Post job

Cyber security analyst jobs in Orem, UT - 56 jobs

All
Cyber Security Analyst
Information Security Analyst
Security Engineer
Senior Security Engineer
Senior Security Analyst
Information Security Engineer
Network Security Analyst
Data Security Analyst
  • Network Security Analyst

    Mindlance 4.6company rating

    Cyber security analyst job in Lehi, UT

    Mindlance is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at ************************* Job Description Job Title: Network Security Analyst Duration: 6 Months Location: Lehi, UT Required: • Minimum 3+ years exp. • Experience with implementing policy on firewalls (Juniper & Palo alto experience preferred) • Review requests for new firewall policy • Understanding of IP stack • Ability to prioritize work and meet defined SLAs • Good communication skills - both verbal and written Additional Information Thanks & Regards, ______________________________________________________________________________________________________ Vikram Bhalla | Team-Recruitment | Mindlance, Inc. | Office: **************
    $75k-95k yearly est. 1d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Product Security Engineer, AI

    Meta 4.8company rating

    Cyber security analyst job in Salt Lake City, UT

    Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys. **Required Skills:** Product Security Engineer, AI Responsibilities: 1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more 2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities 3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products **Minimum Qualifications:** Minimum Qualifications: 4. BS or MS in Computer Science or a related field, or equivalent experience 5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development 6. Experience with exploiting common security vulnerabilities 7. Knowledge of common exploit mitigations and how they work 8. Coding and scripting experience in one or more general purpose languages **Preferred Qualifications:** Preferred Qualifications: 9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software that enables security processes 12. 8+ years of experience finding vulnerabilities in C/C++ code 13. Contributions to the security community (public research, blogging, presentations, bug bounty) 14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows **Public Compensation:** $184,000/year to $257,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $184k-257k yearly 60d+ ago
  • Sr. Security Analyst

    Maximus 4.3company rating

    Cyber security analyst job in Salt Lake City, UT

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. * Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $98k-134k yearly est. Easy Apply 5d ago
  • Sr Security Analyst

    Lightspeed DMS

    Cyber security analyst job in South Jordan, UT

    Lightspeed is a leading provider of cloud-based software for dealerships and Original Equipment Manufacturers (OEMs), serving the Powersport, Marine, RV, Trailer, Outdoor Power Equipment, and Golf Cart industries. Lightspeed's Dealer Management Solution (DMS) enables dealerships to optimize their end-to-end business operations, including sales, parts, service, rentals, accounting, and Customer Relationship Management (CRM). When implemented into their daily operations, Lightspeed helps dealers increase their profitability by selling more units, service, and parts, all while creating a more streamlined experience for customers. For nearly 40 years, Lightspeed has been empowering 4,500+ dealers across North America with the tools and technology they need to manage their dealerships. The Senior Security Analyst is responsible for team lead activities, such as monitoring, analyzing, and responding to security incidents across enterprise systems, cloud environments, and networks. This role ensures the confidentiality, integrity, and availability of organizational information through proactive detection, incident response, and continuous improvement. The ideal candidate will have a strong technical background in leading threat analysis, SIEM integration and management, vulnerability management, and incident handling. What you'll do: Monitor and investigate security alerts and events across SIEM, EDR, and network systems. Conduct root cause analysis and coordinate remediation of security incidents. Lead vulnerability assessments and ensure timely patching and mitigation. Develop and maintain incident response playbooks and escalation procedures. Collaborate with IT, DevOps, and Development teams to strengthen overall security posture. Lead proactive threat hunting and continuous tuning of detection mechanisms. Support internal and external audits (e.g., SOC 2) and risk assessments by providing evidence and guidance. Perform firewall management, including rule changes, troubleshooting, and SOP development for hybrid cloud/on-prem environments. Lead to red/blue team exercises and implement findings to improve defenses. Coordinate and assist with enterprise pen-tests, risk assessments, and compliance initiatives. Serve as a lead security advisor to business and technical teams, providing guidance on secure design, risk mitigation, and compliance using industry frameworks and best practices. What you should have: Qualifications: Bachelor's degree in Cybersecurity, Information Technology, or a related field, or equivalent experience. 8+ years of experience in information security, incident response, or SOC operations. Proven hands-on experience with SIEM tools (Splunk, Sentinel, QRadar, etc.) and EDR/XDR platforms (CrowdStrike, Darktrace, Microsoft Defender). Strong experience securing and monitoring cloud environments (AWS, Azure). Deep knowledge of security frameworks (NIST CSF, ISO 27001, SOC 2). Advanced scripting and automation proficiency (Python, PowerShell, Terraform). Excellent analytical, problem-solving, and communication skills. Preferred Qualifications: Relevant certifications such as AWS Security, CISSP, GCIH, GCIA, GPEN, GWAPT preferred. Experience integrating AI and automation into security operations workflows. Hands-on experience performing dynamic application security testing and red team exercises across endpoint and cloud environments. Expert-level networking and firewall expertise with platforms such as Palo Alto, Cisco, or Checkpoint. Master's degree in Cybersecurity, Information Technology, or a related field. Inclusion and Diversity at Lightspeed: At Lightspeed, we celebrate the uniqueness of every individual and encourage diverse perspectives. We believe that inclusion drives innovation and fosters meaningful connections. We are committed to building an environment where everyone feels valued and empowered to make an impact. Equal Employment Opportunity Statement: Lightspeed is an Equal Opportunity Employer and is dedicated to building a diverse and inclusive workforce. All qualified applicants will be considered for employment without regard to race, color, creed, ancestry, national origin, gender, sexual orientation, gender identity, gender expression, marital status, religion, age, disability, veteran status, or any other protected category. Important Note: Applicants must be authorized to work in the U.S. Ready to apply? Take the next step in your career-apply today and join a team where your skills will make an impact!
    $90k-125k yearly est. Auto-Apply 10d ago
  • Data Security Analyst - C78843 7.5 Salt Lake City, Utah

