Post job

Cyber security analyst jobs in Peoria, AZ - 125 jobs

All
Cyber Security Analyst
Information Security Analyst
Information Security Engineer
Senior Security Analyst
Security Engineer
Security System Engineer
Information Systems Security Officer
Cyber Security Engineer
  • Prisma Cloud Security Engineer

    Teksystems 4.4company rating

    Cyber security analyst job in Chandler, AZ

    We are seeking an experienced *Sr** Security Engineer* to join our Cloud Workload Lifecycle Security (CWLS) team. This role focuses on engineering, automation, and support for *Palo Alto Networks Prisma Cloud Enterprise (PCE)*, with an emphasis on container security and Cloud Workload Protection (CWP) modules. You'll be part of a fast-paced team enabling secure cloud adoption across multiple platforms. *Key Responsibilities:* * Engineer and support Prisma Cloud Enterprise (PCE) solutions, ensuring effective delivery of product roadmap. * Design and develop automation for PCE engineering and support processes. * Deploy and maintain Prisma Defender agents at scale on Kubernetes platforms (public & private cloud). * Perform upgrades, maintenance, and configuration management on PCE consoles. * Troubleshoot incidents and resolve issues with SaaS and deployed Defender agents. * Collaborate with partner teams to address vulnerabilities and compliance issues. * Document designs and processes using tools like Confluence and Visio. *Required Skills:* * 4+ years of Information Security Engineering experience. * 2+ years of Prisma Cloud Enterprise experience (engineering support, admin, automation). * 1+ years deploying Prisma Defender agents on Kubernetes platforms. * 4+ years with GitHub/Bitbucket or similar version control systems. * 1+ years with AI/ML or GenAI tools (e.g., CoPilot, Azure AI, Google Vertex AI). * Strong Python skills (NumPy, Pandas, FastAPI) and experience with RESTful APIs. * 2+ years working with container orchestration (Kubernetes preferred). * Experience with at least two major cloud providers (AWS, Azure, GCP). * CI/CD security experience (Harness, Jenkins, GitHub Actions). * Intermediate to advanced cloud security knowledge. *Nice to Have:* * CISSP or cloud certifications. * Splunk Cloud experience. * Familiarity with security frameworks (CIS, NIST, CSA, FedRAMP). * Linux experience and SQL knowledge. *Job Type & Location*This is a Contract position based out of Chandler, AZ. *Pay and Benefits*The pay range for this position is $65.00 - $70.00/hr. Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following: * Medical, dental & vision * Critical Illness, Accident, and Hospital * 401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available * Life Insurance (Voluntary Life & AD&D for the employee and dependents) * Short and long-term disability * Health Spending Account (HSA) * Transportation benefits * Employee Assistance Program * Time Off/Leave (PTO, Vacation or Sick Leave) *Workplace Type*This is a hybrid position in Chandler,AZ. *Application Deadline*This position is anticipated to close on Jan 22, 2026. h4>About TEKsystems: We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company. The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law. About TEKsystems and TEKsystems Global Services We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com. The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
    $65-70 hourly 2d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cloud Security Engineer

    Iridium Satellite LLC

    Cyber security analyst job in Chandler, AZ

    Job ID 2025-4601 Category Engineering Worker Category Regular Full-Time[F] Iridium is an award-winning and innovative satellite communications company with bragging rights to the only network that offers voice and data connectivity anywhere in the world. For over 20 years, Iridium's unique network and services have supported critical communications needs for individuals, businesses, and the evolving Internet of Things. At Iridium, we understand the importance of staying connected and the limitations of traditional communications networks. People across the globe, including first responders, humanitarians, global militaries, scientific researchers, and lone workers, as well as ships, aircraft and remote operations all rely on Iridium to stay connected. We take our responsibility for providing these essential communications very seriously and pride ourselves on offering a reliable lifeline when needed. Likewise, Iridium is committed to providing an exciting and innovative workplace, where employees are challenged to think outside the box and collaborate on new, bold ideas and solutions. Our talented teams are passionate about their work and the impact our company makes around the world. Iridium fosters an empowering and inclusive culture that allows employees to genuinely be their best selves. We are looking for others who want to join this truly unique company that celebrates our employees and provides the opportunity to truly make a difference in the world. What We're Looking For: If you enjoy learning about and working with breakthrough technologies and are enthusiastic about working in the space industry, then you will be excited about the Senior Software Engineer opening with Iridium for a Space Development Agency (SDA) project. As the Senior Software Engineer within the Ground Systems Development team, you will apply cutting edge technologies to rapidly develop and deploy ground system operations and user service capabilities within a satellite operations environment. Additionally, the Senior Software Engineer will identify and autonomously implement ideas/solutions within the larger development team to support cross-functional efforts across all areas of ground system software development. What You'll Do: Develop high performing/scalable App Cyber Security architecture and implementation to meet the requirements of the SDA project Engage in cross-team DevOps, Ground and Constellation development to support AWS PaaS deployment environment and automation. Develop Work within the Agile/Scrum framework for software development (Atlassian tool suite desired) Create or maintain build environments for software products Play a key role in planning and executing software releases per stakeholder/program schedules and budgets Update issue/feature data in Atlassian Project/Software tracking tools Follow existing Iridium processes for Change Control, Prioritization, Risk Management, Commercial off-the-shelf (COTS) Management, Build and Test software deployments and use advanced knowledge to assist in development of process/procedure documentation materials Edit, structure and present data, concepts and arguments clearly and succinctly through briefings and documentation Respond to questions within scope from stakeholders, as appropriate What You'll Need to Succeed: Bachelor of Science degree in Computer Science, or other engineering discipline 8+ years software programming experience Coding experience on Agile based teams Excellent communication skills, with the ability to clearly convey products, deliverables, analyses, and/or issues to groups outside of your team or those who are unfamiliar with the topic Have confidence and be able to easily build relationships with leadership and colleagues outside of your team Possess an analytical mindset, with the ability to understand a situation or problem and think critically to make decisions and come up with out-of-the-box solutions Be proactive in providing feedback and be enthusiastic in sharing your knowledge with others Capable of prioritizing your own tasks and potentially the tasks of others while making sure deadlines are met Proactivity in seeking out ways to continuously improve yourself and gain new knowledge, including the ability to learn the different software that make up the System Performance and Analysis software Ability to comprehend technical documentation Have a positive attitude to take on ever increasing software development tasks Passion for working in a team driven environment consisting of operators, software testers, senior developers, and system engineers Things That Would be Great if You Brought to the Table: Experience with the following technologies: Design and implementation of Role-based Access Control Keycloak / Vault / IPA / IAM mTLS / SSL or security protocol equivalent Cryptography and PKI/Certifications Authentication and Authorization architecture Design and implementation of Kubernetes auto-deployment to AWS (Helm Charts) Linux based environments and bash shell scripting Security Vulnerability Analysis and Procedures (CVE, TLS) Terraform Python / Java / C++ / Type Script / Perl RESTful / HTTP / ELK or similar / WebSockets XML / JSON / SQL SQL: (e.g., PostgreSQL) and NoSQL based DBs (e.g., Mongo) js / Apache Web Server Assist in software development response to security findings Atlassian management/software development tools: Jira / Git / Crucible / Confluence Micro services architecture Automated testing frameworks Gov and non-Gov Amazon Web Services (AWS) cloud environments We'll Also Need You To: This position directly performs under, supports, or is exposed to a U.S. government contract. To comply with the requirements of Iridium's U.S. government contracts, applicants for this position must be U.S. citizens. Work Environment: This position primarily works in an office setting and is largely sedentary with the majority of the position working with a computer. The role typically requires the use of basic office equipment such as a phone, video, computer, keyboard, mouse, and printer. Iridium is an Equal Opportunity Employer, including individuals with disabilities and protected veterans.
    $87k-122k yearly est. 2d ago
  • Cyber Security Analyst

