Entry Level Cyber Security Analyst
Cyber security analyst job in Dayton, OH
":"As an Entry Level Cyber Security Analyst, you will become a part of an elite team of individuals committed to the security of Customer information and the Company's intellectual property. You will manage the various security tools to identify and evaluate complex business and technology risks.
You must also be able to communicate your findings and recommendations for management.
You will work with teams across the organization including partnering with IT and Software Development on security related matters.
If you are an innovative problem solver in technology who enjoys working in a team environment, this is the position for you! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Entry Level Cyber Security Analyst","date":"2025-11-22","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Bachelor's degree, certificate, or boot camp in CIS, IT, or Cyber Security related fields a plus~^~Linux and Windows operating systems experience and knowledge required~^~Excellent oral and written communication skills~^~Industry standard certifications a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
Computer Network Defense Analyst
Cyber security analyst job in Dayton, OH
Job DescriptionPrime Time Consulting, a GRVTY Company, provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government. Computer Network Defense AnalystWe are actively searching for Computer Network Defense Analysts (CNDAs), located in Ohio, to support our team. We have varying levels of CNDAs, depending on years of experience and education.Duties
Conduct computer network defense.
Conduct target development for use or decision by Government personnel.
Analyze and produce intelligence information.
Conduct computer/network security to provide advice to the Government.
Create and maintain documentation of their analysis.
Ensure to routinely follow oversight and compliance
Acquire/share job knowledge/skill
Partner with team members on the contract, including government personnel and other partner companies
Qualifications
Degree in Computer Science or equivalent technical field
Level 1 - 6 years of experience can replace 2 years of experience with AA degree
Level 2 - 9 years of experience can replace 4 years of experience with BS degree
Level 3 - 12 years of experience can replace up to 6 years of experience with MS degree
Level 4 - 15 years of experience can replace up to 9 years with Doctorate degree
Strong communication skills
Works well in a team and alone
Working knowledge of Microsoft Office Suite
Company Perks
At PTC, a GRVTY Company, we believe that when our employees thrive, our company thrives. That's why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance.
Robust health plan including medical, dental, and vision
Health Savings Account with company contribution
Annual Paid Time Off and Paid Holidays
Paid Parental Leave
401k with generous company match
Training and Development Opportunities
Award Programs
Variety of Company Sponsored Events
Prime Time Consulting, a GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability. Anyone requiring reasonable accommodations should email ******************************* with requested details. A member of the HR team will respond to your request within 2 business days. Please review our current job openings and apply for the positions you believe may be a fit. If you are not an immediate fit, we will also keep your resume in our database for future opportunities.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Cyber Security Specialist
Cyber security analyst job in Kettering, OH
Kettering, OH/Remote
IPTA's Technology Solutions Team is passionate about providing our customers with technical solutions that satisfy their business needs. Through collaborative interactions with customers, team members, subject matter experts (SMEs), technical leaders, and partners we design practical solutions that solve real problems for major government and business organizations. As a member of our Technology Solutions group, you will work with a team of technologists focused on delivering innovative business solutions using emerging technologies through proven successful methods.
Our Team:
We are looking for talented people who are enthusiastic about applying technology to deliver innovative outcomes with "fierce determination, fearless integrity, and passionate service." Our belief is that our people are the key to success. By encouraging and enabling continued learning, our team members grow to achieve their personal career goals. We are looking for:
Smart people with a passion for technology
Ability to solve challenging business problems
Self-directed professionals
Hunger to continually learn and grow
Responsibilities:
Identifies and resolves highly complex issues to prevent cyber attacks on information systems and to keep computer information systems secure from interruption of service, intellectual property theft, network viruses, data mining, financial theft, and theft of sensitive customer data, allowing business to continue as normal.
Designs, installs, and manages security mechanisms that protect networks and information systems against hackers, breaches, viruses, and spyware.
Responds to incidents, investigates violations, and recommends enhancements to plug potential security gaps. Analyzes data to spot trends, and creates tools to support research efforts.
Mitigates threats by gathering information and developing plans, and monitors networks for security breaches.
Develops best practices and security standards, and trains users on security protocols.
Creates and tests disaster recovery procedures to keep IT running in the event of a security breach.
Researches data, learns about new technologies, and gathers information on the latest risks.
Utilizes specialized expertise, up-to-date knowledge, and proficiency in analysis, forensics, and reverse engineering to monitor and diagnose malware events and vulnerability issues resulting in web threats that facilitate cyber crime, including malware, phishing, viruses, denial-of-service attacks, information warfare, and hacking.
Makes recommendations for solutions, including hardware and software programs that can help mitigate risk.
Designs firewalls, monitors use of data files, and regulates access to safeguard information and protect the network.
Keeps up-to-date on current virus reports, and protects networks from these viruses.
Trains users, promotes security awareness, develops policies and procedures, and provides updates and reports to management and executive staff.
Requirements:
Bachelor's degree in a related field
Eight (8) years of prior experience in a similar role
DoD 8570 Level II/II certification required
Active Security Clearance Required
IPTA is an Equal Opportunity/Affirmative Action employer. We are committed to providing equal employment opportunity to all qualified employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, religion, sex, sexual orientation, national origin, age, physical disability, mental disability, medical condition, status as a veteran or disabled veteran or any other characteristic protected by law. We base all employment decisions, including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, returns from lay-off, terminations, and social and recreational programs on the principles of equal employment opportunity. Our employees have diverse backgrounds, skills, and ideas that collectively contribute to a rich working environment and greater opportunity for innovation.
Information Systems Security Officer (ISSO) III
Cyber security analyst job in Dayton, OH
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Information Security, Information Security Management, Information System Security
Certifications:
None
Experience:
5 + years of related experience
US Citizenship Required:
Yes
Job Description:
The Information Systems Security Officer (ISSO) II is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.
This will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities.
Prepare, review, and update authorization packages.
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Notify ISSM when changes occur that might affect the authorization determination of the information system(s).
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
Execute the cyber security portion of the self-inspection, to include security coordination and review of all system assessment plans.
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.
Prepare reports on the status of security safeguards applied to computer systems.
Perform ISSO duties in support of in-house and external customers.
Conduct continuous monitoring activities for authorization boundaries under your preview.
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts.
Experience:
5+ years related experience.
2+ years SAP experience required.
Prior performance in roles such as System, Network Administrator or ISSO.
Education:
Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
Certifications:
IAT Level II ( Security+ CE, CCNA Security, etc) or IAM Level II - within 6 months of hire
Clearance Required to Start:
TS/SCI required
Must be able to Attain - TS/SCI with CI Polygraph
#AirforceSAPOpportunities
The likely salary range for this position is $92,735 - $125,465. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
10-25%
Telecommuting Options:
Onsite
Work Location:
USA OH Dayton
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyInfrastructure Security Analyst
Cyber security analyst job in Dayton, OH
Versiti is a fusion of donors, scientific curiosity, and precision medicine that recognize the gifts of blood and life are precious. We are home to the world-renowned Blood Research Institute, we enable life saving gifts from our donors, and provide the science behind the medicine through our diagnostic laboratories. Versiti brings together outstanding minds with unparalleled experience in transfusion medicine, transplantation, stem cells and cellular therapies, oncology and genomics, diagnostic lab services, and medical and scientific expertise. This combination of skill and knowledge results in improved patient outcomes, higher quality services and reduced cost of care for hospitals, blood centers, hospital systems, research and educational institutions, and other health care providers. At Versiti, we are passionate about improving the lives of patients and helping our healthcare partners thrive.