    CapB Infotek

    Cyber security analyst job in Salt Lake City, UT

    We are looking for a Data Security Analyst for our long-term multiyear project out of Salt Lake City, Utah. Build software libraries and services to provide secure-by-default services to software engineering teams, including authentication systems, secure service architectures, endpoint control solutions, and cloud controls · Partner with colleagues from across engineering and risk to ensure an outstanding developer experience that satisfies the firm's security needs · Collaborate on feature design and problem solving · Help to provide frictionless integration with the firm's runtime, deployment and SDLC technologies · Manage the full lifecycle of software components, from requirements through design, testing, development, release and demise · Help to communicate and promote best practices for security engineering across the firm · Engage in production troubleshooting Basic Qualifications · A strong grounding in security concepts, including secure coding practices, trusted computing and principles of authentication and authorization · A good understanding of public key and symmetric key cryptography · The ability to reason about performance, security, and process interactions in complex distributed systems · Proficiency in designing, developing and testing cross-platform software in one or more of Java, Golang or C#; open to using multiple languages · Experience developing, deploying and supporting software across the full Continuous Delivery life-cycle · The ability to understand and effectively debug both new and existing software · Experience meeting demands for high availability, low latency and scale · The ability to communicate technical concepts effectively, both in writing and orally, as well as the interpersonal skills required to collaborate effectively with colleagues across diverse engineering teams Preferred Qualifications · An understanding of regulated environments, e.g. financial services · Experience building services using public cloud providers such as AWS, Azure or GCP · Experience with threat modeling and risk assessment · Experience of practical security engineering in a Linux and/or Windows environment · Familiarity with service mesh concepts and service-oriented architectures · Familiarity with data protection principles and solutions · Experience with deploying software to containerized environments - Kubernetes/Docker · Experience monitoring, measuring, auditing and supporting software · Scripting skills using Python, PowerShell or bash · Experience with Terraform or similar infrastructure-as-code platforms, as a user and/or as a service provider
    $69k-98k yearly est. 60d+ ago
  • Senior Security Engineer

    Goodleap 4.6company rating

    Cyber security analyst job in Lehi, UT

    GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America. Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information. The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services. Your oversight will encompass: * Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. * Build-time controls: Managing applications/products security controls and activities during development. * Runtime controls: Overseeing security measures at runtime, from prevention to detection and response. Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed. While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities * Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes. * Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. * Support or develop components of the security analytics platform. * Contribute to investigations, threat hunting, and incident response activities in a supporting role. * Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns. * Support the security operations team with the vulnerability management lifecycle for products and services under your purview. * Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities. Required Skills, Knowledge & Abilities * Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences. * Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization. * Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments. * Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus). * Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble. * Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc. * Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases. * Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault. * Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed. * Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas. * Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments. * Experience engaging with vendors in design partnerships. * Experience overseeing vulnerability and threat management at the platform and application levels. * Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement. * Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution. $146,000 - $170,000 a year In addition to the above salary, this role may be eligible for a bonus. Additional Information Regarding Job Duties and s: Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law. If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today! We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI. We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $146k-170k yearly 60d+ ago
  • Information Security Analysts

