, and Linux operating systems Fundamental understanding of OSI model, basic networking and troubleshooting concepts Experience with programming or scripting, including PowerShell, Bash, Python, Yara, and Perl Experience in managing SSO/IAM, email security, phishing and user awareness training Experience in EDR platforms Experience with cloud deployments such as Azure, AWS or similar platforms Experience working with distributed teams and other cross functional stakeholders Familiarity with commercial solutions for logging and security event management, including SIEM or SOAR platforms Familiarity with vulnerability management and IDS/IPS Demonstrated intermediate experience with security incident detection, response frameworks, and established incident handling procedures Understanding and knowledge of various log formats from a variety of network and computer devices Knowledge of Cyber risks and threats related to Cyber attackers Knowledge of recent Cyber events and interpreting kill chain process and threat impacts Presentation, analytical, and critical-thinking skills Ability to manage competing priorities and workload WORKING CONDITIONS AND PHYSICAL REQUIREMENTS The physical demands and working conditions described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Physical Requirements: While performing the duties of this job, the employee is regularly required to use hands to finger, handle, or feel objects, tools; talk or hear. The employee is occasionally required to stand, walk, and sit. The employee must occassionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include color vision and depth perception. Working Conditions: Home internet acceptable for remote computer work. The noise level in the work environment is usually moderate. This job may require travel less than 20% As a privately held third-party testing company, Microbac operates with a commitment to safety, quality, and compliance. Our diverse work portfolio includes broad accreditation offerings and tested insights across the environmental, food and life science markets. OTHER: This is not an exhaustive list of all duties an employee may be required to perform. Microbac reserves the right to revise the job description at any time. Employment is at-will. Microbac, promotes a drug-free, alcohol-free workplace. Applicants considered for hire must pass a drug test before beginning work. Refusal to submit to testing will result in disqualification of further employment consideration. Microbac is an Equal Opportunity Employer - We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. All qualified applicants will receive consideration for employment.
    $81k-111k yearly est. 8d ago
  • AI Security Analyst