Position Summary
The Infrastructure Security Analyst will play a critical role in ensuring the security and integrity of our IT systems and networks. This position involves a balanced focus on IT Systems and Network Support and Cybersecurity with a concentration on Vulnerability Management. The ideal candidate will possess both technical expertise and strong analytical skills to identify, mitigate, and manage vulnerabilities while supporting the overall IT infrastructure. The candidate will thrive in a dynamic, team-oriented environment, where knowledge sharing, and continuous learning are encouraged. As an integral part of our collaborative team, the Infrastructure Security Analyst will work closely with various IT departments, including network operations, system administration, and application development. This role includes direct collaboration with the Senior Cybersecurity Engineer to ensure thorough analysis, identification, and mitigation of infrastructure vulnerabilities. Together, the team will address evolving cyber threats, communicate complex security concepts to stakeholders across all levels, and promote an organization-wide security culture while supporting Versiti's business and operational goals. This position values teamwork, encouraging information sharing and joint problem-solving to fortify the organization's defenses. This role is essential in building a resilient IT infrastructure that can adapt to evolving threats while supporting the organization's business objectives.
Total Rewards Package
Benefits
Versiti provides a comprehensive benefits package based on your job classification. Full-time regular employees are eligible for Medical, Dental, and Vision Plans, Paid Time Off (PTO) and Holidays, Short- and Long-term disability, life insurance, 7% match dollar for dollar 401(k), voluntary programs, discount programs, others.
Responsibilities
Provide technical support for IT infrastructure, including servers, networks, and cloud services.
Monitor system performance, troubleshoot issues, and perform regular maintenance on IT systems and document system configurations, changes, and procedures for future reference and compliance audits.
Collaborate with IT teams to implement and maintain secure network configurations and ensure compliance with organizational policies while assisting in the deployment and configuration of hardware and software as needed.
Respond to and resolve service requests and incidents in a timely manner.
Conduct regular vulnerability assessments and penetration testing to identify security weaknesses within IT systems and networks and collaborate with IT teams to develop and implement mitigation strategies for identified vulnerabilities.
Analyze vulnerability scan reports and prioritize remediation efforts based on risk assessment and monitor security alerts and incidents, responding to security breaches or threats as necessary.
Maintain up-to-date knowledge of the latest cybersecurity threats, vulnerabilities, and trends. Utilize threat intelligence feeds and monitoring tools to proactively identify and mitigate potential security threats. Provide recommendations for security improvements and help implement new security controls.
Performs other duties as required or assigned which are reasonably within the scope of the duties in this job classification
Understands and performs in accordance with all applicable regulatory and compliance requirements
Complies with all standard operating policies and procedures
Qualifications
Education
Bachelor's Degree Computer Science, Information Technology, Cybersecurity, or a related field preferred
Experience
4-6 years Demonstrated experience installing, managing and troubleshooting Linux and/or Microsoft Server environments. required
4-6 years Experience with Enterprise Data Center Server and Network environments. required
4-6 years Experience in conducting vulnerability assessments and penetration testing. required
Demonstrated experience with VMware Server and storage management. preferred
Knowledge, Skills and Abilities
Understanding of patch management processes and tools required
Knowledge of common security frameworks (e.g., NIST, ISO 27001, CIS Controls) required
Strong analytical and problem-solving skills. required
Excellent communication skills, both verbal and written, with the ability to explain technical concepts to non-technical stakeholders. required
Strong attention to detail and ability to work independently as well as part of a team. required
Experience with ticketing systems and IT service management processes. required
Familiarity with scripting languages (e.g., PowerShell, Python). preferred
Licenses and Certifications
Certified Ethical Hacker (CEH) desired
CISSP Certified Information Systems Security Professional desired
Microsoft Certified Systems Engineer (MCSE) preferred
Microsoft Certified Systems Administrator (MCSA) preferred
CompTIA Network+ Certification preferred
CompTIA Security+ Certification preferred
Tools and Technology
Proficiency in network protocols, firewalls, VPNs, and security appliances. required
Knowledge of operating systems (Windows, Linux) and cloud environments (AWS, Azure). required
Experience with vulnerability assessment tools (e.g., Nessus, Qualys, Rapid7). preferred
Experience with container technologies (e.g., Docker, Kubernetes) preferred
Familiarity with threat intelligence and incident response processes. preferred
#LI-EH1
#LI-Hybrid
Auto-ApplyInformation Systems Security Officer (ISSO) II
Cyber security analyst job in Dayton, OH
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Information Security, Information Security Management, Information System Security
Certifications:
None
Experience:
2 + years of related experience
US Citizenship Required:
Yes
Job Description:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
2+ years related experience
SAP experience required
Prior performance in roles such as System, Network Administrator, or ISSO
Education:
Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
Certifications:
IAT Level II or IAM Level II - within 6 months of hire (Security+ CE, CCNA Security, etc.)
Security Clearance:
TS/SCI required
Must be able to Attain - TS/SCI with CI Polygraph
Other Requirements:
Must be able to regularly lift up to 50lbs
#AirforceSAPOpportunities
The likely salary range for this position is $86,615 - $117,185. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
10-25%
Telecommuting Options:
Onsite
Work Location:
USA OH Dayton
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyInformation Security Analyst
Cyber security analyst job in Miamisburg, OH
Job Description
ComResource is looking for an Information Security Analyst.
We need someone to assist in safeguarding sensitive data, neutralizing threats, and ensuring a strong cybersecurity posture through proactive monitoring, investigation, and governance.
Responsibilities:
Develop, implement, and enforce cybersecurity policies and procedures.
Conduct risk assessments, internal audits, and ensure compliance with frameworks like NIST and ISO 27001.
Lead threat detection, incident response, and vulnerability management initiatives.
Oversee security architecture, tools, and endpoint protection solutions.
Drive cybersecurity awareness and training across the organization.
Collaborate with IT, leadership, and cross-functional teams to improve the company's security posture.
Manage vendor and third-party security compliance.
Essentials:
Bachelor's degree in Cybersecurity, IT, or related field.
3+ years of hands-on experience in cybersecurity or a related discipline.
Working knowledge of security frameworks (NIST, ISO 27001).
Experience with SIEM, EDR, and vulnerability management tools.
Strong analytical, communication, and collaboration skills.
Experience supporting governance, risk, and compliance (GRC) functions.
Desired:
Experience with Artic Wolf, CMMC, and NIST compliance.
Familiarity with enterprise platforms such as ERP or CRM systems.
Calm, strategic approach to incident response and crisis management.