    University of Utah 4.0company rating

    Cyber security analyst job in Salt Lake City, UT

    Bookmark this Posting Print Preview | Apply for this Job Please see Special Instructions for more details. About UIT: University Information Technology (UIT), the central IT service provider for the University of Utah, reports to the U's Chief Information Officer and is responsible for many of the U's shared IT services including the wired and wireless network; Campus Information Services (CIS) portal; UMail, telephone, and online collaboration; digital learning technologies; information security; software licensing; and a host of other IT systems and services. About the University of Utah: Located in Salt Lake City, the U is the flagship institution of the State of Utah's system of higher education, home to arts and museum venues and a member of the BIG-12 Conference. Skiing and snowboarding opportunities are a short distance from campus, and opportunities to pursue activities from biking to hiking to fishing abound. Salt Lake City is home to the Utah Symphony and Opera, Ballet West, professional sports teams, and a wide range of other cultural and recreational activities. The University of Utah offers a comprehensive benefits package for eligible employees including: * Excellent health, dental, and wellness coverage at affordable rates * 14.2% retirement contributions * Generous paid leave time * 11 paid holidays per year * 50% tuition reduction for employees after completing probationary period, and spouse, and dependent children after three years * Flex spending accounts * Free transit on most UTA services * Employee discounts on a variety of products and services including cell phones & plans, entertainment, health and fitness, restaurants, retail, and travel * Professional development opportunities * A wellness program to promote health and quality of life * Learn more about the great benefits of working for University of Utah: benefits.utah.edu For more information regarding how our salary and benefit offerings impact the overall compensation here at the University of Utah, please see our Total Compensation Calculator: ****************************************** Announcement Details Open Date 12/15/2025 Requisition Number PRN43780B Job Title Information Security Analysts Working Title Information Security Analysts Career Progression Track P00 Track Level P5 - Expert, P4 - Advanced, P3 - Career FLSA Code Computer Employee Patient Sensitive Job Code? No Standard Hours per Week 40 Full Time or Part Time? Full Time Shift Day Work Schedule Summary Monday - Friday, 8:00 AM - 5:00 PM. Some nights or weekends are possible based on a rotating on call shift. This is a hybrid position. VP Area President Department 00954 - UIT Systems & Security Location Campus City Salt Lake City, UT Type of Recruitment External Posting Pay Rate Range $88,000 - $131,300 Close Date 02/28/2026 Priority Review Date (Note - Posting may close at any time) Job Summary Information Security Analysts The incumbent will play a critical role in safeguarding regulated data across the enterprise by monitoring and analyzing the organization's data security posture. This position focuses on configuring Data Security Posture Management (DSPM) settings and policies, interpreting results, creating reports, identifying risks, and ensuring compliance. The analyst will take a risk-based approach to assess and remediate issues related to unauthorized storage or transmission of regulated data across cloud and on-premise environments. Learn more about the great benefits of working for University of Utah: benefits.utah.edu The department may choose to hire at any of the below job levels and associated pay rates based on their business need and budget. Responsibilities Data Security Monitoring * Review and analyze DSPM tool outputs to identify misconfigurations, unauthorized data flows, and storage of regulated data in non-approved locations. * Monitor the movement of sensitive data across cloud and on-prem systems, ensuring compliance with internal policies and regulatory requirements. Risk Assessment & Governance * Apply a risk-based methodology to prioritize remediation efforts. * Maintain applicable risk register entries and document findings for governance reporting. Collaboration * Partner with the Enterprise Security team to validate technical controls. * Work closely with the Chief Data Officer and Privacy Office to align DSPM findings with data governance and privacy requirements. Compliance & Policy Alignment * Ensure adherence to frameworks such as NIST CSF, CIS 18, and other applicable regulations (e.g., HIPAA, FERPA, etc. etc.). * Support audits and compliance reviews by providing DSPM-related evidence. Reporting & Communication * Prepare dashboards and reports for leadership summarizing DSPM findings, trends, and risk posture. * Communicate actionable insights to stakeholders in clear, business-focused language. Minimum Qualifications EQUIVALENCY STATEMENT: 1 year of higher education can be substituted for 1 year of directly related work experience (Example: bachelor's degree = 4 years of directly related work experience). Department may hire employee at one of the following job levels: Information Security Analyst, III: Requires a bachelor's (or equivalency) + 6 years or a master's (or equivalency) + 4 years of directly related work experience. Information Security Analyst, IV: Requires a bachelor's (or equivalency) + 8 years or a master's (or equivalency) + 6 years of directly related work experience. Information Security Analyst, V: Requires a bachelor's (or equivalency) + 10 years or a master's (or equivalency) + 8 years of directly related work experience. Preferences Certifications such as CISSP, CRISC, or equivalent. Master's degree in information security or another relevant field. Experience with a DSPM tool. 3+ years that are specifically tied to GRC experience. Type Benefited Staff Special Instructions Summary About UIT: University Information Technology (UIT), the central IT service provider for the University of Utah, reports to the U's Chief Information Officer and is responsible for many of the U's shared IT services including the wired and wireless network; Campus Information Services (CIS) portal; UMail, telephone, and online collaboration; digital learning technologies; information security; software licensing; and a host of other IT systems and services. About the University of Utah: Located in Salt Lake City, the U is the flagship institution of the State of Utah's system of higher education, home to arts and museum venues and a member of the BIG-12 Conference. Skiing and snowboarding opportunities are a short distance from campus, and opportunities to pursue activities from biking to hiking to fishing abound. Salt Lake City is home to the Utah Symphony and Opera, Ballet West, professional sports teams, and a wide range of other cultural and recreational activities. The University of Utah offers a comprehensive benefits package for eligible employees including: * Excellent health, dental, and wellness coverage at affordable rates * 14.2% retirement contributions * Generous paid leave time * 11 paid holidays per year * 50% tuition reduction for employees after completing probationary period, and spouse, and dependent children after three years * Flex spending accounts * Free transit on most UTA services * Employee discounts on a variety of products and services including cell phones & plans, entertainment, health and fitness, restaurants, retail, and travel * Professional development opportunities * A wellness program to promote health and quality of life * Learn more about the great benefits of working for University of Utah: benefits.utah.edu For more information regarding how our salary and benefit offerings impact the overall compensation here at the University of Utah, please see our Total Compensation Calculator: ****************************************** Additional Information The University of Utah values candidates who have experience working in settings with students from diverse backgrounds and possess a strong commitment to improving access to higher education for historically underrepresented students. Individuals from historically underrepresented groups, such as minorities, women, qualified persons with disabilities and protected veterans are encouraged to apply. Veterans' preference is extended to qualified applicants, upon request and consistent with University policy and Utah state law. Upon request, reasonable accommodations in the application process will be provided to individuals with disabilities. The University of Utah is an Affirmative Action/Equal Opportunity employer and does not discriminate based upon race, ethnicity, color, religion, national origin, age, disability, sex, sexual orientation, gender, gender identity, gender expression, pregnancy, pregnancy-related conditions, genetic information, or protected veteran's status. The University does not discriminate on the basis of sex in the education program or activity that it operates, as required by Title IX and 34 CFR part 106. The requirement not to discriminate in education programs or activities extends to admission and employment. Inquiries about the application of Title IX and its regulations may be referred to the Title IX Coordinator, to the Department of Education, Office for Civil Rights, or both. To request a reasonable accommodation for a disability or if you or someone you know has experienced discrimination or sexual misconduct including sexual harassment, you may contact the Director/Title IX Coordinator in the Office of Equal Opportunity and Affirmative Action: Director/ Title IX Coordinator Office of Equal Opportunity and Affirmative Action (OEO/AA) 383 University Street, Level 1 OEO Suite Salt Lake City, UT 84112 ************ ************ Online reports may be submitted at oeo.utah.edu For more information: *************************************** To inquire about this posting, email: ******************* or call ************. The University is a participating employer with Utah Retirement Systems ("URS"). Eligible new hires with prior URS service, may elect to enroll in URS if they make the election before they become eligible for retirement (usually the first day of work). Contact Human Resources at ************** for information. Individuals who previously retired and are receiving monthly retirement benefits from URS are subject to URS' post-retirement rules and restrictions. Please contact Utah Retirement Systems at ************** or ************** or University Human Resource Management at ************** if you have questions regarding the post-retirement rules. This position may require the successful completion of a criminal background check and/or drug screen. ************************************ This report includes statistics about criminal offenses, hate crimes, arrests and referrals for disciplinary action, and Violence Against Women Act offenses. They also provide information about safety and security-related services offered by the University of Utah. A paper copy can be obtained by request at the Department of Public Safety located at 1658 East 500 South. Posting Specific Questions Required fields are indicated with an asterisk (*). * * What is your highest level of completed education? * None * High School Diploma or Equivalent * Associate Degree * Bachelor's Degree * Master's Degree * Doctorate Degree * * How many years of related work experience do you have? * Less than 6 years * 6 years or more, but less than 9 years * 9 years or more, but less than 12 years * 12 years or more, but less than 15 years * 15 years or more Applicant Documents Required Documents * Resume * Cover Letter * List of References Optional Documents
    $88k-131.3k yearly Auto-Apply 33d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Salt Lake City, UT

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 59d ago
  • Concierge Security Engineer 3