    PPL Corporation 4.8company rating

    Cyber security analyst job in Allentown, PA

    Company Summary Statement As one of the largest investor-owned utility companies in the United States, PPL Corporation (NYSE: PPL), is committed to creating long-term, sustainable value for our 3.5 million customers, our shareowners and the communities we serve. Our high-performing regulated utilities - PPL Electric Utilities, Louisville Gas and Electric, Kentucky Utilities and Rhode Island Energy - provide an outstanding experience for our customers, consistently ranking among the best utilities in the nation. PPL's companies are also addressing challenges head-on by investing in new infrastructure and technology that is creating a smarter, more reliable and resilient energy grid. We are committed to doing our part to advance a cleaner energy future and drive innovation that enables us to achieve net-zero carbon emissions by 2050 while maintaining energy reliability and affordability for the customers and communities we serve. PPL is a positive force in the cities and towns where we do business, providing support for programs and organizations that empower the success of future generations by helping to build and maintain strong, diverse communities today. Overview **NOTE: This is a hybrid position requiring on-site presence three days per week at one of our local offices in: Allentown, PA (Lehigh Valley); Louisville, KY or Providence, RI.** **LI-Hy #INDPPL** PPL is seeking a passionate and technically skilled Junior to Mid-Level AI Security Analyst to join our Product Security team. This role is ideal for someone with a strong foundation in cybersecurity and a growing expertise in AI/ML systems. You will implement and maintain security guardrails for AI solutions including Traditional ML, Generative AI, and Agentic AI. You'll work within our established AI Security Controls framework, which tailors' controls by AI type and emphasizes observability, traceability, risk management, and specialized safeguards for Generative and Agentic AI. You will collaborate with the Data & AI and Product Teams to ensure that AI-driven applications adhere to enterprise security standards and policies. You will help shape and secure the future of AI technologies across our enterprise, ensuring responsible and resilient adoption of AI in alignment with our security modernization goals. Responsibilities + Collaborate with product teams to embed security into AI/ML models, pipelines, and applications throughout the SDLC. + Conduct security reviews for AI systems, including LLMs, generative models, and data pipelines. + Support the development of AI security policies, standards, and controls aligned with NIST, ISO, and emerging AI regulations. + Define and implement AI-specific risk controls, including model validation, bias mitigation, and explainability. + Collaborate with legal, compliance, and data privacy teams to ensure adherence to evolving AI regulations. + Assist in evaluating and implementing AI security tools for observability, model scanning, and data protection. + Help build awareness and training materials for secure AI development practices across agile teams. + All other duties and projects as assigned. Qualifications **Required Experience** : + Bachelor's degree in Computer Science, Information Security, or a related field. + 2+ years of experience in cybersecurity, with exposure to AI/ML technologies. + Familiarity with secure coding practices, threat modeling, and cloud-native environments. + Understanding of AI/ML concepts such as model training, inference, data labeling, and adversarial attacks. + Knowledge of common AI risks (such as prompt injection, data poisoning, model misuse, etc.) and cybersecurity concepts (authentication, encryption, network security) is required. + Strong communication and collaboration skills in agile environments (SAFe experience a plus). + Strong analytical skills to assess risks and vulnerabilities in complex systems. **Preferred Qualifications** : + Professional certifications such as CCSK, CEH, or AI-specific credentials are highly desirable. + Experience with Microsoft AI security tools (MS Defender for Cloud, MS Defender for Cloud Apps, Azure AI Content Safety, MS Purview). + Experience with AI security tools (e.g., Zenity, HiddenLayer). + Exposure to Power Platform, Power BI, or other low-code tools, especially any experience implementing data governance or DLP (Data Loss Prevention) on those, is a plus. + Experience specifically in AI security or ML model governance is a strong plus. + Proficiency in scripting and automation for security testing is a plus. **Required Experience** : + Bachelor's degree in Computer Science, Information Security, or a related field. + 2+ years of experience in cybersecurity, with exposure to AI/ML technologies. + Familiarity with secure coding practices, threat modeling, and cloud-native environments. + Understanding of AI/ML concepts such as model training, inference, data labeling, and adversarial attacks. + Knowledge of common AI risks (such as prompt injection, data poisoning, model misuse, etc.) and cybersecurity concepts (authentication, encryption, network security) is required. + Strong communication and collaboration skills in agile environments (SAFe experience a plus). + Strong analytical skills to assess risks and vulnerabilities in complex systems. **Preferred Qualifications** : + Professional certifications such as CCSK, CEH, or AI-specific credentials are highly desirable. + Experience with Microsoft AI security tools (MS Defender for Cloud, MS Defender for Cloud Apps, Azure AI Content Safety, MS Purview). + Experience with AI security tools (e.g., Zenity, HiddenLayer). + Exposure to Power Platform, Power BI, or other low-code tools, especially any experience implementing data governance or DLP (Data Loss Prevention) on those, is a plus. + Experience specifically in AI security or ML model governance is a strong plus. + Proficiency in scripting and automation for security testing is a plus. + Collaborate with product teams to embed security into AI/ML models, pipelines, and applications throughout the SDLC. + Conduct security reviews for AI systems, including LLMs, generative models, and data pipelines. + Support the development of AI security policies, standards, and controls aligned with NIST, ISO, and emerging AI regulations. + Define and implement AI-specific risk controls, including model validation, bias mitigation, and explainability. + Collaborate with legal, compliance, and data privacy teams to ensure adherence to evolving AI regulations. + Assist in evaluating and implementing AI security tools for observability, model scanning, and data protection. + Help build awareness and training materials for secure AI development practices across agile teams. + All other duties and projects as assigned. Remote Work The company reserves the right to determine if this position will be assigned to work on-site, remotely, or a combination of both. Assigned work location may change. In the case of remote work, physical presence in the office/on-site may be required to engage in face-to-face interaction and coordination of work among direct reports and co-workers. Equal Employment Opportunity Our company is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, age, religion, sex, national origin, protected veteran status, sexual orientation, gender identify, genetic information, disability status, or any other protected characteristic.
    $71k-85k yearly est. 50d ago
  • Information Security Analyst II (E5122)

    Institute of Electrical and Electronics Engineers

    Cyber security analyst job in Piscataway, NJ

    The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies\: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports. Key Responsibilities Proactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape. Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements. Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security. Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies. Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures. Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization. Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO). Participates in development and update of security policies, procedures, standards, guidelines, and architectures. Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings. Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them. Assists in the formulation and enforcement of security policies and procedures. Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. Req Work Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. Req Licenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. Pref Skills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory. Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM. Knowledge and experience Windows Active Directory. Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.e. Self Service Access requests). Good understanding of a programming language (e.g. Java, C, Perl), HTML/XML and Unix “shells” scripting (e.g. CSH, KSH, SH). Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization. Anticipates problems and identifies long-term implications of decisions and actions. Familiarity with server operating systems, such as; Windows, Linux & Solaris Familiarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus. Familiarity with load balancer technologies and ESSO integration capabilities is a plus. Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus. Other Requirements: As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply. PLEASE NOTE\: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status. For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. =============================================== Disclaimer\: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.
    $84k-119k yearly est. Auto-Apply 22d ago
  • Lead Information Security Analyst - Identity

    Blueprint30 LLC

    Cyber security analyst job in Roseland, NJ

    ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. Like what you see? Apply now! Learn more about ADP at tech.adp.com/careers Responsibilities: Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services. Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms. Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools. Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001). Mentor junior team members in support of IAM security program via process documentation and knowledge sharing. Analyze identity-related incidents and participate in incident response and root cause analysis. Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access). To Succeed in This Role: You will have a bachelor's degree or equivalent. Skills: 5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect) Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc. Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR) Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP) Strong scripting or automation skills (e.g., PowerShell, Python) Excellent analytical, communication, and documentation skills What are you waiting for? Apply today! Find out why people come to ADP and why they stay: **************************** (ADA version: **************************** )
    $84k-119k yearly est. 2h ago
  • Security Analyst - Systems Operations