Req ID: RB8910701020
Information System Security Officer (ISSO)
Cyber security analyst job in Dayton, OH
ARS is looking for an Information System Security Officer (ISSO). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The ISSO will have an active role in monitoring a system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the security impact.
Why Work with us?â¯
âApplied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support.â¯Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.â¯â¯
Responsibilities:
Maintain the operational security posture of systems.
Monitor systems and environments for security compliance.
Develop and update System Security Plans (SSPs).
Manage and control system changes and assess their security impact.
Handle physical, personnel, and environmental security.
Conduct incident response and security awareness training.
Assist the ISSM and assume ISSM duties when necessary.
Assist the ISSM in meeting their duties and responsibilities. The ISSO shall assume ISSM responsibilities in the absence of the ISSM;
Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package;
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard;
Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS;
Report all security-related incidents to the ISSM
Conduct periodic reviews of information systems to ensure compliance with the security authorization package;
Serve as member of the CCB, if designated by the ISSM;
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change;
Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization;
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly;
Ensure all IS security-related documentation is current and accessible to properly authorized individuals; and
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Participate in joint agile backlog planning and provide feedback to the software development team and infrastructure teams around high to medium risk items that require information system owner approval.
Other duties as assigned
Requirements:
Must be a US citizen
Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard
5+ years related experience in SCI/SAP environments.
Bachelor's degree in computer science, Engineering, Finance, Business, or related
field
5-8 years demonstrated performance in related technology
Top Secret w/ SCI eligibility
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
Security Analyst - Indefinite US Work Authorization Required
Cyber security analyst job in New Bremen, OH
: Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
Job Posting External
Primary Responsibilities:
* Lead the design and implementation of SIEM correlation rules and alert logic to detect advanced threats and suspicious behaviors.
* Build and optimize SOAR playbooks to automate multi-step incident response actions.
* Continuously tune alert thresholds and logic to reduce false positives and improve detection accuracy.
* Integrate threat intelligence feeds into SIEM and SOAR platforms to enhance alert context and prioritization.
* Investigate and respond to alerts, coordinating with IT, MDR, and security teams to validate and remediate incidents.
* Maintain documentation for alert logic, playbook workflows, and incident handling procedures.
* Mentor junior analysts on alert development, tuning, and automation best practices.
* Participate in an on-call rotation to support timely response to critical alerts and incidents.
Minimum Qualifications:
* High school diploma or equivalent is required.
* Familiarity with SIEM platforms and basic alert logic.
* Experience with scripting languages such as PowerShell or Python.
* Understanding of cybersecurity fundamentals, including threat types and detection techniques.
* 1+ years of experience in cybersecurity or a related field.
* Strong analytical and problem-solving skills.
* Willingness to participate in an on-call rotation.
Preferred Qualifications:
* Bachelor's degree in cybersecurity, computer science, information technology, or a related field.
* Exposure to SOAR platforms and basic playbook development.
* Experience working with third-party MDR or managed security service providers.
* Certification such as Security+, GSEC, or CEH.
* Familiarity with threat intelligence sources and enrichment techniques.
* Understanding of compliance frameworks such as NIST CSF or ISO 27001.
Work Authorization:
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
Compensation and Benefits:
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities
Nearest Major Market: Lima
Nearest Secondary Market: Findlay
Job Segment: Computer Science, Warehouse, Forklift, Technology, Manufacturing
OT Security Cyber Prevention Engineer
Cyber security analyst job in Marysville, OH
What Makes a Honda, is Who makes a Honda Honda has a clear vision for the future, and it's a joyful one. We are looking for individuals with the skills, courage, persistence, and dreams that will help us reach our future-focused goals. At our core is innovation. Honda is constantly innovating and developing solutions to drive our business with record success. We strive to be a company that serves as a source of “power” that supports people around the world who are trying to do things based on their own initiative and that helps people expand their own potential. To this end, Honda strives to realize “the joy and freedom of mobility” by developing new technologies and an innovative approach to achieve a “zero environmental footprint.”
We are looking for qualified individuals with diverse backgrounds, experiences, continuous improvement values, and a strong work ethic to join our team.
If your goals and values align with Honda's, we want you to join our team to Bring the Future!
The Honda Development and Manufacturing Production Engineering team is responsible for the operational technology
security of the manufacturing environment. The OT Security Cyber Prevention Engineer works across multiple technical
and business areas to develop, implement, and maintain procedures, standards, and controls to prevent the risk or
impact of a cyber incident. The scope of this function covers manufacturing equipment hardware/firmware/ software, OT
enterprise systems, data analysis and reporting, and collaboration with IT/business users to ensure secure operation
across all HDMA locations and equipment.
New equipment introduction - set OT standards for new equipment, integrate equipment into the OT
network, confirm vulnerabilities, perform risk assessments, and visibility of equipment within the asset
management system.
Training - support the creation, administration and maintenance of OT specific training material.
Policies/procedures/auditing - create, issue, maintain, and audit OT specific policies and procedures.
Access control (physical + logical) - set and implement technical standards for equipment level physical
access and control access to OT related systems and equipment.
OT standard creation - support the development, implementation, and maintenance of technical
standards for the OT equipment and networks
Risk metric management/assessments - establish company OT risk metrics and corresponding
assessments to determine OT risk, perform risk assessments, and establish tools for visibility and
reporting.
Sensing/industry benchmarking - research technical and business OT security industry benchmarks and
generate recommendations for adjustments to internal tools or practices to stay in alignment.
What differentiates Honda and makes us an employer of choice?
Total Rewards:
Competitive Base Salary (pay will be based on several variables that include, but not limited to geographic location, work experience, etc.)
Regional Bonus (when applicable)
Manager Lease Car Program (No Cost - Car, Maintenance, and Insurance included)
Industry-leading Benefit Plans (Medical, Dental, Vision, Rx)
Paid time off, including vacation, holidays, shutdown
Company Paid Short-Term and Long-Term Disability
401K Plan with company match + additional contribution
Relocation assistance (if eligible)
Career Growth:
Advancement Opportunities
Career Mobility
Education Reimbursement for Continued learning
Training and Development Programs
Additional Offerings:
Lifestyle Account
Childcare Reimbursement Account
Elder Care Support
Tuition Assistance & Student Loan Repayment
Wellbeing Program
Community Service and Engagement Programs
Product Programs
Honda is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, creed, religion, national origin, sex, sexual orientation, gender identity and expression, age, disability, veteran status, or any other protected factor.
Information Security Analyst (On-Site Position)
Cyber security analyst job in Miamisburg, OH
IS ON-SITE AT OUR CINCINNATI, OHIO OFFICE At Danis, we don't just build projects-we build trust. Since 1916, our reputation has been defined by integrity, innovation, and a relentless commitment to delivering exceptional results. We approach every challenge with a problem-solving mindset, combining precision, creativity, and collaboration to bring our clients' visions to life.
We know that our people are the foundation of our success. That's why we invest heavily in their growth. Through Danis University, employees have access to more than 45 specialized training programs designed to support continuous learning and career advancement. Join us and become part of a team that values your expertise, supports work-life balance, and empowers you to thrive professionally.