    Arcticwolf

    Cyber security analyst job in Pleasant Grove, UT

    At Arctic Wolf, we're not just navigating the cybersecurity landscape - we're redefining it. Our global team of dedicated Pack members is driving innovation and setting new industry standards every day. Our impact speaks for itself: we've earned recognition on the Forbes Cloud 100, CNBC Disruptor 50, Fortune Future 50, and Fortune Cyber 60 lists, and we recently took home the 2024 CRN Products of the Year award. We're proud to be named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services and earning a Customers' Choice distinction from Gartner Peer Insights. Our Aurora Platform also received CRN's Products of the Year award in the inaugural Security Operations Platform category. Join a company that's not only leading, but also shaping, the future of security operations. Our mission is simple: End Cyber Risk. We're looking for a Concierge Security Engineer 3 to be part of making that happen. About the Role: The Concierge Security Engineer supports the technical relationship with their assigned customers and leverages their skills and expertise to create and maintain an outstanding partnership with customers around the provision of security services. As a Concierge Security Engineer, you will: Creating and maintaining a partnership with our customers Analyze log and system data Interact with, and manage, internal and external stakeholders Communicate, educate, and share information with non-technical people Help our customers diagnose problems as well as support specific customer requests Primary technical point of contact for our customers Champion for our customers within the Arctic Wolf Team Mentoring junior analysts with their technical and soft skills To support effective communication and collaboration, this role requires on-camera participation (Zoom) during all customer and internal meetings This is a role that combines aspects of an IT Security Analyst, Security Architect, Incident Response Consultant, a Security Sales Engineer, and Technical Support. The CSE will be responsible for implementing, overseeing, managing, and supporting the network security infrastructure for multiple enterprises by leveraging Arctic Wolf's cloud infrastructure and their expertise in a wide variety of fields. The CSE works in a team along with an assigned Concierge Security Analyst and Customer Success Managers. Arctic Wolf CSEs develop strong working relationships with our customers and feel ownership over their security posture. We are looking for someone who has most of the following: 3+ years in Information Security, Network Security, or Cyber Security 3+ years additionally as a Network Admin, System Admin, Cloud Admin, or similar is strongly preferred Have a detailed understanding of Enterprise IT Security, including: Firewalls, Intrusion Detection, Antivirus, Content Filtering, and Proxies Have an understanding of Enterprise IT Operations, including: Networking, Active Directory, LDAP, Windows Server, and Cloud Infrastructures Analyze log and system data from the above list and other IT systems Know how to use one or more scripting tools and languages such as Python, Bash, and Power Shell Great writing and speaking skills Excellent relationship building skills in a professional context A positive “can-do” attitude A willingness to learn and continuous self-improvement There are no specific degree or certification requirements but degrees in engineering or technology are a plus. Any security or IT certification such as CISSP is also positive. Additional skills and experience: Security forensics Malware analysis E-discovery Threat containment Firewall and IDS provisioning Proxy and content filtering provisioning Authentication and identify management Risk and vulnerability Assessment Network and security Auditing Network troubleshooting Penetration testing Attack simulation PowerPoint presentation skills On-Camera Policy To support a fair, transparent, and engaging interview experience, candidates interviewing remotely are expected to be on camera during all video interviews. Being on camera fosters authentic connection, improves communication, and allows for full engagement from both candidates and interviewers. We understand that technical, bandwidth, or location-related challenges may occasionally prevent video use. If this applies, candidates are required to notify us in advance so we can explore appropriate accommodations. About Arctic Wolf At Arctic Wolf, we foster a collaborative and inclusive work environment that thrives on diversity of thought, background, and culture. This is reflected in our multiple awards, including Top Workplace USA (2021-2024), Best Places to Work - USA (2021-2024), Great Place to Work - Canada (2021-2024), Great Place to Work - UK (2024), and Kununu Top Company - Germany (2024). Our commitment to bold growth and shaping the future of security operations is matched by our dedication to customer satisfaction, with over 7,000 customers worldwide and more than 2,000 channel partners globally. As we continue to expand globally and enhance our technology, Arctic Wolf remains the most trusted name in the industry. Our Values Arctic Wolf recognizes that success comes from delighting our customers, so we work together to ensure that happens every day. We believe in diversity and inclusion, and truly value the unique qualities and unique perspectives all employees bring to the organization. And we appreciate that-by protecting people's and organizations' sensitive data and seeking to end cyber risk- we get to work in an industry that is fundamental to the greater good. We celebrate unique perspectives by creating a platform for all voices to be heard through our Pack Unity program. We encourage all employees to join or create a new alliance. See more about our Pack Unity here. We also believe and practice corporate responsibility, and have recently joined the Pledge 1% Movement, ensuring that we continue to give back to our community. We know that through our mission to End Cyber Risk we will continue to engage and give back to our communities. All wolves receive compelling compensation and benefits packages, including: · Equity for all employees · Flexible time off and paid volunteer days · RRSP and 401k match · Training and career development programs · Comprehensive private benefits plan including medical, mental health, dental, disability, life and AD&D, and value-added services · Robust Employee Assistance Program (EAP) with mental health services · Fertility support and paid parental leave Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race, color, religion, sex, orientation, national origin, age, disability, genetics, or any other basis forbidden under federal, provincial, or local law. Arctic Wolf is committed to fostering a welcoming, accessible, respectful, and inclusive environment ensuring equal access and participation for people with disabilities. As such, we strive to make our entire employee experience as accessible as possible and provide accommodations as required for candidates and employees with disabilities and/or other specific needs where possible. Please let us know if you require any accommodations by emailing *************************. Security Requirements Conducts duties and responsibilities in accordance with AWN's Information Security policies, standards, processes and controls to protect the confidentiality, integrity and availability of AWN business information (in accordance with our employee handbook and corporate policies). Background checks are required for this position. This position may require access to information protected under U.S. export control laws and regulations, including the Export Administration Regulations (“EAR”). Please note that, if applicable, an offer for employment will be conditioned on authorization to receive software or technology controlled under these laws and regulations.
    $79k-110k yearly est. Auto-Apply 39d ago
  • Sr. Security Engineer

