Post Job

Cyber Security Analyst Jobs in Norwood, OH

- 72 Jobs
All
Cyber Security Analyst
Information Security Analyst
Information Systems Security Officer
Cyber Security Engineer
Securities Analyst
Information Security Engineer
Information Assurance Analyst
Cyber Security Specialist
Security Engineer
  • IT Security and Risk Engineer

    Encore Talent Solutions

    Cyber Security Analyst Job In Erlanger, KY

    Encore Talent Solutions is looking for an IT Security, Risk and Compliance Engineer- The ideal candidate will have experience in: Creating and managing policies around HIPPA and PCI Experience managing security awareness programs and managing security audits Conduct reviews to measure compliance with NIST, PCI, and ISO standards, regulations and frameworks Provides strategic risk guidance for IT projects, including evaluation and recommendation of technical controls
    $65k-88k yearly est. 6d ago
  • Cyber Security Analyst II / III

    Federal Reserve Bank of San Francisco 4.7company rating

    Cyber Security Analyst Job In Cincinnati, OH

    CompanyFederal Reserve Bank of ClevelandThe Federal Reserve Bank of Cleveland is part of the nation's central bank, and we've provided many opportunities for professional growth during our history. For twenty-five years in a row, we've been named “One of Northeast Ohio's Best Places to Work” by North Coast 99. This prestigious award honors organizations with outstanding employment practices, including compensation, benefits, training, recruitment, retention, community services, and employee communications. Our People Make the Difference! The Federal Reserve Bank of Cleveland is seeking innovative thinkers with vision to build the framework that will carry the Bank into the future. Follow us on LinkedIn, X, Instagram, and our YouTube channel - Cleveland Fed The selected candidate will support the Cybersecurity Analytics Support Team (CAST) function by actively working with CAST personnel, supervisory staff and Board of Governors' staff concerning ongoing cyber incidents within supervised institutions as well as emerging threats potentially impacting the United States financial sector. This individual would have experience and/or expertise in multiple cybersecurity subject matter areas: Cybersecurity related frameworks such as NIST 800-53, NIST Cybersecurity Framework (CSF), IS 27001, MITRE ATT&CK, etc. Assessing cybersecurity threats, vulnerabilities, and related exploitation activity; recommending related mitigations to manage risk to computing environments. Tracking and reporting on threat actor groups that potentially pose a threat to the United States financial sector. Cloud services and providers such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. Incident management and response activities related to cybersecurity events. Security architecture and design implementation to mitigate threats against confidentiality, integrity, and availability. Essential Accountabilities Conducts analysis and interpreting of cybersecurity threats to identify trends and emerging risks. Provide input and insight into response activities during cyber incidents to include best practices from regulatory bodies, cybersecurity organizations, and NIST. Conducts formal assessments to determine the severity of reported cybersecurity incidents at financial institutions. Prepares in written form research, analysis, and assessments for key internal stakeholders as needed or requested. Analysis supports recommendations regarding cybersecurity threats, threat vectors, threat actors and threat trends. Demonstrates knowledge of cybersecurity threats within the broader financial sector and related industries. Assist bank supervision examination teams, the central point of contact teams, and examiners-in-charge during active cybersecurity incidents at regulated banking/financial institutions. Build and maintain relationships with central points of contact teams, examiners, and board staff across the Federal Reserve System. Communicate appropriate information to the Supervision & Regulation staff at the Federal Reserve Bank and Board levels to maintain a comprehensive understanding of ongoing incidents and ensure appropriate steps are taken to isolate any potential residual effects from a cyber incident. Participates in knowledge sharing forums related to key cybersecurity risks and emerging issues. Participates in efforts to advance Reserve Bank or System strategic initiatives. Provides leadership, coaching, and mentoring for less experienced analysts on processes and procedures related to internal matters and the supervisory process. Weekend on-call support is part of the position on a rotating basis (generally once every 12 weeks) Performs other duties as assigned or requested. Education and Experience Analyst II: Bachelor's Degree in Computer Science, Management Information Systems or related field and 5+ years of related work experience required OR Two years of college and 7+ years of professional work experience. Strong understanding of technology governance, technology risk management, internal audit, and vendor/third party risk management. Knowledge of firewalls, intrusion prevention/detection systems, Linux, Windows, and Identity and Access Management concepts. Analyst III: Bachelor's Degree in Computer Science, Management Information Systems or related field and 7+ years of related work experience required OR Master's Degree and 5+ years of professional work experience. Advanced ability to perform independent research and provide written reports summarizing findings and analysis. Intermediate knowledge of regulations, procedures, and practices of a specific discipline (e.g., bank examinations, information security, cyber intelligence). Advanced problem solving and analytical thinking. Advanced specialized operational/technical skills in cyber intelligence and information security. Intermediate knowledge of Microsoft Office; general proficiency in Word, PowerPoint and Excel. Intermediate knowledge of project management. Intermediate ability to analyze information and demonstrate findings with written reports, data visualizations, graphs/charts, or presentations. Knowledge Areas Advanced ability to perform independent research Advanced knowledge of regulations, procedures and practices of a specific discipline (e.g. information security, cyber intelligence) Intermediate knowledge of Microsoft Office Intermediate knowledge of project management Knowledge of intelligence concepts; intelligence lifecycle, diamond method, structured analytic techniques (red team, devil's advocate, analysis of competing hypothesis) Working knowledge of: ESRI ArcGIS 9x, DCGS-A Systems (Multi-Function Workstation), Analyst Notebook, AxisPro (Link Diagram in MFWS), Multimedia Message Manager (M3), QueryTree, Pathfinder , Maltego General knowledge in areas of technology governance, technology risk management/GRC, internal audit, vendor/third-party management, business resiliency and fraud Security operations concepts; perimeter defense, BYOD, data loss protection, insider threat, kill chain, risk assessment, etc Relevant IT certifications (CISA, CISSP) Skill Areas Advanced problem solving and analytical Advanced specialized operational/technical skills in cyber intelligence and information security Advanced written and verbal communication Intermediate presentation Intermediate public speaking Intermediate strategic thinking/planning Citizenship requirements This position requires access to confidential supervisory information and/or FOMC information, which is limited to "Protected Individuals" as defined in the U.S. federal immigration law. Protected Individuals include, but are not limited to, U.S. citizens, U.S. nationals, and U.S. permanent residents who either are not yet eligible to apply for naturalization or who have applied for naturalization within the requisite timeframe. Candidates who are not U.S. citizens or U.S. permanent residents may be eligible for the information access required for this position and sponsorship for a work visa, and subsequently for permanent residence, if they sign a declaration of intent to become a U.S. citizen and meet other eligibility requirements. In addition, all candidates must undergo an enhanced background check and comply with all applicable information handling rules, and all non-U.S. citizens must sign a declaration of intent to become a U.S. citizen and pursue a path to citizenship. Physical Demands and General Working Conditions This is not necessarily an exhaustive list of all responsibilities, duties, performance standards or requirements, efforts, skills or working conditions associated with the job. While this is intended to be an accurate reflection of the current job, the Federal Reserve Bank of Cleveland reserves the right to revise this or any job description at any time. Reasonable Accommodation Statement - The Federal Reserve Bank of Cleveland is committed to ensuring that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, perform essential job functions, and receive other benefits and privileges of employment. To request a reasonable accommodation for any part of the employment process, please send an email to ****************************************. Location/in office requirements This position is hybrid with 2-3 days in district. Bank's Ethics Rules and Drug Testing As a condition of employment, Federal Reserve Bank of Cleveland employees must comply with the Bank's ethics rules which generally prohibit employees, their spouses/domestic partners, and minor children from owning or controlling, directly or indirectly, any debt or equity interest in a depository institution or an affiliate of a depository institution. A "depository institution" means a bank, a trust company, or any institution that accepts deposits, including a bank chartered under the laws of a foreign country. In addition, employees (and their spouses/domestic partners, and minor children) may not own shares of mutual funds, unit investment trusts or ETFs that have a policy, as stated in the prospectus, of concentrating in the financial services industry and that have underlying investments in banks or other depository institutions. If you or your spouse/domestic partner or minor child own such securities and would not be willing or able to divest them if you accepted an offer of Bank employment, you should raise this issue with the recruiter for this posting. In addition, as a condition of employment, candidates must undergo a background check and will be tested for all controlled substances prohibited by federal law, to include marijuana, prior to hire and for certain safety sensitive positions during employment. Always verify and apply to jobs on Federal Reserve System Careers or through verified Federal Reserve Bank social media channels Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation TechnologyWork ShiftFirst (United States of America) The Federal Reserve Banks believe that diversity and inclusion among our employees is critical to our success as an organization, and we seek to recruit, develop and retain the most talented people from a diverse candidate pool. The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences. Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels. Privacy Notice
    $84k-99k yearly est. 8d ago
  • Cyber Information Assurance Analyst - Secret