    Insight Global

    Cyber security analyst job in Phoenix, AZ

    This is a rare opportunity to join a fast-growing team of information security experts as we transform, enhance, and expand the security program for one of the largest information technology providers in the world. You will join the United States Global Technology Operations (US GTO) Security Strategy and Solutions team supporting governance, risk, and compliance consulting services as well as security service delivery across one or more US-based industries. The successful candidate will have a broad knowledge of current security practices, knowledge of specific Security Tools, as well as the ability to identify and apply legal, regulatory, and industry-specific security requirements. You will help our client deploy effective security solutions and strategies. You must be able to collaborate with a variety of technical and management disciplines including infrastructure and security architecture, security operations, application development, project managers, product owners, and others. Future duties and responsibilities . Incident Response . Security Investigations . Security Engineering . GRC . Tools validation . Vulnerability Management . Reporting We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: **************************************************** Skills and Requirements . Clear written and verbal communication skills . Ability to communicate with executive team . Splunk- 3 years of experience . Qualys- 2 years of experience . Vulnerability Management-2 years of experience . Governance-2 years of experience . Risk Management-2 years of experience . Incident Management-3 years of experience . Education: Associate or bachelor's degree preferred . Cyber Security Certification - Minimum Security+, but CISSP or CISM is preferred
    $75k-104k yearly est. 3d ago
  • Cyber Security Analyst - 26-00507

    Navitaspartners

    Cyber security analyst job in Phoenix, AZ

    Job DescriptionJob Title: Cyber Security AnalystLocation: Phoenix, AZ (Onsite/Hybrid as applicable) Duration: 6-Month ContractRole Overview We are seeking an experienced Cyber Security Analyst to support the security, stability, and operational readiness of a newly implemented recording system within a complex IT infrastructure. The system operates on a Kubernetes-based, containerized platform, and this role plays a critical part in ensuring the environment is securely designed, properly configured, continuously monitored, and defensible from both a technical and governance perspective. This position focuses on security oversight and operational assurance, rather than building the platform from the ground up. The analyst will collaborate closely with internal technical teams and external vendors to evaluate architecture, enforce security controls, and support ongoing operations in a highly regulated public-sector environment. Key Responsibilities Support the design review, security implementation, and operational readiness of a containerized recording system Evaluate system architecture to ensure secure, stable, and compliant configurations Implement and maintain security best practices across Kubernetes-based environments Configure and manage access controls, monitoring, and logging mechanisms Assist with vulnerability assessment, risk mitigation, and security hardening activities Monitor system health, security events, and operational logs to identify and respond to potential risks Collaborate with internal teams and third-party vendors to resolve security and operational issues Ensure the platform meets reliability, security, and compliance expectations Support governance, audit readiness, and documentation efforts as required Contribute to maintaining a defensible security posture in a regulated public-sector environment Required Skills & Experience Practical, hands-on experience with Kubernetes and containerized platforms Strong foundation in cybersecurity principles and best practices Experience working in cloud or hybrid environments Knowledge of: Access control mechanisms System monitoring and alerting Centralized logging and log analysis General infrastructure and application security Ability to assess and secure systems without direct responsibility for platform build-out Strong collaboration and communication skills Preferred Skills & Experience Experience supporting government systems or other highly regulated environments Familiarity with compliance, governance, and audit requirements Exposure to election infrastructure, public-sector IT, or similarly sensitive systems Education Requirements Bachelor's degree in a related field (e.g., Cybersecurity, Co
    $75k-104k yearly est. 4d ago
  • Cyber Security Analyst - AZ