One of the ways we protect that success is through a strong cybersecurity foundation-led by dedicated professionals who stay ahead of emerging threats. As an Information Security Analyst, you'll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You'll monitor, investigate, and respond to security events while shaping our company's cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience. This position reports to the CIO.
Why Join Danis?
* Make an Impact: Lead healthcare projects that support medical professionals and improve patient care. Your work will have a lasting, positive effect on communities.
* Competitive Compensation: Enjoy annual merit increases and bonuses.
* Comprehensive Benefits: Health and dental insurance for you and your family, as well as life insurance, disability coverage, and supplemental insurance options.
* Secure Your Future: 401K plan and profit-sharing opportunities.
* Work-Life Balance: Generous PTO and vacation time, because we value your time outside of work.
* Give Back: Participate in our "Constructing Hope" program to contribute to meaningful community outreach projects.
* Career Development: Access 45+ training programs through Danis University to enhance your skills and grow your career.
What You'll Bring
* Bachelor's degree in Cybersecurity, Information Technology, or a related field.
* 3+ years of hands-on experience in cybersecurity or a related discipline.
* Working knowledge of security frameworks (e.g., NIST, ISO 27001).
* Proficiency with security tools (e.g., SIEM, EDR, vulnerability scanners).
* Strong analytical and investigative mindset.
* Clear, confident communication and collaboration skills.
* Experience managing cross-functional projects and navigating complex security challenges.
Responsibilities
Your Impact:
Strategic Leadership
* Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices.
* Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives.
Governance, Risk, & Compliance
* Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps.
* Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act).
* Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics.
Training & Awareness
* Drive cybersecurity awareness through engaging education initiatives.
* Oversee new hire onboarding for required cyber training.
* Facilitate tabletop exercises to simulate and prepare for real-world scenarios.
Threat Detection & Response
* Continuously monitor systems for suspicious activity or breaches.
* Respond swiftly to security incidents and ensure thorough documentation.
* Engage in proactive threat hunting and analysis to detect emerging risks.
Vulnerability & Risk Management
* Lead regular system assessments and vulnerability scans.
* Ensure robust network segmentation, firewall health, and secure backups.
Security Architecture & Tools
* Oversee the deployment and management of critical security tools.
* Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT.
* Evaluate and enhance our security technology stack.
Collaboration & Communication
* Build trusted partnerships across IT and the broader organization to strengthen security culture.
* Support business continuity and disaster recovery planning with department leads.
* Manage vendor risk and ensure third-party compliance with internal standards.
Preferred Skills
* Familiarity with enterprise systems and platforms (e.g., ERP, CRM).
* Deep expertise in endpoint protection, network monitoring, and DLP tools.
* Calm, strategic approach to crisis management.
Qualifications
Working Environment:
* Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure.
* Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement.
* Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments.
* Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively.
* Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity.
* Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack.
EEO Statement
Danis is an Equal Opportunity Employer. Danis does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit and business need.
Please, no agency calls. Unsolicited resumes from agencies will be considered property of Danis, with no obligation for fees.
#LI-ONSITE
Auto-ApplySecurity Analyst
Cyber security analyst job in Marysville, OH
Sonsoft , Inc. is a USA based corporation duly organized under the laws of the Commonwealth of Georgia. Sonsoft Inc. is growing at a steady pace specializing in the fields of Software Development, Software Consultancy and Information Technology Enabled Services.
Job Description
MUSTS:-
Bachelor's degree in Information Systems or equivalent work experience of a minimum of 3-5 years as an information security risk management practitioner, preferably in the financial, consulting, and/or global organizations.
Prior work experience of risk management disciplines, security policies and standards, technology risk assessment, and third party supplier risk process and requirements.
Current or previous experience with risk assessment methodologies and conducting risk analysis in a regulated environment or related IT audit background.
Knowledge of security and control frameworks, such as ISO 27002, NIST, CobiT, COSO and ITIL.
Experience with implementation of information security best practices for key areas such as access control, data protection, systems development life cycle, PCI DSS, and cloud services.
Professional certification in risk management, and/or audit is preferred (e.g., CISSP, CRISC, CISA, or CISM).
WANTS:-
Demonstrate broad competency and understanding in a variety of IT security areas.
Security Policy Development and Management.
Assist with documenting security policies, standards, and guidelines.
based on the organization's requirements, maturity level, and compliance objectives.
Facilitate, coordinate, and maintain project schedules, plans, and scope using standard project management methodologies.
BUSINESS EXPERIENCE:-
Proven ability to work with and across all levels of the organizations and navigate organizational boundaries.
Excellent organizational, interpersonal and communication skills with strong written, oral, and presentation skills; both delivery and creation of power points (must be able to distill complex topics into simple concepts).
Ability to effectively communicate with technical and executive audiences and develop and maintain strong peer/client/customer relationships underpinned by a service oriented approach to work.
Adept with time management, tasks and projects prioritization, and multi-tasking.
High level of personal integrity, and the ability to professionally handle confidential matters and exude the appropriate level of judgment and maturity.
High degree of initiative, attention to detail, follow-up skills, deliver on commitments, dependability and ability to work with little supervision.
Demonstrated problem-solving skills and capability to drive process improvements.
Proficient with Microsoft Office Suite especially Excel and Power point.
DESCRIPTION:-
Implement the overall risk management framework and processes, tools, and reporting methodologies on a continuous cycle.
Develop and standardize processes and procedures for ongoing risk identification, tracking, monitoring, and evaluating security measures and remediation efforts; communicate security control deficiencies and recommend mitigation plans, report status progress and with non-compliance issues; measure adherence to the security controls from a policy, governance and risk standpoint.
Perform third party supplier risk assessments by reviewing contracts for compliance with security policies, standards and practices; document security gaps and recommend appropriate remediation actions as necessary to minimize risks to the business.
Assist with documenting security policies, standards, and guidelines based on the organization's requirements, maturity level, and compliance objectives.
Qualifications
Planning, designing and implementing an overall risk management process for the organization.
Risk identification, analysis, tracking, monitoring, documenting exceptions, and communicating risks to owners.
Risk assessment, which involves analyzing risks as well as identifying, describing and estimating the risks affecting the business.
Risk evaluation, which involves comparing estimated risks with criteria established by the organization such as costs, legal requirements and environmental factors, and evaluating the organization's previous handling of risks.
Establishing and quantifying the organization's 'risk appetite', i.e. the level of risk they are prepared to accept.
Risk reporting in an appropriate way for different audiences, for example, to the board of directors so they understand the most significant risks, to business heads to ensure they are aware of risks
relevant to their parts of the business and to individuals to understand their accountability for individual risks.
Corporate governance involving external risk reporting to stakeholders.
Carrying out processes such as purchasing insurance, implementing health and safety measures and making business continuity plans to limit risks and prepare for if things go wrong.
Conducting audits of policy and compliance to standards, including liaison with internal and external auditors.
Providing support, education and training to staff to build risk awareness within the organization.
