Post job

Cyber security analyst jobs in Norwalk, CT

- 25 jobs
All
Cyber Security Analyst
Security Engineer
Cyber Security Engineer
Securities Analyst
Information Security Analyst
Network Security Consultant
Network Security Analyst
Senior Security Analyst
Senior Information Security Analyst
Defense Analyst
Information Security Engineer
  • Network Security Analyst

    Skadden 4.9company rating

    Cyber security analyst job in White Plains, NY

    We invite you to review our current business services professionals openings to learn about the opportunities available across the firm. About Us Skadden, Arps, Slate, Meagher & Flom LLP has forged a reputation as one of the most prestigious law firms in the world. Relying on innovation, intellect, teamwork and tenacity, our lawyers deliver the highest quality advice and novel solutions to our clients' legal issues. We are known for handling the most complex transactions, litigation/controversy issues, and regulatory matters, as well as for the strong partnerships we build with clients and each other. Our attorneys, who reflect a broad range of experiences and perspectives, work together seamlessly across 50-plus practices and 21 offices in the world's major financial centers. The Opportunity We are seeking two Network Security Analysts to join our Firm. These positions will be based in our White Plains office (hybrid), and please note the roles have different shift times, listed below. The Network Security Analysts are responsible for implementing and supporting network security solutions for the Firm and, implementing and enforcing practical solutions to secure the Firm's internal and external network infrastructure. Available Shift Times (EST- Hybrid) 1.) Saturday - Sunday: 7:00 a.m. - 8:00 p.m. EST & Monday 7:00 a.m. - 7:00 p.m. 2.) Monday - Friday: 2:00 p.m. - 10:00 p.m. Note: The scheduled hours listed may be flexible and will be discussed during the interview process. Responsibilities Performs daily review of automated security reports and escalate as necessary. Responds to system generated security alerts and coordinate responses. Assists with internal audits, vulnerability scans and risk assessments. Assists with annual penetration testing, review of findings and tracking issue resolution. Participates in evaluating new technologies or new versions of existing products. Works with project teams to implement secure network connectivity solutions. Writes and maintains technical documentation including procedures and troubleshooting guides. Demonstrates effective interpersonal, written and verbal communication skills to facilitate effective work relationships with others. Manages Firm resources responsibly. Complies with and understands Firm operation, policies and procedures. Performs other related duties as assigned. Qualifications Knowledge of relevant firm computer software programs (e.g., Outlook, Excel, PowerPoint), with the ability to learn new software and operating systems Proficient with Access, Project and Visio Thorough knowledge of network management and security technologies and approaches Thorough knowledge of security techniques, latest protocols and defenses Proficient with Microsoft Active Directory and Operating Systems Basic ability to program scripts and batch files Demonstrates effective interpersonal and communication skills, both verbally and in writing Demonstrates close attention to detail Excellent analytical, troubleshooting, organizational, and planning skills Ability to handle multiple projects and shifting priorities Ability to handle sensitive matters and maintain confidentiality Ability to organize and prioritize work Ability to work well in a demanding and fast-paced environment Ability to work well independently as well as effectively within a team Ability to use discretion and exercise independent and sound judgment Flexibility to adjust hours and work the hours necessary to meet operating and business needs Education/Experience Bachelor's degree or equivalent Minimum of two years' experience in multi-national enterprise IT Culture & Life at Skadden What makes Skadden special is our people and the culture, community and spirit of collaboration we have created. We believe in teamwork and inspiring each other to be our best in an atmosphere that promotes professionalism and excellence in all that we do. We know that inclusion and drawing on the strength of a wide spectrum of talent only make us better and is vital to the firm's success. Our goal is for everyone at the firm to enjoy a challenging career with opportunities for development and growth and to support the well-being of our attorneys and business services professionals. Benefits The overall well-being of our team is important to us. We offer generous benefits to help you achieve wellness in all areas of your life. Competitive salaries and year-end discretionary bonuses. Comprehensive health care (medical, dental, vision), savings plan/401(k) and voluntary benefits. Generous paid time off. Paid leave options, including parental. In-classroom, remote, and on-demand learning and professional development opportunities. Robust well-being classes and programs. Opportunities to give back and make an impact in local communities. For further details, please visit: ******************************************************* Skadden is an Equal Opportunity Employer (Disability/Vet/other protected categories). For more information, please visit Skadden.com/careers. The starting base salary for this position is expected to be within the range listed under Salary Details. Actual salary will be determined based on skills, experience (to the extent relevant) and other-job related factors, consistent with applicable law. Salary Details $125,000 -$140,000 EEO Statement Skadden is an Equal Opportunity Employer. It does not discriminate against applicants or employees based on any legally impermissible factor including, but not limited to, race, color, religion, creed, sex, national origin, ancestry, age, alienage or citizenship status, marital or familial status, domestic partnership status, caregiver status, sexual orientation, gender, gender identity or expression, change of sex or transgender status, genetic information, medical condition, pregnancy, childbirth or related medical conditions, sexual and reproductive health decisions, disability, any protected military or veteran status, or status as a victim of domestic or dating violence, sexual assault or offense, or stalking. Applicants who require an accommodation during the application process should contact Lara Bell at **************. Skadden Equal Employment Opportunity Policy Skadden Equal Employment Opportunity Policy Applicants Have Rights Under Federal Employment Law Applicants Have Rights Under Federal Employment Law In accordance with the Transparency in Coverage Rule, click here to review machine-readable files made available by UnitedHealthcare: Transparency in Coverage
    $125k-140k yearly Auto-Apply 28d ago
  • Cyber Security Analyst

    Teksystems 4.4company rating

    Cyber security analyst job in Bethpage, NY

    The Network and Cyber Security Analyst will be responsible for designing, implementing, and maintaining the network and security infrastructure of the IT organization. This role requires a combination of hands-on experience with firewalls and other security tools, strong network knowledge, and expertise in Microsoft Azure networking and security. The ideal candidate will also have experience in setting and documenting security policies as well as working with 3rd party security vendors. Key Responsibilities: - Design, deploy, and maintain secure and high-performance network solutions, including switches, routers, and wireless systems. - Act as 2nd in line patch and troubleshooting support - Monitor and troubleshoot network performance and connectivity issues to ensure minimal downtime. - Optimize network configurations to enhance scalability, efficiency, and security. - Implement and manage firewalls, intrusion prevention systems (IPS), and other security appliances. - Perform regular vulnerability assessments and lead the remediation of identified risks. - Develop and enforce security policies, procedures, and incident response protocols. - Design, deploy, and manage secure cloud networking solutions, with a primary focus on Microsoft Azure. - Configure virtual networks, firewalls, and security groups in Azure to ensure compliance with organizational standards. - Manage identity and access solutions in Azure, including multi-factor authentication (MFA) and conditional access policies. - Collaborate with cross-functional teams to align IT infrastructure with business goals. - Manage 3rd party security partners - Maintain up-to-date documentation of network architecture, configurations, and security policies. - Generate regular reports on network performance, security incidents, and compliance metrics. - Provide guidance and training to staff on security best practices and awareness. - Stay up-to-date with the latest security trends, threats, and technology solutions. Qualifications: - Bachelor's degree in Information Technology, Computer Science, or a related field (or equivalent experience). - Minimum of 8+ years of experience in network administration and cybersecurity roles. - Expertise in configuring and managing network devices such as Cisco, Juniper, or similar switches and routers. - Hands-on experience with firewall platforms such as Cisco, Palo Alto, Fortinet, or similar solutions. - Proficiency in Azure cloud networking, including virtual networks, VPNs, and security configurations. - Strong knowledge of network protocols (TCP/IP, DNS, DHCP, VLANs, etc.) and troubleshooting tools. - Experience in setting and documenting security policies and procedures. - Excellent problem-solving, communication, and leadership skills. Preferred Skills. - Experience with endpoint protection, SIEM solutions, and log management tools. - Knowledge of compliance standards like ISO 27001, NIST, or GDPR. - Certifications such as CCNA, CCNP, Azure Network Engineer Associate, or equivalent are highly desirable. Skills Cyber security, Information security, Firewall, Arcitc Wolf, siem, azure, cisco, Vulnerability assessment, Vulnerability management, palo alto, juniper, CCNA, CCNP, azure network engineer associate, log management tools Top Skills Details Cyber security,Information security,Firewall,Arcitc Wolf,siem,azure,cisco Additional Skills & Qualifications - Experience with endpoint protection, SIEM solutions, and log management tools. - Knowledge of compliance standards like ISO 27001, NIST, or GDPR. - Certifications such as CCNA, CCNP, Azure Network Engineer Associate, or equivalent are highly desirable. Contract to Hire role (approximate time contracting is 6 months) Experience Level Expert Level Job Type & Location This is a Contract to Hire position based out of Bethpage, NY. Pay and Benefits The pay range for this position is $65.00 - $72.00/hr. Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following: - Medical, dental & vision - Critical Illness, Accident, and Hospital - 401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available - Life Insurance (Voluntary Life & AD&D for the employee and dependents) - Short and long-term disability - Health Spending Account (HSA) - Transportation benefits - Employee Assistance Program - Time Off/Leave (PTO, Vacation or Sick Leave) Workplace Type This is a hybrid position in Bethpage,NY. Application Deadline This position is anticipated to close on Dec 19, 2025. h4>About TEKsystems: We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company. The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law. About TEKsystems and TEKsystems Global Services We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com. The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
    $65-72 hourly 10d ago
  • Cyber Security Analyst - Information Security (Identity and Access Management)