    Vensure Employer Solutions 4.1company rating

    Cyber security analyst job in Chandler, AZ

    We are seeking an experienced Cyber Security Analyst to join our cybersecurity team. In this critical role, the successful candidate will be tasked with the comprehensive monitoring, detection, analysis, and response to cybersecurity incidents, ensuring the integrity, confidentiality, and availability of information assets. Leveraging deep technical expertise and a strategic approach to cybersecurity, this position calls for a proactive and vigilant professional dedicated to identifying vulnerabilities, mitigating risks, and leading incident response efforts. The ideal candidate will possess deep technical knowledge, excellent communication skills, and the ability to coordinate incident response activities across the organization. This position requires a blend of analytical prowess, technical expertise, and a strategic mindset to protect the company's assets from internal and external threats Essential Duties and Responsibilities Continuously monitor and evaluate the organization's cybersecurity posture, using securitytools and techniques to detect potential threats and vulnerabilities across a wide range ofsystems and environments. Respond to, investigate, and manage security incidents with precision and expertise, frominitial detection through to resolution, ensuring minimal impact to the organization. Serve as a key contributor to the Security Operations team, enhancing its operationalcapabilities through the development and implementation of security measures and protocols. Mentor and guide junior security analysts within the security operations team, fostering aculture of continuous learning and professional development. Share knowledge and insights onthe latest cybersecurity trends, tools, and practices to enhance team capabilities. Develop, refine, and maintain incident response playbooks, procedures, and guidelines inalignment with industry best practices. Engage in proactive threat hunting initiatives, leveraging threat intelligence and cybersecurityframeworks to identify and neutralize potential threats before they manifest into incidents.• Document and communicate detailed incident reports and analyses, ensuring transparency andclarity in the post-incident review process to improve future security measures and responses Stay current with new threats, technologies, and trends in cybersecurity, contributing to thecompany's IT security strategy and roadmap.• Participate in continuous improvement activities that enhance operational efficiency throughthe implementation of automation. Share knowledge and insights with team members and across the organization to foster aculture of security awareness and resilience Knowledge, Skills, and Abilities Bachelor's degree in Cyber Security, Information Assurance, Computer Science, Engineering, ora related technical field is preferred or equivalent combination of experience, education(including other relevant degree or educational programs), and certifications. Professional security certifications such as GCIH, GCFA, CISSP, or similar are highly desirable Education & Experience 3-5 years of experience in cybersecurity, with a focus on security operations, incidentresponse, or related fields. Proven experience in security systems administration, SIEM, threat intelligence platforms,vulnerability management, and forensic tools. Strong understanding of cybersecurity principles, IT systems, and network security. Demonstrated proficiency in Windows and Linux operating systems, with a solid understandingof cloud services Excellent communication skills, with the ability to convey complex security concepts to bothtechnical and non-technical stakeholders. Demonstrated ability to act with integrity, professionalism, and confidentiality. Organized, adaptable, and capable of managing multiple high-priority tasks in a fast-pacedenvironment
    $80k-111k yearly est. 60d+ ago
  • Cyber Security Analyst - Vulnerability Management

    Runbuggy Inc.

    Cyber security analyst job in Tempe, AZ

    Requirements What You Will Be Doing:: Responsible primarily for day-to-day product vulnerability management services and supporting infrastructure. Ensure product vulnerabilities are identified, prioritized, and remediated, particularly by reducing the backlog of existing product vulnerabilities. Ensure that releases and product changes are reviewed and approved by the Security Team. Collaborate with engineering teams to understand product vulnerability management needs and assist with remediation and mitigation strategies. Build relationships with various teams and technology owners to decrease the likelihood of friction or roadblocks. Schedule and assist with remediation efforts from external and internal penetration tests and assessments. Perform analysis of scan results, assign risk ratings for product vulnerabilities, and help prioritize remediation efforts. Help establish and operationalize key performance indicators, reporting, and metrics to track the maturity of the product vulnerability program. Oversee and help execute manual code review of key product components for security improvements. Help drive the security and privacy product requirements process across RunBuggy's product lines, implementing security early in the product roadmap. Execute on an agreed-upon risk prioritization framework in conjunction with engineering, product, development, operations, and the Sr. Director of Security and Audit who outlines the highest risk items for action to improve RunBuggy's product security. Collaborate with product and sales engineering teams for hardening applications, APIs, and micro services with security built into the services. Help influence new deployment models, including containers, cloud platforms, SaaS, etc., with security built into the platform. Help drive identification of software security findings throughout the lifecycle and the reduction of risk, working with relevant stakeholders. Maintain current knowledge of the RunBuggy threat landscape, including attacker tactics, techniques, and procedures. Other duties as assigned. What You Bring to the Team by Way of Skills and Experience: Demonstrated understanding of cybersecurity threats and vulnerability management and related IT domains. 3+ years' relevant experience as a Vulnerability Analyst required. A degree in Computer Science, IT, Systems Engineering, or a cybersecurity-related qualification is preferred. Experienced as a security analyst supporting product vulnerability management processes in a cloud environment, such as AWS, EKS, Docker, etc. Hands-on experience with vulnerability management tools such as AWS Inspector, SonarCube, etc. Knowledge of containerized web application architecture and related vulnerabilities and issues. Deep understanding of vulnerability management, including risk assessment and remediation planning. Knowledge of the latest trends and awareness of current hacking techniques and cybercrime. Understanding of secure cloud network architectures, including CloudFormation, Kubernetes, and MongoDB. Experience with software development and delivery for a SaaS company. Familiarity with cybersecurity frameworks, such as NIST CSF. Attention to detail, QA skills, the ability to “think forward,” adept at problem solving and addressing issues and complications before they expand. Certificates, Licenses, and/or Registrations: Professional certifications such as Certified Ethical Hacker (CEH), Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified Cloud Security Professional (CCSP) are preferred. What is in it for You and Why you Should Apply: Market-competitive pay based on education, experience, and location. Highly competitive medical, dental, vision, Life w/ AD&D, Short-Term Disability insurance, Long-Term Disability insurance, pet insurance, identity theft protection, and a 401(k) retirement savings plan. Employee wellness program. Employee rewards, discounts, and recognition programs. Generous company-paid holidays (12 per year), vacation, and sick time. Paid paternity/maternity leave. Monthly connectivity/home office stipend if working from home 5 days a week. A supportive and positive space for you to grow and expand your career. Pay Range Disclosure: The advertised range represents the expected pay range for this position at the time of posting based on education, experience, skills, location, and other factors. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. RunBuggy is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination, harassment, and retaliation on the basis of race, color, religion, sex (including gender identity and sexual orientation), pregnancy, parental status, national origin, age, disability, genetic information, or any other status protected under federal, state, or local law. Applicants must be currently authorized to work in the United States. Please, no agencies. Salary Description $90k/yr.-$110k, DOE
    $90k-110k yearly 11d ago
  • Cyber Security Analyst

    Washington Elementary School District 6 4.6company rating

    Cyber security analyst job in Phoenix, AZ

    Pay Grade: PP (Non-Exempt Support Staff Salary System) Department: Management Information Systems (MIS) Accountable To: Administrator of MIS FLSA Status: Non-Exempt Calendar: 261 Days Summary: Under general direction, incumbent is responsible for protecting the school district's technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites. Essential Functions: Threat detection and analysis: Actively monitor security alerts from various sources, including Security Information and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc. Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts. Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls. Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies. User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures. Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment. Performs other job related duties as assigned. Required Qualifications: To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary. High School diploma or equivalent (G.E.D.) prior to being hired; Valid Arizona Department of Transportation Driver's License; Minimum of one year of experience in information security, network security, or a related technology field. Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services. Experience with security tools, including SIEM, antivirus software, and intrusion detection systems. Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card. Preferred Qualifications: It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position. Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise. Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP. Experience working in an educational or public sector environment. Knowledge of emerging security technologies and trends. Experience administering a Cisco Local and Wide area networking environment; Experience with border network security devices such as Email filters and Firewalls; Experience administering Windows Server and Active Directory. Experience with VMWare and Veeam (or other backup and recovery platform) Knowledge and Skills Required: To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Skills required, but not limited to, for this position include: Ability to work independently and collaboratively in a team environment. Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. Familiarity with scripting languages like Python or PowerShell for automating security tasks. Knowledge of common security frameworks, such as NIST. Understanding of networking concepts, firewalls, and data encryption techniques. Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences. Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities. Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack. Physical Requirements: The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus. Working Conditions: The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels. The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
    $48k-60k yearly est. 41d ago
  • Sr. Security Analyst