    Adpcareers

    Cyber security analyst job in Roseland, NJ

    ADP is Hiring a Security Analyst - Systems Operations Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. The position is required to work on weekends and 2 nd US shift on a rotational basis, and to be on off hours on-call schedule, when necessary, with advanced notice. Well, this may be the role for you. Ready to make your mark? The Global Cybersecurity Services (GCS) Security Operations Team is responsible for implementing, managing, and supporting the applications, technologies, and underlying infrastructure delivered by the Global Security Organization (GSO). The primary focus is on Security Information and Event Management (SIEM) platforms and a wide range of standard security applications and tools, including both internal-home-grown and third-party solutions related to Data Governance, End-User Computing Protection, Data Loss Prevention (DLP), Unstructured Data Protection (UDP), Deep Packet Inspection (DPI), Threat Management, SOAR, and more. Like what you see? Apply now! Learn more about ADP at tech.adp.com The Key Responsibilities for Associate Security Analyst in GCS Operations are: -Support, manage, and troubleshoot SIEM platforms and various security technologies/tools; deploy and maintain monitoring systems, review alerts, and perform initial investigation and triage. -Troubleshoot and resolve issues related to operating systems, databases, applications, and security tools; conduct compliance assessments, vulnerability scanning, mitigation planning, and patching/upgrade; participate in disaster recovery (DR) setup, testing, and ongoing support. -Collaborate with Engineering, Project Management, Global IT teams, and end users to fulfill service requests. -Provide feedback to enhance the functionality, reliability, and stability of security technologies and infrastructure. -Be able to adapt quickly to new tools and solutions and support ongoing improvements to GSO service offerings. -Communicate clearly (written and verbal), present technical information effectively, and work efficiently within team-based and fast-paced environments. This role contributes directly to the stability, performance, and effectiveness of ADP's enterprise security ecosystem. To Succeed In This Role- You'll have a bachelor's degree or equivalent. Preferred Qualifications- -Knowledge on ITIL process, Windows and Linux/Unix operating systems, MySql/MSSQL. -Networking Protocols on TCP/IP, DNS, DHCP, HTTP, FTP, SMTP, SSL, Syslogd, PKI, DLP, Load Balancer, IDS, IPS, SIEM, DPI, UDP, GRC. -Scripting language (Linux Shell, Python, Powershell etc), SQL, etc. -Experience with CrowdStrike, Qualys, Snare, Snowflake, or knowledge on AWS/Azure are plus. -Any of the following certifications is a plus: CISSP, GSEC, CISA, CRISC, CISM. YOU'LL LOVE WORKING HERE BECAUSE YOU CAN: Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution. Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity. Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes. Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft. Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation. Join a company committed to equality and equity. Our goal is to impact lasting change through our actions. What are you waiting for? Apply today! Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY (ADA version: https://youtu.be/IQjUCA8SOoA )
    $84k-119k yearly est. 2h ago
  • Information Security Analyst

    Ra 3.1company rating

    Cyber security analyst job in Jersey City, NJ

    Why us? You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you! They are an equal opportunity employer and value diversity at our company. Job Description Strong knowledge of Information Security concepts such as: •Encryption, Cloud and Mobile Device Security •Data Loss and Prevention tools and solutions •Risk-Threat Analysis and Vulnerability Assessments •Enterprise Security Monitoring, Role-Based Access Control (RBAC) •Identity and Access Management, Computer Forensic •IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.) •Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability. Sounds like you? then ping us with your most updated resume. We'd love to talk to you! We are excited about the companies growth and the role you will play with them. Qualifications Desired Skills & Experience: You hold a Bachelor's degree in any domain. You are certified in CISSP, or CISA, or CEH, required. You have more than 1 year experience working in the IT security function. You have good experience with Operating System, Database, Network and Application Security . Additional Information All your information will be kept confidential according to EEO guidelines. Ping me at **********************
    $91k-130k yearly est. Easy Apply 2d ago
  • Information Security Analyst II (E5122)

    Ieee 4.9company rating

    Cyber security analyst job in Piscataway, NJ

    Information Security Analyst II (E5122) - 250363: KNW-B40 Description Job Summary The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports. Key ResponsibilitiesProactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape. Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements. Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security. Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies. Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures. Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization. Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO). Participates in development and update of security policies, procedures, standards, guidelines, and architectures. Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings. Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them. Assists in the formulation and enforcement of security policies and procedures. Qualifications Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. ReqWork Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e. g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. ReqLicenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. PrefSkills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc. ) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory. Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM. Knowledge and experience Windows Active Directory. Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i. e. Self Service Access requests). Good understanding of a programming language (e. g. Java, C, Perl), HTML/XML and Unix “shells” scripting (e. g. CSH, KSH, SH). Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences. o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization. Anticipates problems and identifies long-term implications of decisions and actions. Familiarity with server operating systems, such as; Windows, Linux & SolarisFamiliarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus. Familiarity with load balancer technologies and ESSO integration capabilities is a plus. Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus. Other Requirements:As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply. PLEASE NOTE: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status. For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. ===============================================Disclaimer: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons. Min: $91,000. 00 Max: $114,000. 00 Job: Technology Primary Location: United States-New Jersey-Piscataway Schedule: Full-time Job Type: Regular Job Posting: Jan 5, 2026, 5:38:52 PM
    $91k-114k yearly Auto-Apply 1d ago
  • 3014 - Specialist, Information System Security III (SISS3)

    AlakaʻI Services and Poe'Hana Group, Inc.