    Northrop Grumman 4.7company rating

    Cyber Security Analyst Job In Beavercreek, OH

    Cyber Information Assurance Analyst - Secret Beavercreek, OH Cyber Information Assurance Analyst - Secret Beavercreek, OH At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. **Cybersecurity Professionals, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of threats. Almost daily, these threats grow in sophistication, breadth and speed. At Northrop Grumman, we take a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the whole security realm of offense, defense, and exploitation. Thought leadership demands nothing less. If you are an expert with classified computers within the Department of Defense (DoD) and Intelligence Community computing environments, Northrop Grumman Corporation has fantastic opportunities for your career growth. We are seeking novice level **Information Systems Security Professionals** across the country to support information systems lifecycle activities. The selected candidate will be required to work on-site, full-time at our Beavercreek, OH location. The individual will perform the following duties on a day-to-day basis in support of the program: * Perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy. * Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems. * Includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits. * Assist in the implementation of the required government policy, make recommendations on process tailoring, participate in and document process activities. * Perform analyses to validate established security requirements and to recommend additional security requirements and safeguards. * Support the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports. * Document the results of Certification and Accreditation activities and technical or coordination activity and prepare the system Security Plans and update the Plan of Actions and Milestones POA&M. * Periodically conduct a complete review of each system's audits and monitor corrective actions until all actions are closed. Note: Due to the classified nature of the work being performed, this position does not offer any virtual or telecommute working options. Applicants are encouraged to apply, only if they are willing to work on-site. **Basic Qualifications:** * Master's degree with 0 years of relevant experience OR a Bachelor's degree with 2 years of relevant experience OR an Associate's degree with 4 years of relevant experience OR a High School diploma or equivalent with 6 years of relevant experience * DoD 8570 IAM level I (or higher) security certification (Examples: CND, Cloud+, Security+ CE) * Active DoD Secret level security clearance with ability to obtain and maintain a DoD Top Secret clearance as a condition of continued employment * Ability to obtain and maintain access to Special Programs as condition of continued employment **Preferred Qualifications:** * Bachelor's degree in Cyber Security * Active DoD Top Secret clearance * SAP/SAR Access * 3 years of experience with Certification & Accreditation of classified systems under RMF (Risk Management Frameworks) * Knowledge of ACAS, NESSUS, SPLUNK, SCAP, POA&Ms, NIST, JSIG, system audits, vulnerability scanning, and/or RMF package development ESCSO ESCyberInfoSec **Salary Range:** $79,300 - $118,900 The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions. Employees may be eligible for a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business. The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates. Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit ********************************** . U.S. Citizenship is required for most positions. **Your Privacy** **Privacy Preference Center** ** Manage Consent Preferences** Always Active Always Active Always Active
    28d ago
  • Cyber Analyst/ Cyber Security Analyst

    Cyber Defense Technologies 3.9company rating

    Cyber Security Analyst Job In Dayton, OH

    Cyber Analyst/Cyber Security Analyst Cyber Defense Technologies (CDT), a leading small business cybersecurity and engineering firm, is seeking a skilled and detail-oriented Cyber Analyst/Cyber Security Analyst onsite in Dayton, OH with a TS/SCI clearance. In this role, you will monitor, analyze, for the purpose of mitigating threats. Responsibilities: Monitor network traffic, logs and alert to identify suspicious activity. Use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threat. Perform in-depth analysis of potential threats, vulnerabilities, and incidents to determine severity and impacts. Qualifications: Bachelor's degree in Systems Security, Network Engineering, Information Technology, or related Engineering discipline and typically 5+ years of relevant experience Relevant experience may be considered in lieu of required education. Relevant certifications (e.g. CEH, Security +, CYSA+) Why Join Cyber Defense Technologies? At CDT, we offer a collaborative and inclusive work environment where your expertise in finance and HR can help shape the future of cybersecurity and engineering solutions. This position offers the opportunity to lead financial strategies while supporting HR initiatives in a fast-paced, government contracting environment. Compensation and Benefits: Competitive salary based on experience. Comprehensive benefits package, including health, dental, and retirement plans. Opportunities for professional development and career advancement. CDT is committed to hiring and retaining a diverse workforce. We are an Equal Opportunity employer making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. Apply Now: If you are a proactive Cyber Analyst/Cyber Security Analyst and thrive in dynamic environments, we encourage you to apply and join the CDT team!
    $78k-105k yearly est. 33d ago
  • Cyber Security Analyst - Entry Level

    Per Scholas-National Recruitment 3.6company rating

    Cyber Security Analyst Job In Cincinnati, OH

    Entry Level Cyber Security Analyst Cincinnati, OH READ BEFORE YOU APPLY! Opportunity: Per Scholas is helping to source entry-level candidates for Cyber Security Analyst positions with our employer partners in the Cincinnati region and will offer free training to candidates in need of additional upskilling in order to qualify. Requirements: To be successful, candidates need to possess basic literacy, math, critical thinking, and self-teaching skills, do well in fast-paced environments, and be able to learn new technologies quickly. What we are looking for: Must have at least a High School diploma or GED Must be authorized to work in the US Previous tech work experience or education preferred Must be able to commit a Monday - Friday, 9:00am - 4:00pm Must live in the Atlanta area We are not currently offering visa sponsorship or transfers, but we will accept applications from individuals with work authorization.
    $69k-93k yearly est. 60d+ ago
  • Cyber Security Incident Responder