    Rocky Mountain ATV 3.7company rating

    Cyber security analyst job in Payson, UT

    Job DescriptionDescription: Rocky Mountain is hiring a new Team Member to join our IT Department as a Sr. Security Engineer. For over 40 years, Rocky Mountain ATV/MC has grown to become one of the world's largest providers for power-sport enthusiasts - having the largest selection of riding gear and parts available. Rocky Mountain ATV/MC is not just a distributor, we are also gear testers, product developers, manufacturers of off-road parts/components, and one of the powersports industries leading resources for instruction and demonstration. There has never been a better time to start your career with us! In 2021, Rocky Mountain ATV/MC became a 100% Employee-Owned Organization. Come join us as an Employee-Owner and work with the best in a fast paced, exciting industry. Do you love powersports? Do you want to work for a company with a fun and rewarding environment? Rocky Mountain ATV/MC is that company, we are comprised of powersports enthusiasts just like you. We currently have amazing opportunities for dynamic and dependable individuals who want to share their passion and experience. GET READY. As a colleague at Rocky Mountain ATV/MC, you can enjoy benefits and perks including: Employee Stock Ownership Program (ESOP) Competitive compensation with regular bonuses Excellent tuition reimbursement, graduation bonus and ZERO interest education loans for all employees Delicious onsite cafeterias with discounted meals Excellent Medical, Dental, Vision, and Voluntary Life insurance plans 401K with company match PTO and holiday pay Wellness programs and discounted local gym membership Powersport and wellness race/participation reimbursements Generous employee discount on thousands of products Career advancement, professional development, and opportunities to grow What you will do in this role: Assist in the development, testing, and implementation of secure end-user security technologies Conduct static and dynamic code analysis using industry standard tools Ability to effectively give, receive, and respond to feedback Ensure company compliance with security standards and company policy Create and maintain company documentation regarding security policies and procedures Mentor and train junior team members Make recommendations in response to current security events, covering the spectrum from sudden zero-day vulnerabilities to upcoming end-of-life system preparations Research and give security recommendations regarding new technologies, evolution of business requirements, system and network designs Ability to troubleshoot security related issues Monitor security posture, respond to incidents, and manage day-to-day security tasks Work collaboratively and cooperatively with others, committing to a workplace of teamwork, dignity, and respect Other duties as assigned How you will thrive in this role: CCSP or similar Working knowledge of next-gen firewall administration and configuration, network security, and operations best practices 5+ years of information security applications and systems experience 5+ years of experience with network security, endpoint security, or security threat vectors 1+ year of Packet Analysis experience Excellent communications skills Good Project Management skills Well versed in security frameworks (NIST/CIS) Ability to conduct forensic analytical studies and investigations effectively and efficiently Detail oriented Networking - VLAN, WAN, LAN, Routers, Switches, Access Points, Firewalls, IPS, VPN, etc Proficiency with LINUX commands Scripting skills (python, PowerShell, bash) Ability to understand, read, and/or comprehend instructions and directions including different numbers and specifications Be a collaborative team player who is willing to work with others and independently. Strong work ethic focused on commitment, pride of work, quality, desire to learn, and dependability Physical Demands: Position performance will require the regular physical ability to walk and function in elevation changes means of self-propulsion to include steps, ladders, and varied walking and working surfaces. Ability to negotiate warehouse work areas in a safe manner and behavior. Vision abilities specific to the position will include close vision, peripheral vision, depth perception, and the ability to focus. Performing in this role will require the use of hands to use and handle tools, objects, materials, and controls. Performance requires the frequent ability to sit, talk, hear, stand, climb, balance, stoop kneel, crouch, or crawl. Employee may have to lift and/or move up to 45 pounds. Equality: Rocky Mountain ATV/MC is proud to be a company of inclusion, belonging, and fairness. We rely on our colleagues to collaborate, have a voice, and perspective. We embrace everyone and are proud to be an equal opportunity employer that does not discriminate on the basis of race, color, ethnicity, ancestry, religion, sex, national origin, sexual orientation, age, citizenship status, marital status, disability, gender identity/expression, veteran status, or genetic information or any other category protected under applicable law. Requirements:
    $106k-139k yearly est. 26d ago
  • Information Security Data and Risk Analyst

    Ivanti 4.5company rating

    Cyber security analyst job in Salt Lake City, UT

    Are you an experienced Security Data and Risk Analyst that wants to develop and create awareness around security-relevant key performance and key risk indicators? At Ivanti, we work passionately and authentically, striving to win together and make a real impact for our customers and each other. Join us to elevate your career and help deliver innovative solutions in a dynamic, empowering environment. Why this role matters As the Security Data and Risk Analyst, you will generate enterprise visibility, awareness and understanding of major risk and security issues in a comprehensive and easily consumed manner to support the corporate objectives and especially the reduction of risk. You will be a leader in our Information Security Group which is a global team of experienced professionals dedicated to ensuring the security of Ivanti's products, corporate and production networks, environments, and of course, its data What you'll do: Lead the execution of multiple functions: Taking ownership of and creating awareness around security-relevant key performance and key risk indicators Develop automation for data gathering, analysis and presentation using Python and Go Educate as well as inform audiences of a wide variety of security and risk expertise, including building libraries of material to support understanding of benefits and costs of security management. Generating insights and supporting information for decisions to be made including wrangling data from complex data sets and data sources Create dynamic dashboards and presentations Articulate risk and risk management as realistic, measurable harm; Create dynamic dashboards and presentations Support the Security Governance and executive workstreams, including analysis and presentations materials. Coordinate, chair and present data to management, leadership and C-suite stakeholders in their languages. What you will bring: Minimum of a bachelor's degree, preferably in information systems or data analytics. 4+ years' experience with Python or Go automation and scripting 2+ experience with Risk Management 1 years' experience with Risk Modeling 4+ years Data Analytics experience Familiarity with information security and security terms Experience conducting reporting operations such as presentations, metrics, dashboards, KPIs, KRIs, OKRs. 1 year experience executing/leading project management efforts in a technology-related arena. Can show evidence has created effective KPIs, KRIs and OKRs and a means to measure and report each. Experience with cloud, onprem, corporate, remote, solutions/products dev and transformative environments. Ability to articulate themes from: NIST, ISO, SOC 2, FedRAMP, GDPR and DORA, and Security, Privacy principles. Why Ivanti? Friendly flexible working model: Empower excellence whether you're at home or in the office and support work-life balance. Competitive compensation & total rewards: Including health, wellness, and financial plans tailored for you and your family. Global, diverse teams: Collaborate with talented people from 23+ countries. Learning & development: Grow your skills with access to best-in-class learning tools and programs. Equity & belonging: We value every voice. Your story helps inform our solutions for a changing world. What drives us Ivanti's mission is to elevate human potential within organizations by managing, protecting and automating technology for continuous innovation. It is through diverse and inclusive hiring, decision-making, and commitment to our employees and partners that we will continue to build and deliver world-class solutions for our customers. To learn more about Ivanti's Mission and Core Values. Inclusion at Ivanti Ivanti is proud to be an Equal Opportunity Employer. We're committed to building a diverse team and fostering an inclusive environment where everyone belongs. We welcome applicants from all backgrounds and walks of life. Need adjustments during the process? Reach out to ***************** we're happy to help. #LI-Remote
    $70k-100k yearly est. Auto-Apply 29d ago
  • Network Security Analyst