    Cyber security analyst job in Philadelphia, PA

    Provide senior-level cybersecurity and information system security support for Navy systems by leading RMF activities, security authorization packages, continuous monitoring, and cybersecurity compliance in support of mission operations. Key Responsibilities Lead and support RMF Steps 1-6 for assigned Navy information systems Develop and maintain SSPs, SAPs, SARs, POA&Ms, and security artifacts Coordinate system authorization activities with Authorizing Officials (AOs) Conduct risk assessments and vulnerability analysis Support continuous monitoring, audits, and inspections Advise leadership on cybersecurity risk and mitigation strategies Qualifications (Citizenship, Education, Experience, Skills) Citizenship: U.S. Citizenship required Education: Bachelor's degree in Cybersecurity, IT, or related field (or equivalent experience) Certification: Must possess and maintain a DoD 8140 / IAWF-approved Information Assurance Technical (IAT) Level II certification (e.g., CompTIA Security+ CE, CySA+, SSCP, GSEC, or equivalent) Experience: Minimum 8 years cybersecurity / ISS experience; 5+ years RMF support Skills: RMF; NIST 800-53; risk analysis; technical writing; coordination with government stakeholders Required Systems, Tools, and Framework Experience Frameworks: DoD RMF, NIST SP 800-53, 800-37, 800-30 Systems: eMASS, ACAS, HBSS, STIG Viewer Tools: Nessus, SCAP, vulnerability scanning tools Security Handling: CUI, controlled system documentation We are an Equal Opportunity Employer and strive to provide equal employment opportunity to all applicants and staff in accordance with sound employee relations practices and federal and state laws. All qualified applicants will receive consideration without regard to race, color, religion, sex, national origin, age, disability, veteran status, sexual orientation, gender identity or expression, marital status, ancestry, genetic information, pregnancy status, or any other characteristic protected by law.
    $80k-114k yearly est. 7d ago
  • Information Security Analyst

    Vurke

    Cyber security analyst job in Philadelphia, PA

    About the Role: The Network Security Engineer will design, implement, and manage secure network infrastructure to ensure uninterrupted business operations. Responsibilities: Configure and maintain firewalls, VPNs, and IDS/IPS systems. Perform network security monitoring and incident response. Conduct penetration testing and simulate attacks to identify weaknesses. Harden routers, switches, and network devices. Optimize performance without compromising security. Requirements: 3+ years experience in network engineering/security. Strong knowledge of Cisco, Palo Alto, or Fortinet firewalls. Experience with network protocols (TCP/IP, DNS, SSL, VPN). CCNA Security, CCNP Security, or equivalent certifications. Required Skills: Information Security Security
    $80k-114k yearly est. 60d+ ago
  • Information Security Specialist

    Ask It Consulting

    Cyber security analyst job in Trenton, NJ

    Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. Job Description The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems. Years of Relevant Experience: 5 plus years Preferred Education 4 year college degree or equivalent technical study • -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards • -Develop plans to safeguard computer files against accidental or unauthorized • modification, destruction, or disclosure and to meet emergency data processing • needs. Monitor use of data files and regulate access to safeguard information in • computer files. • -Document and maintain a repository with version control of all policies, procedures and best practices • -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels • -Monitor use of data files and safeguard computer files against authorized access and unauthorized access • -Modify computer security files to incorporate new software, correct errors or access changes • -Perform risk assessments and execute tests of data processing system to ensure • functioning of data processing activities and security measures. • -Encrypt data transmissions and erect firewalls to conceal confidential information as it • is being transmitted and to keep out tainted digital transfers. • -Identify and track issues, risks and action items. • -Document information security policies, standards, and procedures spanning and • encompassing the range of topics such as organization security, asset ID and • classification, personal security, communications and operations management, • access control, system development and maintenance, business continuity • management, and compliance. • -Confer with users to discuss issues such as computer data access needs, security • violations, and programming changes. • -Train users and promote security awareness to ensure system security and to • improve server and network efficiency. Qualifications Prior experience in the following are essential for the role: • Websense 7.8 • E policy Orchestrator 4.6 • Mc Afee email gateway (MEG) 7.6 • Airwatch 8.0.6.0 Additional Information If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
    $84k-119k yearly est. 2d ago
  • Systems Engineer - Cyber Security