    Job Listingselement Materials Technology

    Cyber Security Analyst Job In Blue Ash, OH

    We are looking for an enthusiastic and experienced Cyber Security Incident Responder (IR) to join our dynamic and growing team. The role holder will play a critical role in maintaining the security and resilience of Element's digital infrastructure by effectively handling cyber incidents. This is an opportunity to join an emerging team and become a key contributor on day one. You will work closely with peers to develop what you see as a great 24/7 operational cyber defense capability. We encourage applications from those with direct experience in Digital Forensics and Incident Response (DFIR). This position requires paid on call and overtime if there are serious cyber-attacks. This position is hybrid. Responsibilities Help build Element's IR capability. Implement best practice in line with NIST, SANS and other industry frameworks Govern and coordinate cyber incidents. Act as the lead incident manager and technical authority for Cyber Defense. Conduct thorough investigations to reduce risk. Determine the root cause, impact, and identify remediation actions Collaborate with cross-functional teams including IT, Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malware analysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defense metrics Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Skills / Qualifications A minimum of two years' experience working in cyber security. Technical experience as a Cyber Incident Responder e.g., Digital Forensics Incident Response (DFIR). Experience in managing complex cyber incidents would be great Experience of in working within a complex highly federated organization. A comprehensive understanding of cyber defense operations in both the public and private sectors A bachelor's degree in Computer Science, Information Technology, or a related field is desirable but not essential, as are other relevant certifications (e.g., CISSP, CISM, GIAC) Attention to detail, strong analytical skills and efficient problem solving. The ability to think critically and make sound decisions in high-pressure situations Cultural sensitivity and social flexibility in a global corporate environment Experience in proactive communication to, and direct interaction with senior staff. The ability to convey complex information to a non-technical audience A highly self-motivated individual with positive mindset and can-do attitude. A strong believer of security as an enabler to support business growth This position requires on call and overtime if there are very serious cyber attacks Knowledge of SIEM tooling, including experience in writing and developing advanced hunting and correlation search queries for alerts Must be a US Citizen or Green Card holder #LI-SL1 #LI-SL1 Company Overview Element is one of the fastest growing testing, inspection and certification businesses in the world. Globally we have more than 9,000 brilliant minds operating from 270 sites across 30 countries. Together we share an ambitious purpose to ‘Make tomorrow safer than today'. When failure in use is not an option, we help customers make certain that their products, materials, processes and services are safe, compliant and fit for purpose. From early R&D, through complex regulatory approvals and into production, our global laboratory network of scientists, engineers, and technologists support customers to achieve assurance over product quality, sustainable outcomes, and market access. While we are proud of our global reach, working at Element feels like being part of a smaller company. We empower you to take charge of your career, and reward excellence and integrity with growth and development. Industries across the world depend on our care, attention to detail and the absolute accuracy of our work. The role we have to play in creating a safer world is much bigger than our organization. Diversity Statement At Element, we always take pride in putting our people first. We are an equal opportunity employer that recognizes diversity and inclusion as fundamental to our Vision of becoming “the world's most trusted testing partner”. All suitably qualified candidates will receive consideration for employment on the basis of objective work related criteria and without regard for the following: age, disability, ethnic origin, gender, marital status, race, religion, responsibility of dependents, sexual orientation, or gender identity or other characteristics in accordance with the applicable governing laws or other characteristics in accordance with the applicable governing laws.
    $76k-107k yearly est. 6d ago
  • Information Security Analyst 2, Digital Technology Solutions

    Isacaroma

    Cyber Security Analyst Job In Cincinnati, OH

    Information Security Analyst 2, Digital Technology Solutions University of Cincinnati Posted: December 10, 2024 Location: Cincinnati, Ohio * Clearly convey complex security information to both technical and non-technical stakeholders. * Participate in developing technical documentation (designs, specifications, processes, workflows) and communications. * Mentor and delegate work assignments to student workers. * Participate in multiple low and moderate risk projects. Work with a team to advance project goals and provide technical assistance. * Document individual progress on assigned deliverables. * Gather metrics for area of responsibility. * Carry out procedures to ensure that all systems, products, and services meet organization security standards. * Research information security trends to understand the latest vulnerabilities and threats. * Conduct risk and vulnerability assessments of information systems to identity vulnerabilities, risk, and protection needs. * Assist with providing artifacts to Governance, Risk & Compliance in relation to internal & external audits. * With limited support, work with business units to achieve security objectives. Identify, report, and resolve security risks and violations. * Develop subject matter expertise on security applications and services in the area of responsibility. * With limited support, conduct information security reviews; determine and document risk and impact on the university; provide baseline remediation recommendations. * Assist with cyber investigations through forensic fact gathering with a focus on e-discovery. * Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations. * Develop content for and present information security training and awareness programs. * Develop familiarity with data security laws and regulations applicable to higher education. * Participate in troubleshooting processes during and outside of normal business hours and participate in change management. * Mentor non-security teams regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS). * Serve as seasoned and proficient information security professional. * Perform related duties based on departmental need. This job description can be changed at any time. ****Required Education**** * Bachelor's Degree in in Computer Science, Information Technology, Computer Engineering, or related field. * Four (4) years of relevant work experience and/or other specialized training can be used in lieu of education requirement. ****Required Experience**** * Experience in security tool administration. * Basic scripting skills. * Basic project management skills. * Understanding of system administration. * Basic of network architecture. * Moderate understanding of risk and vulnerability management. * Basic awareness of incident response. * Experience with industry standard security and compliance frameworks. ****Additional Qualifications Considered**** This position will primarily work in the area of information security education and awareness. The ideal candidate will have experience in the field of information security education awareness or similar. Responsibilities may include, but are not limited to: creating education materials including printed and virtual documents, images, and videos, creation of training videos, facilitating in-person and virtual training events and outreach events, creating/designing and maintaining inventory of departmental handouts, managing departmental websites, intranet sites, and social media presences, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes. CISSP, CISM, GISP or similar information security certification(s) are preferred. ****Physical Requirements/Work Environment**** * Hearing, listening - Continuously * Repetitive hand motion (such as typing) - Continuously * Talking - Continuously * Sitting - Continuously * Bending - Seldom * Climbing stairs/ladders - Seldom * Crawling - Seldom * Crouching - Seldom * Kneeling, squatting - Seldom * Lifting - over 50 pounds - Seldom * Lifting - up to 20 pounds - Seldom * Lifting - up to 50 pounds - Seldom * Pulling, pushing - Seldom * Reaching overhead - Seldom * Standing - Seldom * Stooping - Seldom * Walking - Seldom * Shoveling - Not Required Competitive salary range dependent on the candidate's experience. HISTORY IN BRIEF - The University of Cincinnati is a public urban serving research institution that was founded in 1819 and today is one of the country's largest universities offering more than 350 academic programs to more than 44,000 students. UC has many top ranked programs in areas such as Music and Arts, Medical and Human-Services, Criminal Justice and more. Located in an urban setting, UC is close to the heart of Cincinnati and allows easy access for students to enjoy all that the city offers. UC is also the alma mater of many notables such as President William Howard Taft; Albert Sabin, developer of the oral polio vaccine; Astronaut Neil Armstrong and Mary Weinberg, 2008 Olympic gold medalist. UC is classified as a Research University (Very High Research Activity) by the Carnegie Commission and is ranked as one of America's top 35 public research universities by the National Science Foundation. UC jumped 17 spots in the U.S. News & World Report rankings in the past two years alone. In addition to being named a “green university” by Princeton Review, UC has been named one of the world's most beautiful campuses by Forbes and Delta Sky magazines. Learn more at ******************** N STATEMENT - The University of Cincinnati serves the people of Ohio, the nation, and the world as a premier, public, urban research university dedicated to undergraduate, graduate, and professional education, experience-based learning, and research. We are committed to excellence and diversity in our students, faculty, staff, and all of our activities. We provide an inclusive environment where innovation and freedom of intellectual inquiry flourish. Through scholarship, service, partnerships, and leadership, we create opportunity, develop educated and engaged citizens, enhance the economy and enrich our University, city, state and global community. Show more Show less ISACA Career Center is Just One of the Benefits. Discover what else ISACA has to offer!
    $70k-99k yearly est. 28d ago
  • Cyber Engineer