    Northwell Health 4.5company rating

    Cyber security analyst job in Dix Hills, NY

    Document and analyze Identity and Access Management (IAM) processes, procedures, and controls to ensure accuracy, consistency, and alignment with organizational standards. Troubleshoot and resolve identity-related issues identified through reports, alerts, or incident tickets. Create and maintain detailed IAM system and workflow documentation based on business and technical requirements. Collaborate with business stakeholders and IT leadership to design, develop, and enhance IAM operational workflows using existing technologies and services. Develop, execute, and document test cases to validate IAM workflow enhancements and system changes. Build and maintain business-facing reports and dashboards using Power BI, SQL queries, and LDAP queries across targeted identity repositories. Communicate effectively with team members, cross-functional partners, and business units to ensure consistent understanding of IAM processes and initiatives. Support the governance, maintenance, and execution of IAM operational workflows, including responding to and resolving team service requests and incidents. Conduct data analysis to identify, investigate, and remediate user data inconsistencies, anomalies, and policy deviations. Participate in on-call rotation as needed to support critical IAM functions and operational continuity. Highly Preferred Skills: 2-5 years of experience as an IAM Analyst, Business Analyst, or similar technical/functional role. Strong business analysis skills, including requirements gathering, process mapping, and workflow design. Experience writing and executing test cases, test scripts, and test plans. Familiarity with IAM systems and concepts such as identity lifecycle management, authentication, authorization, roles, and entitlements. Experience with IAM tools (e.g., Okta, SailPoint, Azure AD/Entra ID, Duo) is preferred but not required. Working knowledge of SQL, Power BI, or other reporting tools is a plus. Strong documentation skills using MS Word, Excel, Visio, or similar tools. Excellent verbal and written communication skills; able to translate between business and technical language. Detail-oriented, analytical thinker, and effective problem solver. Willingness to participate in testing activities and occasional on-call or after-hours support if needed. Job Description Protects the organization's digital assets from unauthorized access. This includes securing both online and on-premise infrastructures, responding to alerts, mitigating risks before breaches occur and guiding the efforts to contain, triage and recover from cyber incidents when they occur. Job Responsibility Works on moderately complex assignments to protect computer systems, networks, and data from loss and potential service interruptions due to cyber incidents. Analyzes and documents security risks, breaches, and incidents using independent judgment within defined procedures to determine appropriate actions and approaches. Analyzes, reports, and responds to detected cyber incidents. Uses cybersecurity tools to proactively search for and identify threats to systems and networks. Installs and operates security software and measures to protect systems and information infrastructure. Collaborates with the security team and peers to perform tests and find network weaknesses which could lead to a cyber security incident. Makes decisions based on precedent, previous experience and professional guidelines. Researches and recommends cyber security enhancements and tools. Works with management to develop and enhance cyber security best practices. Researches and keeps current on the latest cyber security intelligence technologies, trends, and standards. Trains junior level staff on network and cyber security technologies and procedures. Performs related duties as required. All responsibilities noted here are considered essential functions of the job under the Americans with Disabilities Act. Duties not mentioned here, but considered related are not essential functions. Job Qualification Bachelor's degree in Computer Science, Cyber Security or related field, required. Certifications including but not limited to Security+, CISSP, CISM, CEH, ISSAP, ISSEP, or GSEC, required. 2-4 years of related experience, required. *Additional Salary Detail The salary range and/or hourly rate listed is a good faith determination of potential base compensation that may be offered to a successful applicant for this position at the time of this job advertisement and may be modified in the future.When determining a team member's base salary and/or rate, several factors may be considered as applicable (e.g., location, specialty, service line, years of relevant experience, education, credentials, negotiated contracts, budget and internal equity).
    $90k-131k yearly est. Auto-Apply 9d ago
  • Cyber Defense Forensics Analyst

    EY 4.7company rating

    Cyber security analyst job in Jericho, NY

    At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all. The exceptional EY experience. It's yours to build. EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. Today's world is fuelled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. **The opportunity** Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the technical team responsible for security incident response for EY. The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process. **Your key responsibilities** + Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified + Forensically analyze end user systems and servers found to have possible indicators of compromise + Analysis of artifacts collected during a security incident/forensic analysis + Identify security incidents through 'Hunting' operations within a SIEM and other relevant tools + Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions + Provide consultation and assessment on perceived security threats + Maintain, manage, improve and update security incident process and protocol documentation + Regularly provide reporting and metrics on case work + Resolution of security incidents by identifying root cause and solutions + Analyze findings in investigative matters, and develop fact based reports + Be on-call to deliver global incident response **Skills and attributes for success** + Resolution of security incidents by identifying root cause and solutions + Analyze findings in investigative matters, and develop fact-based reports + Proven integrity and judgment within a professional environment + Ability to appropriately balance work/personal priorities **To qualify for the role you must have** + Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field + 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering; + Understanding of security threats, vulnerabilities, and incident response; + Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis; + Be familiar with legalities surrounding electronic discovery and analysis; + Experience with SIEM technologies (i.e. Splunk); + Deep understanding of both Windows and Unix/Linux based operating systems; **Ideally, you'll also have** + Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH + Background in security incident response in Cloud-based environments, such as Azure + Programming skills in PowerShell, Python and/or C/C++ Understanding of the best security practices for network architecture and server configuration **What we look for** + Demonstrated integrity in a professional environment + Ability to work independently + Have a global mind-set for working with different cultures and backgrounds + Knowledgeable in business industry standard security incident response process, procedures, and life cycle + Excellent teaming skills + Excellent social, communication, and writing skills **What we offer you** The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary range/s. At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more . We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being. **Are you ready to shape your future with confidence? Apply today.** EY accepts applications for this position on an on-going basis. For those living in California, please click here for additional information. EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. **EY | Building a better working world** EY is building a better working world by creating new value for clients, people, society, and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy, and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories. EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law. EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
    $105.2k-186.4k yearly 60d+ ago
  • Senior Cyber Security Engineer