    Penske 4.2company rating

    Cyber security analyst job in Reading, PA

    **Summary Statement:** You will be working with a team of experts to resolve issues and create new security infrastructure based on current market trends. **What you will be doing:** As a Penske Systems Engineer - Cyber Security you will maintain network, server and workstation firewall protection and provide network and application scanning, security logging, and intrusion detection capabilities. You will provide security reviews and define security models for new systems based on current trends and developments. You will also collaborate with different teams within the IT department to discuss, analyze or resolve usability issues and work on projects to update or create new security infrastructures. **Major Responsibilities:** - Ensure associates follow security standards through oversight of the set-up of a user's security access, administer network security access and monitor the associate's use of data systems to safeguard company information - Provide security reviews and define security models for new systems - Analyze and recommend security products based on their performance - Audit access to mission critical applications and to maintain compliance documentation for SOX and PCI - Analyze and review annual SOX and other compliance reports - Collaborate with different teams within the IT department to discuss, analyze, or resolve usability issues - Work on 1-3 mid to large-scale projects concurrently, assigned from department and group senior leadership - Mentor Security Administrators and Offshore Contractors - Define, implement, communicate and update security architecture for multiple computing platforms, operating systems, data networks, applications, and client software - Develop, implement, communicate, and update security policies and procedures for hardware, software, and network infrastructure - Develop, implement, and maintain tools for effective security administration and monitoring compliance IT security policies and procedures as well as detection of attempted security breaches and intrusion - Develop, test, and update disaster recovery plans to ensure that plans achieve desired results in protecting company assets and plans meet corporate risk and business resumption goals - Develop training material to be used to develop awareness within corporation of security policies, procedures, best practices and other issues as needed - Detailed understanding of Cloud Security fundamentals, including cryptography and the shared responsibility model - Other projects as assigned **Qualifications:** - Bachelor's degree or equivalent experience required, advanced degrees or certifications preferred - Minimum of 3+ years' experience - A background in auditing is also desirable - Knowledge of current state of the art security products is required - Firewall software/hardware - Proxy Filtering - Centralized Log configuration and analysis - IDS/IPS configuration and analysis. - SSO Infrastructure - Network Vulnerability Scanning - Advanced User Authentication Structures - OS Hardening and Security - Application vulnerability scanning - Networking TCP/IP and packet capture applications - Endpoint Protection solutions - Encryption Technology - Good documentation and presentation skills are also necessary for this position - Familiarity with disaster recovery planning and test execution - Regular, predictable, full attendance is an essential function of the job - Willingness to travel as necessary, work the required schedule, work at the specific location required, complete Penske employment application, submit to a background investigation (to include past employment, education, and criminal history) and drug screening are required **Physical Requirements:** -The physical and mental demands described here are representative of those that must be met by an associate to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. -The associate will be required to read; communicate verbally and/or in written form; remember and analyze certain information; and remember and understand certain instructions or guidelines. -While performing the duties of this job, the associate may be required to stand, walk, and sit. The associate is frequently required to use hands to touch, handle, and feel, and to reach with hands and arms. The associate must be able to occasionally lift and/or move up to 25lbs/12kg. -Specific vision abilities required by this job include close vision, distance vision, peripheral vision, depth perception and the ability to adjust focus. Penske is an Equal Opportunity Employer **About Penske Truck Leasing/Transportation Solutions** Penske Truck Leasing/Transportation Solutions is a premier global transportation provider that delivers essential and innovative transportation, logistics and technology services to help companies and people move forward. With headquarters in Reading, PA, Penske and its associates are driven by a dedication to excellence and a commitment to customer success. Visit Go Penske to learn more. Job Category: Information Technology Job Function: Software Engineering Job Family: Information Technology Address: 100 Gundy Drive Primary Location: US-PA-Reading Employer: Penske Truck Leasing Co., L.P. Req ID: 2510735
    $88k-124k yearly est. 60d+ ago
  • AI Security Analyst

    Lancesoft 4.5company rating

    Cyber security analyst job in Allentown, PA

    Description: CALLOUTS: - This role is remote. - Looking for experience with agents generative AI - Experience in security tooling like Zenity would be nice to have Seeking a passionate and technically skilled Junior to Mid-Level AI Security Analyst to join our Product Security team. This role is ideal for someone with a strong foundation in cybersecurity and a growing expertise in AI/ML systems. You will implement and maintain security guardrails for AI solutions including Traditional ML, Generative AI, and Agentic AI. You'll work within our established AI Security Controls framework, which tailors'controls by AI type and emphasizes observability, traceability, risk management, and specialized safeguards for Generative and Agentic AI. You will collaborate with the Data & AI and Product Teams to ensure that AI-driven applications adhere to enterprise security standards and policies. You will help shape and secure the future of AI technologies across our enterprise, ensuring responsible and resilient adoption of AI in alignment with our security modernization goals. Required Experience: •Bachelor's degree in Computer Science, Information Security, or a related field. •2+ years of experience in cybersecurity, with exposure to AI/ML technologies. •Familiarity with secure coding practices, threat modeling, and cloud-native environments. •Understanding of AI/ML concepts such as model training, inference, data labeling, and adversarial attacks. •Knowledge of common AI risks (such as prompt injection, data poisoning, model misuse, etc.) and cybersecurity concepts (authentication, encryption, network security) is required. •Strong communication and collaboration skills in agile environments (SAFe experience a plus). •Strong analytical skills to assess risks and vulnerabilities in complex systems. Preferred Qualifications: •Professional certifications such as CCSK, CEH, or AI-specific credentials are highly desirable. •Experience with Microsoft AI security tools (MS Defender for Cloud, MS Defender for Cloud Apps, Azure AI Content Safety, MS Purview). •Experience with AI security tools (e.G., Zenity, HiddenLayer). •Exposure to Power Platform, Power BI, or other low-code tools, especially any experience implementing data governance or DLP (Data Loss Prevention) on those, is a plus. •Experience specifically in AI security or ML model governance is a strong plus. •Proficiency in scripting and automation for security testing is a plus.
    $61k-77k yearly est. 27d ago
  • Senior Information Security Analyst - Cloud/SaaS