Additional Information
**
U.S. citizens and those authorized to work in the U.S. are encouraged to apply
.
We are unable to sponsor at this time.
Note:-
This is a
Contract
job opportunity for you.
Only US Citizen, Green Card Holder, TN Visa, GC-EAD
,
H4-EAD & L2-EAD can apply.
No OPT-EAD & H1B Consultants please.
Please mention your
Visa Status
in your
email
or
resume
.
Information System Security Officer
Cyber security analyst job in Dayton, OH
Secure Your Future with the University of Dayton Research Institute! The University of Dayton's Research Institute (UDRI) is seeking a highly motivated and experienced Information System Security Officer to join our dynamic Sensor & Software Systems division in Warner Robins, GA. This is an exceptional opportunity to be part of a renowned research institution committed to excellence, innovation, and community engagement.
The Information System Security Officer (ISSO) position is supporting the Air Force Rapid Sustainment Office (RSO). The RSO increases mission readiness by rapidly identifying, applying and scaling technology essential to the operation and sustainment of the U.S. Air Force. Success comes from our teamwork and mutual respect for each other's talents and unique perspectives.
This role supports the government cyber lead and provides cybersecurity support for advanced software-intensive technologies to include agile manufacturing, conditioned-based maintenance, augmented reality/virtual reality, cloud-based infrastructure and services, and robotics.
Responsibilities:
• Serve as cybersecurity technical advisor, consultant, and primary point of contact to the Program Manager, Information System Owner, and other stakeholders for the Information systems
• Assessing systems for vulnerabilities and providing corrective recommendations.
• Supporting government Cyber lead in performing RMF activities leading to system RMF acceptance IAW DoDI 8510.01, NIST 800-series special publications, USAF policy and instructions, and guidance as applicable on RSO IT systems in networked, standalone, and cloud configurations.
• Support, coordinate, and continuously monitor system security posture and ensure adverse events are formally handled and reported
• Developing, reviewing, and updating necessary documentation associated with achieving RMF accreditation of each system.
• Applying currently accepted methods for documenting the RMF status of each RSO system within the DoD environment.
• Security Technical Implementation Guides (STIGs) for all systems
• Managing projects in compliance with DoD and AF RMF policies including but not limited to the following:
o DoDI 8500.01 - Cybersecurity Risk Management Framework for DoD Information Technology.
o DoD 8570.01 M - Information Assurance Training, Certification, and Workforce Management.
o CNSSI 1253 - Security Categorization and Control Selection for National Security Systems.
o NIST 800-series Special Publications (SP).
o Computer Security, including SP 800-53 - Security Controls and Assessment Procedures for Federal Information Systems and Organizations and Air Force Instruction Series 17.
Cyberspace:
Accomplishing system categorization, security control selection, security control implementation, security control assessment, and security control monitoring, including, but not limited to, accomplishing the RMF steps as outlined in DoDI 8510.01 on a system-by-system basis
• Providing system performance reporting.
• Support System Administrator for multiple cloud projects and implementations.
• Supporting Interim Authority to Test (IATT)/ Authority to Operate (ATO) planning and execution.
Minimum Qualifications:
• Associates Degree in Cybersecurity, Computer Science, or related field
• 3+ years relevant cybersecurity experience
• Experience with the NIST RMF process
• Security Technical Implementation Guides (STIGs) application experience
• The applicant must meet DoD 8570.01-M IAT Level II or higher certification requirements on hire date (Security+ CE)
• Familiarity with the DOD Information Assurance Vulnerability Management program
• Effective verbal and written communication skills
• Ability to obtain a Secret level security clearance
• Due to the requirements of our research contracts with the U.S. federal government, candidates for this position must be a U.S. citizen
Preferred Qualifications:
While not everyone may possess all of the preferred qualifications, the ideal candidate will bring many of the following:
• 5+ years' DoD cybersecurity experience
• IAT Level III or IAM Level I Certification
• Bachelor's Degree in Cybersecurity, Computer Science, or related field
• Additive Manufacturing experience
• Systems Administration experience
• Experience with Secure Development Operations Systems, as either a user, developer, or system administrator
• Experience with submission of system security package to DoD for ATO, IATO, etc
• Active Secret level security clearance.
• Familiarity with Enterprise Mission Assurance Support Service (eMASS).
• Experience with approved government cloud services such as Microsoft Azure, Amazon Web Services, Google Cloud.
• Relevant cloud infrastructure and security certifications (i.e. Office365, SharePoint, Amazon AWS)
• Cloud Application experience
• Experience managing various project activities ensuring accurate task completion
Special Instructions to Applicants:
To apply please submit a cover letter addressing each minimum qualification and any applicable preferred qualifications that you meet.
Closing Statement:
Informed by its Catholic and Marianist mission, the University is committed to the principles of diversity, equity, and inclusion. Informed by this commitment, we seek to increase diversity, achieve equitable outcomes, and model inclusion across our campus community. As an Affirmative Action and Equal Opportunity Employer, we will not discriminate against minorities, women, protected veterans, individuals with disabilities, or on the basis of age, race, color, national origin, religion, sex, sexual orientation or gender identity.
Computer Network Defense Analyst
Cyber security analyst job in Dayton, OH
Prime Time Consulting, a GRVTY Company, provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government. Computer Network Defense AnalystWe are actively searching for Computer Network Defense Analysts (CNDAs), located in Ohio, to support our team. We have varying levels of CNDAs, depending on years of experience and education.Duties
Conduct computer network defense.
Conduct target development for use or decision by Government personnel.
Analyze and produce intelligence information.
Conduct computer/network security to provide advice to the Government.
Create and maintain documentation of their analysis.
Ensure to routinely follow oversight and compliance
Acquire/share job knowledge/skill
Partner with team members on the contract, including government personnel and other partner companies
Qualifications
Degree in Computer Science or equivalent technical field
Level 1 - 6 years of experience can replace 2 years of experience with AA degree
Level 2 - 9 years of experience can replace 4 years of experience with BS degree
Level 3 - 12 years of experience can replace up to 6 years of experience with MS degree
Level 4 - 15 years of experience can replace up to 9 years with Doctorate degree
Strong communication skills
Works well in a team and alone
Working knowledge of Microsoft Office Suite
Company Perks
At PTC, a GRVTY Company, we believe that when our employees thrive, our company thrives. That's why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance.
Robust health plan including medical, dental, and vision
Health Savings Account with company contribution
Annual Paid Time Off and Paid Holidays
Paid Parental Leave
401k with generous company match
Training and Development Opportunities
Award Programs
Variety of Company Sponsored Events
Prime Time Consulting, a GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability. Anyone requiring reasonable accommodations should email ******************************* with requested details. A member of the HR team will respond to your request within 2 business days. Please review our current job openings and apply for the positions you believe may be a fit. If you are not an immediate fit, we will also keep your resume in our database for future opportunities.
Auto-ApplyInformation Security Compliance Analyst
Cyber security analyst job in Dayton, OH
":"As an Information Security Compliance Analyst, you will learn about the regulatory, contractual, and legislative requirements that affect technology used by our Company . You will be responsible for coordinating with internal and external parties to complete a variety of cyber security assessments, help raise security awareness of associates, provide guidance on industry standard cyber security requirements, and track on-going activities that help meet our security and compliance goals.