    BIC Corporation 4.8company rating

    Cyber security analyst job in Shelton, CT

    For over 75 years, BIC has been creating ingeniously simple and joyful products that are a part of every heart and home. As a member of our team, you'll be a part of reigniting a beloved brand as we continue to reimagine everyday essentials in new, sustainable and responsible ways. Our "roll up your sleeves and get the job done" approach to work creates an environment where self-starters, problem solvers and innovative thinkers thrive. BIC team members are empowered to take ownership of their careers and bring their unique perspectives to the table to make a meaningful impact on our mission. It's a colorful world - make your mark by joining the BIC team today. As **Senior Cybersecurity Engineer,** you will collaborate and partner with a global, cross-functional team to build cybersecurity capabilities and improve maturity. This role involves designing, implementing, and managing security technology to protect the company from cyber threats. Besides, you will support incident response, investigations, playbook development and efforts to identify and mitigate risk. **In this role you will:** + Analyze, triage, and investigate alerts from various sources to determine the appropriate response or escalation + Document analysis, findings, and actions for case management and metrics + Support security incident response planning, procedure/playbook development and investigations + Participate in on-call rotation for off-hours escalations + Administer, optimize, and maintain the health of security tools, such as endpoint protection and response (EDR), network detection and response (NDR), and logging pipelines (Syslog/Cribl). + Assist with remediation of identified security risks + Minimum 6 years' experience in Information Technology or Cybersecurity + IT or cybersecurity certifications from industry recognized sources preferred **What you bring to BIC:** + Minimum 6 years' experience in Information Technology or Cybersecurity + IT or cybersecurity certifications from industry recognized sources preferred + Prior experience interpreting or analyzing log data and working with log pipelines + Triaging alerts from various sources, following playbooks, and escalating legitimate issues + Knowledge of security tools such as endpoint protection, firewalls, intrusion prevention, SIEM and EDR (CrowdStrike) + Strong understanding of Windows server and desktop operating systems, networking fundamentals, security concepts, Active Directory, Microsoft Azure, Office 365. + In-depth analytical and problem-solving skills to resolve complex issues BIC is an Equal Opportunity Employer. We strongly commit to hiring people with different backgrounds and experiences to help us build better products, make better decisions, and better serve our customers. We do not discriminate based upon race, religion, color, national origin, gender, sexual orientation, veteran status, disability status, or similar characteristics. All employment is decided based on qualifications, merit, and business need. BIC is not seeking assistance or accepting unsolicited resumes from search firms for this employment opportunity. Regardless of past practice, all resumes submitted by search firms to any team member at BIC via email, or directly to a BIC team member in any form without a valid written search agreement in place for that position will be deemed the sole property of BIC, and no fee will be paid in the event the candidate is hired by BIC as a result of the referral or through other means.
    $75k-93k yearly est. 60d+ ago
  • Cyber Security Engineer

    Danbury Hospital 4.7company rating

    Cyber security analyst job in Danbury, CT

    at Nuvance Health The Cyber Security Engineer will have responsibility for incident response along with a desire to relentlessly champion best practices. This role will perform all functions required to support day-to-day data security operations, supporting and maintaining a broad suite of cyber security operations infrastructure, serving as a tier 2 escalation point during incident response and investigations and monitoring compliance with IT security policy. Participate in the planning, design, installation, maintenance and tuning of security operations systems in support of security policies and best practice. Work with Information Technology staff and business units to assess risk and address security issues. Responsibilities: • Manage security responsibilities, including firewalls, proxy systems, SIEM, EDR and other security devices. 15% • Strong skills implementing and tuning security components. 15% • Server as an escalation point during incident response and investigations. 15% • Maintain cyber security operations tool to insure detection, response and remediation of latest security threats 15% • Create and review reports on event and incidents. 10% • Stay up to date with latest security threats and assist with developing defense strategy's to combat them. 10 % • Investigate and respond to security violations 10% • Ability to maintain in depth knowledge of security and networking infrastructure utilized by the company including the management and reporting of each. 10% Education Skills Experience • Bachelor's degree in computer science field required • 2 or more years Security Operations with a minimum of 4 years IT experience. • Demonstrated experience in Incident response investigations. • Working knowledge of EDR technologies. • Working knowledge of SIEM technologies. • Working knowledge of common vulnerability management tools. • Working knowledge of enterprise firewall technologies preferred. • Working knowledge of web filtering and proxies preferred. • Working knowledge of MDM solution preferred. • Experience with DLP and IPS/IDS systems preferred. • Working knowledge of email filtering product preferred. • Working knowledge of litigation hold processing and forensic investigations preferred. • Experience participating in Red/Blue/Purple team exercises. • Experience working with information security practices, networks, software, and hardware. Other Information: • CISSP, CEH, or other equivalent certification is a plus. • Disaster recovery and business continuity experience is a plus. • Working knowledge with HIPAA regulations as they pertain to the healthcare industry. Working Conditions: Manual: Some manual skills/motor coord & finger dexterity Occupational: Little or no potential for occupational risk Physical Effort: Sedentary/light effort. May exert up to 10 lbs. force Physical Environment: Generally pleasant working conditions Company: Nuvance Health Org Unit: 1795 Department: Information Security Exempt: Yes Salary Range: $40.43 - $75.10 Hourly
    $40.4-75.1 hourly Auto-Apply 52d ago
  • Senior Security Ops Analyst - Incident Response

    Spartan Technologies

    Cyber security analyst job in New Hyde Park, NY

    We are seeking a Senior Security DevOps Engineer who will be responsible for a variety of objectives resulting in risk mitigation and remediation of internal & external security threats. This role performs advanced threat analysis, threat intelligence gathering & reporting, incident response activities, improves accuracy of security systems, improves existing processes, and works on Cybersecurity focused projects. Contract to hire Onsite 2 days a week located in New York Cybersecurity - Cyber Intelligence & Incident Response Responds to and remediates email, endpoint, threat intelligence, and network-based threats; provides forensic investigation and support. Provides after-hours support as needed for response activities. Integration experience. Collaborates with cross divisional and Cybersecurity teams to continuously improve security capabilities and response to threats in the most efficient and effective manner. Assists with projects to implement advanced technologies to prevent & identify malicious behavior within cloud environments, networks, endpoints, and email technologies. Operates products such as SIEM, SOAR, threat intelligence platforms, advanced email protection, EDR, cloud security products, IDS/IPS, Zero Trust tooling, and other security technologies. Scripting experience. Implements and performs threat analysis utilizing industry standard frameworks (kill chain/diamond model) and techniques. Proposes and helps review security plans and policies to improve environmental security. Maintains and produces metrics, operational playbooks, process diagrams and documentation for the Cybersecurity program. AWS and/or Azure knowledge. Produces and distributes operational and tactical threat intelligence reports. Other duties may be assigned as needed to address new security threats facing the enterprise. Ability to: Demonstrate great teamwork and partnership with internal teams for resolution of security-based issues. Python programming tasks and understand of programming in general. Perform security event correlation, triage, and analysis. Apply security Threat Intelligence while responding to and investigating security events or Incidents. Identify when an application, network, system, or user has been compromised by an internal or external threat. Work on multiple projects to improve security capabilities. Exercise strong understanding of defense-in-depth security best practices. Apply security engineering and architecture concepts to best understand how to employ the most effective security monitoring, response, and threat reporting. Demonstrate effective communication of security issues and topics to management and others. Work well under pressure and within a high paced environment. Maintain operational guidelines and standards for Cybersecurity.
    $95k-130k yearly est. 60d+ ago
  • Workday Application Security Analyst

    Us Tech Solutions 4.4company rating

    Cyber security analyst job in White Plains, NY

    **Duration: 12 months contract (with possible extension)** ***Note: Open to candidates who are willing to relocate at their own expense.** + The Workday Application Security Analyst is responsible for ensuring the confidentiality, integrity, and availability of data within the Workday system. + They design, implement, and maintain security configurations, including roles, permissions, and access controls, to protect organizational data and comply with company policies, industry standards, and regulatory requirements. **Job Functions & Responsibilities** + Develop and implement security roles, domain security policies, data and business process security within Workday + Ensure secure integration with other on‐premise and cloud applications like GRC tools + Configure and manage access permissions to ensure users have the appropriate level of access to data and functionality + Ensure compliance with company policies, industry standards (like SOC 2), and regulatory requirements (like GDPR) + Conduct regular security audits and assessments to identify vulnerabilities and areas for improvement + Assist in investigating and responding to security incidents, identifying root causes, and implementing preventive measures + Collaborate with IT, HR, and other stakeholders to align security efforts with business needs and ensure effective communication of security policies and procedures + Create and maintain documentation for security policies, procedures, and configurations, and provide training to users on security best practices + Stay abreast of Workday updates, industry trends, and emerging security threats to continuously improve security configurations and processes + Familiarity with other ERPs like SAP is preferred + Familiarity with GRC and Workday SoD (Segregation of Duties) management is desired **Skills** + SAP ERP (S/4 HANA is a plus) + Workday + Active Directory group management + GRC AC 10.1 and above + Microsoft Clienture + SuccessFactors + Applicable functional knowledge for SAP security areas like Finance, MM, ISU billing, etc. + SAP audit & compliance **Education & Certifications** + Bachelor's degree in engineering, IT, or related field + 7-10 years of hands‐on industry experience in Workday Security implementation and administration + Strong ITGC compliance knowledge for Workday + Familiarity with Workday risk management and GRC integration + Ability to identify, analyze, and resolve complex security and compliance issues + Strong interpersonal and communication skills, with the ability to effectively collaborate with diverse teams ** About US Tech Solutions:** US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit *********************** (*********************************** . US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
    $77k-108k yearly est. 60d+ ago
  • Information Security Engineer Cmdb