    Cryptic Vector

    Cyber Security Analyst Job In Beckett Ridge, OH

    At Cryptic Vector, we are dedicated to mission success. We take the time to understand our customers' needs, delivering products that perform when our nation needs them most. We understand that properly supporting the most unique missions of the United States government requires the nation's best. Our focus is on creating a culture where the best and brightest want to grow, learn, and stay. If coming up with out-of-the-box solutions is your specialty, then you'll feel right at home at Cryptic Vector. We are solving the country's most unique problems in an environment where problem solvers and hard workers thrive. We've replaced corporate red tape with transparency and servant leadership. Honestly, it's hard not to love this culture! We value the individual experiences that our team members add to our culture and capabilities. Please don't hesitate to apply even if you don't meet the exact qualifications! We are interested in varying levels of experience. Cryptic Vector is looking for Cyber Engineers with experience or interest in offensive cyber engineering. Cyber Engineering at Cryptic Vector is a research and development position spanning a variety of disciplines. The responsibilities of the Cyber Engineer position may include the following: Reverse Engineering (RE) of software/firmware, Vulnerability Research (VR), exploit development/productization Design/develop post-exploitation effects in software/firmware, which can withstand scrutiny and attack Design/develop secure, reliable, software-based communication solutions Design/develop stealth solutions Collaborate with engineering teams and product end users to translate customer/business/technical requirements into architectural designs and software solutions Write unit tests, functional tests, and end-to-end tests Provide constructive code reviews for colleagues Programming languages: Direct and recent experience coding in C and/or C++ Interest in new systems programming languages Proficiency in modern scripting languages (like Python) is important but not central An ideal candidate for these positions will have: Experience developing user-mode applications for traditional platforms (Windows, Linux, mac OS, Android, iOS) or user/kernel-mode capabilities for non-traditional platforms (embedded/proprietary/custom firmware or operating systems) A hacker mindset. Interest analyzing software/firmware for weaknesses. Participation or interest in Capture the Flag (CTF)/hacking competitions Interest in the architecture/internals of proprietary operating systems Comfort working with assembly, machine code, hexadecimal, and binary. Familiarity with reverse engineering tools, such as IDA Pro and/or Ghidra. Experience using, analyzing, and manipulating old/new network protocols. Interest in network/socket programming using TCP/UDP. Working knowledge of basic cryptography functions and programming Humble confidence, with a desire to work in a team setting (perhaps using an agile methodology) Familiarity with software engineering methods/process. Familiarity with CI/CD pipelines and best practices. Requirements Preference for B.S. degree in Computer Science, Cyber Operations, Computer Engineering, Electrical Engineering, or related field Ability to obtain/maintain a US security clearance Willing to work in the greater Cincinnati area
    $68k-93k yearly est. 60d+ ago
  • Strategic Cyber Security Engineer and Subject Matter Expert

    Applied Research Solutions 3.4company rating

    Cyber Security Analyst Job In Dayton, OH

    Applied Research Solutions is seeking an energetic and experienced full-time Strategic Cyber Security Engineer and Subject Matter Expert to support our customer at the Air Force Research Laboratory located at Wright-Patterson AFB. The Cyber Security Engineer will be supporting a cutting-edge program in the development of cyber security strategy and assist in the development of related program protection plans and support program related RMF processes. Why Work with us? Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers. Responsibilities include: + Aid in developing cyber strategy and designing anti-tamper solutions for weapon systems (hardware and software). + Draft and staff specific cybersecurity assessment and authorization artifacts for military programs: + S&T (or Program) Protection Plan + Anti-Tamper Plan + Cybersecurity Strategy, + DevSecOps CONOPS including SAST and DAST, and + RMF/ATO Artifacts. + Provide cyber security technical expertise related to preparation, processing and approval of IATT/ATO documents in support of the AFRL programs of interest. + Advise and contribute to the production of documentation and other artifacts related to DISA approvals and RMF approvals. + Lead discussions and execute processes for approvals of candidate solutions. + Engage with other contractors to share technical data necessary to guide the development of system architectures. + Participate in technical interchanges with relevant team members as necessary + Support and/or lead associated cyber security working groups and/or IPTs. + Other duties as assigned Qualifications/ Technical Experience Requirements: + Must be a US citizen + Must have an active TS with SCI eligibility + BA/BS degree in relevant field and a minimum of 8-10 Years' relevant experience required, MS preferred. + Security+ required, CISM preferred, CISSP very desirable. + Demonstrated experience in developing strategy for designing anti-tamper solutions for weapon systems (hardware and software) + Demonstrated experience in developing cyber security assessments and authorization artifacts for military programs. + Demonstrated experience developing and staffing cyber security, and cyber-related, plans. + Experience with DevSecOps including use of Gitlab on Agile software development programs or software factories, where software was taken from development to production. + Demonstrated and recent experience with Risk Management Framework (RMF) and RMF tools + Demonstrated experience leading working groups, teams and IPTs. + Ability to work efficiently on teams and also individually with minimal supervision. + Strong analytical, communication, and attention to detail skills + Familiarity with key cyber security policies and national security counterterrorism objectives. All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
    $74k-99k yearly est. 28d ago
  • Information Systems Security Officer (ISSO) II

    GD Information Technology

    Cyber Security Analyst Job In Dayton, OH

    Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Information Security Job Qualifications: Skills: Information Security, Information Security Management, Information System Security Certifications: None Experience: 2 + years of related experience US Citizenship Required: Yes Job Description: The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: Assist the ISSM in meeting their duties and responsibilities Prepare, review, and update authorization packages Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly Ensure all IS security-related documentation is current and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them Prepare reports on the status of security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries Experience: 2-5 years related experience, SAP experience required Education: Bachelor's degree in a related area or equivalent experience (4 years) Certifications: IAT Level II - required to Start (Security+ CE, CCNA Security, etc.) Security Clearance: TS/SCI required Must be able to Attain - TS/SCI with CI Polygraph Travel: 40+ percent #GDITpriority #AirforceSAPOpportunities The likely salary range for this position is $82,110 - $111,090. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: 10-25% Telecommuting Options: Onsite Work Location: USA OH Dayton Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.We connect people with the most impactful client missions, creating an unparalleled work experience that allows them to see their impact every day. We create opportunities for our people to lead and learn simultaneously. From securing our nation's most sensitive systems, to enabling digital transformation and cloud adoption, our people are the ones who make change real.GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
    $82.1k-111.1k yearly 22d ago
  • Information Security Analyst-Hybrid