If you thrive on solving complex problems, embrace continuous learning, and approach challenges with curiosity and critical thinking, apply today! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Information Security Compliance Analyst","date":"2025-12-04","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Strong critical thinking skills required~^~Basic computer skills required~^~Strong written and verbal communication~^~Strong ability to drive task and organizing\/maintaining records~^~Ability to think creatively and strategically~^~Passion for learning new and emerging technology~^~Technology education or certifications, experience with enterprise IT environments, experience working with security regulatory requirements, and knowledge of security frameworks such as NIST CFS, NIST 800-53, ISO, PCI-DSS a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
Infrastructure Security Analyst
Cyber security analyst job in Dayton, OH
Versiti is a fusion of donors, scientific curiosity, and precision medicine that recognize the gifts of blood and life are precious. We are home to the world-renowned Blood Research Institute, we enable life saving gifts from our donors, and provide the science behind the medicine through our diagnostic laboratories. Versiti brings together outstanding minds with unparalleled experience in transfusion medicine, transplantation, stem cells and cellular therapies, oncology and genomics, diagnostic lab services, and medical and scientific expertise. This combination of skill and knowledge results in improved patient outcomes, higher quality services and reduced cost of care for hospitals, blood centers, hospital systems, research and educational institutions, and other health care providers. At Versiti, we are passionate about improving the lives of patients and helping our healthcare partners thrive.
Position Summary
The Infrastructure Security Analyst will play a critical role in ensuring the security and integrity of our IT systems and networks. This position involves a balanced focus on IT Systems and Network Support and Cybersecurity with a concentration on Vulnerability Management. The ideal candidate will possess both technical expertise and strong analytical skills to identify, mitigate, and manage vulnerabilities while supporting the overall IT infrastructure. The candidate will thrive in a dynamic, team-oriented environment, where knowledge sharing, and continuous learning are encouraged. As an integral part of our collaborative team, the Infrastructure Security Analyst will work closely with various IT departments, including network operations, system administration, and application development. This role includes direct collaboration with the Senior Cybersecurity Engineer to ensure thorough analysis, identification, and mitigation of infrastructure vulnerabilities. Together, the team will address evolving cyber threats, communicate complex security concepts to stakeholders across all levels, and promote an organization-wide security culture while supporting Versiti's business and operational goals. This position values teamwork, encouraging information sharing and joint problem-solving to fortify the organization's defenses. This role is essential in building a resilient IT infrastructure that can adapt to evolving threats while supporting the organization's business objectives.
Total Rewards Package
Benefits
Versiti provides a comprehensive benefits package based on your job classification. Full-time regular employees are eligible for Medical, Dental, and Vision Plans, Paid Time Off (PTO) and Holidays, Short- and Long-term disability, life insurance, 7% match dollar for dollar 401(k), voluntary programs, discount programs, others.
Responsibilities
Provide technical support for IT infrastructure, including servers, networks, and cloud services.
Monitor system performance, troubleshoot issues, and perform regular maintenance on IT systems and document system configurations, changes, and procedures for future reference and compliance audits.
Collaborate with IT teams to implement and maintain secure network configurations and ensure compliance with organizational policies while assisting in the deployment and configuration of hardware and software as needed.
Respond to and resolve service requests and incidents in a timely manner.
Conduct regular vulnerability assessments and penetration testing to identify security weaknesses within IT systems and networks and collaborate with IT teams to develop and implement mitigation strategies for identified vulnerabilities.
Analyze vulnerability scan reports and prioritize remediation efforts based on risk assessment and monitor security alerts and incidents, responding to security breaches or threats as necessary.
Maintain up-to-date knowledge of the latest cybersecurity threats, vulnerabilities, and trends. Utilize threat intelligence feeds and monitoring tools to proactively identify and mitigate potential security threats. Provide recommendations for security improvements and help implement new security controls.
Performs other duties as required or assigned which are reasonably within the scope of the duties in this job classification
Understands and performs in accordance with all applicable regulatory and compliance requirements
Complies with all standard operating policies and procedures
Qualifications
Education
Bachelor's Degree Computer Science, Information Technology, Cybersecurity, or a related field preferred
Experience
4-6 years Demonstrated experience installing, managing and troubleshooting Linux and/or Microsoft Server environments. required
4-6 years Experience with Enterprise Data Center Server and Network environments. required
4-6 years Experience in conducting vulnerability assessments and penetration testing. required
Demonstrated experience with VMware Server and storage management. preferred
Knowledge, Skills and Abilities
Understanding of patch management processes and tools required
Knowledge of common security frameworks (e.g., NIST, ISO 27001, CIS Controls) required
Strong analytical and problem-solving skills. required
Excellent communication skills, both verbal and written, with the ability to explain technical concepts to non-technical stakeholders. required
Strong attention to detail and ability to work independently as well as part of a team. required
Experience with ticketing systems and IT service management processes. required
Familiarity with scripting languages (e.g., PowerShell, Python). preferred
Licenses and Certifications
Certified Ethical Hacker (CEH) desired
CISSP Certified Information Systems Security Professional desired
Microsoft Certified Systems Engineer (MCSE) preferred
Microsoft Certified Systems Administrator (MCSA) preferred
CompTIA Network+ Certification preferred
CompTIA Security+ Certification preferred
Tools and Technology
Proficiency in network protocols, firewalls, VPNs, and security appliances. required
Knowledge of operating systems (Windows, Linux) and cloud environments (AWS, Azure). required
Experience with vulnerability assessment tools (e.g., Nessus, Qualys, Rapid7). preferred
Experience with container technologies (e.g., Docker, Kubernetes) preferred
Familiarity with threat intelligence and incident response processes. preferred
#LI-EH1
#LI-Hybrid
Not ready to apply? Connect with us for general consideration.
Auto-ApplyInformation Security Analyst (On-Site Position)
Cyber security analyst job in Miamisburg, OH
IS ON-SITE AT OUR CINCINNATI, OHIO OFFICE **
At Danis, we don't just build projects-we build trust. Since 1916, our reputation has been defined by integrity, innovation, and a relentless commitment to delivering exceptional results. We approach every challenge with a problem-solving mindset, combining precision, creativity, and collaboration to bring our clients' visions to life.
We know that our people are the foundation of our success. That's why we invest heavily in their growth. Through Danis University, employees have access to more than 45 specialized training programs designed to support continuous learning and career advancement. Join us and become part of a team that values your expertise, supports work-life balance, and empowers you to thrive professionally.
One of the ways we protect that success is through a strong cybersecurity foundation-led by dedicated professionals who stay ahead of emerging threats. As an Information Security Analyst, you'll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You'll monitor, investigate, and respond to security events while shaping our company's cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience. This position reports to the CIO.
Why Join Danis?
Make an Impact: Lead healthcare projects that support medical professionals and improve patient care. Your work will have a lasting, positive effect on communities.