    Montefiore 4.5company rating

    Cyber security analyst job in Yonkers, NY

    Montefiore is ranked among the top hospitals nationally and regionally by U.S. News & World Report. For more than 100 years we have been innovating new treatments, procedures, and approaches to patient care, producing stellar outcomes and raising the bar for academic medical centers in the region and around the world. Our work to improve health outcomes in underserved communities is unparalleled in the United States. Our workforce is among the most diverse in the US: Montefiore associates speak 60+ languages. This is a hybrid position requiring being on-site as needed. ________________________________________ We are seeking a skilled and detail-oriented CMDB Engineer to join our IT team. This role will be responsible for developing, managing, and optimizing our ServiceNow Configuration Management Database (CMDB), supporting Discovery, service graph connectors, third-party data integrations, and IRE configuration. This role is critical to ensuring visibility, accuracy, and reliability of Configuration Items (CIs) throughout their lifecycle using the ServiceNow platform. ________________________________________ Responsibilities include: • Manage and enhance the ServiceNow CMDB, ensuring accuracy, completeness, and alignment with ITIL standards. • Configure and extend ServiceNow Patterns to improve data ingestion and normalization. • Deep knowledge of how to troubleshoot ServiceNow Discovery-related issues. • Maintain and enhance the ServiceNow CMDB following the Common Service Data Model (CSDM) framework. • Collaborate with infrastructure, network, and application teams to ensure proper CI identification and relationships. • Manage integration with other technologies (e.g., SCCM, vCenter, SolarWinds, etc.) feeding the CMDB. • Create and maintain CMDB documentation, architecture diagrams, and training materials. • Manage and maintain the Identification and Reconciliation Engine (IRE) rules. • Monitor and improve the CMDB Health Dashboard, ensuring ongoing health and governance of the “3 C's” - Completeness, Correctness, and Compliance. • Audit and validate CI data regularly to ensure appropriate CI class assignments, relationships, and attributes. • Oversee and optimize MID server health and ensure discovery schedules are accurate and up to date by liaising with the Network team. • Support audits, compliance, and risk initiatives by ensuring the integrity and traceability of CMDB data. Requirements include: • 7+ years of experience in an enterprise IT organization • Minimum of 3-5 years of hands-on experience with ServiceNow CMDB and Discovery • ServiceNow Certified System Administrator (CSA) certification is required to be eligible for this role. • Strong knowledge and practical experience with ServiceNow CSDM framework and the IRE configuration. • Experience with CI data normalization, reconciliation, and health reporting • Experience with third-party integrations like AWS, SCCM and JAMF • Proficiency in CMDB data modeling, CI class categorization, and relationship mapping. • Strong analytical and troubleshooting skills to manage data quality and Discovery issues. • Experience configuring and maintaining MID Servers and Discovery Schedules. • Bachelor's degree or equivalent experience. Preferred: • Other ServiceNow certifications such as Certified Implementation Specialist - CMDB, Discovery Fundamentals, is a plus. Department: Montefiore Information Technology Bargaining Unit: Non Union Campus: YONKERS Employment Status: Regular Full-Time Address: 3 Odell Plaza, Yonkers Shift: Day Scheduled Hours: 8:30 AM-5 PM Req ID: 224883 Salary Range/Pay Rate: $112,500.00 - $150,000.00 For positions that have only a rate listed, the displayed rate is the hiring rate but could be subject to change based on shift differential, experience, education or other relevant factors. To learn more about the “Montefiore Difference” - who we are at Montefiore and all that we have to offer our associates, please click here. Montefiore is an equal employment opportunity employer. Montefiore will recruit, hire, train, transfer, promote, layoff and discharge associates in all job classifications without regard to their race, color, religion, creed, national origin, alienage or citizenship status, age, gender, actual or presumed disability, history of disability, sexual orientation, gender identity, gender expression, genetic predisposition or carrier status, pregnancy, military status, marital status, or partnership status, or any other characteristic protected by law. SF-DICE-MIT; LI-SC1-REDIRECT
    $112.5k-150k yearly 60d+ ago
  • Cloud Security Engineer

    UL, LLC 4.2company rating

    Cyber security analyst job in Melville, NY

    This role is Hybrid, 3 days a week to any local, US based UL Solutions Office. We are seeking a highly skilled Cloud Security Engineer with strong Application Security expertise to join our security architecture team. This role will be responsible for designing, implementing, and maintaining secure cloud environments and applications across multi-cloud platforms, with a focus on Azure. The ideal candidate will have hands-on experience with cloud-native security tools, DevSecOps practices, and compliance frameworks such as NIST 800-53, SOC 2, and CIS Controls. Cloud Security Engineering + Design and implement security controls for cloud infrastructure (Azure, AWS, GCP). + Develop and maintain security architecture patterns (e.g., hub-and-spoke, Zero Trust). + Integrate security tools such as Wiz, Microsoft Defender for Cloud, Silverfort, and Terraform. + Conduct threat modeling and risk assessments for cloud-native services. + Collaborate with IAM, SOC, and GRC teams to align cloud security with enterprise policies. Application Security + Perform secure code reviews, static/dynamic analysis, and vulnerability assessments. + Integrate security into CI/CD pipelines using tools like Snyk, Checkmarx, or Veracode. + Guide development teams on secure coding practices and OWASP Top 10. + Design and implement API security strategies including OAuth2, OpenID Connect, and mTLS. + Support remediation of application vulnerabilities and provide technical guidance. Compliance & Governance + Map cloud and application security controls to compliance frameworks (NIST 800-53, SOC 2, CIS). + Assist in audits and evidence collection for regulatory compliance. + Maintain documentation of security architecture, policies, and procedures. + Bachelor's degree in Computer Science, Cybersecurity, or related field. + 3-4 years of experience in cloud security engineering and application security. + Strong understanding of Azure security services and architecture. + Experience with infrastructure-as-code (Terraform, Bicep). + Familiarity with Snowflake security features and data protection strategies. + Knowledge of identity and access management (Azure AD, Conditional Access, MFA). + Hands-on experience with DevSecOps tools and practices. Preferred Qualifications + Certifications: Azure Security Engineer Associate, CISSP, CCSP, OSCP, or GIAC. + Experience with multi-subscription Azure environments. + Familiarity with Zero Trust architecture and implementation. + Experience with security automation and orchestration. Soft Skills + Strong analytical and problem-solving skills. + Excellent communication and collaboration abilities. + Ability to work independently and in cross-functional teams. + Passion for continuous learning and staying current with security trends. What you'll experience working for ULS UL Solutions has been pioneering change since 1894 and we're still leading the way. From day one, we've blazed a trail protecting the planet and everyone on it. Our teams have influenced billions of products, plus services, software offerings and more. We break things, burn things and blow things up. All in the name of safety science. That's where you come in - because none of it could happen without you. It takes passion to protect people, problem-solving to safeguard personal data and conviction to make the world a more sustainable place. It takes bold ideas and brilliant minds to build a better world for future generations across the globe. This is more than a job. It's a calling. A passion to use our expertise and play our part in creating a more secure, sustainable world today - and tomorrow. As a member of our safety science community, you'll use your ideas, your energy and your ambition to innovate, challenge and ultimately, help create a safer world. Everyone here is unique. But we're also a global community, working together to help create a safer world. Join UL Solutions and you can connect with the brightest minds in the business, all bringing their distinct perspectives and diverse backgrounds together to deliver real change. Empowering our customers to keep the world safe means thinking ahead. It means investing in training and empowering our people to learn and innovate. At UL Solutions, we help build a better future - one where everyone benefits. Join UL Solutions to be at the center of safety. To learn more about us and the work we do, visit UL.com Total Rewards: We understand compensation is an important factor as you consider the next step in your career. The estimated salary range for this position is $95,000 to $120,000 and is based on multiple factors, including job-related knowledge/skills, experience, geographical location, as well as other factors. This position is eligible for annual bonus compensation with a target payout of 10% of the base salary. This position also provides health benefits such as medical, dental and vision; wellness benefits such as mental and financial health; and retirement savings (401K) commensurate with the standard rewards offered in each individual location or country. We also provide full-time employees with paid time off including vacation (15 days), holiday including floating holidays (12 days) and sick time off (72 hours). #LI-SG2 #LI-Hybrid UL LLC has been and will continue to be an equal opportunity employer. To assure full implementation of this equal employment policy, we will take steps to assure that: Persons are recruited, hired, assigned and promoted without regard to race, color, age, sex or gender, sexual orientation, gender identity, gender expression, transgender status, religion, creed, national origin, ethnicity, citizenship, ancestry, disability, genetic information, military or veteran status, pregnancy, marital or familial status, or any other protected category under applicable law.
    $95k-120k yearly 46d ago
  • Security Analyst - Identity and Access Management