    Univest 4.0company rating

    Cyber security analyst job in Souderton, PA

    Univest Financial Corporation (UVSP), has approximately $7.9 billion in assets and $5.4 billion in assets under management and supervision (as of June, 2025). Headquartered in Souderton, Pa. and founded in 1876, the Corporation and its subsidiaries provide a full-range of financial solutions for individuals, businesses, municipalities and nonprofit organizations in the Mid-Atlantic Region. For nearly 150 years, Univest has stayed true to our philanthropic spirit and the strength of our Committed to Local giving program is one of the things that differentiates us. In 2024, Univest donated $2.1 million to our local nonprofits and our employees volunteered more than 16,000 hours. We are seeking a Senior Information Security Analyst to join our Souderton based Information Security Team. Responsibilities Ensure and continuously improve the confidentiality, integrity, and availability of corporate and customer data in alignment with the company's information security program. Perform real-time monitoring, detection, and analysis of security events from multiple data sources on a daily basis. Identify anomalous network traffic, monitor login activity, search for indicators of compromise, and respond appropriately to detected events. Actively monitor and evaluate emerging threat intelligence from internal and external sources, recommending and implementing preventive and detective measures. Participate in all phases of the incident response process, including identification, containment, eradication, recovery, and reporting. Support information security risk assessments and reviews for new or prospective cloud and SaaS technology acquisitions. Prepare and present evidence for internal and external audits, and assist with remediation of identified gaps. Collaborate with IT to remediate vulnerabilities and strengthen overall security posture. Maintain and grow professional knowledge by attending training sessions, webinars, conferences, and earning continuing professional education credits. Comply with all laws and regulations that apply to the position, including the Univest Code of Conduct Perform additional duties as required Qualifications 10+ years of progressive, hands-on experience in information security support roles. 5+ years of direct experience securing and monitoring cloud and SaaS providers, ideally within a financial services environment. Proven ability to configure, monitor, and manage security controls for Azure, M365, and AWS environments. Skilled in the use of diverse network and endpoint security monitoring, alerting, and investigative tools across multiple platforms. Advanced understanding of internet routing and application protocols, with strong emphasis on TCP/IP. Effective written and verbal communication skills with the ability to explain complex technical and security concepts to non-technical audiences. Excellent analytical, investigative, and problem-solving skills. Demonstrated ability to work independently, collaborate across teams, and serve as a technical subject-matter expert to help guide security initiatives. Highly self-motivated, with a track record of taking on increasing levels of responsibility. Bachelor's degree in an information technology-related field preferred; relevant industry certifications (CISSP, Azure Security Engineer Associate, AWS Certified Security) a plus. Wage Range: The salary for this position ranges from $100,000 - 130,000 Benefits Overview: Univest offer's a comprehensive benefits package that includes: * Health Insurance: Medical, dental and vision coverage (single or family; begins the first of the month following start date) * Retirement Plan: Participation in 401(k) plan with up to a 3% employer match after 6 months of employment * Paid Time Off (PTO): 20 days annually (prorated your first year) * Short Term Disability: 10 days annually of sick time with a doctors note (prorated your first year) * Holiday Time Off: 11 paid holidays * We offer company paid life insurance: as well as other supplemental insurances * Tuition reimbursement * Employee Wellness programs: including fitness club discounts and fitness tracker discounts/ annual reimbursement * Discounts: on loan products * Professional development trainings Click here for Benefit Information #Univest #LI-Hybrid #INDUF An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
    $100k-130k yearly Auto-Apply 50d ago
  • Security Systems Engineer