    Maximus 4.3company rating

    Cyber security analyst job in Phoenix, AZ

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. * Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $97k-131k yearly est. Easy Apply 6d ago
  • Principal Security Information Analyst

    Gen Mobile 3.9company rating

    Cyber security analyst job in Tempe, AZ

    Principal Information Security Analyst (Tier 2) As a Principal Information Security Analyst within Gen Digital's global Security Operations Center (SOC), you will play a key role in strengthening threat detection and response across the organization. The role focuses on improving SOC monitoring and detection processes through technical expertise, continuous development, and close collaboration with other security teams. In this position, you will serve as a senior specialist, leading automation and detection engineering efforts, mentoring junior analysts and contributing to projects that enhance security visibility and overall SOC performance. Operating in a follow-the-sun model, the SOC ensures 24/7 global coverage, with regional teams working during their respective business hours and sharing on-call responsibilities for weekend. Key Responsibilities: Monitor, analyze, and correlate security alerts and events across multiple platforms (SIEM, WAF, EDR, email, cloud, network, and threat intelligence tools) to identify and validate suspicious or malicious activity Continuously develop and fine-tune detection rules, correlation searches, security policies, and dashboards to improve visibility, reduce false positives, and increase alert accuracy across security platforms Support and mentor Tier 1 analysts in alert triage, escalation quality, and use of tools Collaborate with security engineers on automation and enrichment initiatives to streamline operational workflows and improve detection efficiency Maintain complete and up-to-date documentation for all detection use cases, workflows and process improvements Participate in security projects and collaborate with internal stakeholders (e.g., Incident Response, Security Engineering, Application Security, and IT) to enhance detection coverage, visibility, and response capabilities Support the execution of incident response playbooks Qualification and Work Experience: 3-5 years of hands-on experience in SOC operations, cybersecurity monitoring, or related areas such as detection engineering or threat analysis Solid understanding of networking concepts (TCP/IP, DNS, HTTP/S) and how they apply to security monitoring and threat analysis Strong knowledge of cybersecurity principles, common attack techniques, and threat types (e.g., phishing, malware, brute force, web application attacks) Proven experience working with security logs, alerts, and structured data across multiple platforms (SIEM, EDR, WAF, cloud, and network telemetry) Hands-on experience with SIEM platforms - Splunk preferred - including detection content development, rule tuning, and dashboard creation Familiarity with Web Application Firewall (WAF) technologies and the ability to analyze or tune related alerts and policies Understanding of cloud security concepts and experience with monitoring tools for major providers (AWS, Azure, GCP) Working knowledge of scripting or automation (e.g., Python, PowerShell, or API-based integrations) to support analysis and enrichment workflows Experience using AI-based tools to support daily SOC operations, including data analysis, investigation, documentation, and collaboration Strong analytical and problem-solving skills with attention to detail and curiosity for continuous learning Effective communication and documentation skills in English, both written and verbal Experience collaborating across teams (e.g., Security Engineering, Incident Response, Application Security) on detection improvements or automation projects Prior experience in a Security Operations Center (SOC) or similar environment is highly preferred Familiarity with the fintech environment or experience supporting financial services infrastructure is considered a strong advantage #LI-AS1 Gen is proud to be an equal-opportunity employer, committed to diversity and inclusivity. We base employment decisions on merit, experience, and business needs, without considering race, color, national origin, age, religion, sex, pregnancy, genetic information, disability, medical condition, marital status, sexual orientation, gender identity or expression, military or veteran status, or other unlawful factors. Gen prohibits discrimination based on these protected characteristics and recruits talented candidates from diverse backgrounds. We consider individuals with arrest and conviction records and do not discriminate against employees for discussing their own pay or that of other employees or applicants. Learn more about pay transparency. To conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.
    $81k-118k yearly est. Auto-Apply 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Phoenix, AZ

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 60d ago
  • Principal Security Information Analyst