    Mindlance 4.6company rating

    Cyber security analyst job in Lehi, UT

    Mindlance is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at ************************* Job Description Job Title: Network Security Analyst Duration: 6 Months Location: Lehi, UT Required: • Minimum 3+ years exp. • Experience with implementing policy on firewalls (Juniper & Palo alto experience preferred) • Review requests for new firewall policy • Understanding of IP stack • Ability to prioritize work and meet defined SLAs • Good communication skills - both verbal and written Additional InformationThanks & Regards, ______________________________________________________________________________________________________ Vikram Bhalla | Team-Recruitment | Mindlance, Inc. | Office: **************
    $75k-95k yearly est. 60d+ ago
  • Security Engineer - IR Threat Intelligence

    Meta 4.8company rating

    Cyber security analyst job in Salt Lake City, UT

    Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. **Required Skills:** Security Engineer - IR Threat Intelligence Responsibilities: 1. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network 2. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences 3. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations 4. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems 5. Engage constructively in cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions **Minimum Qualifications:** Minimum Qualifications: 6. 5+ years threat intelligence experience 7. Bachelor's degree or equivalent experience in Security 8. Familiarity with campaign tracking techniques and ability to convert the tracking results to long term countermeasures 9. Familiarity with threat modeling framework, such as Diamond Model or/and MITRE ATT&CK framework 10. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks 11. Proven track record of managing and executing on short term and long term projects 12. Ability to work with a team spanning multiple locations/time zones 13. Ability to prioritize and execute tasks with minimal direction or oversight 14. Ability to think critically and qualify assessments with solid communications skills 15. Coding or scripting experience in one or more scripting languages such as Python or PHP **Preferred Qualifications:** Preferred Qualifications: 16. Experience close collaborating with incident responders on incident investigations 17. Familiarity with malware analysis or network traffic analysis 18. Familiarity with nation-state, sophisticated criminal, or supply chain threats 19. Production of file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort 20. Experience in one or more query languages such as SQL 21. Experience writing production code for threat intelligence tooling 22. Experience conducting large scale data analysis 23. Experience working across the broader security community **Public Compensation:** $154,000/year to $217,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $154k-217k yearly 5d ago
  • Jr. Information Security Analyst (Information Security Analyst I)

    Lightspeed DMS

    Cyber security analyst job in South Jordan, UT

    Lightspeed is a leading provider of cloud-based software for dealerships and Original Equipment Manufacturers (OEMs), serving the Powersport, Marine, RV, Trailer, Outdoor Power Equipment, and Golf Cart industries. Lightspeed's Dealer Management Solution (DMS) enables dealerships to optimize their end-to-end business operations, including sales, parts, service, rentals, accounting, and Customer Relationship Management (CRM). When implemented into their daily operations, Lightspeed helps dealers increase their profitability by selling more units, service, and parts, all while creating a more streamlined experience for customers. For nearly 40 years, Lightspeed has been empowering 4,500+ dealers across North America with the tools and technology they need to manage their dealerships. The Jr. Information Security Analyst I supports Lightspeed's cybersecurity operations by assisting with monitoring, analysis, and remediation of security incidents across enterprise systems and cloud environments. Working under the direction of senior analysts, this role helps ensure the confidentiality, integrity, and availability of company data while gaining experience in security tools, processes, and governance activities. The ideal candidate is detail-oriented, eager to learn, and passionate about developing technical and compliance skills in a collaborative environment. What you'll do: Monitor and investigate security alerts and events across SIEM, EDR, and network systems. Assist in the investigation of potential security incidents under senior analyst guidance. Help maintain documentation of incidents, findings, and remediation steps. Perform vulnerability scanning and tracking remediation efforts. Support maintenance of security tools and platforms (endpoint protection, SIEM, firewalls). Assist with compliance tasks related to SOC 2, internal audits, and risk assessments. Assist with gathering security metrics and reports on a monthly basis. Contribute to updating security policies, standards, and procedures. Perform third-party vendor security reviews and due diligence processes. Assist in security awareness initiatives and internal training activities. Collaborate with IT and engineering teams to ensure secure configurations and patch compliance. Assist in the creation of automation scripts and the integration of AI with security workflows. What you should have: Qualifications: Bachelor's degree in Cybersecurity, Information Technology, or a related field, or equivalent experience. 0-3 years of experience in information security, IT operations, or related technical roles. Foundational knowledge of networking, operating systems, and cloud environments (AWS, Azure). Strong experience securing and monitoring cloud environments (AWS, Azure). Exposure to SIEM or EDR tools such as Splunk, Sentinel, or Defender. Understanding of basic security concepts (vulnerabilities, exploits, least privilege, encryption). Excellent analytical, problem-solving, and communication skills. Knowledge of security frameworks such as NIST CSF and SOC 2. Ability to work collaboratively in a team-oriented environment. Preferred Qualifications: CompTIA Security+, CySA+, or equivalent entry-level certification. Experience with vulnerability scanners (Qualys, Nessus, or Rapid7). Exposure to GRC or vendor risk management tools. Exposure to SIEM platforms, Elastic, Splunk, Security Onion. Familiarity with scripting or automation (PowerShell, Python). Demonstrated interest in pursuing a long-term career in cybersecurity operations or compliance. Inclusion and Diversity at Lightspeed: At Lightspeed, we celebrate the uniqueness of every individual and encourage diverse perspectives. We believe that inclusion drives innovation and fosters meaningful connections. We are committed to building an environment where everyone feels valued and empowered to make an impact. Equal Employment Opportunity Statement: Lightspeed is an Equal Opportunity Employer and is dedicated to building a diverse and inclusive workforce. All qualified applicants will be considered for employment without regard to race, color, creed, ancestry, national origin, gender, sexual orientation, gender identity, gender expression, marital status, religion, age, disability, veteran status, or any other protected category. Important Note: Applicants must be authorized to work in the U.S. Ready to apply? Take the next step in your career-apply today and join a team where your skills will make an impact!
    $69k-101k yearly est. Auto-Apply 10d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Salt Lake City, UT

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 59d ago
  • Senior Security Engineer