    Emcor Group 4.7company rating

    Cyber security analyst job in Norwalk, CT

    **About Us** EMCOR Construction Services, Inc. (ECS) is a division of EMCOR Group, Inc. ECS focuses on three core competencies: electrical construction, mechanical construction, and fire protection. Our nationwide group of mechanical and electrical companies have decades of experience in virtually all U.S. markets. **Job Summary** **About Us:** EMCOR Group, Inc. (NYSE: EME) is a Fortune 500 company and a leader in mechanical and electrical construction, industrial and energy infrastructure, and building services. A provider of critical infrastructure systems. EMCOR gives life to new structures and sustains life in existing ones by it planning, installing, operating, maintaining, and protecting the sophisticated and dynamic systems that create facility environments. This includes electrical, mechanical, lighting, air conditioning, heating, security, fire protection, and power generation systems--in virtually every sector of the economy and for a diverse range of businesses, organizations and government. EMCOR represents a rare combination of broad reach with local execution, combining the strength of an industry leader with the knowledge and care of 170 locations. **Job Title:** -- Security Analyst - Identity and Access Management **Job Summary:** -- The Security Analyst for Identity and Access Management (IAM) is responsible for supporting EMCOR's Security Program with a focus on identity systems, single sign-on (SSO), and user lifecycle management. This role also plays a key part in administering Microsoft Sentinel and Defender, using Kusto Query Language (KQL) to enhance threat detection, automate response, and strengthen the organization's overall security posture. **Essential Duties and Responsibilities:** -- + Support and monitor the enterprise information security system as directed by management. + Manage daily operations and support for IAM products, including incident and ticket resolution. + Administer Entra ID, with expertise in SSO, Conditional Access, and modern authentication methods. + Deploy and maintain IAM systems for user life-cycle, access governance, and PAM. + Investigate and resolve IAM security incidents using established tools and procedures. + Provide expertise during incidents, document findings, and help improve protocols. + Help design, implement, and maintain Microsoft Sentinel and Defender security monitoring, including custom KQL queries and automation. + Collaborate with security and IT teams to enhance IAM maturity and awareness. + Maintain and upgrade servers and applications supporting security tools. + Monitor emerging threats and advise stakeholders on responses. + Perform special projects as needed. **Qualifications:** -- + A minimum of five years' experience with Microsoft Active Directory, preferably within a multi-domain environment. + At least three years' experience working with Microsoft Entra ID. + A minimum of two years' experience utilizing the Microsoft Defender Platform and/or Microsoft Sentinel. + At least one year's experience with Privileged Access Management systems. + Demonstrated proficiency in using PowerShell for administration and automation purposes. + Practical experience and/or comprehensive understanding of one or more of the following technologies: MFA, SSO, SAML, OAuth, OpenID, SCIM, and REST API. + Proven ability to communicate effectively and interact professionally with personnel at all organizational levels. + Strong project management capabilities. + Ability to consistently deliver an exceptional standard of customer service. Notice to prospective employees: There have been fraudulent postings and emails regarding job openings. EMCOR Group and its companieslist open positions here (****************************************************************************************************** DateDesc&w=&wc=&we=&wpst=) . Please check our available positions to confirm that a post or email is genuine. EMCOR Group and its companies do not reach out to individuals to help with marketing or other similar services. If an individual is contacted for services outside of EMCOR's normal application process - it is probably fraudulent. **As a leading provider of mechanical and electrical construction, facilities services, and energy infrastructure, we** **offer employees a competitive salary and benefits package and we are always looking for individuals with the talent and skills required to contribute to our continued growth and success. Equal Opportunity Employer/Veterans/Disabled** **Benefits: We are** **committed to providing employees a comprehensive benefits package which includes medical, dental, and vision coverage, along with health savings and flexible spending accounts, life insurance, disability, a 401(k) Savings Plan, College Coach and employee assistance program.** **\#emcor** **\#LI-MJ1** **Equal Opportunity Employer** As a leading provider of mechanical and electrical construction, facilities services, and energy infrastructure, we offer employees a competitive salary and benefits package and we are always looking for individuals with the talent and skills required to contribute to our continued growth and success. Equal Opportunity Employer/Veterans/Disabled **Notice to Prospective Employees** Notice to prospective employees: There have been fraudulent postings and emails regarding job openings. EMCOR Group and its companieslist open positions here (************************************** . Please check our available positions to confirm that a post or email is genuine. EMCOR Group and its companies do not reach out to individuals to help with marketing or other similar services. If an individual is contacted for services outside of EMCOR's normal application process - it is probably fraudulent. Email a Friend Email a Friend **ID** _2025-2663_ **Company** _EMCOR Construction Services, Inc._ **Category** _Information Technology_ **Position Type** _Full-Time_ **Posted Date** _2 months ago_ _(10/14/2025 1:00 PM)_
    $74k-94k yearly est. 60d+ ago
  • Cyber Palo Alto Networks Security Operations Senior Consultant

    Deloitte 4.7company rating

    Cyber security analyst job in Stamford, CT

    Cyber Palo Alto Networks Security Operations Senior Consultant Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success. Recruiting for this role ends on 12/31/25 The team Our Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions. Work You'll Do * Lead the design and deployment of Next-Generation SOC platforms, like Cortex XSIAM, including advanced detection rules and SOAR playbooks, and SIEM ingestion. * Integrate diverse log and telemetry sources, ensuring data quality and normalization. * Develop and optimize automated response workflows for incident containment and remediation. * Advise clients on advanced use cases, threat detection, and automation strategies. * Collaborate with cross-functional teams for solution enhancements and threat intelligence integration. * Present technical findings and recommendations to stakeholders. Required Qualifications * BA/BS degree in a technical field (e.g., Computer Science, Cyber Security) * 4-6 years of progressively responsible experience in cloud, network, or identity security domains, demonstrating increasing levels of responsibility, technical depth, and leadership over time * 3-4 years of experience with Security Operations tools and platforms including Cortex XSIAM, Cortex XDR, Splunk, or similar SIEM technologies * 3-4 years of Security Operations Center experience demonstrating expertise in detection engineering, automation and playbook development, or SOC maturity methodologies * 3-4 years of experience with one or more cloud service providers (AWS, GCP, Azure) and native security tools * 3-4 years of experience with management of log sources, data normalization, ingestion and manipulation of data * 3-4 years of experience working with detection and response platforms (EDR) like Microsoft Defender, Cortex XDR, CrowdStrike * 3-4 years of experience with governance, risk, or compliance initiatives involving common frameworks * Certifications including Palo Alto Networks' PCNSE or Certified Cybersecurity Associate or equivalent and/or similar cybersecurity certifications * Ability to travel up to 50%, on average, based on the work you perform and the clients and industries/sectors you serve. * Limited immigration sponsorship may be available Preferred Qualifications * Experience with Palo Alto Networks' platform of solutions including, but not limited to, next-generation firewalls, Cortex & Prisma Cloud, and Prisma Access, XDR, etc. * Strong understanding of vendor competitive analysis within Security Operations (e.g., competitive differences between competing SIEM solutions) * Proficiency with advanced scripting, playbook development within a SIEM, SOAR or Security platform * Basic proficiency with network routing protocols (e.g., BGP, ECMP) and network architecture concepts (e.g., network segmentation), in support of on-premise and secure cloud infrastructure use cases * Ability to communicate and advise on solution design based on client use-cases, requirements, or other success criteria * Previous consulting or "Big 4" experience * Relevant advanced cybersecurity or related network engineering certifications (e.g., CISSP, CEH, CCSP) Information for applicants with a need for accommodation: ************************************************************************************************************ The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500 - $188,900. You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Benefits At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Our purpose Deloitte's purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Learn more. Professional development From entry-level employees to senior leaders, we believe there's always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career. As used in this posting, "Deloitte" means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see ************************* for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law. Qualified applicants with criminal histories, including arrest or conviction records, will be considered for employment in accordance with the requirements of applicable state and local laws, including the Los Angeles County Fair Chance Ordinance for Employers, City of Los Angeles's Fair Chance Initiative for Hiring Ordinance, San Francisco Fair Chance Ordinance, and the California Fair Chance Act. See notices of various fair chance hiring and ban-the-box laws where available. Fair Chance Hiring and Ban-the-Box Notices | Deloitte US Careers Requisition code: 314097 Job ID 314097
    $102.5k-188.9k yearly 17d ago
  • Email Security Engineer