    Gen Digital

    Cyber security analyst job in Tempe, AZ

    Principal Information Security Analyst (Tier 2) As a Principal Information Security Analyst within Gen Digital's global Security Operations Center (SOC), you will play a key role in strengthening threat detection and response across the organization. The role focuses on improving SOC monitoring and detection processes through technical expertise, continuous development, and close collaboration with other security teams. In this position, you will serve as a senior specialist, leading automation and detection engineering efforts, mentoring junior analysts and contributing to projects that enhance security visibility and overall SOC performance. Operating in a follow-the-sun model, the SOC ensures 24/7 global coverage, with regional teams working during their respective business hours and sharing on-call responsibilities for weekend. Key Responsibilities: * Monitor, analyze, and correlate security alerts and events across multiple platforms (SIEM, WAF, EDR, email, cloud, network, and threat intelligence tools) to identify and validate suspicious or malicious activity * Continuously develop and fine-tune detection rules, correlation searches, security policies, and dashboards to improve visibility, reduce false positives, and increase alert accuracy across security platforms * Support and mentor Tier 1 analysts in alert triage, escalation quality, and use of tools * Collaborate with security engineers on automation and enrichment initiatives to streamline operational workflows and improve detection efficiency * Maintain complete and up-to-date documentation for all detection use cases, workflows and process improvements * Participate in security projects and collaborate with internal stakeholders (e.g., Incident Response, Security Engineering, Application Security, and IT) to enhance detection coverage, visibility, and response capabilities * Support the execution of incident response playbooks Qualification and Work Experience: * 3-5 years of hands-on experience in SOC operations, cybersecurity monitoring, or related areas such as detection engineering or threat analysis * Solid understanding of networking concepts (TCP/IP, DNS, HTTP/S) and how they apply to security monitoring and threat analysis * Strong knowledge of cybersecurity principles, common attack techniques, and threat types (e.g., phishing, malware, brute force, web application attacks) * Proven experience working with security logs, alerts, and structured data across multiple platforms (SIEM, EDR, WAF, cloud, and network telemetry) * Hands-on experience with SIEM platforms - Splunk preferred - including detection content development, rule tuning, and dashboard creation * Familiarity with Web Application Firewall (WAF) technologies and the ability to analyze or tune related alerts and policies * Understanding of cloud security concepts and experience with monitoring tools for major providers (AWS, Azure, GCP) * Working knowledge of scripting or automation (e.g., Python, PowerShell, or API-based integrations) to support analysis and enrichment workflows * Experience using AI-based tools to support daily SOC operations, including data analysis, investigation, documentation, and collaboration * Strong analytical and problem-solving skills with attention to detail and curiosity for continuous learning * Effective communication and documentation skills in English, both written and verbal * Experience collaborating across teams (e.g., Security Engineering, Incident Response, Application Security) on detection improvements or automation projects * Prior experience in a Security Operations Center (SOC) or similar environment is highly preferred * Familiarity with the fintech environment or experience supporting financial services infrastructure is considered a strong advantage #LI-AS1 Gen is proud to be an equal-opportunity employer, committed to diversity and inclusivity. We base employment decisions on merit, experience, and business needs, without considering race, color, national origin, age, religion, sex, pregnancy, genetic information, disability, medical condition, marital status, sexual orientation, gender identity or expression, military or veteran status, or other unlawful factors. Gen prohibits discrimination based on these protected characteristics and recruits talented candidates from diverse backgrounds. We consider individuals with arrest and conviction records and do not discriminate against employees for discussing their own pay or that of other employees or applicants. Learn more about pay transparency. To conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.
    $78k-114k yearly est. Auto-Apply 60d+ ago
  • Senior Security Analyst (L2)

    Lumifi Cyber

    Cyber security analyst job in Scottsdale, AZ

    L2 Security Analyst Full-Time, Exempt We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ. Primary Duties Triage alerts and determine if further investigation or action is required by the customer Assist customers with the investigation and response of incidents throughout the incident response process Perform investigations of customer requests and be able to provide further contextual information along with recommended actions Proactively threat hunt using network and host data within customer environments Mentor junior analysts Required Qualifications Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.) Strong understanding of incident response methodologies and reporting Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.) Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers Preferred Qualifications Minimum of 3+ years of experience performing triage/incident response in enterprise environments Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP) Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving Ability to manage projects to completion both individually and in a group Benefits Include: Health Insurance 80% paid by employer Dental Insurance 80% paid by employer Vision Insurance 80% paid by employer Self- Managed vacation leave Paid sick leave Paid holiday leave All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer. Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
    $87k-119k yearly est. Auto-Apply 60d+ ago
  • Information Security Analyst - IAM / CyberArk

    Stratacuity

    Cyber security analyst job in Chandler, AZ

    Job Title: Information Security Analyst - IAM / CyberArk Client: Large Financial Services Institution Pay Range: $53.60 - $56.60/hr Contract Length: 18 months * Manage customer tickets in JIRA (approx. 300+ per month). * Review submitted service accounts and determine eligibility for vaulting in CyberArk based on predefined criteria. * Process involves cross-referencing multiple source files and following documented procedures. Key Skills & Experience: * 4+ years of Information Security Analysis experience (or equivalent). * Advanced Microsoft Office skills (Excel - VLOOKUPs, data connections, Power Query; PowerPoint). * Experience with IAM tools (CyberArk, PAM solutions, HashiCorp). * Familiarity with Tableau for reporting and analysis. * Strong troubleshooting ability and attention to detail. Advanced Microsoft Office Skills (PowerPoint, Excel - VLookups, data/connections, power queries) Experience with IAM Tools (CyberArk, PAM solutions, HashiCorp) Familiarity with Tableau * MS Office Word, Excel, PowerPoint 2 - 4 Years Cloud 2 - 4 Years Cloud Security 2 - 4 Years Cyber Security 2 - 4 Years PowerBI and Tableau 2 - 4 Years Tableau 2 - 4 Years EEO Employer Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at [email protected] or ************. Apex Systems is a world-class IT services company that serves thousands of clients across the globe. When you join Apex, you become part of a team that values innovation, collaboration, and continuous learning. We offer quality career resources, training, certifications, development opportunities, and a comprehensive benefits package. Our commitment to excellence is reflected in many awards, including ClearlyRated's Best of Staffing in Talent Satisfaction in the United States and Great Place to Work in the United Kingdom and Mexico. Apex uses a virtual recruiter as part of the application process. Click here for more details. Apex Benefits Overview: Apex offers a range of supplemental benefits, including medical, dental, vision, life, disability, and other insurance plans that offer an optional layer of financial protection. We offer an ESPP (employee stock purchase program) and a 401K program which allows you to contribute typically within 30 days of starting, with a company match after 12 months of tenure. Apex also offers a HSA (Health Savings Account on the HDHP plan), a SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions, a corporate discount savings program and other discounts. In terms of professional development, Apex hosts an on-demand training program, provides access to certification prep and a library of technical and leadership courses/books/seminars once you have 6+ months of tenure, and certification discounts and other perks to associations that include CompTIA and IIBA. Apex has a dedicated customer service team for our Consultants that can address questions around benefits and other resources, as well as a certified Career Coach. You can access a full list of our benefits, programs, support teams and resources within our 'Welcome Packet' as well, which an Apex team member can provide. Employee Type: Contract Location: Chandler, AZ, US Job Type: Date Posted: January 14, 2026 Similar Jobs * Information Security Data Analyst * Information Systems Security Officer * Information Systems Analyst * Sr. GCS Cloud Security Analyst * IAM Systems Engineer
    $53.6-56.6 hourly 1d ago
  • F-16 MTT Information Systems Security Officer (ISSO)