    Dagostino Electronic Services 4.1company rating

    Cyber security analyst job in Pittsburgh, PA

    The Systems Engineer position is responsible for providing full cycle implementation and support of customer systems, while working across multiple company departments to ensure full client satisfaction. Under the direction of a manager or dispatcher, coordinates the design and maintenance of all access control, intrusion, and video surveillance systems. Incumbent receives and evaluates work orders and requests, investigates requests and troubleshoots problems where appropriate, establishes priorities and coordinates with contractors, when required. Requirements Essential functions and responsibilities: Assists with security systems integration, mapping and software updates and helps train personnel in the use of these systems. Assists on new projects in both existing areas and new construction helping with security assessments, vendor selection, technology upgrades, product selections, testing, field verification of systems and inspection of work in progress for compliance with standards Assess work sites, conditions, and logistics for each project; Develop Method of Procedure based on pre-project assessment. Design, develop and provide documentation of systems, configurations, and other pertinent information for the customer. Communicate with clients to resolve issues in a professional and confidential manner; Develop and execute client specific solutions. Manage the allocation of project resources, including software, hardware, tools, and related items specific to each customer and/or project. Direct the work responsibilities of union labor personnel based on specific project needs. Design and oversee training programs for new and existing customers; Determine which customers receive training. Collaborate with Customer Relationship Managers on demonstrations for new and potential clients. Perform installation, configuration, programming, and final commissioning of customer systems. Work collaboratively with installation, project management and engineering teams. Perform infrastructure services, including pulling cables, installing wall, and ceiling cabling, and installing surface mounted devices, as required. Perform system wiring and terminations services, as required. Deliver on-going remote and on-site technical support for existing customers and systems. Additional responsibilities may be required as necessary, including but not limited to: Provide internal support for basic trouble shooting. Organizes and manage parts stock and tools. Perform other duties as needed. Success factors/job competencies: Effectively communicate both in writing and verbally Work independently and prioritize multiple tasks and adapt to needed change Analysis Mechanical aptitude Comprehend technical language and read and interpret blueprints, wiring diagrams, and schematics Safety orientation Customer Focus Attention to Detail Teamwork/Collaboration Stay abreast of changes in security technology Physical demands and work environment: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Individual will be required to travel to customer sites as needed. While performing the duties of this job, the employee is occasionally exposed to moving mechanical parts. The employee is occasionally exposed to outside weather conditions and risk of electrical shock. Individual will regularly be required to lift, push, pull, and carry up to 50 pounds, and occasionally up to 75 pounds. Incumbent will be required to use a computer with keyboard, telephone, or handheld mobile device for extended periods of time, and office machinery as needed. Incumbent must be able to read, see, hear, and speak. Workdays and Shifts: Position works Monday-Friday, daylight hours, and additional time as needed to complete work. Education/Certification(s)/License(s) required: Bachelor's Degree in Electronics, Information Technology or related field, or equivalent experience. May be required to participate in safety trainings and/or certifications provided by the Company or customers. Valid driver's license, as employee will be required to travel to local and overnight client sites as needed. Manufacturer specific certifications, as required. Responsible to maintain active certifications and obtain new and updated certifications as required by the Company. Experience/Other required: Position requires two (2) to three (3) years of relevant experience in the electronic services. Strong knowledge of Microsoft Office. Strong computer skills with advanced software aptitude. Security systems to include, service and maintenance across a broad spectrum of access control, intrusion and video surveillance systems such as, Genetec, Milestone, Bosch, and DMP. Applicants must be currently authorized to work in the United States on a full-time basis. Visa sponsorship is not available for this position. This is a full-time, in-person position, and candidates must be able to work from our office located in Pittsburgh, Pennsylvania.
    $90k-127k yearly est. 60d+ ago
  • Specialist, Information System Security III (SISS3)