    IBM 4.7company rating

    Cyber security analyst job in Armonk, NY

    **Introduction** The CISO Cybersecurity Operations Platform (CSOP) team is looking to add an engineer to the Analytics and Data Exploitation team. The Platform provides the technology, services and expertise required by IBM's Cyber Threat Detection and Response teams. We support the Advanced Threat Detection (threat hunting, intelligence, incident response), Vulnerability Detection and Response, Innovation and Remediation, Security Operations Centers and Command Centers teams to deliver enterprise-wide security to one of the world's most established technology companies. We process tens of billions of events per day, meaning effective analysis and data exploitation practices are critical to our success. This is a technical position within the Analytics and Data Exploitation team who employ commercial, open source and in-house developed tools to deliver critical cybersecurity services such as event processing, automation, complex analytics and support to digital investigations. This role operates across our development, test, pre-production and production networks to create, maintain and improve our services -an important component of which is fault-finding and the ability to work within complex, dynamic environments. The right candidate thrives in high-pressure situations and has practical experience working with Big Data technologies -such as Spark, Hadoop and Elasticsearch. The role requires a proven, practical knowledge of container orchestration technologies -specifically Kubernetes and RedHat OpenShift. The work will include the design and optimization of container-deployed systems, as well as the day-to-day engineering and administration of the orchestration environment. This includes cluster management, Pod assignment / configuration, application virtual routing, security, container image registry management and optimization of the runtime engines. Wider knowledge of data ingestion, extraction, transformation and loading technologies is important - including Streamsets and Flink. The role is rounded-out by some software development tasks - all related to cyber security. These will involve Java, SQL, Python and automation scripting so experience with DevSecOps methods is highly advantageous. The Platform team employs hybrid cloud hosting and this includes provisioning, administration and management of services within environments spanning IBM Cloud, Amazon Web Services and Microsoft Azure. About the Team The CISO Cybersecurity Operations Platform (CSOP) team is looking to add an Email Security Engineer to the team. The CSOP provides the technology, services and expertise required by IBM's Cyber Threat Detection and Response teams. We support the Advanced Threat Detection (threat hunting, intelligence, incident response), Vulnerability Detection and Response, Remediation, Security Operations Center and Command Center teams to deliver enterprise-wide security to one of the world's most established technology companies. **Your role and responsibilities** Job Duties: · Contribute to the day-to-day work that supports our critical cybersecurity analysis and data processing workflows · Protect organization against phishing, spoofing, malware, and advanced threats while maintaining user experience and compliance · Familiarity with Exchange, ProofPoint Email Solutions, Powershell, Azure, and M365 suite · Design, implement and maintain secure email solutions within the Microsoft 365 tenant and related servces · Moniotr and respond to email-related security incidents, phishing attempts, and compromise events · Support the team leadership to improve overall exploitation of technologies that best serve our requirements · Partner with CIO and CISO teams to develop email security policies, rules, and playbooks - Work as part of a deeply technical, passionate team of engineers to tackle significant IT challenges **Required technical and professional expertise** · 3 or more years' experience in an email security engineer or similar role · Experience with Microsoft 365 Exchange or Proofpoint email solutions · Hands on experience with SPF, DKIM, and DMARC configuration and rollout at an enterprise level · Experience with (or a proven aptitude for) working within a fast-paced environment where the success criteria are defined by external factors. This includes having to change course quickly, based on the evolving needs of a complex and dynamic environment · Strong experience with incident response processes for phishing and email-based threats · Experience with IBM Cloud, AWS, Azure or similar cloud environments · Strong understanding of email protocols ISMPT, IMAP, POP3) and security controls · Familiarity with SIEM tools for monitoring and automation on email threats · Excellent problem-solving, communication, and documentation skills **Preferred technical and professional experience** · Experience with secure email gateways (Proofpoint, M365, etc) · Microsoft certification · Knowledge of zero trust frameworks and modern authentication methods (MFA, conditional access) · Familiarity with cloud-native security tools (Sentinel, Defender, XDR) · Understanding of email encryption solutions (TLS, S/MIME, PGP) · Experience in large enterprise environments with hybrid Microsoft Exchange deployments · Ansible experience is a strong advantage IBM is committed to creating a diverse environment and is proud to be an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, caste, genetics, pregnancy, disability, neurodivergence, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
    $84k-111k yearly est. 60d+ ago
  • Information Security Risk Analyst

    Technipower 3.1company rating

    Cyber security analyst job in Setauket-East Setauket, NY

    I have a client located in the East Setauket, NY area that has an opportunity for a Information Security Risk Analyst. If you or any of your colleagues are interested in discussing this opportunity please click Apply Now. In this role you will be an Information Security Risk Analyst for a client that works in the medical industry. This role is responsible for monitoring, determining, and reviewing potential and current information security risks. This is a 3 month and possibly longer contract. This role must be performed on-site. The pay on this role is $30.00 to $40.00 an hour based on experience. Job Requirements: 3+ years of experience with O365 and Purview platforms Experience reviewing daily Risky Users Ability to communicate with internal users to evaluate high risk access Ability to monitor the company's networks and identify security breaches Perform 3rd party security reviews using UpGuard TPRM tool Monitor DoJ DSP attestations and manage vendor communication and certs Help assist in creating IS runbook Document security processes Analyze Business Associate Agreements and provide recommendations on security & Liability Support Audit responses and investigations #VIS
    $30-40 hourly 60d+ ago
  • Firewall Security Engineer

    Comprehensive Resources

    Cyber security analyst job in Stamford, CT

    Duration: 6+ Months Experienced Firewall administrator for operational implementation, maintenance and configuration of firewalls. Key Responsibilities: Performs maintenance and changes in firewalls as required. Implementation of new firewalls as required Assists with troubleshooting network connectivity as it relates to firewalls Utilizes change management, request, and ticketing systems, documents status updates and problem resolutions Complete All assignments in a timely manner with an acceptable level of quality Maintains documentation related to work area Completes network change requests Follows documented processes, procedures and policies Performs customer service duties and responds to customer and project requests as defined by management Other related duties assigned as needed. Qualifications/Requirements: Bachelor's degree and with 3 to 4 years of operational experience administering Firewalls 4 or more years networking/firewall background Must have networking TCP/IP routing protocol experience Desired Characteristics: In-depth experience in security aspects of multiple platforms, operating systems, software, communications and network protocols is desired Competency in verbal, written, and presentation communications and interpersonal understanding Ability to understand customer's business needs. Leadership of work teams/groups Ability to work with all levels of employees Highly motivated and able to work effectively under minimal supervision in a fast-paced environment Team-oriented, placing priority on quality and the successful completion of team goals Organization and planning skills that include: time management, project coordination and management, and the ability to handle multiple deadlines and associated pressures. Competency in developing effective solutions to business problems Ability to analyze problems and to make decisions REQUIRED SKILLS YEARS OF EXPERIENCE WHEN THE SKILL WAS LAST USED Expert knowledge of Cisco Security products, ASA and Firepower Expert knowledge of NSX Expert knowledge of Palo Alto systems Security Certifications a Plus Must have networking TCP/IP routing protocol experience Networking/firewall background Operational experience administering Firewalls Additional Information All your information will be kept confidential according to EEO guidelines.
    $83k-114k yearly est. 15h ago
  • Data Security Engineer