    Trident Military Systems

    Cyber security analyst job in Mesa, AZ

    Job Description Trident Military Systems is seeking an Information Systems Security Officer (ISSO) to support Air National Guard (ANG) F-16 Mission Tactics Trainer (MTT) simulators in Mesa, AZ. The successful individual will have an excellent knowledge of the Risk Management Framework (RMF), the documentation, roles and responsibilities, and how to work on a team pursuing cybersecurity practices compliant with policy, regulation, and best practices. Work will be assigned based on available resources among the teammates, prioritization from the Air Force customer, and recurring deliverables based on contractual obligations and clearly assigned with deadlines. Location: Mesa, AZ Required Travel: 0 - 10% What you will do Participate as a cyber team member as they plan, manage and execute all RMF requirements at the Mesa, AZ site to include: Risk management strategy, policies, awareness/trainings, assessments, continuous monitoring, authorizations, implementations, and remediation Manage life-cycle cybersecurity risk to Air Force information systems Ensure F-16 MTT IT assets are assessed for cybersecurity risk to the USAF, subsequent residual risk associated with security controls implementation is assessed and mitigated with Plans of Actions and Milestones (POA&M), aligns with DODI 8510.01, and as documented in the RMF security authorization package for USAF IT Ensure compliance of internal policies and procedures; and develop, review and complete interconnectivity requirement documents Perform the primary duties and responsibilities of an Information System Security Officer (ISSO) for F-16 MTT simulators Knowledge of RMF process, DoDI 8500.01, eMASS and/or other governing documentation Work directly with the ISSM/FSO to ensure program and overall security needs are met Assist in security configuration/STIG validation of all operating systems and network devices Collaborate to ensure all systems are compliant and in scope of current accreditation Perform audits against approved HW/SW lists to ensure system compliance with approved baseline Review ACAS/Nessus vulnerability scans Ensure data backups are occurring in accordance with the continuous monitoring policy Review audit logs in Splunk to detect suspicious or unauthorized activity Assist in authoring and editing Cybersecurity related documents (e.g., ISA, SLA, CIE) Other duties as assigned What you must have 9 years relevant experience with Bachelors in related field; 7 years relevant experience with Masters in related field; 4 years relevant experience with PhD or Juris Doctorate in related field; or High School Diploma or equivalent and 13 years relevant experience Certified Information Assurance Technical (IAT) Level II Knowledge of NIST, RMF, and DoD security requirements and guidelines Proven experience in risk assessment, security incident management, and security awareness training Excellent written and verbal communication skills Operating knowledge of Windows/Linux operating systems Ability to work in a team environment and independently Must be a US citizen, currently hold and able to maintain a Secret Security Clearance Preferred Requirements Experience with software/tools: Nessus/ACAS Splunk ePolicy Orchestrator SCAP Compliance Checker (SCC) STIG Viewer Prior experience working on DoD contracts Physical Requirements The physical requirements listed here are representative of those that are needed by an employee to successfully perform essential job duties. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential duties. Must be able to lift and/or move up to 40 pounds Must be able to walk and/or climb stairs and/or ladders into a simulator or airplane cockpit Must be able to stoop, bend, and crawl on top or under simulators Must be able to distinguish colors Must have ACTIVE DoD SECRET CLEARANCE with the ability to upgarde to SAP/SAR. Must be a US CITIZEN.
    $76k-107k yearly est. 28d ago
  • Information Security Analyst 2

    Rogers Corporation 4.8company rating

    Cyber security analyst job in Chandler, AZ

    This role will provide information security direction, configuration, and operational support of key security tools, as well as broader interactions with enterprise staff to help mitigate security risks and advise the organization on security best practices. Essential Functions: * Defend against and/or mitigate system vulnerabilities related to network infrastructure devices and boundary defense through network and endpoint solution configuration. * Support data and asset risk. * Use data collected from a variety of cyber defense tools (e.g., Intrusion Detection System (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within specific environments for the purposes of mitigating threats. * Address various security problems across a disperse set of assets. * Other duties as assigned. Qualifications: * Bachelor's Degree in Computer Science, Computer Information Systems or related field. May consider equivalent work experience in lieu of degree * 2+ years of progressive cybersecurity experience * Sound comprehension of Information Security practices, concepts, and theories for traditional Information Technology (IT) assets
    $81k-124k yearly est. 33d ago
  • IT Security Engineer (Tempe)

    Arizona Department of Education 4.3company rating

    Cyber security analyst job in Tempe, AZ

    IT Security Engineer (Tempe) Type: Charter Job ID: 131811 County: East Maricopa Contact Information: ASU Preparatory Academy 1130 E University Dr. #230 Tempe, Arizona 85044 District Website Contact: Kathy Piippo Phone: ************ Fax: District Email : Salary Range: $60,000.00 - $69,500.00 USD annually. As part of Arizona State University's charter to provide access and excellence, ASU Preparatory Academy (ASU Prep) shares this commitment by demonstrating all students can achieve at the highest levels, regardless of their background. To scale our current impact, ASU Prep is advancing a major expansion program taking fundamental responsibility for the communities we serve. The IT Security Engineer provides technical support for the school network infrastructure, ensuring reliable connectivity, server operations, and user access across all campuses. This position plays a key role in maintaining stable, secure, and efficient network systems to support teaching, learning, and administrative operations. QUALIFICATIONS: * Bachelor's degree in Computer Science, Information Technology or a related field, or an Associate's Degree, preferred. * Certifications such as Security+, Cysa+, CISSP or equivalent are strongly preferred. * 3+ years of progressive IT experience, including networking and infrastructure support. * 3+ years of experience delivering excellent customer service. * Knowledge of basic networking principles and troubleshooting. * Understanding of cybersecurity best practices, CIPA/FERPA compliance, and basic IAM principles. * Active AZ Department of Public Safety (DPS) IVP Fingerprint Clearance Card. * Any equivalent combination of experience, training and/or education from which comparable knowledge, skills and abilities may be considered. DUTIES AND RESPONSIBILITIES: * Work closely with IT teams, developers, and management to embed security into all aspects of technology operations. * Implement a user awareness program to reduce phish prone behavior among staff and students. * Conduct risk assessments and develop mitigation strategies to reduce exposure. * Manage and maintain security tools like antivirus software, SIEM (Security Information and Event Management) systems, and endpoint protection platforms. * Identify, design and implement security solutions like IDS, EDR, OS hardening, patch management, etc. * Proactively monitor network/software security events and assist teams to troubleshoot and mitigate. * Lead efforts to detect and manage vulnerabilities across the organization. * Conduct security audits to uncover weaknesses. * Collaborate with teams and leadership to develop and disseminate security policies, standards, and procedures. * Support content filtering tools and ensure compliance with CIPA, FERPA, and cybersecurity policies. * Maintain detailed documentation for security related activities. * Participate in IT planning sessions to align infrastructure decisions with instructional and organizational needs. * Coordinate with service providers and vendors including Arizona State University Enterprise Technology for security related advanced troubleshooting of network issues. * Additional duties will be assigned as needed. KNOWLEDGE, SKILLS AND ABILITIES: * Strong diagnostic and troubleshooting skills. * Effective communication and interpersonal skills, especially in high-stakes or customer-facing scenarios. * Strong organizational skills and a solution-focused attitude. * Knowledge of common information systems, connectivity, integrations from a security perspective. * Effective organizational skills. * Effective written and oral communication. * Demonstrated knowledge in Edtech is a plus. * Demonstrated knowledge with common e-learning tools and platforms is a plus. PHYSICAL DEMANDS: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is frequently required to stand and talk or hear and sometimes walk and sit. The employee must use hands, arms and fingers to input data, handle, feel or reach. While performing the duties of this job, the employee may occasionally push or lift up to 30 lbs. such as boxes, supplies, etc. Specific vision abilities required by this job include close vision such as to read handwritten or typed material, and the ability to adjust focus, close vision, distance vision, color vision, peripheral vision and depth perception. LOCATION: UCENT - Hybrid TRAVEL: Travel required to all sites, meetings, trainings and/or conferences and occasional overnight travel may be required. This job description is subject to change at any time. Other: What about learning drives us to do more than deliver the lesson? Maybe we're overachievers. Or maybe we just know what real impact looks like. Each one of us has seen passion win over fear, vision become relentless focus and belief in human potential make it all the way to the finish line. Our mission is to design new models for educational success and raise academic achievement for all learners. Are you ready to find a career with a company whose mission, vision, and values align with yours? Can you see yourself fitting into this mission with us? For more information please visit: ********************************
    $60k-69.5k yearly 24d ago
  • Security Systems Engineer