    Goodleap 4.6company rating

    Cyber security analyst job in Lehi, UT

    About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America. Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information. The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services. Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response. Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed. While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes. Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. Support or develop components of the security analytics platform. Contribute to investigations, threat hunting, and incident response activities in a supporting role. Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns. Support the security operations team with the vulnerability management lifecycle for products and services under your purview. Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities. Required Skills, Knowledge & Abilities Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences. Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization. Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments. Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus). Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble. Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc. Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases. Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault. Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed. Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas. Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments. Experience engaging with vendors in design partnerships. Experience overseeing vulnerability and threat management at the platform and application levels. Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement. Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution. Additional Information Regarding Job Duties and s: Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law. If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today! We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
    $97k-121k yearly est. Auto-Apply 60d+ ago
  • Concierge Security Engineer 2

    Arcticwolf

    Cyber security analyst job in Pleasant Grove, UT

    At Arctic Wolf, we're not just navigating the cybersecurity landscape - we're redefining it. Our global team of dedicated Pack members is driving innovation and setting new industry standards every day. Our impact speaks for itself: we've earned recognition on the Forbes Cloud 100, CNBC Disruptor 50, Fortune Future 50, and Fortune Cyber 60 lists, and we recently took home the 2024 CRN Products of the Year award. We're proud to be named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services and earning a Customers' Choice distinction from Gartner Peer Insights. Our Aurora Platform also received CRN's Products of the Year award in the inaugural Security Operations Platform category. Join a company that's not only leading, but also shaping, the future of security operations. Our mission is simple: End Cyber Risk. We're looking for a Concierge Security Engineer 2 to be part of making that happen. About the Role: The Concierge Security Engineer 2 (CSE2) is a key member of the Concierge Security Team that delivers world-class Arctic Wolf security services. The CSE2 supports the technical relationship with their assigned customers and leverages their skills and expertise to fulfill key responsibilities. As a Concierge Security Engineer 2, you will: Create and maintain an outstanding partnership with customers; Support the direct delivery of Arctic Wolf network and endpoint security solutions to customers, including tasks such as investigating security events, and configuring, troubleshooting and verifying data sources; Action or escalate customer requests for guidance, information or support in a timely manner, including coordinating efforts with other teams, as needed. Proactively interact and communicate with internal and external stakeholders. To support effective communication and collaboration, this role requires on-camera participation (Zoom) during all customer and internal meetings. The CSE2 role combines aspects of an IT Security Analyst, a Security Architect, and an Incident Response Consultant. A successful CSE2 possesses strong technical aptitude and an ability to communicate, educate, and share information effectively with non-technical people. Who You Are: You thrive in fast-paced environments and have a positive can-do attitude. You are a critical thinker that continually learns and can navigate uncertainty. You enjoy working with customers and in a team, are an excellent communicator, and are able to easily interact with a variety of people, personalities and technical skill levels. Above all, your passion for cybersecurity and partnering with customers shows in everything you do! Your experience could look like: 1-5 years of experience in a hands-on security role with a good knowledge of security architecture Degree or diploma in a relevant field, or certifications and experience equivalent Strong partnering and relationship building skills in a professional context Strong communication skills, both written and verbal Strong analytical and problem-solving skills Additional skills and experience: Security testing and forensics tools Malware analysis Scripting/Coding experience Incident response Authentication and identity management Risk management, assessment and common compliance frameworks Penetration testing and attack simulation On-Camera Policy To support a fair, transparent, and engaging interview experience, candidates interviewing remotely are expected to be on camera during all video interviews. Being on camera fosters authentic connection, improves communication, and allows for full engagement from both candidates and interviewers. We understand that technical, bandwidth, or location-related challenges may occasionally prevent video use. If this applies, candidates are required to notify us in advance so we can explore appropriate accommodations. About Arctic Wolf At Arctic Wolf, we foster a collaborative and inclusive work environment that thrives on diversity of thought, background, and culture. This is reflected in our multiple awards, including Top Workplace USA (2021-2024), Best Places to Work - USA (2021-2024), Great Place to Work - Canada (2021-2024), Great Place to Work - UK (2024), and Kununu Top Company - Germany (2024). Our commitment to bold growth and shaping the future of security operations is matched by our dedication to customer satisfaction, with over 7,000 customers worldwide and more than 2,000 channel partners globally. As we continue to expand globally and enhance our technology, Arctic Wolf remains the most trusted name in the industry. Our Values Arctic Wolf recognizes that success comes from delighting our customers, so we work together to ensure that happens every day. We believe in diversity and inclusion, and truly value the unique qualities and unique perspectives all employees bring to the organization. And we appreciate that-by protecting people's and organizations' sensitive data and seeking to end cyber risk- we get to work in an industry that is fundamental to the greater good. We celebrate unique perspectives by creating a platform for all voices to be heard through our Pack Unity program. We encourage all employees to join or create a new alliance. See more about our Pack Unity here. We also believe and practice corporate responsibility, and have recently joined the Pledge 1% Movement, ensuring that we continue to give back to our community. We know that through our mission to End Cyber Risk we will continue to engage and give back to our communities. All wolves receive compelling compensation and benefits packages, including: · Equity for all employees · Flexible time off and paid volunteer days · RRSP and 401k match · Training and career development programs · Comprehensive private benefits plan including medical, mental health, dental, disability, life and AD&D, and value-added services · Robust Employee Assistance Program (EAP) with mental health services · Fertility support and paid parental leave Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race, color, religion, sex, orientation, national origin, age, disability, genetics, or any other basis forbidden under federal, provincial, or local law. Arctic Wolf is committed to fostering a welcoming, accessible, respectful, and inclusive environment ensuring equal access and participation for people with disabilities. As such, we strive to make our entire employee experience as accessible as possible and provide accommodations as required for candidates and employees with disabilities and/or other specific needs where possible. Please let us know if you require any accommodations by emailing *************************. Security Requirements Conducts duties and responsibilities in accordance with AWN's Information Security policies, standards, processes and controls to protect the confidentiality, integrity and availability of AWN business information (in accordance with our employee handbook and corporate policies). Background checks are required for this position. This position may require access to information protected under U.S. export control laws and regulations, including the Export Administration Regulations (“EAR”). Please note that, if applicable, an offer for employment will be conditioned on authorization to receive software or technology controlled under these laws and regulations.
    $79k-110k yearly est. Auto-Apply 39d ago
  • Information Security Analysts

    The University of Utah 4.0company rating

    Cyber security analyst job in Salt Lake City, UT

    Information Security Analysts The incumbent will play a critical role in safeguarding regulated data across the enterprise by monitoring and analyzing the organization's data security posture. This position focuses on configuring Data Security Posture Management ( DSPM ) settings and policies, interpreting results, creating reports, identifying risks, and ensuring compliance. The analyst will take a risk-based approach to assess and remediate issues related to unauthorized storage or transmission of regulated data across cloud and on-premise environments. Learn more about the great benefits of working for University of Utah: benefits.utah.edu The department may choose to hire at any of the below job levels and associated pay rates based on their business need and budget. Responsibilities Data Security Monitoring -Review and analyze DSPM tool outputs to identify misconfigurations, unauthorized data flows, and storage of regulated data in non-approved locations. -Monitor the movement of sensitive data across cloud and on-prem systems, ensuring compliance with internal policies and regulatory requirements. Risk Assessment & Governance -Apply a risk-based methodology to prioritize remediation efforts. -Maintain applicable risk register entries and document findings for governance reporting. Collaboration -Partner with the Enterprise Security team to validate technical controls. -Work closely with the Chief Data Officer and Privacy Office to align DSPM findings with data governance and privacy requirements. Compliance & Policy Alignment -Ensure adherence to frameworks such as NIST CSF , CIS 18, and other applicable regulations (e.g., HIPAA , FERPA , etc. etc.). -Support audits and compliance reviews by providing DSPM -related evidence. Reporting & Communication -Prepare dashboards and reports for leadership summarizing DSPM findings, trends, and risk posture. -Communicate actionable insights to stakeholders in clear, business-focused language. Minimum Qualifications EQUIVALENCY STATEMENT : 1 year of higher education can be substituted for 1 year of directly related work experience (Example: bachelor's degree = 4 years of directly related work experience). Department may hire employee at one of the following job levels: Information Security Analyst, III : Requires a bachelor's (or equivalency) + 6 years or a master's (or equivalency) + 4 years of directly related work experience. Information Security Analyst, IV: Requires a bachelor's (or equivalency) + 8 years or a master's (or equivalency) + 6 years of directly related work experience. Information Security Analyst, V: Requires a bachelor's (or equivalency) + 10 years or a master's (or equivalency) + 8 years of directly related work experience.
    $50k-79k yearly est. 34d ago
  • Jr. Information Security Analyst (Information Security Analyst I)

    Lightspeed DMS

    Cyber security analyst job in South Jordan, UT

    Job Description Lightspeed is a leading provider of cloud-based software for dealerships and Original Equipment Manufacturers (OEMs), serving the Powersport, Marine, RV, Trailer, Outdoor Power Equipment, and Golf Cart industries. Lightspeed's Dealer Management Solution (DMS) enables dealerships to optimize their end-to-end business operations, including sales, parts, service, rentals, accounting, and Customer Relationship Management (CRM). When implemented into their daily operations, Lightspeed helps dealers increase their profitability by selling more units, service, and parts, all while creating a more streamlined experience for customers. For nearly 40 years, Lightspeed has been empowering 4,500+ dealers across North America with the tools and technology they need to manage their dealerships. The Jr. Information Security Analyst I supports Lightspeed's cybersecurity operations by assisting with monitoring, analysis, and remediation of security incidents across enterprise systems and cloud environments. Working under the direction of senior analysts, this role helps ensure the confidentiality, integrity, and availability of company data while gaining experience in security tools, processes, and governance activities. The ideal candidate is detail-oriented, eager to learn, and passionate about developing technical and compliance skills in a collaborative environment. What you'll do: Monitor and investigate security alerts and events across SIEM, EDR, and network systems. Assist in the investigation of potential security incidents under senior analyst guidance. Help maintain documentation of incidents, findings, and remediation steps. Perform vulnerability scanning and tracking remediation efforts. Support maintenance of security tools and platforms (endpoint protection, SIEM, firewalls). Assist with compliance tasks related to SOC 2, internal audits, and risk assessments. Assist with gathering security metrics and reports on a monthly basis. Contribute to updating security policies, standards, and procedures. Perform third-party vendor security reviews and due diligence processes. Assist in security awareness initiatives and internal training activities. Collaborate with IT and engineering teams to ensure secure configurations and patch compliance. Assist in the creation of automation scripts and the integration of AI with security workflows. What you should have: Qualifications: Bachelor's degree in Cybersecurity, Information Technology, or a related field, or equivalent experience. 0-3 years of experience in information security, IT operations, or related technical roles. Foundational knowledge of networking, operating systems, and cloud environments (AWS, Azure). Strong experience securing and monitoring cloud environments (AWS, Azure). Exposure to SIEM or EDR tools such as Splunk, Sentinel, or Defender. Understanding of basic security concepts (vulnerabilities, exploits, least privilege, encryption). Excellent analytical, problem-solving, and communication skills. Knowledge of security frameworks such as NIST CSF and SOC 2. Ability to work collaboratively in a team-oriented environment. Preferred Qualifications: CompTIA Security+, CySA+, or equivalent entry-level certification. Experience with vulnerability scanners (Qualys, Nessus, or Rapid7). Exposure to GRC or vendor risk management tools. Exposure to SIEM platforms, Elastic, Splunk, Security Onion. Familiarity with scripting or automation (PowerShell, Python). Demonstrated interest in pursuing a long-term career in cybersecurity operations or compliance. Inclusion and Diversity at Lightspeed: At Lightspeed, we celebrate the uniqueness of every individual and encourage diverse perspectives. We believe that inclusion drives innovation and fosters meaningful connections. We are committed to building an environment where everyone feels valued and empowered to make an impact. Equal Employment Opportunity Statement: Lightspeed is an Equal Opportunity Employer and is dedicated to building a diverse and inclusive workforce. All qualified applicants will be considered for employment without regard to race, color, creed, ancestry, national origin, gender, sexual orientation, gender identity, gender expression, marital status, religion, age, disability, veteran status, or any other protected category. Important Note: Applicants must be authorized to work in the U.S. Ready to apply? Take the next step in your career-apply today and join a team where your skills will make an impact!
    $69k-101k yearly est. 28d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Salt Lake City, UT

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 59d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Orem, UT?

The average cyber security analyst in Orem, UT earns between $53,000 and $96,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Orem, UT

$71,000
Job type you want
Full Time
Part Time
Internship
Temporary