    Cloud Peritus

    Cyber security analyst job in Stamford, CT

    What you'll do • Design and implement comprehensive data security architectures, with particular focus on database platforms (primarily SQL Server) • Develop and maintain enterprise-wide encryption strategies for securing structured and unstructured data both in transit and at rest, both and both on-premise and in the cloud • Enhance logging, monitoring and SecOps capabilities of enterprise databases and other data stores • Configure and optimize Identity and Access Management (IAM) solutions across data platforms and repositories to align to least privilege principles • Implement Data Loss Prevention (DLP) strategies and controls • Implement and maintain Information Rights Management (IRM) and Digital Rights Management (DRM) solutions • Design and implement data tokenization strategies where appropriate • Secure data processing pipelines and ensure appropriate controls for data workflows • Create and maintain data security documentation, including policies, procedures, and standards • Collaborate with development teams to ensure security best practices in data handling • Conduct vulnerability assessments of the firm's database architecture and associated data storage and processing systems • Assist in monitoring and managing security patching and upgrade processes for database platforms What's required • Bachelor's degree in computer science, cybersecurity, or related technical field • 6+ years of experience in data/database security engineering and governance • Deep expertise in database security, particularly SQL Server • Comprehensive understanding of data warehouse/data lake architectures and tools, particularly Databricks (required) • Subject matter expertise in Object Storage (eg: S3, Azure Blob, etc) and related security • Understanding of Active Directory Delegation (constrained vs. unconstrained) and associated best practices • Experience with 3rd-party SQL Server security governance and monitoring products (eg: Idera, Solarwinds) • Extensive knowledge of encryption technologies for both structured and unstructured data • Broad knowledge of secure data/file sharing solutions and ETL workflows • Experience designing and implementing data tokenization solutions • Experience with data classification and DLP technologies • Scripting/automation capabilities (eg: SQL, PowerShell, Python) • Commitment to the highest ethical standards Qualifications Ivy league colleges education preferred or huge plus. Additional Information All your information will be kept confidential according to EEO guidelines.
    $83k-114k yearly est. 15h ago
  • Information Security Analyst

    Crestron 4.8company rating

    Cyber security analyst job in Rockleigh, NJ

    The Information Security Analyst plays a key role in advancing the company's Governance, Risk & Compliance (GRC) program by protecting enterprise information assets and ensuring compliance with regulatory, contractual, and ethical standards. This position offers hands-on experience across multiple security domains including policy governance, risk management, AI governance, and data security, making it an excellent opportunity for early career professionals or recent graduates passionate about cybersecurity and emerging technology risks. In this role, you will collaborate with teams across Information Security, IT, and Legal to drive initiatives that safeguard sensitive data, maintain compliance obligations, and promote responsible use of artificial intelligence and other advanced technologies. Responsibilities Governance & Policy Management Assist in developing, maintaining, and aligning information security policies with frameworks such as NIST CSF, ISO 27001, SOC 2, CIS, and the NIST AI RMF. Contribute to documentation and control mapping for new or updated regulations related to AI, privacy, and data protection (e.g., GDPR, CCPA, NIST 800-53 Rev 5). Support internal policy review cycles, ensuring consistent version control and executive approval. Risk Management Participate in enterprise risk assessments, including third-party, application, and AI model risk reviews. Help identify, document, and track remediation of security and privacy risks within the GRC platform (e.g., Drata, ServiceNow GRC, OneTrust, Vanta, etc.). Support the development of risk metrics and dashboards for leadership reporting. Learn to evaluate AI-related risks such as model bias, data leakage, data lineage, model transparency, and unintended data exposure. Data Governance & Data Security Assist with data classification, retention, and handling standards, ensuring sensitive data is appropriately protected. Support data inventory and mapping efforts to improve visibility where critical data resides. Help review access controls, encryption standards, and secure data transfer processes in coordination with IT teams. Collaborate with the IT team to ensure alignment between data quality, privacy, and security controls. Compliance & Audit Support Gather and organize evidence for internal and external audits (ISO 27001, PCI, HIPAA, etc.). Maintain control documentation and track audit remediation activities. Support continuous monitoring of compliance requirements and updates to regulatory obligations, including emerging AI governance and data-related laws. AI Governance Support Contribute to inventories of AI tools and use cases across the enterprise. Assist in risk assessments for AI systems, ensuring they align with responsible AI principles such as fairness, accountability, and transparency. Collaborate with IT and legal teams to ensure that AI use complies with company policies. Security Awareness & Communication Help design and distribute training materials related to cybersecurity, data protection, and responsible AI practices. Support internal campaigns promoting secure data handling and ethical technology usage. Prepare metrics, dashboards, and presentations for leadership briefings. Continuous Improvement Participate in projects that automate or streamline GRC processes, such as policy lifecycle management or risk scoring. Stay informed about new threats, regulatory trends, and AI governance frameworks. Engage in ongoing professional development and certification opportunities. Qualifications Bachelor's degree in Cybersecurity, Computer Science, Information Systems, Data Science, or a related field is preferred 0-2 years of experience in cybersecurity, risk management, compliance, or data governance (internship or coursework acceptable). Understanding of cybersecurity principles, risk management, and data privacy fundamentals. Basic familiarity with AI systems, data governance concepts, or information security practices. Strong analytical, communication, and documentation skills. Ability to manage multiple priorities in a fast-paced environment. Proficient in Microsoft Excel, PowerPoint, and data analysis or GRC tools. Exposure to frameworks such as NIST CSF, ISO 27001, SOC 2, NIST AI RMF, or COBIT. Must be able to work in the U.S. without sponsorship Per applicable state requirements, the annual pay range for this position ($60,500 - $84,000) which consists of base salary (subject to performance), reflects the hiring range for candidates. Also note, an individual's offer may vary from this range as it may be impacted by additional factors, including but not limited to the candidate's hiring location, qualifications, experience, and market factors.
    $60.5k-84k yearly 18d ago
  • Senior Information Security Analyst (NOT Remote)

    Saint Francis Health System 4.8company rating

    Cyber security analyst job in New Haven, CT

    Current Saint Francis Employees - Please click HERE to login and apply. Full Time Days PLEASE NOTE: Due to the nature of this role, candidates must be either local to the area or willing to relocate, as this position requires full-time onsite presence. Job Summary: As a member of the Information Security team, responsibilities include manages and mitigates information security risk by identifying, evaluating, assessing, designing, monitoring, administering, reporting and implementing systems, policies and processes. Provides information security risk insight and guides management on information security risk issues and serves as advisor to peers, team members and management. Minimum Education: Bachelor's degree in Computer Science, MIS, Computer Engineering, Cyber Security or related discipline. Licensure, Registration and/or Certification: None. One or more of the following certifications are preferred: Certified Information Systems Security Professional (CISSP), or Certified in Risk and Information Systems Control (CRISC) or Certified Information Systems Auditor (CISA). Work Experience: 3 - 4 years related experience inclusive of two years working directly in an Information Services department and previous experience with HIPAA/PHI compliance programs, policies, procedures, risk assessments and audits. Knowledge, Skills and Abilities: In-depth knowledge of cyber security methodology and security practices. Knowledge of HIPAA, PCI, SOX, ISO and NIST cybersecurity frameworks. Knowledge of intrusion detection and intrusion prevention systems, penetration and vulnerability testing. Knowledge of data loss prevention, anti-virus and anti-malware software tools. Knowledge of computer networking, TCP/IP, routing and switching, network protocols and packet analysis tools. Knowledge of Windows, UNIX and Linux operating systems. Excellent problem solving and analytical skills. Excellent written and oral communication skills. Excellent organizational and interpersonal skills. Ability to work independently as well as in a team setting. Essential Functions and Responsibilities: Define, implement, and enforce information security policies, strategies, and procedures that align with healthcare laws and regulations, such as HIPAA. Conduct and/or support targeted risk assessment. Determine significant risk points and exercise process for risk assessment and risk acceptance. Review assessment results for vulnerabilities, gaps, control deficiencies, and work with key stakeholders to establish plans for sustainable resolution. Maintain an effective information security awareness program and educate internal teams on best practices. Ensures that business and clinical software applications include adequate information and security controls. Establish and maintain metrics based on the information security framework used at SFHS. Decision Making: Independent judgment in making decisions from many diversified alternatives that are subject to general review in final stages only. Working Relationships: Works directly with patients and/or customers. Works with internal customers via telephone or face to face interaction. Works with external customers via telephone or face to face interaction. Works with other healthcare professionals and staff. Works frequently with individuals at Director level or above. Special Job Dimensions: None. Supplemental Information: This document generally describes the essential functions of the job and the physical demands required to perform the job. This compilation of essential functions and physical demands is not all inclusive nor does it prohibit the assignment of additional duties. Information Technology - Information Security - Yale Campus Location: Tulsa, Oklahoma 74136 EOE Protected Veterans/Disability
    $82k-110k yearly est. Auto-Apply 46d ago
  • Cyber Security Engineer Lead - Kings Point, NY - Public Trust Needed

    SOC Support Services 4.7company rating

    Cyber security analyst job in Kings Point, NY

    Cyber Security Technical Lead needed for a Contract to hire opportunity with SOC's client to work onsite in Kings Point, NY * Candidates must be a U.S. citizen or green card holder who has resided in the U.S. for at least 3 years and have the ability to obtain a Public Trust Clearance. This role is responsible for leading, designing, implementing, and maintaining the Academy's cybersecurity governance, compliance programs, and overall security posture. They ensure the security, availability, and integrity of mission-critical systems that support enterprise operations and federal requirements. This role also prioritizes ongoing RMF/ATO documentation, Zero Trust initiatives, vulnerability management, and cybersecurity risk mitigation across the organization. Lastly, it ensures the stability, compliance, readiness, and resilience of all security controls that safeguard Academy systems, data, and users. and Duties: * Ensure compliance with NIST CSF and RMF to maintain accreditation and protect system confidentiality, integrity, and availability * Provide strategic and tactical security guidance, recommending technical and administrative controls * Direct and mature the Incident Response Program, including triage, escalation, documentation, and after-action improvements * Administer enterprise security policies, maintain SOPs/checklists, and drive continuous monitoring and process enhancements * Lead threat and vulnerability management: scanning, pen-test coordination, risk scoring, and remediation tracking * Conduct threat landscape assessments, business impact analyses, and risk treatment recommendations * Oversee development of cybersecurity procedures (International Travel, BYOD, secure communications) * Manage recurring reviews of SSPs, POA&Ms, annual security plans, account audits, and risk acceptance packages * Serve as primary cybersecurity liaison to DOT, MARAD, auditors, and federal oversight entities * Support Zero Trust Architecture and broader security architecture modernization * Lead quarterly and biannual IR tabletop exercises and integrate lessons learned * Coordinate ITSEC team training and cross-functional knowledge sharing * Maintain security documentation, templates, policies, and recurring reports (Awareness Bulletins, POA&M dashboards, CSAM reporting) Required Education and Experience: * Minimum 12 years of progressive cybersecurity experience * Experience with NIST RMF, ATO, C&A processes, POA&M development, and federal audit preparation. * Experience in Security Testing & Evaluation, risk assessments, policy and procedure development. * Experience in U.S. Government contracting or federal cybersecurity environments. * Strong leadership experience and ability to guide Infrastructure, Applications, and Cyber teams in a collaborative security posture. * Demonstrated ability to communicate security requirements to technical and non-technical stakeholders, lead governance meetings, and interact with senior federal leadership. * Expertise with incident response, vulnerability management tools, security event analysis, and risk treatment methodologies. Preferred skills and qualifications: * Bachelor's degree in information technology, Computer Science, Cybersecurity, or related field. * ITIL v3 Foundation certification. * CISM, CISSP or other advanced security management certifications. * Azure Security certification. * Experience with Zero Trust Architecture, Cloud security standards, and federal enclave cybersecurity operations. * Experience with leading training, cyber awareness initiatives, and security program development. * Experience working in a college or university Employment Prerequisites The following requirements must be met to be eligible for this position: successful completion of a background investigation and drug urinalysis. SOC, a Day & Zimmermann company, is an Equal Opportunity Employer, EOE AA M/F/Vet/Disability. Note: Any pay ranges displayed are estimations, which may have been provided by job boards. Actual pay is determined by an applicant's experience, technical expertise, and other qualifications as listed in the job description. All qualified applicants are welcome to apply. #INDSOC Estimated Min Rate: $54.84 Estimated Max Rate: $78.35
    $54.8 hourly 9d ago
  • OT Security Engineer

    Crane Co 4.3company rating

    Cyber security analyst job in Stamford, CT

    The OT Security Engineer, Global Information Security (GIS) will have primary responsibility for Crane's Operational Technology security solutions that protect Crane's manufacturing environments. You will implement OT and IoT security solutions throughout the enterprise and ensure that OT/IoT security solutions identify threats, uncover vulnerabilities, and measure risks of operational equipment. Coordinating with both IT and OT teams at all manufacturing sites, you will define and develop security standards and technical solutions. As a subject matter expert in the hardening and defense of OT, you will work with business units to implement security standards, securely modify systems, and implement secure network architectures during implementations of OT related projects to ensure secure system deployments. You will work closely with other GIS functional areas, supporting security engineering, administration, operations, and incident response. You will integrate the OT/IoT security solutions with other GIS and business unit tools such as SIEM, SOAR, AD, and other tools to gain a unified view of security events and respond more effectively to security incidents both for OT and IT. Responsibilities and Duties: * Support and maintain OT/IoT security tool set and associated integrations with other systems * Collaborate with the manufacturing function across lines of business to develop and define security requirements * Design OT security controls for architectures, systems and networks ensuring that alerting to threats is efficient and effective. * Identify and implement supporting security technologies for the identification of threats and defense of OT systems and provide secure methods for remote access. * Work directly with plant leaders, process engineers, and support/system vendors to ensure OT security controls are implemented * Develop and implement standard work supporting the Global OT security function and supporting solutions * Develop and maintain security models, templates, standards and procedures that can be used to leverage security capabilities in projects and operations * Assist in the identification, response, investigation, and remediation of OT security events and incidents as needed * Ensure security best practices are identified and integrated into all approaches and methodologies. * Define requirements and design standards to protect Crane's OT solutions from security threats and for mitigating the impacts of these threats. * Define reference network architectures based on industry best practices and work with business units to implement for OT solutions * Consult on business unit OT projects and provide cybersecurity expertise Qualifications and Competencies: * 2yrs experience with securing Operational Technology and related systems environments * Strong understanding and prior experience with the application of securing OT and related systems * Current deep technical understanding of common OT systems such as PCS, SCADA, PLCs, RTUs, HMIs, CNC * Deep technical understanding of TCP/IP Networking and Firewalls * Deep technical understanding of system integration methods including API's and authentication methods * Knowledgeable in NIST CSF, NIST 800-82, Purdue Model, IEC 62443 standards * Solid foundation cybersecurity domains such as network security, EDR, anomaly detection * Understanding of common OT communications protocols such as MQTT, MODBUS, DNP3, S7, G-code * Comfortable with designing and overseeing the implementation of secure OT architectures * Prior experience in the direct remediation of vulnerabilities or compensating controls within OT environments * Commitment to security training and earning corresponding certifications * Highly motivated with passion for solving complex problems * Excellent verbal and written communication skills, comfortable with presenting to Operational Teams * Flexibility to work outside regularly scheduled/normal business hours as required * Ability and desire to travel both domestically and internationally * Required: Degree in a related field or at least 4 years relevant professional experience * Required: Mobility and ability to be on your feet for long periods in a manufacturing setting * Required: Technical professional security certification such as GICSP, GRID, OSCP, CEH or similar * US Person as defined under EAR PART 772 AND ITAR 120.15 This description has been designed to indicate the general nature and level of work being performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job. Crane Company. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, gender, sexual orientation, general identity, national origin, disability or veteran status.
    $64k-91k yearly est. Auto-Apply 8d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Norwalk, CT?

The average cyber security analyst in Norwalk, CT earns between $69,000 and $125,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Norwalk, CT

$93,000
Job type you want
Full Time
Part Time
Internship
Temporary