    Exyte Group

    Cyber security analyst job in Chandler, AZ

    Discover your exciting role The Security Systems Engineer designs and implements security solutions to protect facilities, identifies vulnerabilities, and develops strategies to prevent unauthorized access, ensuring effective risk mitigation and compliance with security standards. Explore your tasks and responsibilities * Design and implement integrated security systems tailored for advanced technology and cleanroom environments. * Identify and assess vulnerabilities specific to sensitive facility operations and controlled environments. * Conduct comprehensive threat, risk, and vulnerability assessments for high-value assets and critical infrastructure. * Specify and deploy appropriate security devices and controls that do not compromise cleanroom protocols. * Consult with stakeholders on security requirements, best practices, and regulatory compliance. * Develop strategies to prevent unauthorized access while maintaining operational continuity. * Ensure all security solutions meet industry standards, facility-specific guidelines, and cleanroom requirements. * Collaborate with internal teams, external vendors, and facility managers to deliver effective technical solutions. * Support both large-scale and small-scale security projects, from design through commissioning and validation. * Prepare and maintain detailed documentation for security system designs, installations, and compliance audits. * Other duties as assigned Show your expertise Minimum Required * Bachelor's degree in Engineering or a related field. * 2-5 years of experience as a Security Systems Engineer or in a similar role, preferably in advanced technology or cleanroom facilities. Preferred * Relevant certifications (e.g., CISSP, PSP, or similar) are highly desirable. * Prior experience as a consulting engineer preferred * Prior experience with Advanced Technology * Experience working within a team environment * Experience in the quality control review process * Experience contributing to continuous improvement processes Applicants must be authorized to work for ANY employer in the U.S. We are unable to sponsor or take over sponsorship of an employment Visa at this time. Non-Solicitation: We are not currently accepting third-party agency candidates for this position. Any agency candidate submitted to any employee of Exyte may be contacted by Exyte without obligation to the third-party agency. Exyte US, Inc. is proud to be an Affirmative Action and Equal Employment Opportunity employer that is committed to celebrating diversity and supporting an inclusive workplace where associates excel based on personal merit, qualifications, experience, ability, and job performance. We prohibit discrimination and harassment of any kind based on race, color, religion, age, sex (e.g., pregnancy, childbirth and related medical conditions, sexual orientation, gender identity or expression), national origin, disability status, genetic information, protected veteran status, or any other protected characteristic as outlined by federal, state, or local laws. Contact: You want to be part of the Exyte team? We look forward to receiving your application! For further questions and information, please do not hesitate to contact Phillip Turner via E-Mail at ************************ Please note that we only consider applications submitted through our application portal. Applications sent via email will not be considered due to data protection regulations.
    $78k-112k yearly est. Easy Apply 8d ago
  • Cyber Security Analyst - Vulnerability Management

    Runbuggy OMI, Inc.