    Armada Ltd. 3.9company rating

    Cyber security analyst job in Philadelphia, PA

    Job Description Type: Full Time Overtime Exempt: Exempt Reports To: ARMADA HQ Travel Required: Yes Security Clearance Required: Active Secret Security Clearance ************CONTINGENT UPON AWARD*************** Duties & Responsibilities: Specialist, Information System Security III (SISS3) will conduct risk and vulnerability assessments of planned and installed systems to identify vulnerabilities, risks and protection needs; conduct systems security evaluation, audits, and reviews; determine the residual risk of a package based on package content and assessment results and documenting for the Security Controls Assessor's (SCA) and higher level review. Execute Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities. Specialist, Information System Security III (SISS3) will conduct systems security reviews, audits, or evaluations, as appropriate, to ensure accreditation documents are accurate and represent the current risk posture of the system. Perform analysis of logs, events, and reporting of various data collections tools including: vulnerability monitoring via Assured Compliance Assessment System (ACAS) and related tools, Host Based Security Systems (HBSS), web content filters, Security Information and event management (SIEM), firewall systems, network devices, server devices, workstations, and intrusion detection and prevention systems (ID/PS). Specialist, Information System Security III (SISS3) will assess impacts from observed risks and report via the Cybersecurity Program chain of command. Executing Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities. Perform the evaluation of system administrator, security engineer, and/or system owner proposed corrections to ensure compliance and best-fit solution. Specialist, Information System Security III (SISS3) will present and submit data to management, develop reports, and produce procedural documentation in a comprehensive and cohesive manner. Perform risk management and security engineering for Research, Development, Testing, and Evaluation (RDT&E) RMF Afloat systems include Information Assurance Vulnerability Management (IAVM) support, remediation, patching, scanning and associated boundary maintenance. Specialist, Information System Security III (SISS3) will document residual risks in a plan of actions and milestones formatted in compliance with the current package system, currently eMASS. Specialist, Information System Security III (SISS3) will maintain current vulnerability scan data and residual risk plan of actions and milestones in Vulnerability Remediation Asset Manager (VRAM). Manage, attend, and support configuration control board practices. Create and verify the accuracy of POA&Ms/RARs as identified by vulnerability actual test results. Specialist, Information System Security III (SISS3) shall write technical documentation such as user manuals, reports, documentation, policies, presentations, Plan of Action and Milestones (POA&Ms), risk assessments, proposals, outlines, and summaries in support of both ashore and afloat systems across multiple platforms. Support developing of technical documents across multiple platforms including configuration management, milestone, issue tracking, web site content management and RMF documentation. Specialist, Information System Security III (SISS3) may be required to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe). The estimated number of trips is 14 per year (estimated 25%-30% travel). Other duties as assigned. Knowledge, Skills, and Abilities (KSAs): Ability to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe). Proficient in Microsoft Windows Operating System Administration, including Windows 11, Windows 10, Windows 7, and Windows XP (at a minimum). Ability to work as a team member, communicate, perform office functions and use office tools, customer focused and deliver exceptional performance. Possess excellent organizational and file management skills and the ability to plan and execute administrative work with little supervision. Possess excellent oral and written communication skills. Required Certifications: Minimum of one (1) IAT Level II listed certificate required: CompTIA Security+ (CE) CompTIA CySA+ GIAC Security Essentials (GSEC) ISC² SSCP (Systems Security Certified Practitioner) Minimum/General Experience: Five (5) years of experience in the following: Cybersecurity, Engineering, Test and Evaluation (T&E) or Authorization and Assessment (A&A) (formerly C&A) related field. Information Assurance tools such as Defense Information Systems Agency (DISA) Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS). Command line interface, PowerShell, and performing automated tasking through use of code. Minimum Education: College degree in any technical discipline from an accredited college or university. Disclaimer: The above information has been designed to indicate the general nature and level of work to be performed. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of the contractor assigned to this position. Applying: If you feel you have the knowledge, skills and abilities for this position visit our careers page at ****************** Special Notes: Relocation is not available for these jobs ARMADA provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. ARMADA complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Must be able to successfully pass a background check, and pre-employment drug testing. Job offers are contingent upon results of background check and drug testing.
    $84k-127k yearly est. 26d ago
  • Information Security Systems Engineer-Ss

    McLaughlin Research Corporation 4.0company rating

    Cyber security analyst job in Philadelphia, PA

    McLaughlin Research has several openings (pending award) for Information Systems Security Engineers at the Naval Surface Warfare Center, Philadelphia Division. The Information System Security Engineer (ISSE) designs, develops, implements, and integrates advanced cybersecurity solutions to protect the organization's information systems and data assets. The ISSE III functions as a technical subject matter expert, applying security engineering principles across the system development lifecycle to identify vulnerabilities, mitigate risks, and maintain compliance with information assurance standards. This position often works with classified systems and complex networking environments. Requirements Key Responsibilities Security Architecture and Design: Designing and implementing security architectures for various environments and ensuring trusted relationships between systems. Risk Management and Compliance: Assessing and mitigating threats, leading the creation of security artifacts like SSPs and RARs, supporting system accreditation under frameworks like RMF, and ensuring compliance with policies such as DoD and NIST SP 800-series. Vulnerability Management and Incident Response: Conducting vulnerability assessments and ethical hacking, performing risk assessments, leading incident response, and managing automated scanning tools like ACAS and SCAP. Mentorship and Team Leadership: Guiding junior engineers and analysts and leading teams to achieve security goals. Cross-Functional Collaboration: Representing security engineering on technical teams and interfacing with stakeholders to translate requirements. Required Qualifications Education: BS in Computer Science or relevant field. Experience: 3-10 years in information security engineering, with specific experience potentially needed for DoD or SAP environments. Certifications: Must meet DoD 8570/8140 compliance (IASAE Level III, IAT Level III, or IAM Level III) and hold certifications such as CISSP, CASP+, CISM, CSSLP, or CISSP-ISSEP. Technical Skills: Expertise in RMF, NIST SP 800-53, DISA STIGs/SRGs, experience with security tools (e.g., eMASS, ACAS, Splunk), and knowledge of operating systems and networks (Windows, Linux, Cisco). Scripting proficiency is beneficial. Security Clearance: U.S. citizenship and eligibility to obtain an active security clearance. Equal Employment Opportunity Statement: McLaughlin Research Corporation is an Equal Opportunity and Affirmative Action Employer. It is our policy to recruit, hire, promote, and train for all positions without regard to age, race, creed, religion, national origin, gender identity, marital status, sexual orientation, family responsibilities, pregnancy, minorities, genetic information, status as a person with a disability, amnesty or status as a protected veteran, and to base all such decisions upon the individual's qualifications and ability to perform the work assigned, consistent with contractual requirements and all federal, state and, local laws. EEO is the Law: Applicants and employees are protected under Federal law from discrimination.
    $74k-100k yearly est. 60d+ ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in North Whitehall, PA?

The average cyber security analyst in North Whitehall, PA earns between $63,000 and $115,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in North Whitehall, PA

$85,000
Job type you want
Full Time
Part Time
Internship
Temporary