Competitive Compensation: Enjoy annual merit increases and bonuses.
Comprehensive Benefits: Health and dental insurance for you and your family, as well as life insurance, disability coverage, and supplemental insurance options.
Secure Your Future: 401K plan and profit-sharing opportunities.
Work-Life Balance: Generous PTO and vacation time, because we value your time outside of work.
Give Back: Participate in our “Constructing Hope” program to contribute to meaningful community outreach projects.
Career Development: Access 45+ training programs through Danis University to enhance your skills and grow your career.
What You'll Bring
Bachelor's degree in Cybersecurity, Information Technology, or a related field.
3+ years of hands-on experience in cybersecurity or a related discipline.
Working knowledge of security frameworks (e.g., NIST, ISO 27001).
Proficiency with security tools (e.g., SIEM, EDR, vulnerability scanners).
Strong analytical and investigative mindset.
Clear, confident communication and collaboration skills.
Experience managing cross-functional projects and navigating complex security challenges.
Responsibilities
Your Impact:
Strategic Leadership
Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices.
Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives.
Governance, Risk, & Compliance
Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps.
Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act).
Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics.
Training & Awareness
Drive cybersecurity awareness through engaging education initiatives.
Oversee new hire onboarding for required cyber training.
Facilitate tabletop exercises to simulate and prepare for real-world scenarios.
Threat Detection & Response
Continuously monitor systems for suspicious activity or breaches.
Respond swiftly to security incidents and ensure thorough documentation.
Engage in proactive threat hunting and analysis to detect emerging risks.
Vulnerability & Risk Management
Lead regular system assessments and vulnerability scans.
Ensure robust network segmentation, firewall health, and secure backups.
Security Architecture & Tools
Oversee the deployment and management of critical security tools.
Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT.
Evaluate and enhance our security technology stack.
Collaboration & Communication
Build trusted partnerships across IT and the broader organization to strengthen security culture.
Support business continuity and disaster recovery planning with department leads.
Manage vendor risk and ensure third-party compliance with internal standards.
Preferred Skills
Familiarity with enterprise systems and platforms (e.g., ERP, CRM).
Deep expertise in endpoint protection, network monitoring, and DLP tools.
Calm, strategic approach to crisis management.
Your Impact:
Strategic Leadership
Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices.
Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives.
Governance, Risk, & Compliance
Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps.
Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act).
Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics.
Training & Awareness
Drive cybersecurity awareness through engaging education initiatives.
Oversee new hire onboarding for required cyber training.
Facilitate tabletop exercises to simulate and prepare for real-world scenarios.
Threat Detection & Response
Continuously monitor systems for suspicious activity or breaches.
Respond swiftly to security incidents and ensure thorough documentation.
Engage in proactive threat hunting and analysis to detect emerging risks.
Vulnerability & Risk Management
Lead regular system assessments and vulnerability scans.
Ensure robust network segmentation, firewall health, and secure backups.
Security Architecture & Tools
Oversee the deployment and management of critical security tools.
Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT.
Evaluate and enhance our security technology stack.
Collaboration & Communication
Build trusted partnerships across IT and the broader organization to strengthen security culture.
Support business continuity and disaster recovery planning with department leads.
Manage vendor risk and ensure third-party compliance with internal standards.
Preferred Skills
Familiarity with enterprise systems and platforms (e.g., ERP, CRM).
Deep expertise in endpoint protection, network monitoring, and DLP tools.
Calm, strategic approach to crisis management.
Qualifications Working Environment:
Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure.
Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement.
Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments.
Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively.
Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity.
Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack.
Working Environment:
Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure.
Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement.
Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments.
Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively.
Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity.
Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack.
EEO Statement
Danis is an Equal Opportunity Employer. Danis does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit and business need.
Please, no agency calls. Unsolicited resumes from agencies will be considered property of Danis, with no obligation for fees.
#LI-ONSITE
Auto-ApplySecurity Analyst (In-Persons Interview)
Cyber security analyst job in Marysville, OH
SonSoft Inc. is a USA based corporation duly organized under the laws of the Commonwealth of Georgia. SonSoft Inc is growing at a steady pace specializing in the fields of Software Development, Software Consultancy and Information Technology Enabled Services.
Job Description
Implement the overall risk management framework and processes, tools, and reporting methodologies on a continuous cycle.
Develop and standardize processes and procedures for ongoing risk identification, tracking, monitoring, and evaluating security measures and remediation efforts; communicate security control deficiencies and recommend mitigation plans, report status progress and with non-compliance issues; measure adherence to the security controls from a policy, governance and risk standpoint.
Perform third party supplier risk assessments by reviewing contracts for compliance with security policies, standards and practices; document security gaps and recommend appropriate remediation actions as necessary to minimize risks to the business.
Assist with documenting security policies, standards, and guidelines based on the organization's requirements, maturity level, and compliance objectives.
Facilitate awareness communications to various audiences, coordinate, and maintain project schedules, plans, and scope using standard project management methodologies.
Daily Task Performed:-
Planning, designing and implementing an overall risk management process for the organization;
Risk identification, analysis, tracking, monitoring, documenting exceptions, and communicating risks to owners
risk assessment, which involves analyzing risks as well as identifying, describing and estimating the risks affecting the business;
risk evaluation, which involves comparing estimated risks with criteria established by the organization such as costs, legal requirements and environmental factors, and evaluating the organization's previous handling of risks;
establishing and quantifying the organization's 'risk appetite', i.e. the level of risk they are prepared to accept;
risk reporting in an appropriate way for different audiences, for example, to the board of directors so they understand the most significant risks, to business heads to ensure they are aware of risks relevant to their parts of the business and to individuals to understand their accountability for individual risks;
corporate governance involving external risk reporting to stakeholders;
carrying out processes such as purchasing insurance, implementing health and safety measures and making business continuity plans to limit risks and prepare for if things go wrong;
conducting audits of policy and compliance to standards, including liaison with internal and external auditors;
providing support, education, and training to staff to build risk awareness within the organization
maintaining current documentation of all related activities for GRC Unit
Musts
Bachelor degree in Information Systems or equivalent work experience of a minimum of 3-5 years as an information security risk management practitioner, preferably in the financial, consulting, and/or global organizations
Prior work experience of risk management disciplines, security policies and standards, technology risk assessment, and third party supplier risk process and requirements
Current or previous experience with risk assessment methodologies and conducting risk analysis in a regulated environment or related IT audit background
Knowledge of security and control frameworks, such as ISO 27002, NIST, CobiT, COSO and ITIL
Experience with implementation of information security best practices for key areas such as access control, data protection, systems development life cycle, PCI DSS, and cloud services
Professional certification in risk management, and/or audit is preferred (e.g., CISSP, CRISC, CISA, or CISM)
Qualifications
Business Experience:-
Proven ability to work with and across all levels of the organizations and navigate organizational boundaries
Excellent organizational, interpersonal and communication skills with strong written, oral, and presentation skills; both delivery and creation of power points (must be able to distil complex topics into simple concepts)
Ability to effectively communicate with technical and executive audiences and develop and maintain strong peer/client/customer relationships underpinned by a service oriented approach to work
Adept at time management, tasks and projects prioritization, and multi-tasking
High level of personal integrity, and the ability to professionally handle confidential matters and exude the appropriate level of judgment and maturity
High degree of initiative, attention to detail, follow-up skills, deliver on commitments, dependability, and ability to work with little supervision
Demonstrated problem-solving skills and capability to drive process improvements
Highly proficient with Microsoft Office Suite especially Excel and PowerPoint; and SharePoint administration.