    Cyber security analyst job in Tempe, AZ

    About Us: RunBuggy is the most technically advanced automotive logistics platform on the market. Period. Backed by Porsche Ventures and Hearst Ventures, RunBuggy is transforming the way cars move. Our cutting-edge technology is trusted by some of the largest OEMs, captive finance companies, and automotive lenders in the world to streamline vehicle transportation at scale. RunBuggy's end-to-end platform connects car shippers and haulers in real time - eliminating the friction of traditional load boards and costly custom software. For shippers, RunBuggy integrates directly into existing management systems, reducing transportation costs and accelerating delivery timelines. For transporters, we offer a smarter, more profitable way to find, accept, and manage loads - all from a single app. Since launching in 2019, RunBuggy has grown to over 150 team members, facilitated the movement of hundreds of thousands of vehicles, and attracted tens of thousands of transporters across the U.S. We're not just building a better logistics platform - we're redefining the future of automotive transportation. About the Role: The Cybersecurity Analyst - Vulnerability Management plays a critical role in safeguarding our products and supporting infrastructure. This position is responsible for identifying and mitigating emerging threats, managing product-related security issues, and leading the vulnerability management program across the product lifecycle. Candidates must be authorized to work in the US for any employer and must be within a commutable distance of Tempe, AZ. Please do not apply if you do not meet these requirements. Candidates who include a cover letter explaining how their experience aligns with the position will receive priority in the review and interview process. Requirements What You Will Be Doing:: * Responsible primarily for day-to-day product vulnerability management services and supporting infrastructure. * Ensure product vulnerabilities are identified, prioritized, and remediated, particularly by reducing the backlog of existing product vulnerabilities. * Ensure that releases and product changes are reviewed and approved by the Security Team. * Collaborate with engineering teams to understand product vulnerability management needs and assist with remediation and mitigation strategies. * Build relationships with various teams and technology owners to decrease the likelihood of friction or roadblocks. * Schedule and assist with remediation efforts from external and internal penetration tests and assessments. * Perform analysis of scan results, assign risk ratings for product vulnerabilities, and help prioritize remediation efforts. * Help establish and operationalize key performance indicators, reporting, and metrics to track the maturity of the product vulnerability program. * Oversee and help execute manual code review of key product components for security improvements. * Help drive the security and privacy product requirements process across RunBuggy's product lines, implementing security early in the product roadmap. * Execute on an agreed-upon risk prioritization framework in conjunction with engineering, product, development, operations, and the Sr. Director of Security and Audit who outlines the highest risk items for action to improve RunBuggy's product security. * Collaborate with product and sales engineering teams for hardening applications, APIs, and micro services with security built into the services. * Help influence new deployment models, including containers, cloud platforms, SaaS, etc., with security built into the platform. * Help drive identification of software security findings throughout the lifecycle and the reduction of risk, working with relevant stakeholders. * Maintain current knowledge of the RunBuggy threat landscape, including attacker tactics, techniques, and procedures. * Other duties as assigned. What You Bring to the Team by Way of Skills and Experience: * Demonstrated understanding of cybersecurity threats and vulnerability management and related IT domains. * 3+ years' relevant experience as a Vulnerability Analyst required. * A degree in Computer Science, IT, Systems Engineering, or a cybersecurity-related qualification is preferred. * Experienced as a security analyst supporting product vulnerability management processes in a cloud environment, such as AWS, EKS, Docker, etc. * Hands-on experience with vulnerability management tools such as AWS Inspector, SonarCube, etc. * Knowledge of containerized web application architecture and related vulnerabilities and issues. * Deep understanding of vulnerability management, including risk assessment and remediation planning. * Knowledge of the latest trends and awareness of current hacking techniques and cybercrime. * Understanding of secure cloud network architectures, including CloudFormation, Kubernetes, and MongoDB. * Experience with software development and delivery for a SaaS company. * Familiarity with cybersecurity frameworks, such as NIST CSF. * Attention to detail, QA skills, the ability to "think forward," adept at problem solving and addressing issues and complications before they expand. Certificates, Licenses, and/or Registrations: * Professional certifications such as Certified Ethical Hacker (CEH), Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified Cloud Security Professional (CCSP) are preferred. What is in it for You and Why you Should Apply: * Market-competitive pay based on education, experience, and location. * Highly competitive medical, dental, vision, Life w/ AD&D, Short-Term Disability insurance, Long-Term Disability insurance, pet insurance, identity theft protection, and a 401(k) retirement savings plan. * Employee wellness program. * Employee rewards, discounts, and recognition programs. * Generous company-paid holidays (12 per year), vacation, and sick time. * Paid paternity/maternity leave. * Monthly connectivity/home office stipend if working from home 5 days a week. * A supportive and positive space for you to grow and expand your career. Pay Range Disclosure: The advertised range represents the expected pay range for this position at the time of posting based on education, experience, skills, location, and other factors. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. RunBuggy is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination, harassment, and retaliation on the basis of race, color, religion, sex (including gender identity and sexual orientation), pregnancy, parental status, national origin, age, disability, genetic information, or any other status protected under federal, state, or local law. Applicants must be currently authorized to work in the United States. Please, no agencies. Salary Description $90k/yr.-$110k, DOE
    $90k-110k yearly 30d ago
  • Cyber Security Analyst

    Washington Elementary School District 4.6company rating

    Cyber security analyst job in Phoenix, AZ

    Pay Grade: PP (Non-Exempt Support Staff Salary System) Department: Management Information Systems (MIS) Accountable To: Administrator of MIS FLSA Status: Non-Exempt Calendar: 261 Days Under general direction, incumbent is responsible for protecting the school district's technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites. Essential Functions: * Threat detection and analysis: Actively monitor security alerts from various sources, including Security Information and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc. * Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts. * Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls. * Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. * Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. * Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies. * User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures. * Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment. * Performs other job related duties as assigned. Required Qualifications: To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary. * High School diploma or equivalent (G.E.D.) prior to being hired; * Valid Arizona Department of Transportation Driver's License; * Minimum of one year of experience in information security, network security, or a related technology field. * Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services. * Experience with security tools, including SIEM, antivirus software, and intrusion detection systems. * Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card. Preferred Qualifications: It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position. * Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise. * Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP. * Experience working in an educational or public sector environment. * Knowledge of emerging security technologies and trends. * Experience administering a Cisco Local and Wide area networking environment; * Experience with border network security devices such as Email filters and Firewalls; * Experience administering Windows Server and Active Directory. * Experience with VMWare and Veeam (or other backup and recovery platform) Knowledge and Skills Required: To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Skills required, but not limited to, for this position include: * Ability to work independently and collaboratively in a team environment. * Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. * Familiarity with scripting languages like Python or PowerShell for automating security tasks. * Knowledge of common security frameworks, such as NIST. * Understanding of networking concepts, firewalls, and data encryption techniques. * Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences. * Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities. * Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack. Physical Requirements: The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus. Working Conditions: The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels. The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
    $48k-60k yearly est. 42d ago
  • Information Security Analyst 2

    Rogers Corporation 4.8company rating

    Cyber security analyst job in Chandler, AZ

    This role will provide information security direction, configuration, and operational support of key security tools, as well as broader interactions with enterprise staff to help mitigate security risks and advise the organization on security best practices. Essential Functions: - Defend against and/or mitigate system vulnerabilities related to network infrastructure devices and boundary defense through network and endpoint solution configuration. - Support data and asset risk. - Use data collected from a variety of cyber defense tools (e.g., Intrusion Detection System (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within specific environments for the purposes of mitigating threats. - Address various security problems across a disperse set of assets. - Other duties as assigned. Qualifications: - Bachelor's Degree in Computer Science, Computer Information Systems or related field. May consider equivalent work experience in lieu of degree - 2+ years of progressive cybersecurity experience - Sound comprehension of Information Security practices, concepts, and theories for traditional Information Technology (IT) assets Full-Time Rogers Corporation ("Rogers") maintains a continuing policy of non-discrimination in employment. It is Rogers policy to provide equal opportunity and access for all persons, without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or status as a disabled veteran or other protected veteran, in all phases of the employment process and in compliance with applicable federal, state, and local laws and regulations.
    $81k-124k yearly est. 33d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Peoria, AZ?

The average cyber security analyst in Peoria, AZ earns between $65,000 and $121,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Peoria, AZ

$89,000
Job type you want
Full Time
Part Time
Internship
Temporary