    McGohan Brabender Agency 4.1company rating

    Cyber Security Analyst Job In Dayton, OH

    Job Details Dayton Office - Dayton, OHDescription McGohan Brabender Information Security Analyst About Us: McGohan Brabender is renowned for recruiting top-tier talent within the employee benefits industry. As one of the nation's largest employee-owned (ESOP) benefit firms, we are true entrepreneurial disruptors in the field. Our team embodies agility, serving as advisors, financial strategists, and innovative problem solvers. Our culture is infectious, grounded in our unwavering commitment to fostering a diverse and inclusive workplace where every individual is accorded the utmost dignity and respect. At the core of all our values, whether in life or business, lies our dedication to people. We wholeheartedly encourage everyone to bring their authentic selves to work every single day. About the Role: As an Information Security Analyst at McGohan Brabender, you will play an integral role in safeguarding our organization's data, systems, and networks from cyber threats. The ideal candidate will be a proactive and detail-oriented individual, focused on collaboration with other IT and non-IT resources to create the best solutions for the organization. Key Responsibilities: • Monitor network traffic, system logs, and security alerts for suspicious activity. • Analyze security incidents to assess impact and identify root causes. • Respond to security breaches, implement corrective actions, and mitigate threats. • Coordinate with IT to resolve vulnerabilities and recover affected systems. • Perform vulnerability assessments and risk analyses to identify security risks. • Recommend measures to mitigate identified risks. • Ensure security protocols align with industry regulations and best practices. • Conduct regular security audits for compliance with regulatory requirements. • Assist in designing, implementing, and managing security measures. • Collaborate with IT teams to deploy updates, patches, and configurations. • Provide security awareness training and develop best practice guidelines. • Collaborate with various departments to align security strategies with organizational goals. • Communicate security findings and recommendations to senior management. • Stay current with cyber threats and participate in continuous learning. Qualifications: Knowledge of common information security management frameworks. Experience implementing SOC2. Understanding & experience implementing security protocols in a Microsoft client and server systems. Security & configuration knowledge of O365, Azure, Exchange, Active Directory and related tools. Experience with computer network penetration testing and techniques required. Experience with proactive network, systems monitoring and threat management. Three or more years of related experience. Preferred Qualifications: Previously worked in a HIPAA environment. Scripting language knowledge. Process Automation experience (automating security related functions, scans, reports, etc.) Linux knowledge. Security certifications: CISSP, CISA, Security+ or similar.
    $64k-91k yearly est. 39d ago
  • Information Systems Security Officer (ISSO) II

    Blackphd

    Cyber Security Analyst Job In Dayton, OH

    **Location:** Dayton, OH Job Title: Information Systems Security Officer (ISSO) II **Company Name:** General Dynamics IT **Position Type:** Full Time **Post Date:** 11/07/2024 **Expire Date:** 01/16/2025 **Job Categories:** Engineering, Information Technology Job Description **Information Systems Security Officer (ISSO) II** The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: * Assist the ISSM in meeting their duties and responsibilities * Prepare, review, and update authorization packages * Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media * Notify ISSM when changes occur that might affect the authorization determination of the information system(s) * Conduct periodic reviews of information systems to ensure compliance with the security authorization package * Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change * Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly * Ensure all IS security-related documentation is current and accessible to properly authorized individuals * Ensure audit records are collected, reviewed, and documented (to include any anomalies) * Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties * Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans * Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them * Prepare reports on the status of security safeguards applied to computer systems * Perform ISSO duties in support of in-house and external customers * Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries Experience: * 2-5 years related experience * SAP experience **required** * Prior performance in roles such as System, Network Administrator, or ISSO Education: * Bachelors degree in a related area or equivalent experience (4 years) Certifications: * IAT Level II or IAM Level II - within 6 months of hire (Security+ CE, CCNA Security, etc.) Security Clearance: * TS/SCI required * Must be able to Attain TS/SCI with CI Polygraph Other Requirements: * Must be able to regularly lift up to 50lbs #AirforceSAPOpportunities | Contact Information **Company Name:** **Website:**
    $65k-87k yearly est. 29d ago
  • Merger and Acquisition Security Analyst - Erlanger, KY @ ADM

    Cyber Crime

    Cyber Security Analyst Job In Erlanger, KY

    **Merger & Acquisition Security Analyst - ADM Global Primary Locations** . Under general supervision, analyze, architect, engineer, implement, integrate and maintain effective methods to protect ADM systems and data during Merger, Acquisition, Divestiture, and Joint Venture (MADJV) process. Use established process, procedures and standards, while recommending process improvements through experience and leading practices. Interface with IT and MADJV Leads to operationalize security requirements to enable the business and maintain the security posture to appropriate risk levels. Must display enthusiasm and interest in Information Security and draw recommendations based on real world experience. **Job Responsibilities:** * Under guidance of the Global Information & Cyber Security (GICS) MADJV Manager, represent GICS for MADJV related activities. * Work with GICS Directors and GICS MADJV Lead on recommending plans on all MADJV related activity. Use established process, procedures and standards, while recommending process improvements through experience and best practice. * Assess security posture, identify risks, and develop strategies to mitigate / manage risks through MADJV projects. * Interface with IT and other MADJV stakeholders to operationalize security requirements to enable the business and maintain the security posture to appropriate risk levels. Collaborate within the broader Information Security function, and MADJV leads to help design and implement security improvements and requirements. * Perform functions in a timely manner and with extreme level of attention to detail, urgency and thoroughness. * Anticipate problems and identify long-term implications of decisions and actions. **Job Requirements:** * “Full Professional Proficiency” (Inter-agency Language Round-table [IRL] level 4, or equivalent) or greater written & verbal capability in English. * 3+ years' experience in Information Technology, demonstrating work with Information Security, Security Governance, Audit or Risk and Control . * Experience with security principles and defense-in-depth techniques. * Bachelors' degree or equivalent work experience. * Understanding of Information Security Layers. * Security experience related to concepts of least privilege, risk management, vulnerability management, identity and access management, access controls, and segmentation. * Experience executing large global projects with slim timelines and schedules. * Understanding and knowledge of Sarbanes-Oxley and IT General Controls. * Knowledge of third party auditing, such as cloud, and risk assessment methodologies. * Ability to communicate and collaborate effectively with other team members in a geographic and culturally diverse workforce. * Expected to complete projects within specified deadlines. * Expected to work occasional nights, weekends, holidays, and overtime. * Occasional travel may be required. * Strong sense of professionalism and ethics. **Desired Skills:** * Current holder of CISSP and / or other industry certifications a plus. * Security project management experience preferred. * Additional language skills a plus. Before applying for an exempt, non-exempt or hourly job opportunity, you are expected to initiate position for more than 18 months, supervisor approval is not required. a discussion and share your intentions with your supervisor. * If you've been in your current * If you've been in your current position for less than 18 months, verbal supervisor approval is required. Hiring Manager- Arthur Avart Recruiter- Alisa Koster **City** Erlanger **State** KY - Kentucky **Location Country** United States About ADM At ADM, we unlock the power of nature to provide access to nutrition worldwide. With industry-advancing innovations, a complete portfolio of ingredients and solutions to meet any taste, and a commitment to sustainability, we give customers an edge in solving the nutritional challenges of today and tomorrow. We're a global leader in human and animal nutrition and the world's premier agricultural origination and processing company. Our breadth, depth, insights, facilities and logistical expertise give us unparalleled capabilities to meet needs for food, beverages, health and wellness, and more. From the seed of the idea to the outcome of the solution, we enrich the quality of life the world over. Learn more at ************ **Explore more career opportunities** Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
    $61k-85k yearly est. 28d ago
  • Cyber Security Engineer - Information System Security Officer

    Illumination Works LLC 3.9company rating

    Cyber Security Analyst Job In Beavercreek, OH

    Share If you are unable to complete this application due to a disability, contact this employer to ask for an accommodation or an alternative application process. **Cyber Security Engineer - Information System Security Officer** 30+ days ago Requisition ID: 1132 **Location and Travel Details:** Dayton, OH - hybrid The key responsibilities of the **Cyber Security Engineer -** **Information System Security Officer (ISSO)** include: * Provide support for implementing and enforcing information systems security policies, standards, and methodologies * Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types of information * Analyze threats and develop and implement best practice methodologies for incident detection, reporting, and vulnerability remediation * Maintain records on systems, applications, hardware, etc. to include system upgrades * Evaluate security solutions to ensure they meet security requirements for processing information * Maintain operational security posture for information systems * Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system/program/enclave * Develop and maintain documentation for Certification & Accreditation in accordance with specified policies * Develop and update system security plans and other IA documentation * Provide CM for security-relevant information system software, hardware, and firmware * Develop system security policy and ensure compliance **Key skills for this position include:** * Demonstrated knowledge of and experience with several of the following: current security tools; hardware/software security implementation; communication protocols; encryption techniques/tools * Experience completing security evaluations of software systems or architectures to ensure they meet security requirements * Experience preparing and maintaining SSPs and other security related documentation * Experience proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies, preferably on a large software or IT program * Demonstrated experience performing day-to-day security operations of large, complicated information and information processing systems * Must be committed to developing and adhering to best practices * Must be a solutions-oriented team player and must possess a high level of self-initiative * Must have excellent interpersonal skills * Must possess a Security+ certification * Minimum education: Bachelor's degree in Computer Science, Cybersecurity, or comparable academic discipline * Minimum experience requirements: five years of experience required * Must have or be willing to obtain Secret Clearance (this requires US Citizenship) * Acceptable candidates must successfully pass a drug test and background screen **Desired Experience:** * Knowledge of DoD security requirements * Experience with Cloud * Knowledge of DoD systems, data and processes At Illumination Works, we know data, and we should, we've been doing it since we started in 2006! We specialize in everything data from big data to data science, software engineering, data management, AR/IoT, and cloud development. Illumination Works is a trusted technology partner in user-centered digital transformation-delivering impactful business results to clients. We partner with customers to solve their unique technology and data challenges, and stay on top of modern technologies and advancements leveraging our Innovation Lab. We invest in our employees in all aspects of their life and we value family. We offer market competitive salary, a generous PTO package, and comprehensive medical, dental, vision and life insurance plans. We also offer 401K, short/long-term disability insurance, a fun and engaging culture, and training opportunities to keep you up to speed on the latest technologies. Illumination Works is committed to hiring and retaining a diverse workforce. We are an Equal Opportunity Employer, making decisions without regard to race, color, religion, sexual orientation, gender identity or national origin, age, veteran status, disability, or any other protected class. Acceptable candidates must successfully pass a drug test and background screen.
    $66k-83k yearly est. 28d ago
  • API Security Engineer Company Hidden Finance Cincinnati, OH 1 Opening 2 months ago $1,500 reward per hire

    Agility Partners LLC 4.6company rating

    Cyber Security Analyst Job In Cincinnati, OH

    **API Security Engineer** Company Hidden Finance Cincinnati, OH Base pay $12,345 - $678,910 or to view salary and company information Other Contract 1 Opening $1,500 reward per hire **About this Role** Agility Partners is seeking a qualified API Security Engineer to fill an open position with one of our banking clients. In this exciting opportunity, you will play a crucial role in securing APIs, leading technical conversations, and establishing an API management strategy. **Responsibilities:** * Lead technical discussions to determine API security items and define API patterns. * Write best practices and create business and security requirements with a focus on threat modeling. * Collaborate with stakeholders to determine control criticality and work with application owners to create patterns. * Address Information Security risks, ensuring alignment with business objectives and regulatory requirements. * Provide expertise on decisions and priorities regarding the enterprise's Information Security strategy. **Benefits and Perks** ***Reasons to Love It:*** Work within a collaborative team environment where ideas and creativity are welcomed! Family and Work Life balance are important to this organization and valued for the employees. * Working for an organization that focuses on company culture, inclusion and diversity * 50% medical coverage for you and your entire family, short/long term disability and life insurance options * 401(k) * Life Insurance * Disability coverage **The Ideal Candidate** **Qualifications:** * Bachelor's degree in a relevant technology field or equivalent combination of education and work experience. * 8+ years of engineering or IT/Security work experience. * 5+ years of interdisciplinary experience in Access Control Systems, Application Security, Application SDLC, Operating Systems, Cryptographic Controls, API Security, and Networking. * Excellent communication skills and the ability to build effective relationships with business leaders. * Strong organizational skills with the ability to manage multiple tasks simultaneously. * Solid understanding of IT security best practices. * Skilled in designing, implementing, and supporting complex technical solutions. * Experience in API security testing, architecture, design, and lifecycle management. * Proficient in integrating security-focused API initiatives with other development teams. * Ability to provide clear and concise documentation on delivered code and customer onboarding. **Additional Preferred Skills:** * Experience with Jenkins pipelines and automating security controls within CI/CD pipelines. * Extensive development experience with different API capabilities. * Previous microservice development and application vulnerability remediation experience. * Knowledge of serverless solutions within AWS. Share this job. Make $1,500. When a friend applies to this position and gets hired, you'll get credited with a referral reward!* *Reward paid upon hire of your candidate according to our Recruiting Agreement Policy (see right).
    $92k-122k yearly est. 27d ago
  • Information Security Analyst 1, Digital Technology Solution

    University of Cincinnati 4.7company rating

    Cyber Security Analyst Job In Cincinnati, OH

    Current UC employees must apply internally via SuccessFactors You are invited to submit an application to be considered for one of multiple vacancies of the same position. Founded in 1819, the University of Cincinnati ranks among the nation's best urban public research universities. Home to 53,235 students, more than 11,000 faculty and staff and 350,000+ living alumni, UC combines a Top 35 public research university with a physical setting The New York Times calls "the most ambitious campus design program in the country." With the launch of Next Lives Here, the Cincinnati Innovation District, a $100 million JobsOhio investment, three straight years of record enrollment, worldwide leadership in cooperative education, a dynamic academic health center and entry into the Big 12 Conference, UC's momentum has never been stronger. UC's annual budget stands at $1.85 billion, and its endowment totals nearly $1.8 billion. Job Overview Assist in performing procedures and provide technical solutions that serve to provide appropriate access to and protect systems from unauthorized users. Essential Functions * Participate in peer knowledge sharing groups. * Communicate security concepts effectively, with guidance. * Assist with development of technical documentation (designs, specifications, processes, workflows) and communications. * Document individual progress on assigned deliverables. * Participate in gathering of metrics for area of responsibility. * Carry out procedures to ensure that support departmental and university operations in the information security area. * Maintain familiarity with information security trends and best practices. * Participate in internal information security projects and initiatives. * Participate in preparation and maintenance of functional documentation for assigned tasks. * Participate in the research, design, implementation, and support of systems supporting information security tools and services. * Participate in the development, maintenance, and utilization of standard operating procedures. * Participate in conducting risk and vulnerability assessments of information systems to identity vulnerabilities, risks, and protection needs. * Participate in troubleshooting processes during and outside of normal business hours. * Assist with mentoring non-security teams regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS). * Assist with information security training and awareness programs. * Perform related duties based on departmental need. This job description can be changed at any time. Required Education * Associate's Degree in Computer Science, Information Technology, Computer Engineering, or related field. * Two (2) years of relevant work experience and/or other specialized training can be used in lieu of education requirement. Required Experience Possess working knowledge of commonly-used concepts, practices, and procedures and contributes through support, using established processes, methods, and systems. Additional Qualifications Considered This position will primarily work in the area of information security operations. The ideal candidate will have education or experience in the field of information security operations. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and event management (SIEM), SSL and client certificate management, vulnerability management, privileged access management, password management, system/application administration for security related technologies, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes. CISSP, CISM, GISP or similar information security certification(s) are preferred. Technical security certifications such as Security+, GSEC or similar. Physical Requirements/Work Environment * Talking - Continuously * Sitting - Continuously * Hearing, listening - Continuously * Repetitive hand motion (such as typing) - Continuously * Bending - Seldom * Climbing stairs/ladders - Seldom * Crawling - Seldom * Crouching - Seldom * Kneeling, squatting - Seldom * Lifting - over 50 pounds - Seldom * Lifting - up to 20 pounds - Seldom * Lifting - up to 50 pounds - Seldom * Pulling, pushing - Seldom * Reaching overhead - Seldom * Standing - Seldom * Stooping - Seldom * Walking - Seldom * Shoveling - Not Required Compensation and Benefits UC offers a wide array of complementary and affordable benefit options, to meet the financial, educational, health, and wellness needs of you and your family. Eligibility varies by position and FTE. * Competitive salary range dependent on the candidate's experience. * Comprehensive insurance plans including medical, dental, vision, and prescription coverage. * Flexible spending accounts and an award-winning employee wellness program, plus an employee assistance program. * Financial security via our life and long-term disability insurance, accident and illness insurance, and retirement savings plans. * Generous paid time off work options including vacation, sick leave, annual holidays, and winter season days in addition to paid parental leave. * Tuition remission is available for employees and their eligible dependents. * Enjoy discounts for on and off-campus activities and services. As a UC employee, and an employee of an Ohio public institution, if hired you will not contribute to the federal Social Security system, other than contributions to Medicare. Instead, UC employees have the option to contribute to a state retirement plan (OPERS, STRS) or an alternative retirement plan (ARP). To learn more about why UC is a great place to work, please visit our careers page at ******************************** For questions about the UC recruiting process or to request accommodations with the application, please contact Human Resources at ***********. The University of Cincinnati is an Equal Opportunity Employer. REQ: 97769 SF:OMJ SF:RM SF:HEJ, SF:INS SF:HERC SF:DIV SF:LJN SF:IHE Information Security Analyst 1, Digital Technology Solution Date: Jan 7, 2025 Location: Cincinnati, OH, US Facility: Main Campus
    $46k-62k yearly est. 37d ago
  • Cyber Analyst/ Cyber Security Analyst

    Cyber Defense Technologies 3.9company rating

    Cyber Security Analyst Job In Dayton, OH

    Cyber Analyst/Cyber Security Analyst** Cyber Defense Technologies (CDT), a leading small business cybersecurity and engineering firm, is seeking a skilled and detail-oriented Cyber Analyst/Cyber Security Analyst onsite in Dayton, OH with a TS/SCI clearance. In this role, you will monitor, analyze, for the purpose of mitigating threats. **Responsibilities:** * Monitor network traffic, logs and alert to identify suspicious activity. * Use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threat. * Perform in-depth analysis of potential threats, vulnerabilities, and incidents to determine severity and impacts. **Qualifications:** * Bachelor's degree in Systems Security, Network Engineering, Information Technology, or related Engineering discipline and typically 5+ years of relevant experience * Relevant experience may be considered in lieu of required education. * Relevant certifications (e.g. CEH, Security +, CYSA+) At CDT, we offer a collaborative and inclusive work environment where your expertise in finance and HR can help shape the future of cybersecurity and engineering solutions. This position offers the opportunity to lead financial strategies while supporting HR initiatives in a fast-paced, government contracting environment. **Compensation and Benefits:** * Competitive salary based on experience. * Comprehensive benefits package, including health, dental, and retirement plans. * Opportunities for professional development and career advancement. CDT is committed to hiring and retaining a diverse workforce. We are an Equal Opportunity employer making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. **Apply Now:** If you are a proactive Cyber Analyst/Cyber Security Analyst and thrive in dynamic environments, we encourage you to apply and join the CDT team!
    $78k-105k yearly est. 28d ago
  • Industrial Security Analyst/Principal Industrial Security Analyst

    Northrop Grumman 4.7company rating

    Cyber Security Analyst Job In Cincinnati, OH

    ** Education** ** Disabled Veteran Resources/Benefits** Industrial Security Analyst/Principal Industrial Security Analyst Cincinnati, OH * **Category:** Security * **Clearance Type:** Top Secret * **Shift:** 1st Shift (United States of America) * **Travel Required:** Yes, 10% of the Time * **Relocation Assistance:** Relocation assistance may be available * **Positions Available:** 1 **Requisition ID: R10173958** At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. **Northrop Grumman Mission Systems (NGMS) is looking for you to join our team as an Industrial Security Analyst/ Principal Industrial Security Analyst 3 in Cincinnati, OH.** We offer flexible work arrangements, phenomenal learning opportunities, exposure to a wide variety of projects and customers, and a very friendly inclusive environment! We are looking for self-motivated, proactive, and goal-oriented people to help us grow our services and become even better at what we do. * Develops, and administers security programs and procedures for classified or proprietary materials, documents, and equipment. * Studies and implements federal security regulations that apply to company operations. * Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies. * Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to restricted records and materials. * Conducts security education classes and security audits. Investigates security violations and prepares reports specifying preventive action to be taken. * The position will require COMSEC custodian work and prior knowledge is preferred but not required. **This position may be filled at either a level 2 or Level 3.** **Basic Qualifications for a level 2:** * Active Top Secret Clearance. * 2+ Years of Industrial Security or Contractor Program Security Officer or related experience with Bachelors; An additional 4 years of applicable work experience may be substituted for bachelor's degree. **Basic Qualifications for a level 3:** * Active Top Secret Clearance. * 5+ Years of Industrial Security or Contractor Program Security Officer or related experience with Bachelors; OR 3+ years with Masters; An additional 4 years of applicable work experience may be substituted for bachelor's degree. **Preferred Qualifications:** * CPSO certification * FSO certification * Top Secret//SCI clearance * The position will require COMSEC custodian work and prior knowledge is preferred but not required. **Salary Range:** $65,500 - $98,300 **Salary Range 2:** $80,600 - $121,000 The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions. Employees may be eligible for a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business. The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates. Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit. U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions. **Your Privacy** **Privacy Preference Center** ** Manage Consent Preferences** Always Active Always Active Always Active
    27d ago
  • Information Security Analyst 3, Digital Technology Solutions

    Isacaroma

    Cyber Security Analyst Job In Cincinnati, OH

    Information Security Analyst 3, Digital Technology Solutions University of Cincinnati Posted: December 10, 2024 Location: Cincinnati, Ohio **Current UC employees must apply internally via *SuccessFactors*** Assist in performing procedures and provides technical solutions that serve to provide appropriate access to and protect systems from unauthorized users. ****Essential Functions**** * Assist with developing strategies to achieve organizational goals; understand organization's strengths and weaknesses; analyze potential risks and opportunities; adapt recommendations to changing conditions and aligns with best practices. * Help facilitate large collaborative teams to achieve organizational goals. * Support community communication efforts, presenting security insights to leadership. * Develop technical documentation (designs, specifications, processes, workflows) and communications. * Develop and validate baseline security configurations for operating systems, applications, networking, and telecommunications equipment. * Participate in multiple, moderate- to high-risk projects. * Work with a team to advance project goals and provide technical help and subject matter expertise. Actively engage in project support and solutioning. * Share technical knowledge with teammates and help solve more complex problems. * Document individual progress on assigned deliverables. * Gather, maintain, and validate metrics for area of responsibility. * Mentor student workers and junior employees. * Carry out procedures to ensure that all systems, products, and services meet organization security standards. Recommend procedural improvements. * Research information security trends to maintain technical understanding of the latest vulnerabilities and threats. * Assist with providing artifacts to Governance, Risk & Compliance in relation to internal & external audits. * Independently work with business units to achieve security objectives and identifies, reports, and resolves security risks and violations. * Perform cyber investigations through forensic fact gathering with a focus on e-discovery. * Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations. * Provide guidance and technical expertise as needed for information security training and awareness programs. * Participate in troubleshooting processes during and outside of normal business hours and participate in change management and root cause analysis. * Mentor others regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS). * Serve as an expert resource to others. * Perform related duties based on departmental need. This job description can be changed at any time. ****Required Education**** Bachelor's Degree in Computer Science, Information Technology, Computer Engineering, or related field. Eight (8) years of relevant work experience and/or other specialized training can be used in lieu of education requirement. ****Required Experience**** * Two (2) years of related experience * Advanced knowledge of security tool administration. * Moderate project management skills. * Experience with system administration. * Experience with network architecture or some level of related technical training. * Advanced understanding of risk and vulnerability management. * Experience with incident response. * Advanced knowledge of industry standard security and compliance frameworks. ****Additional Qualifications Considered**** This position will primarily work in the area of information security operations. The ideal candidate will have experience in the field of information security operations. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and event management (SIEM), SSL and client certificate management, vulnerability management, privileged access management, password management, system/application administration for security related technologies, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes, and supervision/mentorship of co-op and student workers.2. CISSP, CISM, GISP or similar information security certification(s) are preferred. ****Physical Requirements/Work Environment**** * Sitting - Continuously * Repetitive hand motion (such as typing) - Continuously * Hearing, listening - Continuously * Talking - Continuously * Standing - Seldom * Walking - Seldom * Bending - Seldom * Stooping - Seldom * Climbing stairs/ladders - Seldom * Kneeling, squatting - Seldom * Crouching - Seldom * Crawling - Seldom * Reaching overhead - Seldom * Pulling, pushing - Seldom * Lifting - up to 20 pounds - Seldom * Lifting - up to 50 pounds - Seldom * Lifting - over 50 pounds - Seldom **Compensation and Benefits** UC offers a wide array of complementary and affordable benefit options, to meet the financial, educational, health, and wellness needs of you and your family. Eligibility varies by position and FTE. * Competitive salary range of $76,000 - $86,000 dependent on the candidate's experience. * Comprehensive insurance plans including medical, dental, vision, and prescription coverage. * Flexible spending accounts and an award-winning employee wellness program, plus an employee assistance program. * Financial security via our life and long-term disability insurance, accident and illness insurance, and retirement savings plans. * Generous paid time off work options including vacation, sick leave, annual holidays, and winter season days in addition to paid parental leave. * Tuition remission is available for employees and their eligible dependents. * Enjoy discounts for on and off-campus activities and services. For questions about the UC recruiting process or to request accommodations with the application, please contact Human Resources at ***********. **The University of Cincinnati is an Equal Opportunity Employer.** REQ: 97767 HISTORY IN BRIEF - The University of Cincinnati is a public urban serving research institution that was founded in 1819 and today is one of the country's largest universities offering more than 350 academic programs to more than 44,000 students. UC has many top ranked programs in areas such as Music and Arts, Medical and Human-Services, Criminal Justice and more. Located in an urban setting, UC is close to the heart of Cincinnati and allows easy access for students to enjoy all that the city offers. UC is also the alma mater of many notables such as President William Howard Taft; Albert Sabin, developer of the oral polio vaccine; Astronaut Neil Armstrong and Mary Weinberg, 2008 Olympic gold medalist. UC is classified as a Research University (Very High Research Activity) by the Carnegie Commission and is ranked as one of America's top 35 public research universities by the National Science Foundation. UC jumped 17 spots in the U.S. News & World Report rankings in the past two years alone. In addition to being named a “green university” by Princeton Review, UC has been named one of the world's most beautiful campuses by Forbes and Delta Sky magazines. Learn more at ******************** N STATEMENT - The University of Cincinnati serves the people of Ohio, the nation, and the world as a premier, public, urban research university dedicated to undergraduate, graduate, and professional education, experience-based learning, and research. We are committed to excellence and diversity in our students, faculty, staff, and all of our activities. We provide an inclusive environment where innovation and freedom of intellectual inquiry flourish. Through scholarship, service, partnerships,
    28d ago
  • Information Systems Security Officer (ISSO) II

    Blackphd

    Cyber Security Analyst Job In Dayton, OH

    **Location:** Dayton, OH Job Title: Information Systems Security Officer (ISSO) II **Company Name:** General Dynamics IT **Position Type:** Full Time **Post Date:** 11/13/2024 **Expire Date:** 01/11/2025 **Job Categories:** Engineering, Information Technology Job Description **Information Systems Security Officer (ISSO) II** The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: * Assist the ISSM in meeting their duties and responsibilities * Prepare, review, and update authorization packages * Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media * Notify ISSM when changes occur that might affect the authorization determination of the information system(s) * Conduct periodic reviews of information systems to ensure compliance with the security authorization package * Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change * Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly * Ensure all IS security-related documentation is current and accessible to properly authorized individuals * Ensure audit records are collected, reviewed, and documented (to include any anomalies) * Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties * Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans * Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them * Prepare reports on the status of security safeguards applied to computer systems * Perform ISSO duties in support of in-house and external customers * Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries Experience: * 2-5 years related experience * SAP experience **required** * Prior performance in roles such as System, Network Administrator, or ISSO Education: * Bachelors degree in a related area or equivalent experience (4 years) Certifications: * IAT Level II or IAM Level II - within 6 months of hire (Security+ CE, CCNA Security, etc.) Security Clearance: * TS/SCI required * Must be willing to sit for a CI polygraph Other Requirements: * Must be able to regularly lift up to 50lbs #AirforceSAPOpportunities | Contact Information **Company Name:** **Website:**
    $65k-87k yearly est. 28d ago

Learn More About Cyber Security Analyst Jobs

How much does a Cyber Security Analyst earn in Norwood, OH?

The average cyber security analyst in Norwood, OH earns between $63,000 and $113,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average Cyber Security Analyst Salary In Norwood, OH

$84,000

What are the biggest employers of Cyber Security Analysts in Norwood, OH?

The biggest employers of Cyber Security Analysts in Norwood, OH are:
  1. Federal Reserve Bank of San Francisco
  2. Per Scholas
Job type you want
Full Time
Part Time
Internship
Temporary