Wants:-
Demonstrate broad competency and understanding in a variety of IT security areas:
Security Policy Development and Management
Assist with documenting security policies, standards, standard operating procedures and guidelines based on the organization's requirements, maturity level, and compliance objectives.
· Risk Management
Perform risk assessments, generate risk reports/updates, tracking progress of remediation efforts.
Security Awareness
Facilitate and distribute communications to various audiences to promote about GRC Unit's objectives and goals.
Information security risk management, risk assessments, reporting, tracking and strong interpersonal and communication skills.
Additional Information
Connect with me at
*******************************************
(For Direct Clients Requirements)
** U.S. Citizens and those who are authorized to work independently in the United States are encouraged to apply. We are unable to sponsor at this time.
Note:-
This is a
Contract job opportunity
for you.
Only
US Citizen
,
Green Card Holder
,
GC-EAD
,
H4-EAD & L2-EAD
can apply.
No
OPT-EAD, H1B & TN
candidates,
please.
Please mention your
Visa Status
in your
email
or
resume
.
**
All your information will be kept confidential according to EEO guidelines.
Information Security Analyst 2
Cyber security analyst job in New Bremen, OH
: Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
Information Security Analyst 2
Job Duties
* Governance, Risk, & Compliance (GRC) Application Subject Matter Expert - Operate and maintain Company's Governance, Risk and Compliance (GRC) platform, its libraries, reports, portals, and data integrations to effectively support operations, data accuracy and user processes. Serve as the primary liaison for GRC software vendors, by maintaining contact with vendor representatives, submitting troubleshooting tickets and software feedback to improve the user experience. Support Company's Enterprise Risk Management, Compliance, Vendor Management, Business Continuity Planning, Information Technology and Security, Project Management and Audit Programs with data entry, maintenance, and configuration. Develop, maintain, and distribute custom and ad hoc reporting of risk data including taxonomy analytics and Key Risk Indicators (KRI's).
* Security Architecture & Control Design - Develop/integrate cybersecurity designs for systems and networks for the processing of company data. Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements. Ensure that acquired or developed systems and architectures are consistent with company's cybersecurity architecture guidelines.
* Risk Assessment - Coordinate external risk assessments including audits, gap assessments, and penetration testing to evaluate security architectures and designs to determine the adequacy of security design and architecture. Determine protection needs (i.e., security controls) for company's information processing and document appropriately. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
* Incident Response Communication- Coordinate communication and information sharing aspects of incident response. Draft messages and updates to internal and external audiences for Incident Response Team (IRT) review, such as employees, customers, partners, media, or public. Handle crisis management issues and provides guidance and education on incident prevention and response best practices. Perform other duties as assigned.
Minimum Qualifications
* 2-4 years related experience
* Associate's degree (Information Technology, Cyber Security, Computer Science)
* Non-degree considered if 6+ years of related experience along with a high school diploma (GED)
Preferred Qualifications
Intermediate knowledge of various Information Security & Privacy Frameworks such as the Secure Controls Framework, NIST CSF, NIST 800-171, NIST 800-53, NIST Privacy Framework, ISO-27001, ISO-27701, GDPR, US & other global privacy regulations. Work experience in other Information Technology disciplines such as software development, help desk, networking, systems administration or similar in conjunction with professional certifications such as CASP+, CISSP Associate, or AWS Associate Level Certifications. Intermediate level of knowledge in at least one scripting or software development language such as PowerShell, Bash, Java, or Python. Good written and oral communication skills, deductive reasoning, and analytical investigative skills. Good interpersonal skills to facilitate positive relations between business groups. Requires excellent verbal and written communication skills, as well as a knowledge of company's culture and values.
Work Authorization:
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
Compensation and Benefits:
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities
Nearest Major Market: Lima
Nearest Secondary Market: Findlay
Job Segment: Information Security, Data Entry, Help Desk, Information Technology, Computer Science, Technology, Administrative
Information Security Analyst 2
Cyber security analyst job in New Bremen, OH
: Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
**Information Security Analyst 2**
**Job Duties**
+ Governance, Risk, & Compliance (GRC) Application Subject Matter Expert - Operate and maintain Company's Governance, Risk and Compliance (GRC) platform, its libraries, reports, portals, and data integrations to effectively support operations, data accuracy and user processes. Serve as the primary liaison for GRC software vendors, by maintaining contact with vendor representatives, submitting troubleshooting tickets and software feedback to improve the user experience. Support Company's Enterprise Risk Management, Compliance, Vendor Management, Business Continuity Planning, Information Technology and Security, Project Management and Audit Programs with data entry, maintenance, and configuration. Develop, maintain, and distribute custom and ad hoc reporting of risk data including taxonomy analytics and Key Risk Indicators (KRI's).
+ Security Architecture & Control Design - Develop/integrate cybersecurity designs for systems and networks for the processing of company data. Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements. Ensure that acquired or developed systems and architectures are consistent with company's cybersecurity architecture guidelines.
+ Risk Assessment - Coordinate external risk assessments including audits, gap assessments, and penetration testing to evaluate security architectures and designs to determine the adequacy of security design and architecture. Determine protection needs (i.e., security controls) for company's information processing and document appropriately. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
+ Incident Response Communication- Coordinate communication and information sharing aspects of incident response. Draft messages and updates to internal and external audiences for Incident Response Team (IRT) review, such as employees, customers, partners, media, or public. Handle crisis management issues and provides guidance and education on incident prevention and response best practices. Perform other duties as assigned.
**Minimum Qualifications**
+ 2-4 years related experience
+ Associate's degree (Information Technology, Cyber Security, Computer Science)
+ Non-degree considered if 6+ years of related experience along with a high school diploma (GED)
**Preferred Qualifications**
Intermediate knowledge of various Information Security & Privacy Frameworks such as the Secure Controls Framework, NIST CSF, NIST 800-171, NIST 800-53, NIST Privacy Framework, ISO-27001, ISO-27701, GDPR, US & other global privacy regulations. Work experience in other Information Technology disciplines such as software development, help desk, networking, systems administration or similar in conjunction with professional certifications such as CASP+, CISSP Associate, or AWS Associate Level Certifications. Intermediate level of knowledge in at least one scripting or software development language such as PowerShell, Bash, Java, or Python. Good written and oral communication skills, deductive reasoning, and analytical investigative skills. Good interpersonal skills to facilitate positive relations between business groups. Requires excellent verbal and written communication skills, as well as a knowledge of company's culture and values.
**Work Authorization:**
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
**Compensation and Benefits:**
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities